Design and Build a User-Facing Service Catalog

  • Buy Link or Shortcode: {j2store}395|cart{/j2store}
  • member rating overall impact: 9.3/10 Overall Impact
  • member rating average dollars saved: $62,821 Average $ Saved
  • member rating average days saved: 29 Average Days Saved
  • Parent Category Name: Service Management
  • Parent Category Link: /service-management
  • Business users don’t know what breadth of services are available to them.
  • It is difficult for business users to obtain useful information regarding services because they are often described in technical language.
  • Business users have unrealistic expectations of what IT can do for them.
  • There is no defined agreement on what is available, so the business assumes everything is.

Our Advice

Critical Insight

  • Define services from the business user’s perspective, not IT’s perspective.
    • A service catalog is of no use if a user looks at it and sees a significant amount of information that doesn’t apply to them.
  • Separate the enterprise services from the Line of Business (LOB) services.
    • This will simplify the process of documenting your service definitions and make it easier for users to navigate, which leads to a higher chance of user acceptance.

Impact and Result

  • Our program helps you organize your services in a way that is relevant to the users, and practical and manageable for IT.
  • Our approach to defining and categorizing services ensures your service catalog remains a living document. You may add or revise your service records with ease.
  • Our program creates a bridge between IT and the business. Begin transforming IT’s perception within the organization by communicating the benefits of the service catalog.

Design and Build a User-Facing Service Catalog Research & Tools

Start here – read the Executive Brief

Read our concise executive brief to understand why building a Service Catalog is a good idea for your business, and how following our approach will help you accomplish this difficult task.

Besides the small introduction, subscribers and consulting clients within this management domain have access to:

1. Launch the project

The Launch the Project phase will walk through completing Info-Tech's project charter template. This phase will help build a balanced project team, create a change message and communication plan, and achieve buy-in from key stakeholders.

  • Design & Build a User-Facing Service Catalog – Phase 1: Launch the Project
  • Service Catalog Project Charter

2. Identify and define enterprise services

The Identify and Define Enterprise Services phase will help to target enterprise services offered by the IT team. They are offered to everyone in the organization, and are grouped together in logical categories for users to access them easily.

  • Design & Build a User-Facing Service Catalog – Phase 2: Identify and Define Enterprise Services
  • Sample Enterprise Services

3. Identify and define Line of Business (LOB) services

After completing this phase, all services IT offers to each LOB or functional group should have been identified. Each group should receive different services and display only these services in the catalog.

  • Design & Build a User-Facing Service Catalog – Phase 3: Identify and Define Line of Business Services
  • Sample LOB Services – Industry Specific
  • Sample LOB Services – Functional Group

4. Complete the Services Definition Chart

Completing the Services Definition Chart will help the business pick which information to include in the catalog. This phase also prepares the catalog to be extended into a technical service catalog through the inclusion of IT-facing fields.

  • Design & Build a User-Facing Service Catalog – Phase 4: Complete Service Definitions
  • Services Definition Chart
[infographic]

Workshop: Design and Build a User-Facing Service Catalog

Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

1 Launch the Project

The Purpose

The purpose of this module is to help engage IT with business decision making.

Key Benefits Achieved

This module will help build a foundation for the project to begin. The buy-in from key stakeholders is key to having them take onus on the project’s completion.

Activities

1.1 Assemble the project team.

1.2 Develop a communication plan.

1.3 Establish metrics for success.

1.4 Complete the project charter.

Outputs

A list of project members, stakeholders, and a project leader.

A change message, communication strategy, and defined benefits for each user group.

Metrics used to monitor the usefulness of the catalog, both from a performance and monetary perspective.

A completed project charter to engage users in the initiative.

2 Identify and Define Enterprise Services

The Purpose

The purpose of this module is to review services which are offered across the entire organization.

Key Benefits Achieved

A complete list of enterprise services defined from the user’s perspective to help them understand what is available to them.

Activities

2.1 Identify enterprise services used by almost everyone across the organization.

2.2 Categorize services into logical groups.

2.3 Define the services from the user’s perspective.

Outputs

A complete understanding of enterprise services for both IT service providers and business users.

Logical groups for organizing the services in the catalog.

Completed definitions in business language, preferably reviewed by business users.

3 Identify and Define Line of Business (LOB) Services

The Purpose

The purpose of this module is to define the remaining LOB services for business users, and separate them into functional groups.

Key Benefits Achieved

Business users are not cluttered with LOB definitions that do not pertain to their business activities.

Business users are provided with only relevant IT information.

Activities

3.1 Identify the LOBs.

3.2 Determine which one of two methodologies is more suitable.

3.3 Identify LOB services using appropriate methodology.

3.4 Define services from a user perspective.

Outputs

A structured view of the different functional groups within the business.

An easy to follow process for identifying all services for each LOB.

A list of every service for each LOB.

Completed definitions in business language, preferably reviewed by business users.

4 Complete the Full Service Definitions

The Purpose

The purpose of this module is to guide the client to completing their service record definitions completely.

Key Benefits Achieved

This module will finalize the deliverable for the client by defining every user-facing service in novice terms.

Activities

4.1 Understand the components to each service definition (information fields).

4.2 Pick which information to include in each definition.

4.3 Complete the service definitions.

Outputs

A selection of information fields to be included in the service catalog.

A selection of information fields to be included in the service catalog.

A completed service record design, ready to be implemented with the right tool.

Further reading

Design and Build a User-Facing Service Catalog

Improve user satisfaction with IT with a convenient menu-like catalog.

Our understanding of the problem

This Research Is Designed For:

  • CIOs
  • Directors and senior managers within IT and the business

This Research Will Help You:

  • Articulate all of the services IT provides to the business in a language the business users understand.
  • Improve IT and business alignment through a common understanding of service features and IT support.

This Research Will Help Them

  • Standardize and communicate how users request access to services.
  • Standardize and communicate how users obtain support for services.
  • Clearly understand IT’s role in providing each service.

What is a service catalog?

The user-facing service catalog is the go-to place for IT service-related information.

The catalog defines, documents, and organizes the services that IT delivers to the organization. The catalog also describes the features of the services and how the services are intended to be used.

The user-facing service catalog creates benefits for both the business and IT.

For business users, the service catalog:

  1. Documents how to request access to the service, hours of availability, delivery timeframes, and customer responsibilities.
  2. Specifies how to obtain support for the services, support hours, and documentation.

For IT, the service catalog:

  1. Identifies who owns the services and who is authorized to use the services.
  2. Specifies IT support requirements for the services, including support hours and documentation.

What is the difference between a user-facing service catalog and a technical service catalog?

This blueprint is about creating a user-facing service catalog written and organized in a way that focuses on the services from the business’ view.

User facing

User-friendly, intuitive, and simple overview of the services that IT provides to the business.

The items you would see on the menu at a restaurant are an example of User Facing. The content is relatable and easy to understand.

Technical

Series of technical workflows, supporting services, and the technical components that are required to deliver a service.

The recipe book with cooking instructions is an example of Technical Facing. This catalog is intended for the IT teams and is “behind the scene.”

What is a service and what does it mean to be service oriented?

The sum of the people, processes, and technologies required to enable users to achieve a business outcome is a Service.

A service is used directly by the end users and is perceived as a coherent whole.

Business Users →Service = Application & Systems + People & Processes

Service Orientation is…

  • A focus on business requirements and business value, rather than IT driven motives.
  • Services are designed to enable required business activities.
  • Services are defined from the business perspective using business language.

In other words, put on your user hat and leave behind the technical jargons!

A lack of a published user-facing service catalog could be the source of many pains throughout your organization

IT Pains

  • IT doesn’t understand all the services they provide.
  • Business users would go outside of IT for solutions, proliferating shadow IT.
  • Business users have a negative yet unrealistic perception of what IT is capable of.
  • IT has no way of managing expectations for their users, which tend to inflate.
  • There is often no defined agreement on services; the business assumes everything is available.

Business Pains

  • Business users don’t know what services are available to them.
  • It is difficult to obtain useful information regarding a service because IT always talks in technical language.
  • Without a standard process in place, business users don’t know how to request access to a service with multiple sources of information available.
  • Receiving IT support is a painful, long process and IT doesn’t understand what type of support the business requires.

An overwhelming majority of IT organizations still need to improve how they demonstrate their value to the business

This image contains a pie chart with a slice representing 23% of the circle This image contains a pie chart with a slice representing 47% of the circle This image contains a pie chart with a slice representing 92% of the circle

23% of IT is still viewed as a cost center.

47% of business executives believe that business goals are going unsupported by IT.

92% of IT leaders see the need to prove the business value of IT’s contribution.

How a Service Catalog can help:

Use the catalog to demonstrate how IT is an integral part of the organization and IT services are essential to achieve business objectives.

Source: IT Communication in Crisis Report

Transform the perception of IT by articulating all the services that are provided through the service catalog in a user-friendly language.

Source: Info-Tech Benchmarking and Diagnostic Programs

Increase IT-business communication and collaboration through the service catalog initiative. Move from technology focused to service-oriented.

Source: IT Communication in Crisis Report

Project Steps

Phase 1 – Project Launch

1.2 Project Team

The team must be balanced between representatives from the business and IT.

1.2 Communication Plan

Communication plan to facilitate input from both sides and gain adoption.

1.3 Identify Metrics

Metrics should reflect the catalog benefits. Look to reduced number of service desk inquiries.

1.4 Project Charter

Project charter helps walk you through project preparation.

This blueprint separates enterprise service from line of business service.

This image contains a comparison between Enterprise IT Service and Line of Business Service, which will be discussed in further detail later in this blueprint.

Project steps

Phase 2 – Identify and Define Enterprise Services

2.1 Identify the services that are used across the entire organization.

2.2 Users must be able to identify with the service categories.

2.3 Create basic definitions for enterprise services.

Phase 3 – Identify and Define Line of Business Services

3.1 Identify the different lines of business (LOBs) in the organization.

3.2 Understand the differences between our two methodologies for identifying LOB services.

3.3 Use methodology 1 if you have thorough knowledge of the business.

3.4 Use methodology 2 if you only have an IT view of the LOB.

Phase 4 – Complete Service Definitions

4.1 Understand the different components to each service definition, or the fields in the service record.

4.2 Identify which information to include for each service definition.

4.3 Define each enterprise service according to the information and field properties.

4.3 Define each LOB service according to the information and field properties.

Define your service catalog in bundles to achieve better catalog design in the long run

Trying to implement too many services at once can be overwhelming for both IT and the users. You don’t have to define and implement all of your services in one release of the catalog.

Info-Tech recommends implementing services themselves in batches, starting with enterprise, and then grouping LOB services into separate releases. Why? It benefits both IT and business users:

  • It enables a better learning experience for IT – get to test the first release before going full-scale. In other words, IT gets a better understanding of all components of their deliverable before full adoption.
  • It is easier to meet customer agreements on what is to be delivered early, and easier to be able to meet those deadlines.
This image depicts how you can use bundles to simplify the process of catalog design using bundles. The cycle includes the steps: Identify Services; Select a Service Bundle; Review Record Design; followed by a cycle of: Pick a service; Service X; Service Data Collection; Create Service Record, followed by Publish the bundle; Communicate the bundle; Rinse and Repeat.

After implementing a service catalog, your IT will be able to:

Use the service catalog to communicate all the services that IT provides to the business.

Improve IT’s visibility within the organization by creating a single source of information for all the value creating services IT has to offer. The service catalog helps the business understand the value IT brings to each service, each line of business, and the overall organization.

Concentrate more on high-value IT services.

The service catalog contains information which empowers business users to access IT services and information without the help of IT support staff. The reduction in routine inquiries decreases workload and increases morale within the IT support team, and allows IT to concentrate on providing higher value services.

Reduce shadow IT and gain control of services.

Service catalog brings more control to your IT environment by reducing shadow IT activities. The service catalog communicates business requests responsively in a language the business users understand, thus eliminating the need for users to seek outside help.

After implementing a service catalog, your business will be able to:

Access IT services with ease.

The language of IT is often confusing for the business and the users don’t know what to do when they have a concern. With a user-facing service catalog, business users can access information through a single source of information, and better understand how to request access or receive support for a service through clear, consistent, and business-relevant language.

Empower users to self-serve.

The service catalog enables users to “self-serve” IT services. Instead of calling the service desk every time an issue occurs, the users can rely on the service catalog for information. This simplified process not only reduces routine service requests, but also provides information in a faster, more efficient manner that increases productivity for both IT and the business.

Gain transparency on the IT services provided.

With every service clearly defined, business users can better understand the current support level, communicate their expectation for IT accountability, and help IT align services with critical business strategies.

Leverage the different Info-Tech deliverable tools to help you along the way

1. Project Charter

A project charter template with a few samples completed. The project charter helps you govern the project progress and responsibilities.

2. Enterprise Service Definitions

A full list of enterprise definitions with features and descriptions pre-populated. These are meant to get you on your feet defining your own enterprise services, or editing the ones already there.

3. Basic Line of Business Service Definitions

Similar to the enterprise services deliverable, but with two separate deliverables focusing on different perspectives – functional groups services (e.g. HR and finance) and industry-specific services (e.g. education and government).

Service Definitions & Service Record Design

Get a taste of a completed service catalog with full service definitions and service record design. This is the final product of the service catalog design once all the steps and activities have been completed.

The service catalog can be the foundation of your future IT service management endeavors

After establishing a catalog of all IT services, the following projects are often pursued for other objectives. Service catalog is a precursor for all three.

1. Technical Service Catalog

Need an IT-friendly breakdown of each service?
Keep better record of what technical components are required to deliver a service. The technical service catalog is the IT version of a user-facing catalog.

2. Service-Based Costing

Want to know how much each IT service is costing you?
Get a better grip on the true cost of IT. Using service-based costing can help justify IT expenses and increase budgetary allotment.

3. Chargeback

Want to hold each business unit accountable for the IT services they use?
Some business units abuse their IT services because they are thought to be free. Keep them accountable and charge them for what they use.

The service catalog need not be expensive – organizations of all sizes (small, medium, large) can benefit from a service catalog

No matter what size organization you may be, every organization can create a service catalog. Small businesses can benefit from the catalog the same way a large organization can. We have an easy step-by-step methodology to help introduce a catalog to your business.

It is common that users do not know where to go to obtain services from IT… We always end up with a serious time-crunch at the beginning of a new school year. With automated on- and off-boarding services, this could change for the better.Dean Obermeyer, Technology Coordinator, Los Alamos Public Schools

CIO Call to Action

As the CIO and the project sponsor, you need to spearhead the development of the service catalog and communicate support to drive engagement and adoption.

    Start

  1. Select an experienced project leader
  2. Identify stakeholders and select project team members with the project leader
  3. Throughout the project

  4. Attend or lead the project kick-off meeting
  5. Create checkpoints to regularly touch base with the project team
  6. Service catalog launch

  7. Communicate the change message from beginning to implementation

Identify a project leader who will drive measurable results with this initiative

The project leader acts on behalf of the CIO and must be a senior level staff member who has extensive knowledge of the organization and experiences marshalling resources.

Influential & Impactful

Developing a service catalog requires dedication from many groups within IT and outside of IT.
The project leader must hold a visible, senior position and can marshal all the necessary resources to ensure the success of the project. Ability to exert impact and influence around both IT and the business is a must.

Relationship with the Business

The user-facing service catalog cannot be successful if business input is not received.
The project leader must leverage his/her existing relationship with the business to test out the service definitions and the service record design.

Results Driven

Creating a service catalog is not an easy job and the project leader must continuously engage the team members to drive results and efficiency.
The highly visible nature of the service catalog means the project leader must produce a high-quality outcome that satisfies the business users.

Info-Tech’s methodology helps organization to standardize how to define services

CASE STUDY A
Industry Municipal Government
Source Onsite engagement

Municipal Government
The IT department of a large municipal government in the United States provides services to a large number of customers in various government agencies.
Service Catalog Initiative
The municipal government allocated a significant amount of resources to answer routine inquiries that could have been avoided through user self-service. The government also found that they do not organize all the services IT provides, and they could not document and publish them to the customer. The government has already begun the service catalog initiative, but was struggling with how to identify services. Progress was slow because people were arguing amongst themselves – the project team became demoralized and the initiative was on the brink of failure.
Results
With Info-Tech’s onsite support, the government was able to follow a standardized methodology to identify and define services from the user perspective. The government was able to successfully communicate the initiative to the business before the full adoption of the service catalog.

We’re in demos with vendors right now to purchase an ITSM tool, and when the first vendor looked at our finished catalog, they were completely impressed.- Client Feedback

[We feel] very confident. The group as a whole is pumped up and empowered – they're ready to pounce on it. We plan to stick to the schedule for the next three months, and then review progress/priorities. - Client Feedback

CASE STUDY B
Industry Healthcare
Source Onsite engagement

Healthcare Provider
The organization is a healthcare provider in Canada. It treats patients with medical emergencies, standard operations, and manages a faculty of staff ranging from nurses and clerks, to senior doctors. This organization is run across several hospitals, various local clinics, and research centers.
Service Catalog Initiative
Because the organization is publicly funded, it is subject to regular audit requirements – one of which is to have a service catalog in place.
The organization also would like to charge back its clients for IT-related costs. In order to do this, the organization must be able to trace it back to each service. Therefore, the first step would be to create a user-facing service catalog, followed by the technical service catalog, which then allows the organization to do service-based costing and chargeback.
Results
By leveraging Info-Tech’s expertise on the subject, the healthcare provider was able to fast-track its service catalog development and establish the groundwork for chargeback abilities.

"There is always some reticence going in, but none of that was apparent coming out. The group dynamic was very good. [Info-Tech] was able to get that response, and no one around the table was silent.
The [expectation] of the participants was that there was a purpose in doing the workshop. Everybody knew it was for multiple reasons, and everyone had their own accountability/stakes in the development of it. Highly engaged."
- Client Feedback

Info-Tech offers various levels of support to best suit your needs

DIY Toolkit

“Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful.”

Guided Implementation

“Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track.”

Workshop

“We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place.”

Consulting

“Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project.”

Diagnostics and consistent frameworks used throughout all four options

Launch the Project

Identify Enterprise Services

Identify Line of Business Services

Complete Service Definitions

Best-Practice Toolkit

1.1 Assemble the project team.

1.2 Develop a communication plan.

1.3 Establish metrics for success.

1.4 Complete the project charter.

2.1 Identify services available organization-wide.

2.2 Categorize services into logical groups.

2.3 Define the services.

3.1 Identify different LOBs.

3.2 Pick one of two methodologies.

3.3 Use method to identify LOB services.

4.1 Learn components to each service definition.

4.2 Pick which information to include in each definition.

4.3 Define each service accordingly.

Guided Implementations Identify the project leader with the appropriate skills.

Assemble a well-rounded project team.

Develop a mission statement and change messages.

Create a comprehensive list of enterprise services that are used across the organization.

Create a categorization scheme that is based on the needs of the business users.

Walk through the two Info-Tech methodologies and understand which one is applicable.

Define LOB services using the appropriate methodology.

Decide what should be included and what should be kept internal for the service record design.

Complete the full service definitions.

Onsite Workshop Phase 1 Results:

Clear understanding of project objectives and support obtained from the business.

Phase 2 Results:

Enterprise services defined and categorized.

Phase 3 Results:

LOB services defined based on user perspective.

Phase 4 Results:

Service record designed according to how IT wishes to communicate to the business.

Workshop overview

Contact your account representative or email Workshops@InfoTech.com for more information.

Workshop Day 1 Workshop Day 2 Workshop Day 3 Workshop Day 4
Activities

Launch the Project

Identify Enterprise Services

Identify Line of Business Services

Complete Service Definitions

1.1 Assemble the project team.

1.2 Develop a communication plan.

1.3 Establish metrics for success.

1.4 Complete the project charter.

2.1 Identify services available organization-wide.

2.2 Categorize services into logical groups.

2.3 Define the services.

3.1 Identify different LOBs.

3.2 Pick one of two methodologies.

3.3 Use method to identify LOB services.

4.1 Learn components to each service definition.

4.2 Pick which information to include in each definition.

4.3 Define each service accordingly.

Deliverables
  • Service Catalog Project Charter
  • Enterprise Service Definitions
  • LOB Service Definitions – Functional groups
  • LOB Service Definitions – Industry specific
  • Service Definitions Chart

PHASE 1

Launch the Project

Design & Build a User-Facing Service Catalog

Step 1 – Create a project charter to launch the initiative

  1. Complete the Project Charter
  2. Create Enterprise Services Definitions
  3. Create Line of Business Services Definitions
  4. Complete Service Definitions

This step will walk you through the following activities:

  • Develop a mission statement to obtain buy-ins from both IT and business stakeholders.
  • Assemble a well-rounded project team to increase the success of the project.
  • Identify and obtain support from stakeholders.
  • Create an impactful change message to the organization to promote the service catalog.
  • Determine project metrics to measure the effectiveness and value of the initiative.

Step Insights

  • The project leader must have a strong relationship with the business, the ability to garner user input, and the authority to lead the team in creating a user-facing catalog that is accessible and understandable to the user.
  • Having two separate change messages prepared for IT and the business is a must. The business change message advocates how the catalog will make IT more accessible to users, and the IT message centers around how the catalog will make IT’s life easier through a standardized request process.

Phase 1 outline

Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.

Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.

Guided Implementation 1: Launch the project
Proposed Time to Completion: 2 weeks
Step 1.2: Create change messages

Step 1.2: Create change messages

Start with an analyst kick off call:

  • Identify the key objectives of creating a user-facing service catalog.
  • Identify the necessary members of the project team.

Review findings with analyst:

  • Prioritize project stakeholders according to their involvement and influence.
  • Create a change message for IT and the business articulating the benefits.

Then complete these activities…

  • Assemble a team with representatives from all areas of IT.
  • Identify the key project stakeholders.
  • Create a project mission statement.
  • Then complete these activities…

  • Create a separate change message for IT and the business.
  • Determine communication methods and channels.
  • With these tools & templates: Service

    Catalog Project Charter

    With these tools & templates:

    Service Catalog Project Charter

    Use Info-Tech’s Service Catalog Project Charter to begin your initiative

    1.1 Project Charter

    The following section of slides outline how to effectively use Info-Tech’s sample project charter.

    The Project Charter is used to govern the initiative throughout the project. IT should provide the foundation for project communication and monitoring.

    It has been pre-populated with information appropriate for Service Catalog projects. Please review this sample text and change, add, or delete information as required.

    Building the charter as a group will help you to clarify your key messages and help secure buy-in from critical stakeholders upfront.

    You may feel like a full charter isn’t necessary, and depending on your organizational size, it might not be. However, the exercise of building the charter is important none-the-less. No matter your current climate, some elements of communicating the value and plans for implementing the catalog will be necessary.

    The Charter includes the following sections:

    • Mission Statement
    • Project team members
    • Project stakeholders
    • Change message
    • Communication and organizational plan
    • Metrics

    Use Info-Tech’s Service Catalog Project Charter.

    Create a mission statement to articulate the purpose of this project

    The mission statement must be compelling because embarking on creating a service catalog is no easy task. It requires significant commitment from different people in different areas of the business.

    Good mission statements are directive, easy to understand, narrow in focus, and favor substance over vagueness.

    While building your mission statement, think about what it is intended to do, i.e. keep the project team engaged and engage others to adopt the service catalog. Included in the project charter’s mission statement section is a brief description of the goals and objectives of the service catalog.

    Ask yourself the following questions:

    1. What frustrations does your business face regarding IT services?
    2. f our company continues growing at this rate, will IT be able to manage service levels?
    3. How has IT benefited from consolidating IT services into a user perspective?

    Project Charter

    Info-Tech’s project charter contains two sample mission statements, along with additional tips to help you create yours.

    Tackle the project with a properly assembled team to increase the speed and quality in which the catalog will be created

    Construct a well-balanced project team to increase your chances of success.

    Project Leader

    Project leader will be the main catalyst for the creation of the catalog. This person is responsible for driving the whole initiative.

    Project Participants

    IT project participants’ input and business input will be pivotal to the creation of the catalog.

    Project Stakeholders

    The project stakeholders are the senior executives who have a vested interest in the service catalog. IT must produce periodic and targeted communication to these stakeholders.

    Increase your chances of success by creating a dynamic group of project participants

    Your project team will be a major success factor for your service catalog. Involvement from IT management and the business is a must.

    IT Team Member

    IT Service Desk Manager

    • The Service Desk team will be an integral part of the service catalog creation. Because of their client-facing work, service desk technicians can provide real feedback about how users view and request services.

    Senior Manager/Director of Application

    • The Application representative provides input on how applications are used by the business and supported by IT.

    Senior Manager/Director of Infrastructure

    • The infrastructure representative provides input on services regarding data storage, device management, security, etc.

    Business Team Member

    Business IT Liaison

    • This role is responsible for bridging the communication between IT and the business. This role could be fulfilled by the business relationship manager, service delivery manager, or business analyst. It doesn’t have to be a dedicated role; it could be part of an existing role.

    Business representatives from different LOBs

    • Business users need to validate the service catalog design and ensure the service definitions are user facing and relevant.

    Project Charter

    Input your project team, their roles, and relevant contact information into your project charter, Section 2.

    Identify the senior managers who are the stakeholders for the service catalog

    Obtain explicit buy-in from both IT and business stakeholders.

    The stakeholders could be your biggest champions for the service catalog initiative, or they could pull you back significantly. Engage the stakeholders at the start of the project and communicate the benefits of the service catalog to them to gain their approval.

    Stakeholders

    Benefits

    CIO
    • Improved visibility and perception for IT
    • Ability to better manage business expectation

    Manager of Service Desk

    • Reduced number of routine inquires
    • Respond to business needs faster and uniformly

    Senior Manager/Director of Application & Infrastructure

    • Streamlined and standardized request/support process
    • More effective communication with the business

    Senior Business Executives from Major LOBs

    • Self-service increases user productivity for business users
    • Better quality of services provided by IT

    Project Charter

    Document a list of stakeholders, their involvement in the process (why they are stakeholders), and their contact information in Section 3.

    Articulate the creation of the service catalog to the organization

    Spread the word of service catalog implementation. Bring attention to your change message through effective mediums and organizational changes.

    Key aspects of a communication plan

    The methods of communication (e.g. newsletters, email broadcast, news of the day, automated messages) notify users of implementation.

    In addition, it is important to know who will deliver the message (delivery strategy). Talking to the business leaders is very important, and you need IT executives to deliver the message. Work hard on obtaining their support as they are the ones communicating to their staff and could be your project champions.

    Recommended organizational changes

    The communication plan should consist of changes that will affect the way users interact with the catalog. Users should know of any meetings pertinent to the maintenance and improvement of the catalog, and ways to access the catalog (e.g. link on desktop/start menu).

    This image depicts the cycle of communicating change. the items in the cycle include: What is the change?; Why are we doing it?; How are we going to go about it?; What are we trying to achieve?; How often will we be updated?

    The Qualities of Leadership: Leading Change

    Project Charter

    Your communication plan should serve as a rough guide. Communication happens in several unpredictable happenstances, but the overall message should be contained within.

    Ensure you get the whole company on board for the service catalog with a well practiced change message

    The success of your catalog implementation hinges on the business’ readiness.

    One of the top challenges for organizations that are implementing a service catalog is the acceptance and adoption of the change. Effective planning for implementation and communication is pivotal. Ensure you create tailored plans for communication and understand how the change will impact staff.

    1. Draft your change message
    2. “Better Service, Better Value.” It is important to have two change messages prepared: one for the IT department and one for business users.
      Outline a few of the key benefits each user group will gain from adopting the service catalog (e.g. Faster, ease of use, convenient, consistent…)

    3. Address feedback
    4. Anticipate some resistances of service catalog adoption and prepare responses. These may be the other benefits which were not included in the change message (e.g. IT may be reluctant to think in business language.)

    5. Conduct training sessions
    6. Host lunch & learns to demonstrate the value of the service catalog to both business and IT user groups.
      These training sessions also serve as a great way to gather feedback from users regarding style and usability.

    Project Charter

    Pick your communication medium, and then identify your target audience. You should have a change message for each: the IT department and the business users. Pay careful consideration to wording and phrasing with regard for each.

    Track metrics throughout the project to keep stakeholders informed

    In order to measure the success of your service catalog, you must establish baseline metrics to determine how much value the catalog is creating for your business.

    1. Number of service requests via the service catalog
    2. The number of service catalog requests should be carefully monitored so that it does not fluctuate too greatly. In general, the number of requests via the service catalog should increase, which indicates a higher level of self-serve.

    3. Number of inquiry calls to the service desk
    4. The number of inquiry calls should decrease because customers are able to self-serve routine IT inquiries that would otherwise have gone through the service desk.

    5. Customer satisfaction – specific questions
    6. The organization could adopt the following sample survey questions:
      From 0-5: How satisfied are you with the functionality of the service catalog? How often do you turn to the service catalog first to solve IT problems?

    7. Number of non-standard requests
    8. The number of non-standard requests should decrease because a majority of services should eventually be covered in the service catalog. Users should be able to solve nearly any IT related problem through navigating the service catalog.

    Metric Description Current Metric Future Goal
    Number of service requests via the Service Catalog
    Number of inquiry calls to the service desk
    Customer Satisfaction – specific question
    Number of non-standard requests

    Use metrics to monitor the monetary improvements the service catalog creates for the business

    When measuring against your baseline, you should expect to see the following two monetary improvements:

    1. Improved service desk efficiency
    2. (# of routine inquiry calls reduced) x (average time for a call) x (average service desk wage)

      Routine inquiries often take up a significant portion of the service desk’s effort, and the majority of them can be answered via the service catalog, thus reducing the amount of time required for a service desk employee to engage in routine solutions. The reduction in routine inquiries allows IT to allocate resources to high-value services and provide higher quality of support.

    Example

    Originally, the service desk of an organization answers 850 inquiries per month, and around 540 of them are routine inquiries requesting information on when a service is available, who they can contact if they want to receive a service, and what they need to do if they want access to a service, etc.

    IT successfully communicated the introduction of the service catalog to the business and 3 months after the service catalog was implemented, the number of routine inquiries dropped to 60 per month. Given that the average time for IT to answer the inquiry is 10 minutes (0.167 hour) and the hourly wage of a service desk technician is $25, the monthly monetary cost saving of the service catalog is:

    (540 – 60) x 0.167 x 25 = $2004.00

    • Reduced expense by eliminating non-standard requests

    (Average additional cost of non-standard request) x (Reduction of non-standard request)
    +
    (Extra time IT spends on non-standard request fulfilment) x (Average wage)

    Non-standard requests require a lot of time, and often a lot of money. IT frequently incurs additional cost because the business is not aware of how to properly request service or support. Not only can the service catalog standardize and streamline the service request process, it can also help IT define its job boundary and say no to the business if needed.

    Example

    The IT department of an organization often finds itself dealing with last-minute, frustrating service requests from the business. For example, although equipment requests should be placed a week in advance, the business often requests equipment to be delivered the next day, leaving IT to pay for additional expedited shipping costs and/or working fanatically to allocate the equipment. Typically, these requests happen 4 times a month, with an additional cost of $200.00. IT staff work an extra 6 hours per each non-standard request at an hourly wage of $30.00.

    With the service catalog, the users are now aware of the rules that are in place and can submit their request with more ease. IT can also refer the users to the service catalog when a non-standard request occurs, which helps IT to charge the cost to the department or not meet the terms of the business.

    The monthly cost saving in this case is:

    $200.00 x 4 + 6 hours x 30 = $980.00

    Create your project charter for the service catalog initiative to get key stakeholders to buy in

    1.1 2-3 hours

    The project charter is an important document to govern your project process. Support from the project sponsors is important and must be documented. Complete the following steps working with Info-Tech’s sample Project Charter.

    1. The project leader and the core project team must identify key reasons for creating a service catalog. Document the project objectives and benefits in the mission statement section.
    2. Identify and document your project team. The team must include representatives from the Infrastructure, Applications, Service desk, and a Business-IT Liaison.
    3. Identify and document your project stakeholders. The stakeholders are those who have interest in seeing the service catalog completed. Stakeholders for IT are the CIO and management of different IT practices. Stakeholders for the business are executives of different LOBs.
    4. Identify your target audience and choose the communication medium most effective to reach them. Draft a communication message hitting all key elements.
      Info-Tech’s project charter contains sample change messages for the business and IT.
    5. Develop a strategy as to how the change message will be distributed, i.e. the communication and organizational change plan.
    6. Use the metrics identified as a base to measure your service catalog’s implementation. If you have identified any other objectives, add new metrics to monitor your progress from the baseline to reaching those objectives.
    7. Sign and date the project charter to officiate commitment to completing the project and reaching your objectives. Have the signed and dated charter available to members of the project team.

    INPUT

    • A collaborative discussion between team members

    OUTPUT

    • Thorough briefing for project launch
    • A committed team

    Materials

    • Communication message and plan
    • Metric tracking

    Participants

    • Project leader
    • Core project team

    Obtain buy-in from business users at the beginning of the service catalog initiative

    CASE STUDY A
    Industry Government
    Source Onsite engagement

    Challenge

    The nature of government IT is quite complex: there are several different agencies located in a number of different areas. It is extremely important to communicate the idea of the service catalog to all the users, no matter the agency or location.

    The IT department had yet to let business leaders of the various agencies know about the initiative and garner their support for the project. This has proven to be prohibitive for gaining adoption from all users.

    Solution

    The IT leaders met and identified all the opportunities to communicate the service catalog to the business leaders and end users.

    To meet with the business leaders, IT leaders hosted a service level meeting with the business directors and managers. They adopted a steering committee for the continuation of the project.

    To communicate with business users, IT leaders published announcements on the intranet website before releasing the catalog there as well.

    Results

    Because IT communicated the initiative, support from business stakeholders was obtained early and business leaders were on board shortly after.

    IT also managed to convince key business stakeholders to become project champions, and leveraged their network to communicate the initiative to their employees.

    With this level of adoption, it meant that it was easier for IT to garner business participation in the project and to obtain feedback throughout.

    Info-Tech assists project leader to garner support from the project team

    CASE STUDY A
    Industry Government
    Source Onsite engagement

    Challenge

    The project received buy-in from the CIO and director of infrastructure. Together they assembled a team and project leader.

    The two struggled to get buy-in from the rest of the team, however. They didn’t understand the catalog or its benefits and objectives. They were reluctant to change their old ways. They didn’t know how much work was required from them to accomplish the project.

    Solution

    With the Info-Tech analyst on site, the client was able to discuss the benefits within their team as well as the project team responsibilities.

    The Info-Tech analyst convinced the group to move towards focusing on a business- and service-oriented mindset.

    The workshop discussion was intended to get the entire team on board and engaged with meeting project objectives.

    Results

    The project team had experienced full buy-in after the workshop. The CIO and director relived their struggles of getting project members on-board through proper communication and engagement.

    Engaging the members of the project team with the discussion was key to having them take ownership in accomplishing the project.

    The business users understood that the service catalog was to benefit their long-term IT service development.

    If you want additional support, have our analysts guide you through this phase as part of an Info-Tech workshop

    Book a workshop with our Info-Tech analysts

    • To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team.
    • Info-Tech analysts will join you and your team onsite at your location or welcome you to Info-Tech’s historic Toronto office to participate in an innovative onsite workshop.
    • Contact your account manager (www.infotech.com/account), or email Workshops@InfoTech.com for more information.
    The following are sample activities that will be conducted by Info-Tech analysts with your team:
    1.1 this image contains a screenshot from section 1.1 of this blueprint. Begin your project with a mission statement
    A strong mission statement that outlines the benefits of the project is needed to communicate the purpose of the project. The onsite Info-Tech analysts will help you customize the message and establish the foundation of the project charter.
    1.2 this image contains a screenshot from section 1.2 of this blueprint.

    Identify project team members

    Our onsite analysts will help you identify high-value team members to contribute to this project.

    1.3 This image contains a screenshot from section 1.3 of this blueprint.

    Identify important business and IT stakeholders

    Buy-in from senior IT and business management is a must. Info-Tech will help you identify the stakeholders and determine their level of influence and impact.

    1.4 This image contains a screenshot from section 1.4 of this blueprint.

    Create a change message for the business and IT

    It is important to communicate changes early and the message must be tailored for each target audience. Our analysts will help you create an effective message by articulating the benefits of the service catalog to the business and to IT.

    1.5 This image contains a screenshot from section 1.5 of this blueprint.

    Determine service project metrics

    To demonstrate the value of the service catalog, IT must come up with tangible metrics. Info-Tech’s analysts will provide some sample metrics as well as facilitate a discussion around which metrics should be tracked and monitored.

    PHASE 2

    Identify and Define Enterprise Services

    Design & Build a User-Facing Service Catalog

    Step 2 – Create Enterprise Services Definitions

    1. Complete the Project Charter
    2. Create Enterprise Services Definitions
    3. Create Line of Business Services Definitions
    4. Complete Service Definitions

    This step will walk you through the following activities:

    • Identify and define enterprise services that are commonly used across the organization.
    • Create service descriptions and features to accurately sum up the functionality of each service.
    • Create service categories and assign each service to a category.

    Step Insights

    • When defining services, be sure to carefully distinguish between what is a feature and what is a service. Often, separate services are defined in situations when they would be better off as features of existing services, and vice versa.
    • When coming up with enterprise services categories, ensure the categories group the services in a way that is intuitive. The users should be able to find a service easily based on the names of the categories.

    Phase 2 outline

    Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.

    Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.

    Guided Implementation 2: Define Enterprise Services
    Proposed Time to Completion: 4 weeks

    Step 2.1: Identify enterprise services

    Step 2.2: Create service categories

    Start with an analyst kick off call:

    • Identify enterprise services that are commonly used.
    • Ensure the list is comprehensive and capture common IT needs.
    • Create service descriptions and features.

    Review findings with analyst:

    • Review full list of identified enterprise services.
    • Identify service categories that are intuitive to the users.

    Then complete these activities…

    • Use Info-Tech’s sample enterprise service definitions as a guide, and change/add/delete the service definitions to customize them to your organization.

    Then complete these activities…

    • Group identified services into categories that are intuitive to the users.

    With these tools & templates: Service

    Sample Enterprise Services

    With these tools & templates:

    Sample Enterprise Services

    Identify enterprise services in the organization apart from the services available to lines of business

    Separating enterprise services from line of business services helps keep things simple to organize the service catalog. -

    Documentation of all business-facing IT services is an intimidating task, and a lack of parameters around this process often leads to longer project times and unsatisfactory outcomes.

    To streamline this process, separating enterprise services from line of business services allows IT to effectively and efficiently organize these services. This method increases the visibility of the service catalog through user-oriented communication plans.

    Enterprise Services are common services that are used across the organization.

    1. Common Services for all users within the organization (e.g. Email, Video Conferencing, Remote Access, Guest Wireless)
    2. Service Requests organized into Service Offerings (e.g. Hardware Provisioning, Software Deployment, Hardware Repair, Equipment Loans)
    3. Consulting Services (e.g. Project Management, Business Analysis, RFP Preparation, Contract Negotiation)

    All user groups access Enterprise Services

    Enterprise Services

    • Finance
    • IT
    • Sales
    • HR

    Ensure your enterprise services are defined from the user perspective and are commonly used

    If you are unsure whether a service is enterprise wide, ask yourself these two questions:

    This image contains an example of how you would use the two questions: Does the user directly use the service themselves?; and; Is the service used by the entire organization (or nearly everyone)?. The examples given are: A. Video Conferencing; B. Exchange Server; C. Email & Fax; D. Order Entry System

    Leverage Info-Tech’s Sample Enterprise Services definition

    2.1 Info-Tech’s Sample Enterprise Services definitions

    Included with this blueprint is Info-Tech’s Sample Enterprise Services definitions.

    The sample contains dozens of services common across most organizations; however, as a whole, they are not complete for every organization. They must be modified according to the business’ needs. Phase two will serve as a guide to identifying an enterprise service as well as how to fill out the necessary fields.

    This image contains a screenshot of definitions from Info-Tech's Sample Enterprises services

    Info-Tech Insight

    Keep track of which services you either modify or delete. You will have to change the same services in the final Info-Tech deliverable.

    The next slide will introduce you to the information for each service record that can be edited.

    Info-Tech’s Sample Enterprise Services definitions is designed to be easily customized

    2.1 Info-Tech’s Sample Enterprise Services definitions

    Below is an example of a service record and its necessary fields of information. This is information that can be kept, deleted, or expanded upon.

    Name the service unambiguously and from the user’s perspective.

    Brief description of how the service allows users to perform tasks.

    Describe the functionality of the service and how it helps users to achieve their business objectives.

    Cluster the services into logical groups.

    Service Name Description Features Category
    Email Email communication to connect with other employees, suppliers, and customers
    • Inbox
    • Calendar
    • Resource Scheduling (meeting rooms)
    • Access to shared mailboxes
    • Limit on mailbox size (‘x’ GB)
    • Address book/external contacts
    • Spam filtering, virus protection
    • Archiving and retrieval of older emails
    • Web/browser access to email
    • Mass email/notification (emergency, surveys, reporting)
    • Setting up a distribution list
    • Setting up Active Sync for email access on mobile devices
    Communications

    Distinguish between a feature and a unique service

    It can be difficult to determine what is considered a service itself, and what is a feature of another service. Use these tips and examples below to help you standardize this judgement.

    Example 1

    Web Conferencing has already been defined as a service. Is Audio Conferencing its own service or a feature of Web Conferencing?

    Info-Tech Tip: Is Audio Conferencing run by the same application as the Web Conferencing? Does it use the same equipment? If not, Audio Conferencing is probably its own service.

    Example 2

    Web Conferencing has already been defined as a service. Is “Screen Sharing” its own service or a feature of Web Conferencing?

    Info-Tech Tip: It depends on how the user interacts with Screen Sharing. Do they only screen share when engaged in a Web Conference? If so, Screen Sharing is a feature and not a service itself.

    Example 3

    VoIP is a popular alternative to landline telephone nowadays, but should it be part of the telephony service or a separate service?

    Info-Tech Tip: It depends on how the VoIP phone is set up.

    If the user uses the VoIP phone the same way they would use a landline phone – because the catalog is user facing – consider the VoIP as part of the telephone service.

    If the user uses their computer application to call and receive calls, consider this a separate service on its own.

    Info-Tech Insight

    While there are some best practices for coming up with service definitions, it is not an exact science and you cannot accommodate everyone. When in doubt, think how most users would perceive the service.

    Change or delete Info-Tech’s enterprise services definitions to make them your own

    2.1 3 hours

    You need to be as comprehensive as possible and try to capture the entire breadth of services IT provides to the business.

    To achieve this, a three-step process is recommended.

    1. First, assemble your project team. It is imperative to have representatives from the service desk. Host two separate workshops, one with the business and one with IT. These workshops should take the form of focus groups and should take no more than 1-2 hours.
    2. Business Focus Group:
    • In an open-forum setting, discuss what the business needs from IT to carry out their day-to-day activities.
    • Engage user-group representatives and business relationship managers.

    IT Focus Group:

    • In a similar open-forum setting, determine what IT delivers to the business. Don’t think about it from a support perspective, but from an “ask” perspective – e.g. “Service Requests.
    • Engage the following individuals: team leads, managers, directors.
  • Review results from the focus groups and compare with your service desk tickets – are there services users inquire about frequently that are not included? Finalize your list of enterprise services as a group.
  • INPUT

    • Modify Info-Tech’s sample services

    OUTPUT

    • A list of some of your business’ enterprise services

    Materials

    • Whiteboard/marker
    • Info-Tech sample enterprise services

    Participants

    • Key members of the project team
    • Service desk rep
    • Business rep

    Using Info-Tech’s Sample Enterprise Services, expand upon the services to add those that we did not include

    2.2 1-3 hours (depending on size and complexity of the IT department)

    Have your user hat on when documenting service features and descriptions. Try to imagine how the users interact with each service.

    1. Once you have your service name, start with the service feature. This field lists all the functionality the service provides. Think from the user’s perspective and document the IT-related activities they need to complete.
    2. Review the service feature fields with internal IT first to make sure there isn’t any information that IT doesn’t want to publish. Afterwards, review with business users to ensure the language is easy to understand and the features are relatable.
    3. Lastly, create a high-level service description that defines the nature of the service in one or two sentences.

    INPUT

    • Collaborate and discuss to expand on Info-Tech’s example

    OUTPUT

    • A complete list of your business’ enterprise services

    Materials

    • Whiteboard/marker
    • Info-Tech sample enterprise services

    Participants

    • Key members of the project team
    • Service desk rep
    • Business rep

    Follow Info-Tech’s guidelines to establish categories for the enterprise services that IT provides to the business

    Similar to the services and their features, there is no right or wrong way to categorize. The best approach is to do what makes sense for your organization and understand what your users think.

    What are Service Categories?

    Categories organize services into logical groups that the users can identify with. Services with similar functions are grouped together in a common category.

    When deciding your categories, think about:

    • What is best for the users?
    • Look at the workflows from the user perspective: how and why do they use the service?
    • Will the user connect with the category name?
    • Will they think about the services within the category?
    Enterprise Service Categories
    Accounts and Access
    Collaboration
    Communication
    Connectivity
    Consulting
    Desktop, Equipment, & Software
    Employee Services
    Files and Documents
    Help & Support
    Training

    Sample categories

    Categorize the services from the list below; how would you think to group them?

    There is no right or wrong way to categorize services; it is subjective to how they are provided by IT and how they are used by the business. Use the aforementioned categories to group the following services. Sample solutions are provided on the following slide.

    Service Name
    Telephone
    Email
    Remote access
    Internet
    BYOD (wireless access)
    Instant Messaging
    Video Conferencing
    Audio Conferencing
    Guest Wi-Fi
    Document Sharing

    Tips and tricks:

    1. Think about the technology behind the service. Is it the same application that provides the services? For example: is instant messaging run by the same application as email?
    2. Consider how the service is used by the business. Are two services always used together? If instant messaging is always used during video conferencing, then they belong in the same category.
    3. Consider the purpose of the services. Do they achieve the same outcomes? For example, document sharing is different from video conferencing, though they both support a collaborative working environment.

    This is a sample of different categorizations – use these examples to think about which would better suit your business

    Example 1 Example 2

    Desktop, Equipment, & Software Services

    Connectivity

    Mobile Devices

    Communications

    Internet

    Telephone

    BYOD (wireless access)

    Telephone

    Guest Wi-Fi

    Internet

    Email

    Remote Access

    Instant Messaging

    Video Conferencing

    Audio Conferencing

    Communications

    Collaboration

    Storage and Retrieval

    Accounts and Access

    Telephone

    Email

    Document Sharing

    Remote access

    Email

    Instant Messaging

    Connectivity

    Mobile Devices

    Video Conferencing

    Internet

    BYOD (wireless access)

    Audio Conferencing

    Guest Wi-Fi

    Guest Wi-Fi

    Document Sharing

    Info-Tech Insight

    Services can have multiple categories only if it means the users will be better off. Try to limit this as much as possible.

    Neither of these two examples are the correct answer, and no such thing exists. The answers you came up with may well be better suited for the users in your business.

    With key members of your project team, categorize the list of enterprise services you have created

    2.3 1 hour

    Before you start, you must have a modified list of all defined enterprise services and a modified list of categories.

    1. Write down the service names on sticky notes and write down the categories either on the whiteboard or on the flipchart.
    2. Assign the service to a category one at a time. For each service, obtain consensus on how the users would view the service and which category would be the most logical choice. In some cases, discuss whether a service should be included in two categories to create better searchability for the users.
    3. If a consensus could not be reached on how to categorize a service, review the service features and category name. In some cases, you may go back and change the features or modify or create new categories if needed.

    INPUT

    • Collaborate and discuss to expand on Info-Tech’s example

    OUTPUT

    • A complete list of your business’ enterprise services

    Materials

    • Whiteboard/marker
    • Info-Tech sample enterprise services

    Participants

    • Key members of the project team
    • Service desk rep
    • Business rep

    Accounts & Access Services

    • User ID & Access
    • Remote Access
    • Business Applications Access

    Communication Services

    • Telephone
    • Email
    • Mobile devices

    Files & Documents

    • Shared Folders
    • File Storage
    • File Restoration
    • File Archiving

    Collaboration

    • Web Conferencing
    • Audio Conferencing
    • Video Conferencing
    • Chat
    • Document Sharing

    Employee Services

    • Onboarding & Off Boarding
    • Benefits Self Service
    • Time and Attendance
    • Employee Records Management

    Help & Support

    • Service Desk
    • Desk Side Support
    • After Hours Support

    Desktop, Equipment, & Software

    • Printing
    • Hardware Provisioning
    • Software Provisioning
    • Software Support
    • Device Move
    • Equipment Loaner

    Education & Training Services

    • Desktop Application Training
    • Corporate Application Training
    • Clinical Application Training
    • IT Training Consultation

    Connectivity

    • BYOD (wireless access)
    • Internet
    • Guest Wi-Fi

    IT Consulting Services

    • Project Management
    • Analysis
    • RFP Reviews
    • Solution Development
    • Business Analysis/Requirements Gathering
    • RFI/RFP Evaluation
    • Security Consulting & Assessment
    • Contract Management
    • Contract Negotiation

    IT department identifies a comprehensive list of enterprise services

    CASE STUDY A
    Industry Government
    Source Onsite engagement

    Challenge

    Because of the breadth of services IT provides across several agencies, it was challenging to identify what was considered enterprise beyond just the basic ones (email, internet, etc.)

    IT recognized that although the specific tasks of service could be different, there are many services that are offered universally across the organization and streamlining the service request and delivery process would reduce the burden on IT.

    Solution

    The client began with services that users interact with on a daily basis; this includes email, wireless, telephone, internet, printing, etc.

    Then, they focused on common service requests from the users, such as software and hardware provisioning, as well as remote access.

    Lastly, they began to think of other IT services that are provided across the organization, such as RFP/RFI support, project management analysis, employee onboarding/off-boarding, etc.

    Results

    By going through the lists and enterprise categories, the government was able to come up with a comprehensive list of all services IT provides to the business.

    Classifying services such as onboarding meant that IT could now standardize IT services for new recruits and employee termination.

    By capturing all enterprise services offered to the organization, IT centralized its management of services instead of having scattered request processes.

    Organization distinguishes features from services using Info-Tech’s tips and techniques

    CASE STUDY B
    Industry Government
    Source Onsite engagement

    Challenge

    For some services, the project team had difficulty deciding on what was a service and what was a feature. They found it hard to distinguish between a service with features or multiple services.

    For example, the client struggled to define the Wi-Fi services because they had many different user groups and different processes to obtain the service. Patients, visitors, doctors, researchers, and corporate employees all use Wi-Fi, but the service features for each user group were different.

    Solution

    The Info-Tech analyst came on-site and engaged the project team in a discussion around how the users would view the services.

    The analyst also provided tips and techniques on identifying services and their features.

    Because patients and visitors do not access Wi-Fi or receive support for the service in the same way as clinical or corporate employees, Wi-Fi was separated into two services (one for each user group).

    Results

    Using the tips and techniques that were provided during the onsite engagement, the project team was able to have a high degree of clarity on how to define the services by articulating who the authorized users are, and how to access the process.

    This allowed the group to focus on the users’ perspective and create clear, unambiguous service features so that users could clearly understand eligibility requirements for the service and how to request them.

    If you want additional support, have our analysts guide you through this phase as part of an Info-Tech workshop

    Book a workshop with our Info-Tech analysts

    this is a picture of an Info-Tech Analyst

    • To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team.
    • Info-Tech analysts will join you and your team onsite at your location or welcome you to Info-Tech’s historic Toronto office to participate in an innovative onsite workshop.
    • Contact your account manager (www.infotech.com/account), or email Workshops@InfoTech.com for more information.
    The following are sample activities that will be conducted by Info-Tech analysts with your team:
    2.1 This image contains a screenshot from section 2.1 of this blueprint.

    Understand what enterprise services are

    The project team must have a clear understanding of what qualifies as an enterprise service. The onsite analysts will also promote a user-oriented mindset so the catalog focuses on business needs.

    2.2 this image contains a screenshot from section 2.2 of this blueprint.

    Identify enterprise services

    The Info-Tech analysts will provide a list of ready-to-use services and will work with the project team to change, add, and delete service definitions and to customize the service features.

    2.3 this image contains a screenshot from section 2.3 of this blueprint.

    Identify categories for enterprise services

    The Info-Tech analyst will again emphasize the importance of being service-oriented rather than IT-oriented. This will allow the group to come up with categories that are intuitive to the users.

    PHASE 3

    Identify and Define Line of Business Services

    Design & Build a User-Facing Service Catalog

    Step 3 – Create Line of Business Services Definitions

    1. Complete the Project Charter
    2. Create Enterprise Services Definitions
    3. Create Line of Business Services Definitions
    4. Complete Service Definitions

    This step will walk you through the following activities:

    • Identify lines of business (LOB) within the organization as well as the user groups within the different LOBs.
    • Determine which one of Info-Tech’s two approaches is more suitable for your IT organization.
    • Define and document LOB services using the appropriate approach.
    • Categorize the LOB services based on the organization’s functional structure.

    Step Insights

    • Collaboration with the business significantly strengthens the quality of line of business service definitions. A significant amount of user input is crucial to create impactful and effective service definitions.
    • If a strong relationship with the business is not in place, IT can look at business applications and the business activities they support in order to understand how to define line of business services.

    Phase 3 outline

    Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.

    Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.

    Guided Implementation 3: Define LOB Services

    Proposed Time to Completion: 4 weeks

    Step 3.1: Identify LOB services

    Step 3.2: Define LOB services

    Start with an analyst kick off call:

    • Identify enterprise services that are commonly used.
    • Ensure the list is comprehensive and capture common IT needs.
    • Create service descriptions and features.

    Review findings with analyst:

    • Use either the business view or the IT view methodology to identify and define LOB services.

    Then complete these activities…

    • Select one of the methodologies and either compile a list of business applications or a list of user groups/functional departments.

    Then complete these activities…

    • Validate the service definitions and features with business users.

    With these tools & templates: Service

    LOB Services – Functional Group
    LOB Services – Industry Specific

    With these tools & templates:

    LOB Services – Functional Group
    LOB Services – Industry Specific

    Communicate with your business users to get a clear picture of each line of business

    Within a business unit, there are user groups that use unique applications and IT services to perform business activities. IT must understand which group is consuming each service to document to their needs and requirements. Only then is it logical to group services into lines of business.

    Covering every LOB service is a difficult task. Info-Tech offers two approaches to identifying LOB services, though we recommend working alongside business user groups to have input on how each service is used directly from the users. Doing so makes the job of completing the service catalog easier, and the product more detailed and user friendly.

    Some helpful questions to keep in mind when characterizing user groups:

    • Where do they fall on the organizational chart?
    • What kind of work do they do?
    • What is included in their job description?
    • What are tasks that they do in addition to their formal responsibilities?
    • What do they need from IT to do their day-to-day tasks?
    • What does their work day look like?
    • When, why, and how do they use IT services?

    Info-Tech Insight

    With business user input, you can answer questions as specific as “What requirements are necessary for IT to deliver value to each line of business?” and “What does each LOB need in order to run their operation?”

    Understand when it is best to use one of Info-Tech’s two approaches to defining LOB services

    1. Business View

    Business View is the preferred method for IT departments with a better understanding of business operations. This is because they can begin with input from the user, enabling them to more successfully define every service for each user group and LOB.

    In addition, IT will also have a chance to work together with the business and this will improve the level of collaboration and communication. However, in order to follow this methodology, IT needs to have a pre-established relationship with the business and can demonstrate their knowledge of business applications.

    2. IT View

    The IT view begins with considering each business application used within the organization’s lines of business. Start with a broad view, following with a process of narrowing down, and then iterate for each business application.

    This process leads to each unique service performed by every application within the business’ LOBs.

    The IT view does not necessarily require a substantial amount of information about the business procedures. IT staff are capable of deducing what business users often require to maintain their applications’ functionality.

    Use one of Info-Tech’s two methodologies to help you identify each LOB service

    Choose the methodology that fits your IT organization’s knowledge of the business.

    This image demonstrates a comparison between the business view of service and the IT View of Service. Under the Business View, the inputs are LOB; User Groups; and Business Activity. Under the IT View, the inputs are Business Application and Functionality, and the outputs are Business Activity; User Groups; and LOB.

    1. Business View

    If you do have knowledge of business operations, using the business view is the better option and the service definition will be more relatable to the users.

    2. IT View

    For organizations that don’t have established relationships with the business or detailed knowledge of business activities, IT can decompose the application into services. They have more familiarity and comfort with the business applications than with business activities.

    It is important to continue after the service is identified because it helps confirm and solidify the names and features. Determining the business activity and the user groups can help you become more user-oriented.

    Identifying LOB services using Info-Tech’s Business View method

    We will illustrate the two methodologies with the same example.

    If you have established an ongoing relationship with the business and you are familiar with their business operations, starting with the LOB and user groups will ensure you cover all the services IT provides to the business and create more relatable service names.

    This is a screenshot of an example of the business view of Service.

    Identifying LOB services using Info-Tech’s IT View method

    If you want to understand what services IT provides to the Sales functional group, and you don’t have comprehensive knowledge of the department, you need to start with the IT perspective.

    This is a screenshot of an example of the business view of Service.

    Info-Tech Insight

    If you are concerned about the fact that people always associate a service with an application, you can include the application in the service name or description so users can find the service through a search function.

    Group LOB services into functional groups as you did enterprise services into categories

    3.1 Sample Line of Business Services Definitions – Functional Groups & Industry Examples

    Like categories for enterprise services in Phase Two, LOB services are grouped into functional groups. Functional groups are the components of an organizational chart (HR, Finance, etc.) that are found in a company’s structure.

    Functional Groups

    Functional groups enable a clear view for business users of what services they need, while omitting services that do not apply to them. This does not overwhelm them, and provides them with only relevant information.

    Industry Services

    To be clear, industry services can be put into functional groups.

    Info-Tech provides a few sample industry services (without their functional group) to give an idea of what LOB service is specific to these industries. Try to extrapolate from these examples to create LOB services for your business.

    Use Info-Tech’s Sample LOB Services – Functional Group and Sample LOB Services – Industry Specific documents.

    This is a screenshot of Info-Tech's Functional Group Services

    Info-Tech Insight

    Keep track of which services you either modify or delete. You will have to change the same services in the final Info-Tech deliverable.

    Identify the user group and business activity within each line of business – Business view

    3.1 30-45 minutes per line of business

    Only perform this activity if you have a relationship with the business that can enable you to generate business input on service identifications and definitions.

    In a group of your project participants, repeat the sequence for each LOB.

    1. Brainstorm each user group within the LOB that is creating value for the business by performing functional activities.
    2. Think of what each individual end user must do to create their value. Think of the bigger picture rather than specifics at this point. For example, sales representatives must communicate with clients to create value.
    3. Now that you have each user group and the activities they perform, consider the specifics of how they go about doing that activity. Consider each application they use and how much they use that application. Think of any and all IT services that could occur as a result of that application usage.

    INPUT

    • A collaborative discussion (with a business relationship)

    OUTPUT

    • LOB services defined from the business perspective

    Materials

    • Sticky notes
    • Whiteboard/marker

    Participants

    • Members of the project team
    • Representatives from the LOBs

    Identify the user group and business activity within each line of business – IT view

    3.1 30-45 minutes per application

    Only perform this activity if you cannot generate business input through your relationships, and must begin service definitions with business applications.

    In a group of your project participants, repeat the sequence for each application.

    1. Brainstorm all applications that the business provides through IT. Cross out the ones that provide enterprise services.
    2. In broad terms, think about what the application is accomplishing to create value for the business from IT’s perspective. What are the modules? Is it recording interactions with the clients? Each software can have multiple functionalities.
    3. Narrow down each functionality performed by the application and think about how IT helps deliver that value. Create a name for the service that the users can relate to and understand.
    4. → Optional

    5. Now go beyond the service and think about the business activities. They are always similar to IT’s application functionality, but from the user perspective. How would the user think about what the application’s functionality to accomplish that particular service is? At this point, focus on the service, not the application.
    6. Determine the user groups for each service. This step will help you complete the service record design in phase 4. Keep in mind that multiple user groups may access one service.

    INPUT

    • A collaborative discussion (without a business relationship)

    OUTPUT

    • LOB services defined from the IT perspective

    Materials

    • Sticky notes
    • Whiteboard/marker

    Participants

    • Members of the project team

    You must review your LOB service definitions with the business before deployment

    Coming up with LOB service definitions is challenging for IT because it requires comprehension of all lines of business within the organization as well as direct interaction with the business users.

    After completing the LOB service definitions, IT must talk to the business to ensure all the user groups and business activities are covered and all the features are accurate.

    Here are some tips to reviewing your LOB Service Catalog generated content:

    • If you plan to talk to a business SME, plan ahead to help complete the project in time for rollout.
    • Include a business relationship manager on the project team to facilitate discussion if you do not have an established relationship with the business.

    Sample Meeting Agenda

    Go through the service in batches. Present 5-10 related services to the business first. Start with the service name and then focus on the features.

    In the meeting, discuss whether the service features accurately sum up the business activities, or if there are missing key activities. Also discuss whether certain services should be split up into multiple services or combined into one.

    Organization identifies LOB services using Info-Tech’s methodologies

    CASE STUDY A
    Industry Government
    Source Onsite engagement

    Challenge

    There were many users from different LOBs, and IT provided multiple services to all of them. Tracking them and who had access to what was difficult.

    IT didn’t understand who provided the services (service owner) and who the customers were (business owner) for some of the services.

    Solution

    After identifying the different Lines of Business, they followed the first approach (Business View) for those that IT had sufficient knowledge of in terms of business operations:

    1. Identified lines of business
    2. Identified user groups
    3. Identified business activities

    For the LOBs they weren’t familiar with, they used the IT view method, beginning with the application:

    1. Identified business apps
    2. Deduced the functionalities of each application
    3. Traced the application back to the service and identified the service owner and business owner

    Results

    Through these two methodologies, IT was able to define services according to how the users both perceive and utilize them.

    IT was able to capture all the services it provides to each line of business effectively without too much help from the business representatives.

    By capturing all enterprise services offered to the organization, IT centralized its management of services instead of having scattered request processes.

    Info-Tech helps organization to identify LOB services using the IT View

    CASE STUDY B
    Industry Healthcare
    Source Onsite engagement

    Challenge
    The organization uses a major application containing several modules used by different users for various business activities.

    The challenge was to break down the application into multiple services in a way that makes sense to the business users. Users should be able to find services specific to them easily.

    Therefore, the project team must understand how to map the modules to different services and user groups.


    Solution
    The project team identified the major lines of business and took various user groups such as nurses and doctors, figured out their daily tasks that require IT services, and mapped each user-facing service to the functionality of the application.

    The project team then went back to the application to ensure all the modules and functionalities within the application were accounted for. This helped to ensure that services for all user groups were covered and prepared to be released in the catalog.


    Results
    Once the project team had come up with a comprehensive list of services for each line of business, they were able to sit with the business and review the services.

    IT was also able to use this opportunity to demonstrate all the services it provides. Having all the LOB services demonstrates IT has done its preparation and can show the value they help create for the business in a language the users can understand. The end result was a strengthened relationship between the business and the IT department.

    If you want additional support, have our analysts guide you through this phase as part of an Info-Tech workshop

    Book a workshop with our Info-Tech analysts

    This is a picture of an Info-Tech Analyst

    • To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team.
    • Info-Tech analysts will join you and your team onsite at your location or welcome you to Info-Tech’s historic Toronto office to participate in an innovative onsite workshop.
    • Contact your account manager (www.infotech.com/account), or email Workshops@InfoTech.com for more information.
    The following are sample activities that will be conducted by Info-Tech analysts with your team:
    3.1 this image contains a screenshot from section 3.1 of this blueprint.

    Understand what Line of Business services are

    The onsite analysts will provide a clear distinction between enterprise services and LOB services. The analysts will also articulate the importance of validating LOB services with the business.

    3.2 this image contains a screenshot from section 3.2 of this blueprint.

    Identify LOB services using the business’ view

    There are two methods for coming up with LOB services. If IT has comprehensive knowledge of the business, they can identify the services by outlining the user groups and their business activities.

    3.3 This image contains a screenshot from section 3.3 of this blueprint.

    Identify LOB services using IT’s view

    If IT does not understand the business and cannot obtain business input, Info-Tech’s analysts will present the second method, which allows IT to identify services with more comfortability through business applications/systems.

    3.4 This image contains a screenshot from section 3.4 of this blueprint.

    Categorize the LOB services into functional groups

    The analysts will help the project team categorize the LOB services based on user groups or functional departments.

    PHASE 4

    Complete Service Definitions

    Design & Build a User-Facing Service Catalog

    Step 4: Complete service definitions and service record design

    1. Complete the Project Charter
    2. Create Enterprise Services Definitions
    3. Create Line of Business Services Definitions
    4. Complete Service Definitions

    This step will walk you through the following activities:

    • Select which fields of information you would like to include in your service catalog design.
    • Determine which fields should be kept internal for IT use only.
    • Complete the service record design with business input if possible.

    Step Insights

    • Don’t overcomplicate the service record design. Only include the pieces of information the users really need to see.
    • Don’t publish anything that you don’t want to be held accountable for. If you are not ready, keep the metrics and costs internal.
    • It is crucial to designate a facilitator and a decision maker so confusions and disagreements regarding service definitions can be resolved efficiently.

    Phase 3 outline

    Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.

    Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.

    Guided Implementation 4: Complete service definitions
    Proposed Time to Completion (in weeks): 4 weeks

    Step 4.1: Design service record

    Step 4.2: Complete service definitions

    Start with an analyst kick off call:

    • Review Info-Tech’s sample service record and determine which fields to add/change/delete.
    • Determine which fields should be kept internal.

    Review findings with analyst:

    • Complete all fields in the service record for each identified service.

    Then complete these activities…

    • Finalize the design of the service record and bring over enterprise services and LOB services.

    Then complete these activities…

    • Test the service definitions with business users prior to catalog implementation.

    With these tools & templates: Service

    Services Definition Chart

    With these tools & templates:

    Services Definition Chart

    Utilize Info-Tech’s Services Definition Chart to map out your final service catalog design

    Info-Tech’s Sample Services Definition Chart

    Info-Tech has provided a sample Services Definition Chart with standard service definitions and pre-populated fields. It is up to you throughout this step to decide which fields are necessary to your business users, as well as how much detail you wish to include in each of them.

    This image contains a screenshot from Info-Tech's Services Definition Chart.

    Info-Tech Insight

    Keep track of which services you either modify or delete. You will have to change the same services in the final Info-Tech deliverable.

    Tips and techniques for service record design

    The majority of the fields in the service catalog are user facing, which means they must be written in business language that the users can understand.

    If there is any confusion or disagreement in filling out the fields, a facilitator is required to lead the working groups in coming up with a definitive answer. If a decision is still not reached, it should be escalated to the decision maker (usually the service owner).

    IT-Facing Fields

    There are IT facing fields that should not be published to the business users – they are for the benefit of IT. For example, you may want to keep Performance Metrics internal to IT until you are ready to discuss it with the business.

    If the organization is interested in creating a Technical Service Catalog following this initiative, these fields will provide a helpful starting place for IT to identify the people, process, and technology required to support user-facing services.

    Info-Tech Insight

    It is important for IT-facing fields to be kept internal. If business users are having trouble with a service and the service owner’s name is available to them, they will phone them for support even if they are not the support owner.

    Design your service catalog with business input: have the user in mind

    When completing the service record, adopt the principle that “Less is More.” Keep it simple and write the service description from the user’s perspective, without IT language. From the list below, pick which fields of information are important to your business users.

    What do the users need to access the service quickly and with minimal assistance?

    The depicted image contains an example of an analysis of what users need to access the service quickly and with minimal assistance. The contents are as follows. Under Service Overview, Name; Description; Features; Category; and Supporting Services. Under Owners, are Service Owner; Business Owner. Under Access Policies and Procedures, are Authorized Users; Request Process; Approval Requirements/Process; Turnaround Time; User Responsibility. Under Availability and Service Levels are Support Hours; Hours of Availability; Planned Downtime; and Metrics. Under Support Policies & Procedures are Support Process; Support Owner; Support Documentation. Under Costs are Internal Cost; Customer Cost. The items which are IT Facing are coloured Red. These include Supporting Services; Service Owner; Business Owner; Metrics; Support Owner; and Internal Cost.

    Identify service overview

    “What information must I have in each service record? What are the fundamentals required to define a service?”

    Necessary Fields – Service Description:

    • Service name → a title for the service that gives a hint of its purpose.
    • Service description → what the service does and expected outcomes.
    • Service features → describe functionality of the service.
    • Service category → an intuitive way to group the service.
    • Support services → applications/systems required to support the service.

    Description: Delivers electronic messages to and from employees.

    Features:

    • Desk phone
    • Teleconference phones (meeting rooms)
    • Voicemail
    • Recover deleted voicemails
    • Team line: call rings multiple phones/according to call tree
    • Employee directory
    • Caller ID, Conference calling

    Category: Communications

    This image contains an example of a Service overview table. The headings are: Description; Features; Category; Supporting Services (Systems, Applications).

    Identify owners

    Who is responsible for the delivery of the service and what are their roles?

    Service Owner and Business Owner

    Service owner → the IT member who is responsible and accountable for the delivery of the service.

    Business owner → the business partner of the service owner who ensures the provided service meets business needs.

    Example: Time Entry

    Service Owner: Manager of Business Solutions

    Business Owner: VP of Human Resources

    This image depicts a blank table with the headings Service Owner, and Business Owner

    Info-Tech Insight

    For enterprise services that are used by almost everyone in the organization, the business owner is the CIO.

    Identify access policies and procedures

    “Who is authorized to access this service? How do they access it?”

    Access Policies & Procedures

    Authorized users → who can access the service.

    Request process → how to request access to the service.

    Approval requirement/process → what the user needs to have in place before accessing the service.

    Example: Guest Wi-Fi

    Authorized Users: All people on site not working for the company

    Request Process: Self-Service through website for external visitors

    Approval Requirement/Process: N/A

    This image depicts a blank table with the headings: Authorized Users; Request Process; Approval Requirement/Process

    Info-Tech Insight

    Clearly defining how to access a service saves time and money by decreasing calls to the service desk and getting users up and running faster. The result is higher user productivity.

    Identify access policies and procedures

    “Who is authorized to access this service? How do they access it?”

    Access Policies & Procedures

    Requirements & pre-requisites → details of what must happen before a service can be provided.

    Turnaround time → how much time it will take to grant access to the service.

    User responsibility → What the user is expected to do to acquire the service.

    Example: Guest Wi-Fi

    Requirements & Pre-requisites: Disclaimer of non-liability and acceptance

    Turnaround time: Immediate

    User Responsibility: Adhering to policies outlined in the disclaimer

    This image depicts a blank table with the headings: Authorized Users; Request Process; Approval Requirement/Process

    Info-Tech Insight

    Clearly defining how to access a service saves time and money by decreasing calls to the service desk and getting users up and running faster. The result is higher user productivity.

    Identify availability and service levels

    “When is this service available to users? What service levels can the user expect?”

    Availability & Service Levels

    Support hours → what days/times is this service available to users?

    Hours of availability/planned downtime → is there scheduled downtime for maintenance?

    Performance metrics → what level of performance can the user expect for this service?

    Example: Software Provisioning

    Support Hours: Standard business hours

    Hours of Availability/Planned Downtime: Standard business hours; can be agreed to work beyond operating hours either earlier or later

    Performance Metrics: N/A

    This image depicts a blank table with the headings: Support hours; Hours of availability/planned downtime; Performance Metrics.

    Info-Tech Insight

    Manage user expectations by clearly documenting and communicating service levels.

    Identify support policies and procedures

    “How do I obtain support for this service?”

    Support Policies & Procedures

    Support process → what is the process for obtaining support for this service?

    Support owner → who can users contact for escalations regarding this service?

    Support documentation → where can users find support documentation for this service?

    Example: Shared Folders

    Support Process: Contact help desk or submit a ticket via portal

    Support Owner: Manager, client support

    Support Documentation: .pdf of how-to guide

    This image depicts a blank table with the headings: Support Process; Support Owner; Support Documentation

    Info-Tech Insight

    Clearly documenting support procedures enables users to get the help they need faster and more efficiently.

    Identify service costs and approvals

    “Is there a cost for this service? If so, how much and who is expensing it?”

    Costs

    Internal Cost → do we know the total cost of the service?

    Customer Cost → a lot of services are provided without charge to the business; however, certain service requests will be charged to a department’s budget.

    Example: Hardware Provisioning

    Internal Cost: For purposes of audit, new laptops will be expensed to IT.

    Customer Cost: Cost to rush order 10 new laptops with retina displays for the graphics team. Charged for extra shipment cost, not for cost of laptop.

    This image depicts a blank table with the headings: Internal Costs; Customer costs

    Info-Tech Insight

    Set user expectations by clearly documenting costs associated with a service and how to obtain approval for these costs if required.

    Complete the service record design fields for every service

    4.1 3 Hours

    This is the final activity to completing the service record design. It has been a long journey to make it here; now, all that is left is completing the fields and transferring information from previous activities.

    1. Organize the services however you think is most appropriate. A common method of organization is alphabetically by enterprise category, and then each LOB functional group.
    2. Determine which fields you would like to keep or edit to be part of your design. Also add any other fields you can think of which will add value to the user or IT. Remember to keep them IT facing if necessary.
    3. Complete the fields for each service one by one. Keep in mind that for some services, a field or two may not apply to the nature of that service and may be left blank or filled with a null value (e.g. N/A).

    INPUT

    • A collaborative discussion

    OUTPUT

    • Completed service record design ready for a catalog

    Materials

    • Info-Tech sample service record design.

    Participants

    • Project stakeholders, business representatives

    Info-Tech Insight

    Don’t forget to delete or bring over the edited LOB and Enterprise services from the phase 2 and 3 deliverables.

    Complete the service definitions and get them ready for publication

    Now that you have completed the first run of service definitions, you can go back and complete the rest of the identified services in batches. You should observe increased efficiency and effectiveness in filling out the service definitions.

    This image depicts how you can use bundles to simplify the process of catalog design using bundles. The cycle includes the steps: Identify Services; Select a Service Bundle; Review Record Design; followed by a cycle of: Pick a service; Service X; Service Data Collection; Create Service Record, followed by Publish the bundle; Communicate the bundle; Rinse and Repeat.

    This blueprint’s purpose is to help you design a service catalog. There are a number of different platforms to build the catalog offered by application vendors. The sophistication of the catalog depends on the size of your business. It may be as simple as an Excel book, or something as complex as a website integrated with your service desk.

    Determine how you want to publish the service catalog

    There are various levels of maturity to consider when you are thinking about how to deploy your service catalog.

    1. Website/User Portal 2. Catalog Module Within ITSM Tool

    3. Homegrown Solution

    Prerequisite

    An internet website, or a user portal

    An existing ITSM tool with a built-in service catalog module

    Database development capabilities

    Website development capabilities

    Pros

    Low cost

    Low effort

    Easy to deploy

    Customized solution tailored for the organization

    High flexibility regarding how the service catalog is published

    Cons

    Not aesthetically appealing

    Lacking sophistication

    Difficult to customize to organization’s needs

    Limitation on how the service catalog info is published

    High effort

    High cost

    → Maturity Level →

    Organization uses the service catalog to outline IT’s and users’ responsibilities

    CASE STUDY A
    Industry Government
    Source Onsite engagement

    Challenge

    The client had collected a lot of good information, but they were not sure about what to include to ensure the users could understand the service clearly.

    They were also not sure what to keep internal so the service catalog did not increase IT’s workload. They want to help the business, but not appear as if they are capable of solving everything for everyone immediately. There was a fear of over-commitment.

    Solution

    The government created a Customer Responsibility field for each service, so it was not just IT who was providing solutions. Business users needed to understand what they had to do to receive some services.

    The Service Owner and Business Owner fields were also kept internal so users would go through the proper request channel instead of calling Service Owners directly.

    Lastly, the Performance Metrics field was kept internal until IT was ready to present service metrics to the business.

    Results

    The business was provided clarity on their responsibility and what was duly owed to them by IT staff. This established clear boundaries on what was to be expected of IT services projected into the future.

    The business users knew what to do and how to obtain the services provided to them. In the meantime, they didn’t feel overwhelmed by the amount of information provided by the service catalog.

    Organization leverages the service catalog as a tool to define IT workflows and business processes

    CASE STUDY B
    Industry Healthcare
    Source Onsite engagement

    Challenge

    There is a lack of clarity and a lack of agreement between the client’s team members regarding the request/approval processes for certain services. This was an indication that there is a level of ambiguity around process. Members were not sure what was the proper way to access a service and could not come up with what to include in the catalog.

    Different people from different teams had different ways of accessing services. This could be true for both enterprise and LOB services.

    Solution

    The Info-Tech analyst facilitated a discussion about workflows and business processes.

    In particular, the discussion focused around the approval/authorization process, and IT’s workflows required to deliver the service. The Info-Tech analyst on site walked the client through their different processes to determine which one should be included in the catalog.

    Results

    The discussion brought clarity to the project team around both IT and business process. Using this new information, IT was able to communicate to the business better, and create consistency for IT and the users of the catalog.

    The catalog design was a shared space where IT and business users could confer what the due process and responsibilities were from both sides. This increased accountability for both parties.

    If you want additional support, have our analysts guide you through this phase as part of an Info-Tech workshop

    Book a workshop with our Info-Tech analysts

    this is a picture of an Info-Tech Analyst

    • To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team.
    • Info-Tech analysts will join you and your team onsite at your location or welcome you to Info-Tech’s historic Toronto office to participate in an innovative onsite workshop.
    • Contact your account manager (www.infotech.com/account), or email Workshops@InfoTech.com for more information.
    The following are sample activities that will be conducted by Info-Tech analysts with your team:
    4.1 this image contains a screenshot from section 4.1 of this blueprint.

    Determine which fields should be included in the record design

    The analysts will present the sample service definitions record and facilitate a discussion to customize the service record so unique business needs are captured.

    4.2 this image contains a screenshot from section 4.2.1 of this blueprint.

    Determine which fields should be kept internal

    The onsite analysts will explain why certain fields are used but not published. The analysts will help the team determine which fields should be kept internal.

    4.3 this image contains a screenshot from section 4.3 of this blueprint.

    Complete the service definitions

    The Info-Tech analysts will help the group complete the full service definitions. This exercise will also provide the organization with a clear understanding of IT workflows and business processes.

    Summary of accomplishment

    Knowledge Gained

    • Understanding why it is important to identify and define services from the user’s perspective.
    • Understand the differences between enterprise services and line of business services.
    • Distinguish service features from services.
    • Involve the business users to define LOB services using either IT’s view or LOB’s view.

    Processes Optimized

    • Enterprise services identification and documentation.
    • Line of business services identification and documentation.

    Deliverables Completed

    • Service catalog project charter
    • Enterprise services definitions
    • Line of business service definitions – functional groups
    • Line of business service definitions – industry specific
    • Service definition chart

    Project step summary

    Client Project: Design and Build a User-Facing Service Catalog

    1. Launch the Project – Maximize project success by assembling a well-rounded team and managing all important stakeholders.
    2. Identify Enterprise Services – Identify services that are used commonly across the organization and categorize them in a user-friendly way.
    3. Identify Line of Business Services – Identify services that are specific to each line of business using one of two Info-Tech methodologies.
    4. Complete the Service Definitions – Determine what should be presented to the users and complete the service definitions for all identified services.

    Info-Tech Insight

    This project has the ability to fit the following formats:

    • Onsite workshop by Info-Tech Research Group consulting analysts.
    • Do-it-yourself with your team.
    • Remote delivery (Info-Tech Guided Implementation).

    Related Info-Tech research

    Establish a Service-Based Costing Model

    Develop the right level of service-based costing capability by applying our methodology.

    Design and Build an Effective Contract Lifecycle Management Process

    • Buy Link or Shortcode: {j2store}214|cart{/j2store}
    • member rating overall impact: 9.0/10 Overall Impact
    • member rating average dollars saved: $5,039 Average $ Saved
    • member rating average days saved: 20 Average Days Saved
    • Parent Category Name: Vendor Management
    • Parent Category Link: /vendor-management
    • Your vendor contracts are unorganized and held in various cabinets and network shares. There is no consolidated list or view of all the agreements, and some are misplaced or lost as coworkers leave.
    • The contract process takes a long time to complete. Coworkers are unsure who should be reviewing and approving them.
    • You are concerned that you are not getting favorable terms with your vendors and not complying with your agreement commitments.
    • You are unsure what risks your organization could be exposed to in your IT vendor contacts. These could be financial, legal, or security risks and/or compliance requirements.

    Our Advice

    Critical Insight

    • Focus on what’s best for you. There are two phases to CLM. All stages within those phases are important, but choose to improve the phase that can be most beneficial to your organization in the short term. However, be sure to include reviewing risk and monitoring compliance.
    • Educate yourself. Understand the stages of CLM and how each step can rely on the previous one, like a stepping-stone model to success.
    • Consider the overall picture. Contract lifecycle management is the sum of many processes designed to manage contracts end to end while reducing corporate risk, improving financial savings, and managing agreement obligations. It can take time to get CLM organized and working efficiently, but then it will show its ROI and continuously improve.

    Impact and Result

    • Understand how to identify and mitigate risk to save the organization time and money.
    • Gain the knowledge required to implement a CLM that will be beneficial to all business units.
    • Achieve measurable savings in contract time processing, financial risk avoidance, and dollar savings.
    • Effectively review, store, manage, comply with, and renew agreements with a collaborative process

    Design and Build an Effective Contract Lifecycle Management Process Research & Tools

    Start here – read the Executive Brief

    Read our concise Executive Brief to find out how a contract management system will save money and time and mitigate contract risk, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. Master the operational framework of contract lifecycle management.

    Understand how the basic operational framework of CLM will ensure cost savings, improved collaboration, and constant CLM improvement.

    • Design and Build an Effective Contract Lifecycle Management Process – Phase 1: Master the Operational Framework of CLM
    • Existing CLM Process Worksheet
    • Contract Manager

    2. Understand the ten stages of contract lifecycle management.

    Understand the two phases of CLM and the ten stages that make up the entire process.

    • Design and Build an Effective Contract Lifecycle Management Process – Phase 2: Understand the Ten Stages of CLM
    • CLM Maturity Assessment Tool
    • CLM RASCI Diagram
    [infographic]

    Workshop: Design and Build an Effective Contract Lifecycle Management Process

    Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

    1 Review Your CLM Process and Learn the Basics

    The Purpose

    Identify current CLM processes.

    Learn the CLM operational framework.

    Key Benefits Achieved

    Documented overview of current processes and stakeholders.

    Activities

    1.1 Review and capture your current process.

    1.2 Identify current stakeholders.

    1.3 Learn the operational framework of CLM.

    1.4 Identify current process gaps.

    Outputs

    Existing CLM Process Worksheet

    2 Learn More and Plan

    The Purpose

    Dive into the two phases of CLM and the ten stages of a robust system.

    Key Benefits Achieved

    A deep understanding of the required components/stages of a CLM system.

    Activities

    2.1 Understand the two phases of CLM.

    2.2 Learn the ten stages of CLM.

    2.3 Assess your CLM maturity state.

    2.4 Identify and assign stakeholders.

    Outputs

    CLM Maturity Assessment

    CLM RASCI Diagram

    Further reading

    Design and Build an Effective Contract Lifecycle Management Process

    Mitigate risk and drive value through robust best practices for contract lifecycle management.

    Our understanding of the problem

    This Research Is Designed For:

    • The CIO who depends on numerous key vendors for services
    • The CIO or Project Manager who wants to maximize the value delivered by vendors
    • The Director or Manager of an existing IT procurement or vendor management team
    • The Contracts Manager or Legal Counsel whose IT department holds responsibility for contracts, negotiation, and administration

    This Research Will Help You:

    • Implement and streamline the contract management process, policies, and procedures
    • Baseline and benchmark existing contract processes
    • Understand the importance and value of contract lifecycle management (CLM)
    • Minimize risk, save time, and maximize savings with vendor contracts

    This Research Will Also Assist

    • IT Service Managers
    • IT Procurement
    • Contract teams
    • Finance and Legal departments
    • Senior IT leadership

    This Research Will Help Them

    • Understand the required components of a CLM
    • Establish the current CLM maturity level
    • Implement a new CLM process
    • Improve on an existing or disparate process

    ANALYST PERSPECTIVE

    "Contract lifecycle management (CLM) is a vital process for small and enterprise organizations alike. Research shows that all organizations can benefit from a contract management process, whether they have as few as 25 contracts or especially if they have contracts numbering in the hundreds.

    A CLM system will:

    • Save valuable time in the entire cycle of contract/agreement processes.
    • Save the organization money, both hard and soft dollars.
    • Mitigate risk to the organization.
    • Avoid loss of revenue.

    If you’re not managing your contracts, you aren’t capitalizing on your investment with your vendors and are potentially exposing your organization to contract and monetary risk."

    - Ted Walker
    Principal Research Advisor, Vendor Management Practice
    Info-Tech Research Group

    Executive Summary

    Situation

    • Most organizations have vendor overload and even worse, no defined process to manage the associated contracts and agreements. To manage contracts, some vendor management offices (VMOs) use a shared network drive to store the contracts and a spreadsheet to catalog and manage them. Yet other less-mature VMOs may just rely on a file cabinet in Procurement and a reminder in someone’s calendar about renewals. These disparate processes likely cost your organization time spent finding, managing, and renewing contracts, not to mention potential increases in vendor costs and risk and the inability to track contract obligations.

    Complication

    • Contract lifecycle management (CLM) is not an IT buzzword, and it’s rarely on the top-ten list of CIO concerns in most annual surveys. Until a VMO gets to a level of maturity that can fully develop a CLM and afford the time and costs of doing so, there can be several challenges to developing even the basic processes required to store, manage, and renew IT vendor contracts. As is always an issue in IT, budget is one of the biggest obstacles in implementing a standard CLM process. Until senior leadership realizes that a CLM process can save time, money, and risk, getting mindshare and funding commitment will remain a challenge.

    Resolution

    • Understand the immediate benefits of a CLM process – even a basic CLM implementation can provide significant cost savings to the organization; reduce time spent on creating, negotiating, and renewing contracts; and help identify and mitigate risks within your vendor contracts.
    • Budgets don’t always need to be a barrier to a standard CLM process. However, a robust CLM system can provide significant savings to the organization.

    Info-Tech Insight

    • If you aren’t managing your contracts, you aren’t capitalizing on your investments.
    • Even a basic CLM process with efficient procedures will provide savings and benefits.
    • Not having a CLM process may be costing your organization money, time, and exposure to unmitigated risk.

    What you can gain from this blueprint

    Why Create a CLM

    • Improved contract organization
    • Centralized and manageable storage/archives
    • Improved vendor compliance
    • Risk mitigation
    • Reduced potential loss of revenue

    Knowledge Gained

    • Understanding of the value and importance of a CLM
    • How CLM can impact many departments within the organization
    • Who should be involved in the CLM steps and processes
    • Why a CLM is important to your organization
    • How to save time and money by maximizing IT vendor contracts
    • How basic CLM policies and procedures can be implemented without costly software expenditure

    The Outcome

    • A foundation for a CLM with best-practice processes
    • Reduced exposure to potential risks within vendor contracts
    • Maximized savings with primary vendors
    • Vendor compliance and corporate governance
    • Collaboration, transparency, and integration with business units

    Contract management: A case study

    CASE STUDY
    Industry Finance and Banking
    Source Apttus

    FIS Global

    The Challenge

    FIS’ business groups were isolated across the organization and used different agreements, making contract creation a long, difficult, and manual process.

    • Customers frustrated by slow and complicated contracting process
    • Manual contract creation and approval processes
    • Sensitive contract data that lacked secure storage
    • Multiple agreements managed across divisions
    • Lack of central repository for past contracts
    • Inconsistent and inaccessible

    The Solution: Automating and Streamlining the Contract Management Process

    A robust CLM system solved FIS’ various contract management needs while also providing a solution that could expand into full quote-to cash in the future.

    • Contract lifecycle management (CLM)
    • Intelligent workflow approvals (IWA)
    • X-Author for Excel

    Customer Results

    • 75% cycle time reduction
    • $1M saved in admin costs per year
    • 49% increase in sales proposal volume
    • Automation on one standard platform and solution
    • 55% stronger compliance management
    • Easy maintenance for various templates
    • Ability to quickly absorb new contracts and processes via FIS’s ongoing acquisitions

    Track the impact of CLM with these metrics

    Dollars Saved

    Upfront dollars saved

    • Potential dollars saved from avoiding unfavorable terms and conditions
    • Incentives that encourage the vendor to act in the customer’s best interest
    • Secured commitments to provide specified products and services at firm prices
    • Cost savings related to audits, penalties, and back support
    • Savings from discounts found

    Time Saved

    Time saved, which can be done in several areas

    • Defined and automated approval flow process
    • Preapproved contract templates with corporate terms
    • Reduced negotiation times
    • Locate contracts in minutes

    Pitfalls Avoided

    Number of pitfalls found and avoided, such as

    • Auto-renewal
    • Inconsistencies between sections and documents
    • Security and data not being deleted upon termination
    • Improper licensing

    The numbers are compelling

    71%

    of companies can’t locate up to 10% of their contracts.

    Source: TechnologyAdvice, 2019

    9.2%

    of companies’ annual revenue is lost because of poor contract management practices.

    Source: IACCM, 2019

    60%

    still track contracts in shared drives or email folders.

    Source: “State of Contract Management,” SpringCM, 2018

    CLM blueprint objectives

    • To provide a best-practice process for managing IT vendor contract lifecycles through a framework that organizes from the core, analyzes each step in the cycle, has collaboration and governance attached to each step, and integrates with established vendor management practices within your organization.
    • CLM doesn’t have to be an expensive managed database system in the cloud with fancy dashboards. As long as you have a defined process that has the framework steps and is followed by the organization, this will provide basic CLM and save the organization time and money over a short period of time.
    • This blueprint will not delve into the many vendors or providers of CLM solutions and their methodologies. However, we will discuss briefly how to use our framework and contract stages in evaluating a potential solution that you may be considering.

    Info-Tech offers various levels of support to best suit your needs

    DIY Toolkit

    "Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful.”

    Guided Implementation

    “Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track."

    Workshop

    "We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place."

    Consulting

    "Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project."

    Diagnostics and consistent frameworks used throughout all four options

    Design and Build an Effective CLM Process – project overview

    1. Master the Operational Framework

    2. Understand the Ten Stages of CLM

    Best-Practice Toolkit

    1.1 Understand the operational framework components.

    1.2 Review your current framework.

    1.3 Create a plan to implement or enhance existing processes.

    2.1 Understand the ten stages of CLM.

    2.2 Review and document your current processes.

    2.3 Review RASCI chart and assign internal ownership.

    2.4 Create an improvement plan.

    2.5 Track changes for measurable ROI.

    Guided Implementations
    • Review existing processes.
    • Understand what CLM is and why the framework is essential.
    • Create an implementation or improvement plan.
    • Review the ten stages of CLM.
    • Complete CLM Maturity Assessment.
    • Create a plan to target improvement.
    • Track progress to measure savings.
    Onsite Workshop

    Module 1: Review and Learn the Basics

    • Review and capture your current processes.
    • Learn the basic operational framework of contract management.

    Module 2 Results:

    • Understand the ten stages of effective CLM.
    • Create an improvement or implementation plan.
    Phase 1 Outcome:
    • A full understanding of what makes a comprehensive contract management system.
    Phase 2 Outcome:
    • A full understanding of your current CLM processes and where to focus your efforts for improvement or implementation.

    Workshop overview

    Contact your account representative or email Workshops@InfoTech.com for more information.

    Workshop Day 1 Workshop Day 2
    Activities

    Task – Review and Learn the Basics

    Task – Learn More and Plan

    1.1 Review and capture your current process.

    1.2 Identify current stakeholders.

    1.3 Learn the operational framework of contract lifecycle management.

    1.4 Identify current process gaps.

    2.1 Understand the two phases of CLM.

    2.2 Learn the ten stages of CLM.

    2.3 Assess your CLM maturity.

    2.4 Identify and assign stakeholders.

    2.5 Discuss ROI.

    2.6 Summarize and next steps.

    Deliverables
    1. Internal interviews with business units
    2. Existing CLM Process Worksheet
    1. CLM Maturity Assessment
    2. RASCI Diagram
    3. Improvement Action Plan

    PHASE 1

    Master the Operational Framework of Contract Lifecycle Management

    Design and Build an Effective CLM Process

    Phase 1: Master the Operational Framework of Contract Lifecycle Management

    Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.

    Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of
    2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.

    Guided Implementation 1: Master the Operational Framework of Contract Lifecycle Management
    Proposed Time to Completion: 1-4 weeks

    Step 1.1: Document your Current CLM Process

    Step 1.2: Read and Understand the Operational Framework

    Step 1.3: Review Solution Options

    Start with an analyst kick-off call:

    • Understand what your current process(es) is for each stage
    • Do a probative review of any current processes
    • Interview stakeholders for input

    Review findings with analyst:

    • Discuss the importance of the framework as the core of your plan
    • Review the gaps in your existing process
    • Understand how to prioritize next steps towards a CLM

    Finalize phase deliverable:

    • Establish ownership of the framework
    • Prioritize improvement areas or map out how your new CLM will look

    Then complete these activities…

    • Document the details of your process for each stage of CLM

    With these tools & templates:

    • Existing CLM Process Worksheet

    Phase 1 Results:

    • A full understanding of what makes a comprehensive contract management system.

    What Is Contract Lifecycle Management?

    • Every contract has a lifecycle, from creation to time and usage to expiration. Organizations using a legacy or manual contract management process usually ask, “What is contract lifecycle management and how will it benefit my business?”
    • Contract lifecycle management (CLM) creates a process that manages each contract or agreement. CLM eases the challenges of managing hundreds or even thousands of important business and IT contracts that affect the day-to-day business and could expose the organization to vendor risk.
    • Managing a few contracts is quite easy, but as the number of contracts grows, managing each step for each contract becomes increasingly difficult. Ultimately, it will get to a point where managing contracts properly becomes very difficult or seemingly impossible.

    That’s where contract lifecycle management (CLM) comes in.

    CLM can save money and improve revenue by:

    • Improving accuracy and decreasing errors through standardized contract templates and approved terms and conditions that will reduce repetitive tasks.
    • Securing contracts and processes through centralized software storage, minimizing risk of lost or misplaced contracts due to changes in physical assets like hard drives, network shares, and file cabinets.
    • Using policies and procedures that standardize, organize, track, and optimize IT contracts, eliminating time spent on creation, approvals, errors, and vendor compliance.
    • Reducing the organization’s exposure to risks and liability.
    • Having contracts renewed on time without penalties and with the most favorable terms for the business.

    The Operational Framework of Contract Lifecycle Management

    Four Components of the Operational Framework

    1. Organization
    2. Analysis
    3. Collaboration and Governance
    4. Integration/Vendor Management
    • By organizing at the core of the process and then analyzing each stage, you will maximize each step of the CLM process and ensure long-term contract management for the organization.
    • Collaboration and governance as overarching policies for the system will provide accountability to stakeholders and business units.
    • Integration and vendor management are encompassing features in a well-developed CLM that add visibility, additional value, and savings to the entire organization.

    Info-Tech Best Practice

    Putting a contract manager in place to manage the CLM project will accelerate the improvements and provide faster returns to the organizations. Reference Info-Tech’s Contract Manager Job Description template as needed.

    The operational framework is key to the success, return on investment (ROI), cost savings, and customer satisfaction of a CLM process.

    This image depicts Info-Tech's Operational Framework.  It consists of a series of five concentric circles, with each circle a different colour.  On the outer circle, is the word Integration.  The next outermost circle has the words Collaboration and Governance.  The next circle has no words, the next circle has the word Analysis, and the very centre circle has the word Organization.

    1. Organization

    • Every enterprise needs to organize its contract documents and data in a central repository so that everyone knows where to find the golden source of contractual truth.
    • This includes:
      • A repository for storing and organizing contract documents.
      • A data dictionary for describing the terms and conditions in a consistent, normalized way.
      • A database for persistent data storage.
      • An object model that tracks changes to the contract and its prevailing terms over time.

    Info-Tech Insight

    Paper is still alive and doing very well at slowing down the many stages of the contract process.

    2. Analysis

    Most organizations analyze their contracts in two ways:

    • First, they use reporting, search, and analytics to reveal risky and toxic terms so that appropriate operational strategies can be implemented to eliminate, mitigate, or transfer the risk.
    • Second, they use process analytics to reveal bottlenecks and points of friction as contracts are created, approved, and negotiated.

    3. Collaboration

    • Throughout the contract lifecycle, teams must collaborate on tasks both pre-execution and post-execution.
    • This includes document collaboration among several different departments across an enterprise.
    • The challenge is to make the collaboration smooth and transparent to avoid costly mistakes.
    • For some contracting tasks, especially in regulated industries, a high degree of control is required.
    • In these scenarios, the organization must implement controlled systems that restrict access to certain types of data and processes backed up with robust audit trails.

    4. Integration

    • For complete visibility into operational responsibilities, relationships, and risk, an organization must integrate its golden contract data with other systems of record.
    • An enterprise contracts platform must therefore provide a rich set of APIs and connectors so that information can be pushed into or pulled from systems for enterprise resource planning (ERP), customer relationship management (CRM), supplier relationship management (SRM), document management, etc.

    This is the ultimate goal of a robust contract management system!

    Member Activity: Document Current CLM Processes

    1.1 Completion Time: 1-5 days

    Goal: Document your existing CLM processes (if any) and who owns them, who manages them, etc.

    Instructions

    Interview internal business unit decision makers, stakeholders, Finance, Legal, CIO, VMO, Sales, and/or Procurement to understand what’s currently in place.

    1. Use the Existing CLM Process Worksheet to capture and document current CLM processes.
    2. Establish what processes, procedures, policies, and workflows, if any, are in place for pre-execution (Phase 1) contract stages.
    3. Do the same for post-execution (Phase 2) stages.
    4. Use this worksheet as reference for assessments and as a benchmark for improvement review six to 12 months later.
    This image contains a screenshot of Info-Tech's Existing CLM Process Discovery Worksheet

    INPUT

    • Internal information from all CLM stakeholders

    OUTPUT

    • A summary of processes and owners currently in place

    Materials

    • Existing CLM processes from interviews

    Participants

    • Finance, Legal, CIO, VMO, Sales, Procurement

    PHASE 2

    Understand the Ten Stages of Contract Lifecycle Management

    Design and Build an Effective CLM Process

    Phase 1: Master the Operational Framework of Contract Lifecycle Management

    Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.

    Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of
    2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.

    Guided Implementation 2: Understand the Ten Stages of Contract Lifecycle Management

    Proposed Time to Completion: 1-10 weeks

    Step 2.1: Assess CLM Maturity

    Step 2.2: Complete a RASCI Diagram

    Start with an analyst kick-off call:

    • Review the importance of assessing the maturity of your current CLM processes
    • Discuss interview process for internal stakeholders
    • Use data from the Existing CLM Process Worksheet

    Review findings with analyst:

    • Review your maturity results
    • Identify stages that require immediate improvement
    • Prioritize improvement or implementation of process

    Then complete these activities…

    • Work through the maturity assessment process
    • Answer the questions in the assessment tool
    • Review the summary tab to learn where to focus improvement efforts

    Then complete these activities…

    • Using maturity assessment and existing process data, establish ownership for each process stage
    • Fill in the RASCI Chart based on internal review or existing processes

    With these tools & templates:

    • CLM Maturity Assessment Tool

    With these tools & templates:

    • CLM RASCI Diagram

    Phase 2 Results & Insights:

    • A full understanding of your current CLM process and where improvement is required
    • A mapping of stakeholders for each stage of the CLM process

    The Ten Stages of Contract Lifecycle Management

    There are ten key stages of contract lifecycle management.

    The steps are divided into two phases, pre-execution and post-execution.

      Pre-Execution (Phase 1)

    1. Request
    2. Create
    3. Review Risk
    4. Approve
    5. Negotiate
    6. Sign
    7. Post-Execution (Phase 2)

    8. Capture
    9. Manage
    10. Monitor Compliance
    11. Optimize

    Ten Process Stages Within the CLM Framework

    This image contains the CLM framework from earlier in the presentation, with the addition of the following ten steps: 1. Request; 2. Create Contract; 3. Review Risk; 4. Approve; 5. Negotiate; 6. Sign; 7. Capture; 8. Manage; 9. Monitor Compliance; 10. Optimize.

    Stage 1: Request or Initiate

    Contract lifecycle management begins with the contract requesting process, where one party requests for or initiates the contracting process and subsequently uses that information for drafting or authoring the contract document. This is usually the first step in CLM.

    Requests for contracts can come from various sources:

    • Business units within the organization
    • Vendors presenting their contract, including renewal agreements
    • System- or process-generated requests for renewal or extension

    At this stage, you need to validate if a non-disclosure agreement (NDA) is currently in place with the other party or is required before moving forward. At times, adequate NDA components could be included within the contract or agreement to satisfy corporate confidentiality requirements.

    Stage 1: Request or Initiate

    Stage Input

    • Information about what the contract needs to contain, such as critical dates, term length, coverage, milestones, etc.
    • Some organizations require that justification and budget approval be provided at this stage.
    • Request could come from a vendor as a pre-created contract.
    • Best practices recommend that a contract request form or template is used to standardize all required information.

    Stage Output

    • Completed request form, stored or posted with all details required to move forward to risk review and contract creation.
    • Possible audit trails.

    Stage 2: Create Contract

    • At the creation or drafting stage, the document is created, generated, or provided by the vendor. The document will contain all clauses, scope, terms and conditions, and pricing as required.
    • In some cases, a vendor-presented contract that is already prepared will go through an internal review or redlining process by the business unit and/or Legal.
    • Both internal and external review and redlining are included in this stage.
    • Also at this stage, the approvers and signing authorities are identified and added to the contract. In addition, some audit trail features may be added.

    Info-Tech Best Practice

    For a comprehensive list of terms and conditions, see our Software Terms & Conditions Evaluation Tool within Master Contract Review and Negotiation for Software Agreements.

    Stage 2: Create Contract

    Stage Input

    • Contract request form, risk review/assessment.
    • Vendor- or contractor-provided contract/agreement, either soft copy, electronic form, or more frequently, “clickwrap” web-posted document.
    • Could also include a renewal notification from a vendor or from the CLM system or admin.

    Stage Output

    • Completed draft contract or agreement, typically in a Microsoft Word or Adobe PDF format with audit trail or comment tracking.
    • Redlined document for additional revision and or acceptance.
    • Amendment or addendum to existing contract.

    Stage 3: Review Risk 1 of 2

    The importance of risk review can not be understated. The contract or agreement must be reviewed by several stakeholders who can identify risks to the organization within the contract.

    Three important definitions:

    1. Risk is the potential for a negative outcome. A risk is crossing the street while wearing headphones and selecting the next track to play on your smartphone. A negative outcome is getting hit by an oncoming person who, unremarkably, was doing something similar at the same time.
    2. Risk mitigation is about taking the steps necessary to minimize both the likelihood of a risk occurring – look around both before and while crossing the street – and its impact if it does occur – fall if you must, but save the smartphone!
    3. Contract risk is about any number of situations that can cause a contract to fail, from trivially – the supplier delivers needed goods late – to catastrophically – the supplier goes out of business without having delivered your long-delayed orders.

    Stage 3: Review Risk 2 of 2

    • Contracts must be reviewed for business terms and conditions, potential risk situations from a financial or legal perspective, business commitments or obligations, and any operational concerns.
    • Mitigating contract risk requires a good understanding of what contracts are in place, how important they are to the success of the organization, and what data they contain.

    Collectively, this is known as contract visibility.

    • Risk avoidance and mitigation are also a key component in the ROI of a CLM system and should be tracked for analysis.
    • Risk-identifying forms or templates can be used to maintain consistency with corporate standards.

    Stage 3: Review Risk

    Stage Input

    • All details of the proposed contract so that a proper risk analysis can be done as well as appropriate review with stakeholders, including:
      • Finance
      • Legal
      • Procurement
      • Security
      • Line-of-business owner
      • IT stakeholders

    Stage Output

    • A list of identified concerns that could expose the business unit or organization.
    • Recommendations to minimize or eliminate identified risks.

    Stage 4: Approve

    The approval stage can be a short process if policies and procedures are already in place. Most organizations will have defined delegation of authority or approval authority depending on risk, value of the contract, and other corporate considerations.

    • Defined approval levels should be known within the organization and can be applied to the approval workflow, expediting the approval of drafted terms, conditions, changes, and cost/spend within the contract internally.
    • Tracking and flexibility needs to considered in the approval process.
    • Gates need to be in place to ensure that a required approver has approved the contract before it moves to the next approver.
    • Flexibility is needed in some situations for ad hoc approval tasks and should include audit trail as required.
    • Approvers can include business units, Finance, Legal, Security, and C-level leaders

    Stage 4: Approve

    Stage Input

    • Complete draft contract with all terms and conditions (T&Cs) and approval trail.
    • Amendment or addendum to existing contract.

    Stage Output

    • Approved draft contract ready to move to the next step of negotiating with the vendor.
    • Approved amendment or addendum to existing or renewal agreement.

    Stage 5: Negotiate

    • At this stage, there should be an approved draft of the contract that can be presented to the other party or vendor for review.
    • Typically organizations will negotiate their larger deals for terms and conditions with the goal of balancing the contractual allocation of risk with the importance of the vendor or agreement and its value to the business.
    • Several people on either side are typically involved and will discuss legal and commercial terms of the contract. Throughout the process, negotiators may leverage a variety of tools, including playbooks with preferred and fallback positions, clause libraries, document redlines and comparisons, and issue lists.
    • Audit trails or tracking of changes and acceptances is an important part of this stage. Tracking will avoid duplication and lost or missed changes and will speed up the entire process.
    • A final, clean document is created at this point and readied for execution.

    Stage 5: Negotiate

    Stage Input

    • Approved draft contract ready to move to the next step of negotiating with the vendor.
    • Approved amendment or addendum to existing or renewal agreement.

    Stage Output

    • A finalized and approved contract or amendment with agreed-upon terms and conditions ready for signatures.

    Info-Tech Insight

    Saving the different versions of a contract during negotiations will save time, provide reassurance of agreed terms as you move through the process, and provide reference for future negotiations with the vendor.

    Stage 6: Sign or Execute

    • At this stage in the process, all the heavy lifting in a contract’s creation is complete. Now it’s signature time.
    • To finalize the agreement, both parties need to the sign the final document. This can be done by an in-person wet ink signature or by what is becoming more prevalent, digital signature through an e-signature process.
    • Once complete, the final executed documents are exchanged or received electronically and then retained by each party.

    Stage 6: Sign or Execute

    Stage Input

    • A finalized and approved contract or amendment with agreed-upon terms and conditions ready for signatures.

    Stage Output

    • An executed contract or amendment ready to move to the next stage of CLM, capturing in the repository.

    Info-Tech Best Practice

    Process flow provisions should made for potential rejection of the contract by signatories, looping the contract back to the appropriate stage for rework or revision.

    Stage 7: Capture in Database/Repository 1 of 2

    • This is one of the most important stages of a CLM process. Executed agreements need to be stored in a single manageable, searchable, reportable, and centralized repository.
    • All documents should to be captured electronically, reviewed for accuracy, and then posted to the CLM repository.
    • The repository can be in various formats depending on the maturity, robustness, and budget of the CLM program.

    Most repositories are some type of database:

    • An off-the-shelf product
    • A PaaS cloud-based solution
    • A homegrown, internally developed database
    • An add-on module to your ERP system

    Stage 7: Capture in Database/Repository 2 of 2

    Several important features of an electronic repository should be considered:

    • Consistent metadata tagging of clauses, terms, conditions, dates, etc.
    • Centralized summary view of all contracts
    • Controlled access for those who need to review and manage the contracts

    Establishing an effective repository will be key to providing measurable value to the organization and saving large amounts of time for the business unit.

    Info-Tech Insight

    Planning for future needs by investing a little more money into a better, more robust repository could pay bigger dividends to the VMO and organization while providing a higher ROI over time as advanced functionality is deployed.

    Stage 8: Manage

    • Once an agreement is captured in the repository, it needs to be managed from both an operational and a commitment perspective.
    • Through a summary view or master list, contracts need to be operationally managed for end dates and renewals, vendor performance, discounts, and rebates.
    • Managing contracts for commitment and compliance will ensure all contract requirements, rights, service-level agreements (SLAs), and terms are fulfilled. This will eliminate the high costs of missed SLAs, potential breaches, or missed renewals.
    • Managing contracts can be improved by adding metadata to the records that allow for easier search and retrieval of contracts or even proactive notification.
    • The repository management features can and should be available to business stakeholders, or reporting from a CLM admin can also alert stakeholders to renewals, pricing, SLAs, etc.
    • Also important to this stage is reporting. This can be done by an admin or via a self-serve feature for stakeholders, or it could even be automated.

    Stage 9: Monitor Compliance 1 of 2

    • At this stage, the contracts or agreements need to be monitored for the polices within them and the purpose for which they were signed.
    • This is referred to as obligation management and is a key step to providing savings to the organization and mitigating risk.
    • Many contracts contain commitments by each party. These can include but are not limited to SLAs, service uptime targets, user counts, pricing threshold discounts and rebates, renewal notices to vendors, and training requirements.
    • All of these obligations within the contracts should be summarized and monitored to ensure that all commitments are delivered on. Managing obligations will mitigate risks, maximize savings and rebates to the organization, and minimize the potential for a breach within the contract.

    Stage 9: Monitor Compliance 2 of 2

    • Monitoring and measuring vendor commitments and performance will also be a key factor in maximizing the benefits of the contract through vendor accountability.
    • Also included in this stage is renewal and/or disposition of the contract. If renewal is due, it should go back to the business unit for submission to the Stage 1: Request process. If the business unit is not going to renew the contract, the contract must be tagged and archived for future reference.

    Stage 10: Optimize

    • The goal of this stage is to improve the other stages of the process as well as evaluate how each stage is integrating with the core operational framework processes.
    • With more data and improved insight into contractual terms and performance, a business can optimize its portfolio for better value, greater savings, and lower-risk outcomes.
    • For high-performance contract teams, the goal is a continuous feedback loop between the contract portfolio and business performance. If, for example, the data shows that certain negotiation issues consume a large chunk of time but yield no measurable difference in risk or performance, you may tweak the playbook to remedy those issues quickly.

    Additional optimization tactics:

    • Streamlining contract renewals with auto-renew
    • Predefined risk review process or template, continuous review/improvement of negotiation playbook
    • Better automation or flow of approval process
    • Better signature delegation process if required
    • Improving repository search with metadata tagging
    • Automating renewal tracking or notice process
    • Tracking the time a contract spends in each stage

    Establish Your Current CLM Maturity Position

    • Sometimes organizations have a well-defined pre-execution process but have a poor post-signature process.
    • Identifying your current processes or lack thereof will provide you with a starting point in developing a plan for your CLM. It’s possible that most of the stages are there and just need some improvements, or maybe some are missing and need to be implemented.
    • It’s not unusual for organizations to have a manual pre-execution process and an automated backend repository with compliance and renewal notices features.

    Info-Tech Best Practice

    Use the CLM Maturity Assessment Tool to outline where your organization is at each stage of the process.

    Member Activity: Assess Current CLM Maturity

    2.1 Completion Time 1-2 days

    Goal: Identify and measure your existing CLM processes, if any, and provide a maturity value to each stage. The resulting scores will provide a maturity assessment of your CLM.

    Instructions

    1. Use the Existing CLM Process Worksheet to document current CLM processes.
    2. Using the CLM worksheet info, answer the questions in the CLM Maturity Assessment Tool.
    3. Review the results and scores on Tab 3 to see where you need to focus your initial improvements.
    4. Save the initial assessment for future reference and reassess in six to 12 months to measure progress.

    This image contains a screenshot from Info-Tech's CLM Maturity Assessment Tool.

    INPUT

    • Internal information from all CLM stakeholders

    OUTPUT

    • A summary of processes and owners currently in place in the organization

    Materials

    • Existing CLM processes from interviews

    Participants

    • Finance, Legal, CIO, VMO, Sales, Procurement

    Member Activity: Complete RASCI Chart

    2.2 Completion Time 2-6 hours

    Goal: Identify who in your organization is primarily accountable and involved in each stage of the CLM process.

    Instructions

    Engage internal business unit decision makers, stakeholders, Finance, Legal, CIO, VMO, Sales, and Procurement as required to validate who should be involved in each stage.

    1. Using the information collected from internal reviews, assign a level in the CLM RASCI Diagram to each team member.
    2. Use the resulting RASCI diagram to guide you through developing or improving your CLM stages.

    This image contains a screenshot from Info-Tech's CLM RASCI Diagram.

    INPUT

    • Internal interview information

    OUTPUT

    • Understanding of who is involved in each CLM stage

    Materials

    • Interview data
    • RASCI Diagram

    Participants

    • Finance, Legal, CIO, VMO, Sales, Procurement

    Applying CLM Framework and Stages to Your Organization

    • Understand what CLM process you currently do or do not have in place.
    • Review implementation options: automated, semi-automated, and manual solutions.
    • If you are improving an existing process, focus on one phase at a time, perfect it, and then move to the other phase. This can also be driven by budget and time.
    • Create a plan to start with and then move to automating or semi-automating the stages.
    • Building onto or enhancing an existing system or processes can be a cost-effective method to produce near-term measurable savings
    • Focus on one phase at a time, then move on to the other phase.
    • While reviewing implementation of or improvements to CLM stages, be sure to track or calculate the potential time and cost savings and risk mitigation. This will help in any required business case for a CLM.

    CLM: An ROI Discussion 1 of 2

    • ROI can be easier to quantify and measure in larger organizations with larger CLM, but ROI metrics can be obtained regardless of the company or CLM size.
    • Organizations recognize their ROI through gains in efficiency across the entire business as well as within individual departments involved in the contracting process. They also do so by reducing the risk associated with decentralized and insecure storage of and access to their contracts, failure to comply with terms of their contracts, and missing deadlines associated with contracts.

    Just a few of the factors to consider within your own organization include:

    • The number of people inside and outside your company that touch your contracts.
    • The number of hours spent weekly, monthly, and annually managing contracts.
    • Potential efficiencies gained in better managing those contracts.
    • The total number of contracts that exist at any given time.
    • The average value and total value of those contract types.
    • The potential risk of being in breach of any of those contracts.
    • The number of places contracts are stored.
    • The level of security that exists to prevent unauthorized access.
    • The potential impact of unauthorized access to your sensitive contract data.

    CLM: An ROI Discussion 2 of 2

    Decision-Maker Apprehensions

    Decision-maker concerns arise from a common misunderstanding – that is, a fundamental failure to appreciate the true source of contract management value. This misunderstanding goes back many years to the time when analysts first started to take an interest in contract management and its automation. Their limited experience (primarily in retail and manufacturing sectors) led them to think of contract management as essentially an administrative function, primarily focused on procurement of goods. In such environments, the purpose of automation is focused on internal efficiency, augmented by the possibility of savings from reduced errors (e.g. failing to spot a renewal or expiry date) or compliance (ensuring use of standard terms).

    Today’s CLM systems and processes can provide ROI in several areas in the business.

    Info-Tech Insight

    Research on ROI of CLM software shows significant hard cost savings to an organization. For example, a $10 million company with 300 contracts valued at $3 million could realize savings of $83,400 and avoid up to $460,000 in lost revenues. (Derived from: ACCDocket, 2018)

    Additional Considerations 1 of 2

    Who should own and/or manage the CLM process within an organization? Legal, VMO, business unit, Sales?

    This is an often-discussed question. Research suggests that there is no definitive answer, as there are several variables.

    Organizations needs to review what makes the best business sense for them based on several considerations and then decide where CLM belongs.

    • Business unit budgets and time management
    • Available Administration personnel and time
    • IT resources
    • Security and access concerns
    • Best fit based on organizational structure

    35% of law professionals feel contract management is a legal responsibility, while 45% feel it’s a business responsibility and a final 20% are unsure where it belongs. (Source: “10 Eye-Popping Contract Management Statistics,” Apttus, 2018)

    Additional Considerations 2 of 2

    What type of CLM software or platform should we use?

    This too is a difficult question to answer definitively. Again, there are several variables to consider. As well, several solutions are available, and this is not a one-size-fits-all scenario.

    As with who should own the CLM process, organizations must review the various CLM software solutions available that will meet their current and future needs and then ask, “What do we need the system to do?”

    • Do you build a “homegrown” solution?
    • Should it be an add-on module to the current ERP or CRM system?
    • Is on-premises more suitable?
    • Is an adequate off-the-shelf (OTS) solution available?
    • What about the many cloud offerings?
    • Is there a basic system to start with that can expand as you grow?

    Info-Tech Insight

    When considering what type of solution to choose, prioritize what needs to been done or improved. Sometimes solutions can be deployed in phases as an “add-on” type modules.

    Summary of Accomplishment

    Knowledge Gained

    • Documented current CLM process
    • Core operational framework to build a CLM process on
    • Understanding of best practices required for a sustainable CLM

    Processes Optimized

    • Internal RASCI process identified
    • Existing internal stage improvements
    • Internal review process for risk mitigation

    Deliverables Completed

    • Existing CLM Processes Worksheet
    • CLM Maturity Assessment
    • CLM RASCI Chart
    • CLM improvement plan

    Project Step Summary

    Client Project: CLM Assessment and Improvement Plan

    1. Set your goals – what do you want to achieve in your CLM project?
    2. Assess your organization’s current CLM position in relation to CLM best practices and stages.
    3. Map your organization’s RASCI structure for CLM.
    4. Identify opportunities for stage improvements or target all low stage assessments.
    5. Prioritize improvement processes.
    6. Track ROI metrics.
    7. Develop a CLM implementation or improvement plan.

    Info-Tech Insight

    This project can fit your organization’s schedule:

    • Do-it-yourself with your team.
    • Remote delivery (Info-Tech Guided Implementation).

    CLM Blueprint Summary and Conclusion

    • Contract management is a vital component of a responsible VMO that will benefit all business units in an organization, save time and money, and reduce risk exposure.
    • A basic well-deployed and well-managed CLM will provide ROI in the short term.
    • Setting an improvement plan with concise improvements and potential cost savings based on process improvements will help your business case for CLM get approval and leadership buy-in.
    • Educating and aligning all business units and stakeholders to any changes to CLM processes will ensure that cost savings and ROI are achieved.
    • When evaluating a CLM software solution, use the operational framework and the ten process stages in this blueprint as a reference guide for CLM vendor functionality and selection.

    Related Info-Tech Research

    Master Contract Review and Negotiation

    Optimize spend with significant cost savings and negotiate from a position of strength.

    Manage Your Vendors Before They Manage You

    Maximize the value of vendor relationships.

    Bibliography

    Burla, Daniel. “The Must Know Of Transition to Dynamics 365 on Premise.” Sherweb, 14 April 2017. Web.

    Anand, Vishal, “Strategic Considerations in Implementing an End-to-End Contract Lifecycle Management Solution.” DWF Mindcrest, 20 Aug. 2016. Web.

    Alspaugh, Zach. “10 Eye-Popping Contract Management Statistics from the General Counsel’s Technology Report.” Apttus, 23 Nov. 2018. Web.

    Bishop, Randy. “Contract Management is not just a cost center.” ContractSafe, 9 Sept. 2019. Web.

    Bryce, Ian. “Contract Management KPIs - Measuring What Matters.” Gatekeeper, 2 May 2019. Web.

    Busch, Jason. “Contract Lifecycle Management 101.” Determine. 4 Jan. 2018. Web.

    “Contract Management Software Buyer's Guide.” TechnologyAdvice, 5 Aug. 2019. Web.

    Dunne, Michael. “Analysts Predict that 2019 will be a Big Year for Contract Lifecycle Management.” Apttus, 19 Nov. 2018. Web.

    “FIS Case Study.” Apttus, n.d. Web.

    Gutwein, Katie. “3 Takeaways from the 2018 State of Contract Management Report.” SpringCM, 2018. Web.

    “IACCM 2019 Benchmark Report.” IAACM, 4 Sept. 2019. Web.

    Linsley, Rod. “How Proverbial Wisdom Can Help Improve Contract Risk Mitigation.” Gatekeeper, 2 Aug. 2019. Web.

    Mars, Scott. “Contract Management Data Extraction.” Exari, 20 June 2017. Web.

    Rodriquez, Elizabeth. “Global Contract Life-Cycle Management Market Statistics and Trends 2019.” Business Tech Hub, 17 June 2017. Web.

    “State of Contract Management Report.” SpringCM, 2018. Web.

    Teninbaum, Gabriel, and Arthur Raguette. “Realizing ROI from Contract Management Technology.” ACCDocket.com, 29 Jan. 2018. Web.

    Wagner, Thomas. “Strategic Report on Contract Life cycle Management Software Market with Top Key Players- IBM Emptoris, Icertis, SAP, Apttus, CLM Matrix, Oracle, Infor, Newgen Software, Zycus, Symfact, Contract Logix, Coupa Software.” Market Research, 21 June 2019. Web.

    “What is Your Contract Lifecycle Management (CLM) Persona?” Spend Matters, 19 Oct. 2017. Web.

    Release management

    • Buy Link or Shortcode: {j2store}9|cart{/j2store}
    • Related Products: {j2store}9|crosssells{/j2store}
    • Up-Sell: {j2store}9|upsells{/j2store}
    • member rating overall impact: 10.0/10
    • member rating average dollars saved: $35,731
    • member rating average days saved: 20
    • Parent Category Name: Infra and Operations
    • Parent Category Link: /infra-and-operations
    Today's world requires frequent and fast deployments. Stay in control with release management.

    Fix Your IT Culture

    • Buy Link or Shortcode: {j2store}518|cart{/j2store}
    • member rating overall impact: 10.0/10 Overall Impact
    • member rating average dollars saved: $32,499 Average $ Saved
    • member rating average days saved: 20 Average Days Saved
    • Parent Category Name: Lead
    • Parent Category Link: /lead
    • Go beyond value statements to create a culture that enables the departmental strategy.
    • There is confusion about how to translate culture from an abstract concept to something that is measurable, actionable, and process driven.
    • Organizations lack clarity about who is accountable and responsible for culture, with groups often pointing fingers at each other.

    Our Advice

    Critical Insight

    • When it comes to culture, the lived experience can be different from stated values. Culture is the pattern of behaviors and the way work is done rather than simply perks, working environment, and policy.
    • Executives’ active participation in culture change is paramount. If executives aren’t willing to change the way they behave, attempts to shift the culture will fail.
    • Elevate culture to a business imperative. Foster a culture that is linked to strategy rather than trying to replicate the hot culture of the moment.
    • Target values that will have the greatest impact. Select a few focus values as a guide and align all behaviors and work practices to those values.

    Impact and Result

    • Executives need to clarify how the culture they want will help achieve their strategy and choose the focus values that will have the maximum impact.
    • Measure the current state of culture and facilitate the process of leveraging existing elements while shifting undesirable ones.

    Fix Your IT Culture Research & Tools

    Start here – read the Executive Brief

    Read our concise Executive Brief to find out why you should improve your culture to enable your strategy, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. Assessment: Determine current culture and identify focus values

    Complete a cultural assessment and select focus values to form core culture efforts.

    • Culture Documentation Template
    • IT Departmental Values Survey
    • IT Culture Diagnostic
    • Cultural Assessment Report Template

    2. Tools: Give IT executives the tools to drive change

    Enable executives to gather feedback on behavioral perceptions and support behavioral change.

    • Executive Reflection Template

    3. Behavioral Alignment: Align IT behaviors to the desired culture

    Review all areas of the department to understand where the links to culture exist and create a communication plan.

    • Standard Internal Communications Plan
    • IT Competency Library
    • Leadership Competency Library

    4. Sustainment: Disseminate and manage culture within the department

    Customize a process to infuse behaviors aligned with focus values in work practices and complete the first wave of meetings.

    • Culture Facilitation Guide for Leaders
    [infographic]

    Document Your Cloud Strategy

    • Buy Link or Shortcode: {j2store}468|cart{/j2store}
    • member rating overall impact: 8.9/10 Overall Impact
    • member rating average dollars saved: $35,642 Average $ Saved
    • member rating average days saved: 21 Average Days Saved
    • Parent Category Name: Cloud Strategy
    • Parent Category Link: /cloud-strategy

    Despite the universally agreed-upon benefit of formulating a coherent strategy, several obstacles make execution difficult:

    • Inconsistent understanding of what the cloud means
    • Inability to come to a consensus on key decisions
    • Ungoverned decision-making
    • Unclear understanding of cloud roles and responsibilities

    Our Advice

    Critical Insight

    A cloud strategy might seem like a big project, but it’s just a series of smaller conversations. The methodology presented here is designed to facilitate those conversations, using a curated list of topics, prompts, participant lists, and sample outcomes. We have divided the strategy into four key areas:

    • Vision and alignment
    • People
    • Governance
    • Technology

    Impact and Result

    • A shared understanding of what is necessary to succeed in the cloud
    • An end to ad hoc deployments that solve small problems and create larger ones
    • A unified approach and set of principles that apply to governance, architecture, integration, skills, and roles (and much, much more).

    Document Your Cloud Strategy Research & Tools

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. Document Your Cloud Strategy – a phased guide to identifying, validating, and recording the steps you’ll take, the processes you’ll leverage, and the governance you’ll deploy to succeed in the cloud.

    This storyboard comprises four phases, covering mission and vision, people, governance, and technology, and how each of these areas requires forethought when migrating to the cloud.

    • Document Your Cloud Strategy – Phases 1-4

    2. Cloud Strategy Document Template – a template that allows you to record the results of the cloud strategy exercise in a clear, readable way.

    Each section of Document Your Cloud Strategy corresponds to a section in the document template. Once you’ve completed each exercise, you can record your results in the document template, leaving you with an artifact you can share with stakeholders.

    • Cloud Strategy Document Template
    [infographic]

    Workshop: Document Your Cloud Strategy

    Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

    1 Document Your Vision and Alignment

    The Purpose

    Understand and document your cloud vision and its alignment with your other strategic priorities.

    Key Benefits Achieved

    A complete understanding of your strategy, vision, alignment, and a list of success metrics that will help you find your way.

    Activities

    1.1 Record your cloud mission and vision.

    1.2 Document your cloud strategy’s alignment with other strategic plans.

    1.3 Record your cloud guiding principles.

    Outputs

    Documented strategy, vision, and alignment.

    Defined success metrics.

    2 Record Your People Strategy

    The Purpose

    Define how people, skills, and roles will contribute to the broader cloud strategy.

    Key Benefits Achieved

    Sections of the strategy that highlight skills, roles, culture, adoption, and the creation of a governance body.

    Activities

    2.1 Outline your skills and roles strategy.

    2.2 Document your approach to culture and adoption

    2.3 Create a cloud governing body.

    Outputs

    Documented people strategy.

    3 Document Governance Principles

    The Purpose

    This section facilitates governance in the cloud, developing principles that apply to architecture, integration, finance management, and more.

    Key Benefits Achieved

    Sections of the strategy that define governance principles.

    Activities

    3.1 Conduct discussion on architecture.

    3.2 Conduct discussion on integration and interoperability.

    3.3 Conduct discussion on operations management.

    3.4 Conduct discussion on cloud portfolio management.

    3.5 Conduct discussion on cloud vendor management.

    3.6 Conduct discussion on finance management.

    3.7 Conduct discussion on security.

    3.8 Conduct discussion on data controls.

    Outputs

    Documented cloud governance strategy.

    4 Formalize Your Technology Strategy

    The Purpose

    Creation of a formal cloud strategy relating to technology around provisioning, monitoring, and migration.

    Key Benefits Achieved

    Completed strategy sections of the document that cover technology areas.

    Activities

    4.1 Formalize organizational approach to monitoring.

    4.2 Document provisioning process.

    4.3 Outline migration processes and procedures.

    Outputs

    Documented cloud technology strategy.

    Further reading

    Document Your Cloud Strategy

    Get ready for the cloudy future with a consistent, proven strategy.

    Analyst perspective

    Any approach is better than no approach

    The image contains a picture of Jeremy Roberts

    Moving to the cloud is a big, scary transition, like moving from gas-powered to electric cars, or from cable to streaming, or even from the office to working from home. There are some undeniable benefits, but we must reorient our lives a bit to accommodate those changes, and the results aren’t always one-for-one. A strategy helps you make decisions about your future direction and how you should respond to changes and challenges. In Document Your Cloud Strategy we hope to help you accomplish just that: clarifying your overall mission and vision (as it relates to the cloud) and helping you develop an approach to changes in technology, people management, and, of course, governance. The cloud is not a panacea. Taken on its own, it will not solve your problems. But it can be an important tool in your IT toolkit, and you should aim to make the best use of it – whatever “best” happens to mean for you.

    Jeremy Roberts

    Research Director, Infrastructure and Operations

    Info-Tech Research Group

    Executive Summary

    Your Challenge

    The cloud is multifaceted. It can be complicated. It can be expensive. Everyone has an opinion on the best way to proceed – and in many cases has already begun the process without bothering to get clearance from IT. The core challenge is creating a coherent strategy to facilitate your overall goals while making the best use of cloud technology, your financial resources, and your people.

    Common Obstacles

    Despite the universally agreed-upon benefit of formulating a coherent strategy, several obstacles make execution difficult:

    • Inconsistent understanding of what the cloud means
    • Inability to come to a consensus on key decisions
    • Ungoverned decision making
    • Unclear understanding of cloud roles and responsibilities

    Info-Tech’s Approach

    A cloud strategy might seem like a big project, but it’s just a series of smaller conversations. The methodology presented here is designed to facilitate those conversations, using a curated list of topics, prompts, participant lists, and sample outcomes. We have divided the strategy into four key areas:

    1. Vision and alignment
    2. People
    3. Governance
    4. Technology

    The answers might be different, but the questions are the same

    Every organization will approach the cloud differently, but they all need to ask the same questions: When will we use the cloud? What forms will our cloud usage take? How will we manage governance? What will we do about people? How will we incorporate new technology into our environment? The answers to these questions are as numerous as there are people to answer them, but the questions must be asked.

    Your challenge

    This research is designed to help organizations that are facing these challenges or looking to:

    • Ensure that the cloud strategy is complete and accurately reflects organizational goals and priorities.
    • Develop a consistent and coherent approach to adopting cloud services.
    • Design an approach to mitigate risks and challenges associated with adopting cloud services.
    • Create a shared understanding of the expected benefits of cloud services and the steps required to realize those benefits.

    Grappling with a cloud strategy is a top initiative: 43% of respondents report progressing on a cloud-first strategy as a top cloud initiative.

    Source: Flexera, 2021.

    Definition: Cloud strategy

    A document providing a systematic overview of cloud services, their appropriate use, and the steps that an organization will take to maximize value and minimize risk.

    Common obstacles

    These barriers make this challenge difficult to address for many organizations:

    • The cloud means different things to different people, and creating a strategy that is comprehensive enough to cover a multitude of use cases while also being written to be consumable by all stakeholders is difficult.
    • The incentives to adopt the cloud differ based on the expected benefit for the individual customer. User-led decision making and historically ungoverned deployments can make it difficult to reset expectation and align with a formal strategy.
    • Getting all the right people in a room together to agree on the key components of the strategy and the direction undertaken for each one is often difficult.

    Info-Tech’s approach

    Define Your Cloud Vision

    Vision and alignment

    • Mission and vision
    • Alignment to other strategic plans
    • Guiding principles
    • Measuring success

    Technology

    • Monitoring
    • Provisioning
    • Migration

    Governance

    • Architecture
    • Integration and interoperability
    • Operations management
    • Cloud portfolio management
    • Cloud vendor management
    • Finance management
    • Security
    • Data controls

    People

    • Skills and roles
    • Culture and adoption
    • Governing bodies

    Info-Tech’s approach

    Your cloud strategy will comprise the elements listed under “vision and alignment,” “technology,” “governance,” and “people.” The Info-Tech methodology involves breaking the strategy down into subcomponents and going through a three-step process for each one. Start by reviewing a standard set of questions and understanding the goal of the exercise: What do we need to know? What are some common considerations and best practices? Once you’ve had a chance to review, discuss your current state and any gaps: What has been done? What still needs to be done? Finally, outline how you plan to go forward: What are your next steps? Who needs to be involved?

    Review

    • What questions do we need to answer to complete the discussion of this strategy component? What does the decision look like?
    • What are some key terms and best practices we must understand before deciding?

    Discuss

    • What steps have we already taken to address this component?
    • Does anything still need to be done?
    • Is there anything we’re not sure about or need further guidance on?

    Go forward

    • What are the next steps?
    • Who needs to be involved?
    • What questions still need to be asked/answered?
    • What should the document’s wording look like?

    Info-Tech’s methodology for documenting your cloud strategy

    1. Document your vision and alignment

    2. Record your people strategy

    3. Document governance principles

    4. Formalize your technology strategy

    Phase Steps

    1. Record your cloud mission and vision
    2. Document your cloud strategy’s alignment with other strategic plans
    3. Record your cloud guiding principles
    4. Define success
    1. Outline your skills and roles strategy
    2. Document your approach to culture and adoption
    3. Create a cloud governing body

    Document official organizational positions in these governance areas:

    1. Architecture
    2. Integration and interoperability
    3. Operations management
    4. Cloud portfolio management
    5. Cloud vendor management
    6. Finance management
    7. Security
    8. Data controls
    1. Formalize organizational approach to monitoring
    2. Document provisioning process
    3. Outline migration processes and procedures

    Phase Outcomes

    Documented strategy: vision and alignment

    Documented people strategy

    Documented cloud governance strategy

    Documented cloud technology strategy

    Insight summary

    Separate strategy from tactics

    Separate strategy from tactics! A strategy requires building out the framework for ongoing decision making. It is meant to be high level and achieve a large goal. The outcome of a strategy is often a sense of commitment to the goal and better communication on the topic.

    The cloud does not exist in a vacuum

    Your cloud strategy flows from your cloud vision and should align with the broader IT strategy. It is also part of a pantheon of strategies and should exist harmoniously with other strategies – data, security, etc.

    People problems needn’t preponderate

    The cloud doesn’t have to be a great disruptor. If you handle the transition well, you can focus your people on doing more valuable work – and this is generally engaging.

    Governance is a means to an end

    Governing your deployment for its own sake will only frustrate your end users. Articulate the benefits users and the organization can expect to see and you’re more likely to receive the necessary buy-in.

    Technology isn’t a panacea

    Technology won’t solve all your problems. Technology is a force multiplier, but you will still have to design processes and train your people to fully leverage it.

    Key deliverable

    Cloud Strategy Document template

    Inconsistency and informality are the enemies of efficiency. Capture the results of the cloud strategy generation exercises in the Cloud Strategy Document template.

    The image contains a screenshot of the Cloud Strategy Document Template.
    • Record the results of the exercises undertaken as part of this blueprint in the Cloud Strategy Document template.
    • It is important to remember that not every cloud strategy will look exactly the same, but this template represents an amalgamation of best practices and cloud strategy creation honed over several years of advisory service in the space.
    • You know your audience better than anyone. If you would prefer a strategy delivered in a different way (e.g. presentation format) feel free to adapt the Cloud Vision Executive Presentation into a longer strategy presentation.
    • Emphasis is an area where you should exercise discretion as well. A cost-oriented cloud strategy, or one that prioritizes one type of cloud (e.g. SaaS) at the exclusion of others, may benefit from more focus on some areas than others, or the introduction of relevant subcategories. Include as many of these as you think will be relevant.
    • Parsimony is king – if you can distill a concept to its essence, start there. Include additional detail only as needed. You want your cloud strategy document to be read. If it’s too long or overly detailed, you’ll encounter readability issues.

    Blueprint benefits

    IT benefits

    Business benefits

    • A consistent, well-defined approach to the cloud
    • Consensus on key strategy components, including security, architecture, and integration
    • A clear path forward on skill development and talent acquisition/retention
    • A comprehensive resource for information about the organization’s approach to key strategy components
    • Predictable access to cloud services
    • A business-aligned approach to leveraging the resources available in the cloud
    • Efficient and secure consumption of cloud resources where appropriate to do so
    • Answers to questions about the cloud and how it will be leveraged in the environment

    Measure the value of this blueprint

    Don’t take our word for it:

    • Document Your Cloud Strategy has been available for several years in various forms as both a workshop and as an analyst-led guided implementation.
    • After each engagement, we send a survey that asks members how they benefited from the experience. Those who have worked through Info-Tech’s cloud strategy material have given overwhelmingly positive feedback.
    • Additionally, members reported saving between 10 and 20 days and an average of $46,499.
    • Measure the value by calculating the time saved as a result of using Info-Tech’s framework vs. a home-brewed cloud strategy alternative and by comparing the overall cost of a guided implementation or workshop with the equivalent offering from another firm. We’re confident you’ll come out ahead.

    8.8/10 Average reported satisfaction

    13 Days Average reported time savings

    $46,499 Average cost savings

    Executive Brief Case Study

    INDUSTRY: Pharmaceuticals

    SOURCE: Info-Tech workshop

    Pharmaceutical company

    The unnamed pharmaceutical company that is the subject of this case study was looking to make the transition to the cloud. In the absence of a coherent strategy, the organization had a few cloud deployments with no easily discernable overall approach. Representatives of several distinct functions (legal, infrastructure, data, etc.) all had opinions on the uses and abuses of cloud services, but it had been difficult to round everyone up and have the necessary conversations. As a result, the strategy exercise had not proceeded in a speedy or well-governed way. This lack of strategic readiness presented a roadblock to moving forward with the cloud strategy and to work with the cloud implementation partner, tasked with execution.

    Results

    The company engaged Info-Tech for a four-day workshop on cloud strategy documentation. Over the course of four days, participants drawn from across the organization discussed the strategic components and generated consensus statements and next steps. The team was able to formalize the cloud strategy and described the experience as saving 10 days.

    Example output: Document your cloud strategy workshop exercise

    The image contains an example of Document your cloud streatgy workshop exercise.

    Anything in green, the team was reasonably sure they had good alignment and next steps. Those yellow flags warranted more discussion and were not ready for documentation.

    Info-Tech offers various levels of support to best suit your needs

    DIY Toolkit

    "Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful."

    Guided Implementation

    "Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track."

    Workshop

    "We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place."

    Consulting

    "Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project."

    Diagnostics and consistent frameworks are used throughout all four options.

    Guided Implementation

    What does a typical GI on this topic look like?

    Document your vision and alignment

    Record your people strategy

    Document governance principles

    Formalize your technology strategy

    Call #1: Review existing vision/strategy documentation.

    Call #2: Review progress on skills, roles, and governance bodies.

    Call #3: Work through integration, architecture, finance management, etc. based on reqs. (May be more than one call.)

    Call #4: Discuss challenges with monitoring, provisioning, and migration as-needed.

    A Guided Implementation (GI) is a series of calls with an Info-Tech analyst to help implement our best practices in your organization. A typical GI is 4 to 6 calls over the course of 1 to 3 months

    Workshop Overview

    Contact your account representative for more information.

    workshops@infotech.com 1-888-670-8889

    Day 1

    Day 2

    Day 3

    Day 4

    Day 5

    Answer
    “so what?”

    Define the
    IT target state

    Assess the IT
    current state

    Bridge the gap and
    create the strategy

    Next steps and
    wrap-up (offsite)

    Activities

    1.1 Introduction

    1.2 Discuss cloud mission and vision

    1.3 Discuss alignment with other strategic plans

    1.4 Discuss guiding principles

    1.5 Define success metrics

    2.1 Discuss skills and roles

    2.2 Review culture and adoption

    2.3 Discuss a cloud governing body

    2.4 Review architecture position

    2.5 Discuss integration and interoperability

    3.1 Discuss cloud operations management

    3.2 Review cloud portfolio management

    3.3 Discuss cloud vendor management

    3.4 Discuss cloud finance management

    3.5 Discuss cloud security

    4.1 Review and formalize data controls

    4.2 Design a monitoring approach

    4.3 Document the workload provisioning process

    4.4 Outline migration processes and procedures

    5.1 Populate the Cloud Strategy Document

    Deliverables

    Formalized cloud mission and vision, along with alignment with strategic plans, guiding principles, and success metrics

    Position statement on skills and roles, culture and adoption, governing bodies, architecture, and integration/interoperability

    Position statements on cloud operations management, portfolio management, vendor management, finance management, and cloud security

    Position statements on data controls, monitoring, provisioning, and migration

    Completed Cloud Strategy Document

    Phase 1

    Document Your Vision and Alignment

    Phase 1

    Phase 2

    Phase 3

    Phase 4

    1.1 Document your mission and vision

    1.2 Document alignment to other strategic plans

    1.3 Document guiding principles

    1.4 Document success metrics

    2.1 Define approach to skills and roles

    2.2 Define approach to culture and adoption

    2.3 Define cloud governing bodies

    3.1 Define architecture direction

    3.2 Define integration approach

    3.3 Define operations management process

    3.4 Define portfolio management direction

    3.5 Define vendor management direction

    3.6 Document finance management tactics

    3.7 Define approach to cloud security

    3.8 Define data controls in the cloud

    4.1 Define cloud monitoring strategy

    4.2 Define cloud provisioning strategy

    4.3 Define cloud migration strategy

    This phase will walk you through the following activities:

    1. Record your cloud mission and vision
    2. Document your cloud strategy’s alignment with other strategic plans
    3. Record your cloud guiding principles
    4. Define success

    This phase has the following outcome:

    • Documented strategy: vision and alignment

    Record your mission and vision

    Build on the work you’ve already done

    Before formally documenting your cloud strategy, you should ensure that you have a good understanding of your overall cloud vision. How do you plan to leverage the cloud? What goals are you looking to accomplish? How will you distribute your workloads between different cloud service models (SaaS, PaaS, IaaS)? What will your preferred delivery model be (public, private, hybrid)? Will you support your cloud deployment internally or use the services of various consultants or managed service providers?

    The answers to these questions will inform the first section of your cloud strategy. If you haven’t put much thought into this or think you could use a deep dive on the fundamentals of your cloud vision and cloud archetypes, consider reviewing Define Your Cloud Vision, the companion blueprint to this one.

    Once you understand your cloud vision and what you’re trying to accomplish with your cloud strategy, this phase will walk you through aligning the strategy with other strategic initiatives. What decisions have others made that will impact the cloud strategy (or that the cloud strategy will impact)? Who must be involved/informed? What callouts must be involved at what point? Do users have access to the appropriate strategic documentation (and would they understand it if they did)?

    You must also capture some guiding principles. A strategy by its nature provides direction, helping readers understand the decisions they should make and why those decisions align with organizational interests. Creating some top-level principles is a useful exercise because those principles facilitate comprehension and ensure the strategy’s applicability.

    Finally, this phase will walk you through the process of measuring success. Once you know where you’d like to go, the principles that underpin your direction, and how your cloud strategy figures into the broader strategic pantheon, you should record what success actually means. If you’re looking to save money, overall cost should be a metric you track. If the cloud is all about productivity, generate appropriate productivity metrics. If you’re looking to expand into new technology or close a datacenter, you will need to track output specific to those overall goals.

    Review: mission and vision

    The overall organizational mission is a key foundational element of the cloud strategy. If you don’t understand where you’re going, how can you begin the journey to get there? This section of the strategy has four key parts that you should understand and incorporate into the beginning of the strategy document. If you haven’t already, review Define Your Cloud Vision for instructions on how to generate these elements.

    1. Cloud vision statement: This is a succinct encapsulation of your overall perspective on the suitability of cloud services for your environment – what you hope to accomplish. The ideal statement includes a scope (who/what does the strategy impact?), a goal (what will it accomplish?), and a key differentiator (what will make it happen?). This is an example: “[Organization] will leverage public cloud solutions and retire existing datacenter and colocation facilities. This transition will simplify infrastructure administration, support and security, while modernizing legacy infrastructure and reducing the need for additional capital expenditure.” You might also consider reviewing your overall cloud archetype (next slide) and including the output of that exercise in the document

    2. Service model decision framework: Services can be provided as software as a service (SaaS), platform as a service (PaaS), infrastructure as a service (IaaS), or they can be colocated or remain on premises. Not all cloud service models serve the same purpose or provide equal value in all circumstances. Understanding how you plan to take advantage of these distinct service models is an important component of the cloud strategy. In this section of the strategy, a rubric that captures the characteristics of the ideal workload for each of the named service models, along with some justification for the selection, is essential. This is a core component of Define Your Cloud Vision, and if you would like to analyze individual workloads, you can use the Cloud Vision Workbook for that purpose.

    3. Delivery model decision framework: Just as there are different cloud service models that have unique value propositions, there are several unique cloud delivery models as well, distinguished by ownership, operation, and customer base. Public clouds are the purview of third-party providers who make them available to paying customers. Private clouds are built for the exclusive use of a designated organization or group of organizations with internal clients to serve. Hybrid clouds involve the use of multiple, interoperable delivery models (interoperability is the key term here), while multi-cloud deployment models incorporate multiple delivery and service models into a single coherent strategy. What will your preferred delivery model be? Why?

    4. Support model decision framework: Once you have a service model nailed down and understand how you will execute on the delivery, the question then becomes about how you will support your cloud deployment going forward. Broadly speaking, you can choose to manage your deployment in house using internal resources (e.g. staff), to use managed service providers for ongoing support, or to hire consultants to handle specific projects/tasks. Each approach has its strengths and weaknesses, and many cloud customers will deploy multiple support models across time and different workloads. A foundational perspective on the support model is a key component of the cloud vision and should appear early in the strategy.

    Understand key cloud concepts: Archetype

    Once you understand the value of the cloud, your workloads’ general suitability for the cloud, and your proposed risks and mitigations, the next step is to define your cloud archetype. Your organization’s cloud archetype is the strategic posture that IT adopts to best support the organization’s goals. Info-Tech’s model recognizes seven archetypes, divided into three high-level archetypes. After consultation with your stakeholders, and based on the results of the suitability and risk assessment activities, define your archetype. The archetype feeds into the overall cloud vision and provides simple insight into the cloud future state for all stakeholders. The cloud vision itself is captured in a “vision statement,” a short summary of the overall approach that includes the overall cloud archetype.

    The image contains an arrow facing vertically up. The pointed end of the arrow is labelled more cloud, and the bottom of the arrow is labelled less cloud.

    We can best support the organization’s goals by:

    Cloud-Focused

    Cloud-Centric

    Providing all workloads through cloud delivery.

    Cloud-First

    Using the cloud as our default deployment model. For each workload, we should ask “why NOT cloud?”

    Cloud-Opportunistic

    Hybrid

    Enabling the ability to transition seamlessly between on-premises and cloud resources for many workloads.

    Integrated

    Combining cloud and traditional infrastructure resources, integrating data and applications through APIs or middleware.

    Split

    Using the cloud for some workloads and traditional infrastructure resources for others.

    Cloud-Averse

    Cloud-Light

    Using traditional infrastructure resources and limiting our use of the cloud to when it is absolutely necessary.

    Anti-Cloud

    Using traditional infrastructure resources and avoiding the use of cloud wherever possible.

    Implement DevOps Practices That Work

    • Buy Link or Shortcode: {j2store}155|cart{/j2store}
    • member rating overall impact: 9.1/10 Overall Impact
    • member rating average dollars saved: $42,916 Average $ Saved
    • member rating average days saved: 20 Average Days Saved
    • Parent Category Name: Development
    • Parent Category Link: /development
    • In today’s world, business agility is essential to stay competitive. Quick responses to business needs through efficient development and deployment practices are critical for business value delivery.
    • Organizations are looking to DevOps as an approach to rapidly deliver changes, but they often lack the foundations to use DevOps effectively.

    Our Advice

    Critical Insight

    Even in a highly tool-centric view, it is the appreciation of DevOps core principles that will determine your success in implementing its practices.

    Impact and Result

    • Understand the basics of DevOps-related improvements.
    • Assess the health and conduciveness of software delivery process through Info-Tech Research Group’s MATURE framework.

    Implement DevOps Practices That Work Research & Tools

    Start here – read the Executive Brief

    Read our concise Executive Brief to find out why you should implement DevOps, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. Examine your current state

    Understand the current state of your software delivery process and categorize existing challenges in it.

    • DevOps Readiness Survey

    2. MATURE your delivery lifecycle

    Brainstorm solutions using Info-Tech Research Group’s MATURE framework.

    • DevOps Roadmap Template

    3. Choose the right metrics and tools for your needs

    Identify metrics that are insightful and valuable. Determine tools that can help with DevOps practices implementation.

    • DevOps Pipeline Maturity Assessment

    4. Select horizons for improvement

    Lay out a schedule for enhancements for your software process to make it ready for DevOps.

    [infographic]

    Workshop: Implement DevOps Practices That Work

    Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

    1 Examine Your Current State

    The Purpose

    Set the context for improvement.

    Key Benefits Achieved

    Provide a great foundation for an actionable vision and goals that people can align to.

    Activities

    1.1 Review the outcome of the DevOps Readiness Survey.

    1.2 Articulate the current-state delivery process.

    1.3 Categorize existing challenges using PEAS.

    Outputs

    Baseline assessment of the organization’s readiness for introducing DevOps principles in its delivery process

    A categorized list of challenges currently evident in the delivery process

    2 MATURE Your Delivery Lifecycle

    The Purpose

    Brainstorm solutions using the MATURE framework.

    Key Benefits Achieved

    Collaborative list of solutions to challenges that are restricting/may restrict adoption of DevOps in your organization.

    Activities

    2.1 Brainstorm solutions for identified challenges.

    2.2 Understand different DevOps topologies within the context of strong communication and collaboration.

    Outputs

    A list of solutions that will enhance the current delivery process into one which is influenced by DevOps principles

    (Optional) Identify a team topology that works for your organization.

    3 Choose the Right Metrics and Tools for Your Needs

    The Purpose

    Select metrics and tools for your DevOps-inspired delivery pipeline.

    Key Benefits Achieved

    Enable your team to select the right metrics and tool chain that support the implementation of DevOps practices.

    Activities

    3.1 Identify metrics that are sensible and provide meaningful insights into your organization’s DevOps transition.

    3.2 Determine the set of tools that satisfy enterprise standards and can be used to implement DevOps practices.

    3.3 (Optional) Assess DevOps pipeline maturity.

    Outputs

    A list of metrics that will assist in measuring the progress of your organization’s DevOps transition

    A list of tools that meet enterprise standards and enhance delivery processes

    4 Define Your Release, Communication, and Next Steps

    The Purpose

    Build a plan laying out the work needed to be done for implementing the necessary changes to your organization.

    Key Benefits Achieved

    Roadmap of steps to take in the coming future.

    Activities

    4.1 Create a roadmap for future-state delivery process.

    Outputs

    Roadmap for future-state delivery process

    Enhance Your Solution Architecture Practices

    • Buy Link or Shortcode: {j2store}157|cart{/j2store}
    • member rating overall impact: 9.0/10 Overall Impact
    • member rating average dollars saved: $33,359 Average $ Saved
    • member rating average days saved: 11 Average Days Saved
    • Parent Category Name: Development
    • Parent Category Link: /development
    • In today’s world, business agility is essential to stay competitive. Quick responses to business needs through efficient development and deployment practices is critical for business value delivery.
    • A mature solution architecture practice is the basic necessity for a business to have technical agility.

    Our Advice

    Critical Insight

    Don’t architect for normal situations. That is a shallow approach and leads to decisions that may seem “right” but will not be able to stand up to system elasticity needs.

    Impact and Result

    • Understand the different parts of a continuous security architecture framework and how they may apply to your decisions.
    • Develop a solution architecture for upcoming work (or if there is a desire to reduce tech debt).

    Enhance Your Solution Architecture Practices Research & Tools

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. Solution Architecture Practices Deck – A deck to help you develop an approach for or validate existing solution architecture capability.

    Translate stakeholder objectives into architecture requirements, solutions, and changes. Incorporate architecture quality attributes in decisions to increase your architecture’s life. Evaluate your solution architecture from multiple views to obtain a holistic perspective of the range of issues, risks, and opportunities.

    • Enhance Your Solution Architecture Practices – Phases 1-3

    2. Solution Architecture Template – A template to record the results from the exercises to help you define, detail, and make real your digital product vision.

    Identify and detail the value maps that support the business, and discover the architectural quality attribute that is most important for the value maps. Brainstorm solutions for design decisions for data, security, scalability, and performance.

    • Solution Architecture Template
    [infographic]

    Workshop: Enhance Your Solution Architecture Practices

    Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

    1 Vision and Value Maps

    The Purpose

    Document a vision statement for the solution architecture practice (in general) and/or a specific vision statement, if using a single project as an example.

    Document business architecture and capabilities.

    Decompose capabilities into use cases.

    Key Benefits Achieved

    Provide a great foundation for an actionable vision and goals that people can align to.

    Develop a collaborative understanding of business capabilities.

    Develop a collaborative understanding of use cases and personas that are relevant for the business.

    Activities

    1.1 Develop vision statement.

    1.2 Document list of value stream maps and their associated use cases.

    1.3 Document architectural quality attributes needed for use cases using SRME.

    Outputs

    Solution Architecture Template with sections filled out for vision statement canvas and value maps

    2 Continue Vision and Value Maps, Begin Phase 2

    The Purpose

    Map value stream to required architectural attributes.

    Prioritize architecture decisions.

    Discuss and document data architecture.

    Key Benefits Achieved

    An understanding of architectural attributes needed for value streams.

    Conceptual understanding of data architecture.

    Activities

    2.1 Map value stream to required architectural attributes.

    2.2 Prioritize architecture decisions.

    2.3 Discuss and document data architecture.

    Outputs

    Solution Architecture Template with sections filled out for value stream and architecture attribute mapping; a prioritized list of architecture design decisions; and data architecture

    3 Continue Phase 2, Begin Phase 3

    The Purpose

    Discuss security and threat assessment.

    Discuss resolutions to threats via security architecture decisions.

    Discuss system’s scalability needs.

    Key Benefits Achieved

    Decisions for security architecture.

    Decisions for scalability architecture.

    Activities

    3.1 Discuss security and threat assessment.

    3.2 Discuss resolutions to threats via security architecture decisions.

    3.3 Discuss system’s scalability needs.

    Outputs

    Solution Architecture Template with sections filled out for security architecture and scalability design

    4 Continue Phase 3, Start and Finish Phase 4

    The Purpose

    Discuss performance architecture.

    Compile all the architectural decisions into a solutions architecture list.

    Key Benefits Achieved

    A complete solution architecture.

    A set of principles that will form the foundation of solution architecture practices.

    Activities

    4.1 Discuss performance architecture.

    4.2 Compile all the architectural decisions into a solutions architecture list.

    Outputs

    Solution Architecture Template with sections filled out for performance and a complete solution architecture

    Further reading

    Enhance Your Solution Architecture Practice

    Ensure your software systems solution is architected to reflect stakeholders’ short- and long-term needs.

    Analyst Perspective

    Application architecture is a critical foundation for supporting the growth and evolution of application systems. However, the business is willing to exchange the extension of the architecture’s life with quality best practices for the quick delivery of new or enhanced application functionalities. This trade-off may generate immediate benefits to stakeholders, but it will come with high maintenance and upgrade costs in the future, rendering your system legacy early.

    Technical teams know the importance of implementing quality attributes into architecture but are unable to gain approval for the investments. Overcoming this challenge requires a focus of architectural enhancements on specific problem areas with significant business visibility. Then, demonstrate how quality solutions are vital enablers for supporting valuable application functionalities by tracing these solutions to stakeholder objectives and conducting business and technical risk and impact assessments through multiple business and technical perspectives.

    this is a picture of Andrew Kum-Seun

    Andrew Kum-Seun
    Research Manager, Applications
    Info-Tech Research Group

    Enhance Your Solution Architecture

    Ensure your software systems solution is architected to reflect stakeholders’ short- and long-term needs.

    EXECUTIVE BRIEF

    Executive Summary

    Your Challenge

    • Most organizations have some form of solution architecture; however, it may not accurately and sufficiently support the current and rapidly changing business and technical environments.
    • To enable quick delivery, applications are built and integrated haphazardly, typically omitting architecture quality practices.

    Common Obstacles

    • Failing to involve development and stakeholder perspectives in design can lead to short-lived architecture and critical development, testing, and deployment constraints and risks being omitted.
    • Architects are experiencing little traction implementing solutions to improve architecture quality due to the challenge of tracing these solutions back to the right stakeholder objectives.

    Info-Tech's Approach

    • Translate stakeholder objectives into architecture requirements, solutions, and changes. Incorporate architecture quality attributes in decisions to increase your architecture’s life.
    • Evaluate your solution architecture from multiple views to obtain a holistic perspective of the range of issues, risks, and opportunities.
    • Regularly review and recalibrate your solution architecture so that it accurately reflects and supports current stakeholder needs and technical environments.

    Info-Tech Insight

    Well-received applications can have poor architectural qualities. Functional needs often take precedence over quality architecture. Quality must be baked into design, execution, and decision-making practices to ensure the right tradeoffs are made.

    A badly designed solution architecture is the root of all technical evils

    A well-thought-through and strategically designed solution architecture is essential for the long-term success of any software system, and by extension, the organization because:

    1. It will help achieve quality attribute requirements (security, scalability, performance, usability, resiliency, etc.) for a software system.
    2. It can define and refine architectural guiding principles. A solution architecture is not only important for today but also a vision for the future of the system’s ability to react positively to changing business needs.
    3. It can help build usable (and reusable) services. In a fast-moving environment, the convenience of having pre-made plug-and-play architectural objects reduces the risk incurred from knee-jerk reactions in response to unexpected demands.
    4. It can be used to create a roadmap to an IT future state. Architectural concerns support transition planning activities that can lead to the successful implementation of a strategic IT plan.

    Demand for quick delivery makes teams omit architectural best practices, increasing downstream risks

    In its need for speed, a business often doesn’t see the value in making sure architecture is maintainable, reusable, and scalable. This demand leads to an organizational desire for development practices and the procurement of vendors that favor time-to-market over long-term maintainability. Unfortunately, technical teams are pushed to omit design quality and validation best practices.

    What are the business impacts of omitting architecture design practices?

    Poor quality application architecture impedes business growth opportunities, exposes enterprise systems to risks, and consumes precious IT budgets in maintenance that could otherwise be used for innovation and new projects.

    Previous estimations indicate that roughly 50% of security problems are the result of software design. […] Flaws in the architecture of a software system can have a greater impact on various security concerns in the system, and as a result, give more space and flexibility for malicious users.(Source: IEEE Software)

    Errors in software requirements and software design documents are more frequent than errors in the source code itself according to Computer Finance Magazine. Defects introduced during the requirements and design phase are not only more probable but also more severe and more difficult to remove. (Source: iSixSigma)

    Design a solution architecture that can be successful within the constraints and complexities set before you

    APPLICATION ARCHITECTURE…

    … describes the dependencies, structures, constraints, standards, and development guidelines to successfully deliver functional and long-living applications. This artifact lays the foundation to discuss the enhancement of the use and operations of your systems considering existing complexities.

    Good architecture design practices can give you a number of benefits:

    Lowers maintenance costs by revealing key issues and risks early. The Systems Sciences Institute at IBM has reported that the cost to fix an error found after product release was 4 to 5 times as much as one uncovered during design.(iSixSigma)

    Supports the design and implementation activities by providing key insights for project scheduling, work allocation, cost analysis, risk management, and skills development.(IBM: developerWorks)

    Eliminates unnecessary creativity and activities on the part of designers and implementers, which is achieved by imposing the necessary constraints on what they can do and making it clear that deviation from constraints can break the architecture.(IBM: developerWorks)

    Use Info-Tech’s Continuous Solution Architecture (CSA) Framework for designing adaptable systems

    Solution architecture is not a one-size-fits-all conversation. There are many design considerations and trade-offs to keep in mind as a product or services solution is conceptualized, evaluated, tested, and confirmed. The following is a list of good practices that should inform most architecture design decisions.

    Principle 1: Design your solution to have at least two of everything.

    Principle 2: Include a “kill switch” in your fault-isolation design. You should be able to turn off everything you release.

    Principle 3: If it can be monitored, it should be. Use server and audit logs where possible.

    Principle 4: Asynchronous is better than synchronous. Asynchronous design is more complex but worth the processing efficiency it introduces.

    Principle 5: Stateless over stateful: State data should only be used if necessary.

    Principle 6: Go horizonal (scale out) over vertical (scale up).

    Principle 7: Good architecture comes in small packages.

    Principle 8: Practice just-in-time architecture. Delay finalizing an approach for as long as you can.

    Principle 9: X-ilities over features. Quality of an architecture is the foundation over which features exist. A weak foundation can never be obfuscated through shiny features.

    Principle 10: Architect for products not projects. A product is an ongoing concern, while a project is short lived and therefore only focused on what is. A product mindset forces architects to think about what can or should be.

    Principle 11: Design for rollback: When all else fails, you should be able to stand up the previous best state of the system.

    Principle 12: Test the solution architecture like you test your solution’s features.

    CSA should be used for every step in designing a solution’s architecture

    Solution architecture is a technical response to a business need, and like all complex evolutionary systems, must adapt its design for changing circumstances.

    The triggers for changes to existing solution architectures can come from, at least, three sources:

    1. Changing business goals
    2. Existing backlog of technical debt
    3. Solution architecture roadmap

    A solution’s architecture is cross-cutting and multi-dimensional and at the minimum includes:

    • Product Portfolio Strategy
    • Application Architecture
    • Data Architecture
    • Information Architecture
    • Operational Architecture

    along with several qualitative attributes (also called non-functional requirements).

    This image contains a chart which demonstrates the relationship between changing hanging business goals, Existing backlog of technical debt, Solution architecture roadmap, and Product Portfolio Strategy, Application Architecture, Data Architecture, Information Architecture and, Operational Architecture

    Related Research: Product Portfolio Strategy

    Integrate Portfolios to Create Exceptional Customer Value

    • Define an organizing principle that will structure your projects and applications in a way that matters to your stakeholders.
    • Bridge application and project portfolio data using the organizing principle that matters to communicate with stakeholders across the organization.
    • Create a dashboard that brings together the benefits of both project and application portfolio management to improve visibility and decision making.

    Deliver on Your Digital Portfolio Vision

    • Recognize that a vision is only as good as the data that backs it up. Lay out a comprehensive backlog with quality built in that can be effectively communicated and understood through roadmaps.
    • Your intent is only a dream if it cannot be implemented ; define what goes into a release plan via the release canvas.
    • Define a communication approach that lets everyone know where you are heading.

    Related Research: Data, Information & Integration Architecture

    Build a Data Architecture Roadmap

    • Have a framework in place to identify the appropriate solution for the challenge at hand. Our three-phase practical approach will help you build a custom and modernized data architecture.
    • Identify and prioritize the business drivers in which data architecture changes would create the largest overall benefit and determine the corresponding data architecture tiers that need to be addressed.
    • Discover the best-practice trends, measure your current state, and define the targets for your data architecture tactics.
    • Build a cohesive and personalized roadmap for restructuring your data architecture. Manage your decisions and resulting changes.

    Build a Data Pipeline for Reporting and Analytics

    • Understand your high-level business capabilities and interactions across them – your data repositories and flows should be just a digital reflection thereof.
    • Divide your data world in logical verticals overlaid with various speed data progression lanes, i.e. build your data pipeline – and conquer it one segment at a time.
    • Use the most appropriate database design pattern for a given phase/component in your data pipeline progression.

    Related Research:Operational Architecture

    Optimize Application Release Management

    • Acquire release management ownership. Ensure there is appropriate accountability for the speed and quality of the releases passing through the entire pipeline.
    • A release manager has oversight over the entire release process and facilitates the necessary communication between business stakeholders and various IT roles.
    • Instill holistic thinking. Release management includes all steps required to push release and change requests to production along with the hand-off to Operations and Support. Increase the transparency and visibility of the entire pipeline to ensure local optimizations do not generate bottlenecks in other areas.
    • Standardize and lay a strong release management foundation. Optimize the key areas where you are experiencing the most pain and continually improve.

    Build Your Infrastructure Roadmap

    • Increased communication. More information being shared to more people who need it.
    • Better planning. More accurate information being shared.
    • Reduced lead times. Less due diligence or discovery work required as part of project implementations.
    • Faster delivery times. Less low-value work, freeing up more time for project work.

    Related Research:Security Architecture

    Identify Opportunities to Mature the Security Architecture

    • A right-sized security architecture can be created by assessing the complexity of the IT department, the operations currently underway for security, and the perceived value of a security architecture within the organization. This will bring about a deeper understanding of the organizational infrastructure.
    • Developing a security architecture should also result in a list of opportunities (i.e. initiatives) that an organization can integrate into a roadmap. These initiatives will seek to improve security operations and strengthen the IT department’s understanding of security’s role within the organization.
    • A better understanding of the infrastructure will help to save time on determining the correct technologies required from vendors, and therefore, cut down on the amount of vendor noise.
    • Creating a defensible roadmap will assist with justifying future security spend.

    Key deliverable:

    Solution Architecture Template
    Record the results from the exercises to help you define, detail, and make real your digital product vision.

    Blueprint Deliverables

    Each step of this blueprint is accompanied by supporting deliverables to help you accomplish your goals:

    This image contains screenshots of the deliverables which will be discussed later in this blueprint

    Info-Tech offers various levels of support to best suit your needs

    DIY Toolkit

    Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful.

    Guided Implementation

    Our team knows that we need to fix a process, but we need assistance to determine where to focus. some check-ins along the way would help keep us on track

    Workshop

    We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place

    Consulting

    Our team does not have the time or the knowledge to take this project on. we need assistance through the entirety of this project.

    Diagnostics and consistent frameworks are used throughout all four options

    Workshop Overview

    Contact your account representative for more information. workshops@infotech.com 1-888-670-8889

    Day 1 Day 2 Day 3 Day 4
    Exercises
    1. Articulate an architectural vision
    2. Develop dynamic value stream maps
    1. Create a conceptual map between the value stream, use case, and required architectural attribute
    2. Create a prioritized list of architectural attributes
    3. Develop a data architecture that supports transactional and analytical needs
    1. Document security architecture risks and mitigations
    2. Document scalability architecture
    1. Document performance-enhancing architecture
    2. Bring it all together
    Outcomes
    1. Architecture vision
    2. Dynamic value stream maps (including user stories/personas)
    1. List of required architectural attributes
    2. Architectural attributes prioritized
    3. Data architecture design decisions
    1. Security threat and risk analysis
    2. Security design decisions
    3. Scalability design decisions
    1. Performance design decisions
    2. Finalized decisions

    Guided Implementation

    What does a typical GI on this topic look like?

    A Guided Implementation (GI) is series of calls with an Info-Tech analyst to help implement our best practices in your organization.
    This GI is between 8 to 10 calls over the course of approximately four to six months.

    Phase 1 Phase 2 Phase 2
    Call #1:
    Articulate an architectural vision.
    Call #4:
    Continue discussion on value stream mapping and related use cases.
    Call #6:
    Document security design decisions.
    Call #2:
    Discuss value stream mapping and related use cases.
    Call #5:
    • Map the value streams to required architectural attribute.
    • Create a prioritized list of architectural attributes.
    Call #7:
    • Document scalability design decisions.
    • Document performance design decisions.
    Call #3:
    Continue discussion on value stream mapping and related use cases.
    Call #8:
    Bring it all together.

    Phase 1: Visions and Value Maps

    Phase 1

    1.1 Articulate an Architectural Vision
    1.2 Develop Dynamic Value Stream Maps
    1.3 Map Value Streams, Use Cases, and Required Architectural Attributes
    1.4 Create a Prioritized List of Architectural Attributes

    Phase 2

    2.1 Develop a Data Architecture That Supports Transactional and Analytical Needs
    2.2 Document Security Architecture Risks and Mitigations

    Phase 3

    3.1 Document Scalability Architecture
    3.2 Document Performance Enhancing Architecture
    3.3 Combine the Different Architecture Design Decisions Into a Unified Solution Architecture

    This phase will walk you through the following activities:

    • Determine a vision for architecture outcomes
    • Draw dynamic value stream maps
    • Derive architectural design decisions
    • Prioritize design decisions

    This phase involves the following participants:

    • Business Architect
    • Product Owner
    • Application Architect
    • Integration Architect
    • Database Architect
    • Enterprise Architect

    Enhance Your Solution Architecture Practice

    Let’s get this straight: You need an architectural vision

    If you start off by saying I want to architect a system, you’ve already lost. Remember what a vision is for!

    An architectural vision...

    … is your North Star

    Your product vision serves as the single fixed point for product development and delivery.

    … aligns stakeholders

    It gets everyone on the same page.

    … helps focus on meaningful work

    There is no pride in being a rudderless ship. It can also be very expensive.

    And eventually...

    … kick-starts your strategy

    We know where to go, we know who to bring along, and we know the steps to get there. Let’s plan this out.

    An architectural vision is multi-dimensional

    Who is the target customer (or customers)?

    What is the key benefit a customer can get from using our service or product?

    Why should they be engaged with you?

    What makes our service or product better than our competitors?

    (Adapted from Crossing the Chasm)

    Info-Tech Insight

    It doesn’t matter if you are delivering value to internal or external stakeholders, you need a product vision to ensure everyone understands the “why.”

    Use a canvas as the dashboard for your architecture

    The solution architecture canvas provides a single dashboard to quickly define and communicate the most important information about the vision. A canvas is an effective tool for aligning teams and providing an executive summary view.

    This image contains a sample canvas for you to use as the dashboard for your architecture. The sections are: Solution Name, Tracking Info, Vision, Business Goals, Metrics, Personas, and Stakeholders.

    Leverage the solution architecture canvas to state and inform your architecture vision

    This image contains the sample canvas from the previous section, with annotations explaining what to do for each of the headings.

    1.1 Craft a vision statement for your solution’s architecture

    1. Use the product canvas template provided for articulating your solution’s architecture.

    *If needed, remove or add additional data points to fit your purposes.

    There are different statement templates available to help form your product vision statements. Some include:

    • For [our target customer], who [customer’s need], the [product] is a [product category or description] that [unique benefits and selling points]. Unlike [competitors or current methods], our product [main differentiators].
    • We believe (in) a [noun: world, time, state, etc.] where [persona] can [verb: do, make, offer, etc.], for/by/with [benefit/goal].
    • To [verb: empower, unlock, enable, create, etc.] [persona] to [benefit, goal, future state].
    • Our vision is to [verb: build, design, provide] the [goal, future state] to [verb: help, enable, make it easier to...] [persona].

    (Adapted from Crossing the Chasm)

    Download the Solution Architecture Template and document your vision statement.

    Input

    • Business Goals
    • Product Portfolio Vision

    Output

    • Solution Architecture Vision

    Materials

    • Whiteboard/Flip Charts

    Participants

    • Business Architect
    • Product Owner
    • IT Leadership
    • Business Leadership

    Solution Architecture Canvas: Refine your vision statement

    This image contains a screenshot of the canvas from earlier in the blueprint, with only the annotation for Solution Name: Vision, unique value proposition, elevator pitch, or positioning statement.

    Understand your value streams before determining your solution’s architecture

    Business Strategy

    Sets and communicates the direction of the entire organization.

    Value Stream

    Segments, groups, and creates a coherent narrative as to how an organization creates value.

    Business Capability Map

    Decomposes an organization into its component parts to establish a common language across the organization.

    Execution

    Implements the business strategy through capability building or improvement projects.

    Identify your organization’s goals and define the value streams that support them

    Goal

    Revenue Growth

    Value Streams

    Stream 1- Product Purchase
    Stream 2- Customer Acquisition
    stream 3- Product Financing

    There are many techniques that help with constructing value streams and their capabilities.

    Domain-driven design is a technique that can be used for hypothesizing the value maps, their capabilities, and associated solution architecture.

    Read more about domain-driven design here.

    Value streams can be external (deliver value to customers) or internal (support operations)

      External Perspective

    1. Core value streams are mostly externally facing: they deliver value to either an external/internal customer and they tie to the customer perspective of the strategy map.
    • E.g. customer acquisition, product purchase, product delivery

    Internal Perspective

  • Support value streams are internally facing: they provide the foundational support for an organization to operate.
    • E.g. employee recruitment to retirement

    Key Questions to Ask While Evaluating Value Streams

    • Who are your customers?
    • What benefits do we deliver to them?
    • How do we deliver those benefits?
    • How does the customer receive the benefits?
    This image contains an example of value streams. The main headings are: Customer Acquisitions, Product Purchase, Product Delivery, Confirm Order, Product Financing, and Product Release.

    Value streams highlight the what, not the how

    Value chains set a high-level context, but architectural decisions still need to be made to deal with the dynamism of user interaction and their subsequent expectations. User stories (and/or use cases) and themes are great tools for developing such decisions.

    Product Delivery

    1. Order Confirmation
    2. Order Dispatching
    3. Warehouse Management
    4. Fill Order
    5. Ship Order
    6. Deliver Order

    Use Case and User Story Theme: Confirm Order

    This image shows the relationship between confirming the customer's order online, and the Online Buyer, the Online Catalog, the Integrated Payment, and the Inventory Lookup.

    The use case Confirming Customer’s Online Order has four actors:

    1. An Online Buyer who should be provided with a catalog of products to purchase from.
    2. An Online Catalog that is invoked to display its contents on demand.
    3. An Integrated Payment system for accepting an online form of payment (credit card, Bitcoins, etc.) in a secure transaction.
    4. An Inventory Lookup module that confirms there is stock available to satisfy the Online Buyer’s order.

    Info-Tech Insight

    Each use case theme links back to a feature(s) in the product backlog.

    Related Research

    Deliver on Your Digital Portfolio Vision

    • Recognize that a vision is only as good as the data that backs it up. Lay out a comprehensive backlog with quality built in that can be effectively communicated and understood through roadmaps.
    • Your intent is only a dream if it cannot be implemented – define what goes into a release plan via the release canvas.
    • Define a communication approach that lets everyone know where you are heading.

    Document Your Business Architecture

    • Recognize the opportunity for architecture work, analyze the current and target states of your business strategy, and identify and engage the right stakeholders.
    • Model the business in the form of architectural blueprints.
    • Apply business architecture techniques such as strategy maps, value streams, and business capability maps to design usable and accurate blueprints of the business.
    • Drive business architecture forward to promote real value to the organization.
    • Assess your current projects to determine if you are investing in the right capabilities. Conduct business capability assessments to identify opportunities and to prioritize projects.

    1.2 Document dynamic value stream maps

    1. Create value stream maps that support your business objectives.
    • The value stream maps could belong to existing or new business objectives.
  • For each value stream map:
    • Determine use case(s), the actors, and their expected activity.

    *Refer to the next slide for an example of a dynamic value stream map.

    Download the Solution Architecture Template for documentation of dynamic value stream map

    Input

    • Business Goals
    • Some or All Existing Business Processes
    • Some or All Proposed New Business Processes

    Output

    • Dynamic Value Stream Maps for Multiple Use Roles and Use Cases

    Materials

    • Whiteboard/Flip Charts

    Participants

    • Business Architect
    • Product Owner
    • Application Architect
    • Integration Architect

    Example: Dynamic value stream map

    Loan Provision*

    *Value Stream Name: Usually has the same name as the capability it illustrates.

    Loan Application**; Disbursement of Fund**; Risk Management**; Service Accounts**

    **Value Stream Components: Specific functions that support the successful delivery of a value stream.

    Disbursement of Funds

    This image shows the relationship between depositing the load into the applicant's bank account, and the Applicant's bank, the Loan Applicant, and the Loan Supplier.

    Style #1:

    The use case Disbursement of Funds has three actors:

    1. A Loan Applicant who applied for a loan and got approved for one.
    2. A Loan Supplier who is the source for the funds.
    3. The Applicant’s Bank that has an account into which the funds are deposited.

    Style # 2:

    Loan Provision: Disbursement of Funds
    Use Case Actors Expectation
    Deposit Loan Into Applicant’s Bank Account
    1. Loan Applicant
    2. Loan Supplier
    3. Applicant’s Bank
    1. Should be able to see deposit in bank account
    2. Deposit funds into account
    3. Accept funds into account

    Mid-Phase 1 Checkpoint

    By now, the following items are ideally completed:

    • Mid-Phase 1 Checkpoint

    Start with an investigation of your architecture’s qualitative needs

    Quality attributes can be viewed as the -ilities (e.g. scalability, usability, reliability) that a software system needs to provide. A system not meeting any of its quality attribute requirements will likely not function as required. Examples of quality attributes are:

    1. Slow system response time
    2. Security breaches that result in loss of personal data
    3. A product feature upgrade that is not compatible with previous versions
    Examples of Qualitative Attributes
    Performance Compatibility Usability Reliability Security Maintainability
    • Response Time
    • Resource Utilization
    • System Capacity
    • Interoperability
    • Accessibility
    • User Interface
    • Intuitiveness
    • Availability
    • Fault Tolerance
    • Recoverability
    • Integrity
    • Non-Repudiation
    • Modularity
    • Reusability
    • Modifiability
    • Testability

    Focus on quality attributes that are architecturally significant.

    • Not every system requires every quality attribute.
    • Pay attention to those attributes without which the solution will not be able to satisfy a user’s abstract* expectation.
    • This set can be considered Architecturally Significant Requirements (ASR). ASR concern scenarios have the most impact on the architecture of the software system.
    • ASR are fundamental needs of the system and changing them in the future can be a costly and difficult exercise.

    *Abstract since attributes like performance and reliability are not directly measurable by a user.

    Stimulus Response Measurement Environmental Context

    For applicable use cases: (*Adapted from S Carnegie Mellon University, 2000)

    1. Determine the Stimulus (temporal, external, or internal) that puts stress on the system. For example, a VPN-accessed hospital management system is used for nurses to login at 8am every weekday.
    2. Describe how the system should Respond to the stimulus. For example, the hospital management system should complete a nurse login under 10ms on initiation of the HTTPS request.
    3. Set a Measurement criteria for determining the success of the response to the stimulus. For example, the system should be able to successfully respond to 98% of the HTTPS requests the first time.
    4. Note the environmental context under which the stimulus occurs, including any unusual conditions in effect.
    • The hospital management system needs to respond in under 10ms under typical load or peak load?
    • What is the time variance of peak loads, for example, an e-commerce system during a Black Friday sale?
    • How big is the peak load?

    Info-Tech Insight

    Three out of four is bad. Don’t architect for normal situations because the solution will be fragile and prone to catastrophic failure under unexpected events.
    Read article: Retail sites crash under weight of online Black Friday shoppers.

    Discover and evaluate the qualitative attributes needed for use cases or user stories

    Deposit Loan Into Applicant’s Bank Account

    Assume analysis is being done for a to-be developed system.

    User Loan Applicant
    Expectations On login to the web system, should be able to see accurate bank balance after loan funds are deposited.
    User signs into the online portal and opens their account balance page.
    Expected Response From System System creates a connection to the data source and renders it on the screen in under 10ms.
    Measurement Under Normal Loads:
    • Response in 10ms or less
    • Data should not be stale
    Under Peak Loads:
    • Response in 15ms or less
    • Data should not be stale
    Quality Attribute Required Required Attribute # 1: Performance
    • Design Decision: Reduce latency by placing authorization components closer to user’s location.
    Required Attribute # 2: Data Reliability
    • Design Decision: Use event-driven ETL pipelines.
    Required Attribute # 3: Scalability
    • Design Decision: Following Principle # 4 of the CSA (JIT Architecture), delay decision until necessary.

    Use cases developed in Phase 1.2 should be used here. (Adapted from the ATAM Utility Tree Method for Quality Attribute Engineering)

    Reduce technical debt while you are at it

    Deposit Loan Into Applicant’s Bank Account

    Assume analysis is being done for a to-be developed system.

    UserLoan Applicant
    ExpectationsOn login to the web system, should be able to see accurate bank balance after loan funds are deposited.
    User signs into the online portal and opens their account balance page.
    Expected Response From SystemSystem creates a connection to the data source and renders it on the screen in under 10ms.
    MeasurementUnder Normal Loads:
    • Response in 10ms or less
    • Data should not be stale
    Under Peak Loads:
    • Response in 15ms or less
    • Data should not be stale
    Quality Attribute RequiredRequired Attribute # 1: Performance
    • Design Decision: Reduce latency by placing authorization components closer to user’s location.

    Required Attribute # 2: Data Reliability

    • Expected is 15ms or less under peak loads, but average latency is 21ms.
    • Design Decision: Use event-driven ETL pipelines.

    Required Attribute # 3: Scalability

    • Data should not be stale and should sync instantaneously, but in some zip codes data synchronization is taking 8 hours.
    • Design Decision: Investigate integrations and flows across application, database, and infrastructure. (Note: A dedicated section for discussing scalability is presented in Phase 2.)

    1.3 Create a conceptual map between the value streams, use cases, and required architectural attributes

    1. For selected use cases completed in Phase 1.2:
    • Map the value stream to its associated use cases.
    • For each use case, list the required architectural quality attributes.

    Download the Solution Architecture Template for mapping value stream components to their required architectural attribute.

    Input

    • Use Cases
    • User Roles
    • Stimulus to System
    • Response From System
    • Response Measurement

    Output

    • List of Architectural Quality Attributes

    Materials

    • Whiteboard/Flip Charts

    Participants

    • Business Architect
    • Application Architect
    • Integration Architect
    • Database Architect
    • Infrastructure Architect

    Example for Phase 1.3

    Loan Provision

    Loan Application → Disbursement of Funds → Risk Management → Service Accounts

    Value Stream Component Use Case Required Architectural Attribute
    Loan Application UC1: Submit Loan Application
    UC2: Review Loan Application
    UC3: Approve Loan Application
    UCn: ……..
    UC1: Resilience, Data Reliability
    UC2: Data Reliability
    UC3: Scalability, Security, Performance
    UCn: …..
    Disbursement of Funds UC1: Deposit Funds Into Applicant’s Bank Account
    UCn: ……..
    UC1: Performance, Scalability, Data Reliability
    Risk Management ….. …..
    Service Accounts ….. …..

    1.2 Document dynamic value stream maps

    1. Create value stream maps that support your business objectives.
    • The value stream maps could belong to existing or new business objectives.
  • For each value stream map:
    • Determine use case(s), the actors, and their expected activity.

    *Refer to the next slide for an example of a dynamic value stream map.

    Download the Solution Architecture Template for documentation of dynamic value stream map

    Input

    • Business Goals
    • Some or All Existing Business Processes
    • Some or All Proposed New Business Processes

    Output

    • Dynamic Value Stream Maps for Multiple Use Roles and Use Cases

    Materials

    • Whiteboard/Flip Charts

    Participants

    • Business Architect
    • Product Owner
    • Application Architect
    • Integration Architect

    Example: Dynamic value stream map

    Loan Provision*

    *Value Stream Name: Usually has the same name as the capability it illustrates.

    Loan Application**; Disbursement of Fund**; Risk Management**; Service Accounts**

    **Value Stream Components: Specific functions that support the successful delivery of a value stream.

    Disbursement of Funds

    This image shows the relationship between depositing the load into the applicant's bank account, and the Applicant's bank, the Loan Applicant, and the Loan Supplier.

    Style #1:

    The use case Disbursement of Funds has three actors:

    1. A Loan Applicant who applied for a loan and got approved for one.
    2. A Loan Supplier who is the source for the funds.
    3. The Applicant’s Bank that has an account into which the funds are deposited.

    Style # 2:

    Loan Provision: Disbursement of Funds
    Use Case Actors Expectation
    Deposit Loan Into Applicant’s Bank Account
    1. Loan Applicant
    2. Loan Supplier
    3. Applicant’s Bank
    1. Should be able to see deposit in bank account
    2. Deposit funds into account
    3. Accept funds into account

    Mid-Phase 1 Checkpoint

    By now, the following items are ideally completed:

    • Mid-Phase 1 Checkpoint

    Start with an investigation of your architecture’s qualitative needs

    Quality attributes can be viewed as the -ilities (e.g. scalability, usability, reliability) that a software system needs to provide. A system not meeting any of its quality attribute requirements will likely not function as required. Examples of quality attributes are:

    1. Slow system response time
    2. Security breaches that result in loss of personal data
    3. A product feature upgrade that is not compatible with previous versions
    Examples of Qualitative Attributes
    Performance Compatibility Usability Reliability Security Maintainability
    • Response Time
    • Resource Utilization
    • System Capacity
    • Interoperability
    • Accessibility
    • User Interface
    • Intuitiveness
    • Availability
    • Fault Tolerance
    • Recoverability
    • Integrity
    • Non-Repudiation
    • Modularity
    • Reusability
    • Modifiability
    • Testability

    Focus on quality attributes that are architecturally significant.

    • Not every system requires every quality attribute.
    • Pay attention to those attributes without which the solution will not be able to satisfy a user’s abstract* expectation.
    • This set can be considered Architecturally Significant Requirements (ASR). ASR concern scenarios have the most impact on the architecture of the software system.
    • ASR are fundamental needs of the system and changing them in the future can be a costly and difficult exercise.

    *Abstract since attributes like performance and reliability are not directly measurable by a user.

    Stimulus Response Measurement Environmental Context

    For applicable use cases: (*Adapted from S Carnegie Mellon University, 2000)

    1. Determine the Stimulus (temporal, external, or internal) that puts stress on the system. For example, a VPN-accessed hospital management system is used for nurses to login at 8am every weekday.
    2. Describe how the system should Respond to the stimulus. For example, the hospital management system should complete a nurse login under 10ms on initiation of the HTTPS request.
    3. Set a Measurement criteria for determining the success of the response to the stimulus. For example, the system should be able to successfully respond to 98% of the HTTPS requests the first time.
    4. Note the environmental context under which the stimulus occurs, including any unusual conditions in effect.
    • The hospital management system needs to respond in under 10ms under typical load or peak load?
    • What is the time variance of peak loads, for example, an e-commerce system during a Black Friday sale?
    • How big is the peak load?

    Info-Tech Insight

    Three out of four is bad. Don’t architect for normal situations because the solution will be fragile and prone to catastrophic failure under unexpected events.
    Read article: Retail sites crash under weight of online Black Friday shoppers.

    Discover and evaluate the qualitative attributes needed for use cases or user stories

    Deposit Loan Into Applicant’s Bank Account

    Assume analysis is being done for a to-be developed system.

    User Loan Applicant
    Expectations On login to the web system, should be able to see accurate bank balance after loan funds are deposited.
    User signs into the online portal and opens their account balance page.
    Expected Response From System System creates a connection to the data source and renders it on the screen in under 10ms.
    Measurement Under Normal Loads:
    • Response in 10ms or less
    • Data should not be stale
    Under Peak Loads:
    • Response in 15ms or less
    • Data should not be stale
    Quality Attribute Required Required Attribute # 1: Performance
    • Design Decision: Reduce latency by placing authorization components closer to user’s location.
    Required Attribute # 2: Data Reliability
    • Design Decision: Use event-driven ETL pipelines.
    Required Attribute # 3: Scalability
    • Design Decision: Following Principle # 4 of the CSA (JIT Architecture), delay decision until necessary.

    Use cases developed in Phase 1.2 should be used here. (Adapted from the ATAM Utility Tree Method for Quality Attribute Engineering)

    Reduce technical debt while you are at it

    Deposit Loan Into Applicant’s Bank Account

    Assume analysis is being done for a to-be developed system.

    UserLoan Applicant
    ExpectationsOn login to the web system, should be able to see accurate bank balance after loan funds are deposited.
    User signs into the online portal and opens their account balance page.
    Expected Response From SystemSystem creates a connection to the data source and renders it on the screen in under 10ms.
    MeasurementUnder Normal Loads:
    • Response in 10ms or less
    • Data should not be stale
    Under Peak Loads:
    • Response in 15ms or less
    • Data should not be stale
    Quality Attribute RequiredRequired Attribute # 1: Performance
    • Design Decision: Reduce latency by placing authorization components closer to user’s location.

    Required Attribute # 2: Data Reliability

    • Expected is 15ms or less under peak loads, but average latency is 21ms.
    • Design Decision: Use event-driven ETL pipelines.

    Required Attribute # 3: Scalability

    • Data should not be stale and should sync instantaneously, but in some zip codes data synchronization is taking 8 hours.
    • Design Decision: Investigate integrations and flows across application, database, and infrastructure. (Note: A dedicated section for discussing scalability is presented in Phase 2.)

    1.3 Create a conceptual map between the value streams, use cases, and required architectural attributes

    1. For selected use cases completed in Phase 1.2:
    • Map the value stream to its associated use cases.
    • For each use case, list the required architectural quality attributes.

    Download the Solution Architecture Template for mapping value stream components to their required architectural attribute.

    Input

    • Use Cases
    • User Roles
    • Stimulus to System
    • Response From System
    • Response Measurement

    Output

    • List of Architectural Quality Attributes

    Materials

    • Whiteboard/Flip Charts

    Participants

    • Business Architect
    • Application Architect
    • Integration Architect
    • Database Architect
    • Infrastructure Architect

    Prioritize architectural quality attributes to ensure a right-engineered solution

    Trade-offs are inherent in solution architecture. Scaling systems may impact performance and weaken security, while fault-tolerance and redundancy may improve availability but at higher than desired costs. In the end, the best solution is not always perfect, but balanced and right-engineered (versus over- or under-engineered).

    Loan Provision

    Loan Application → Disbursement of Funds → Risk Management → Service Accounts

    1. Map architecture attributes against the value stream components.
    • Use individual use cases to determine which attributes are needed for a value stream component.
    This image contains a screenshot of the table showing the importance of scalability, resiliance, performance, security, and data reliability for loan application, disbursement of funds, risk management, and service accounts.

    In our example, the prioritized list of architectural attributes are:

    • Security (4 votes for Very Important)
    • Data Reliability (2 votes for Very Important)
    • Scalability (1 vote for Very Important and 1 vote for Fairly Important) and finally
    • Resilience (1 vote for Very Important, 0 votes for Fairly Important and 1 vote for Mildly Important)
    • Performance (0 votes for Very Important, 2 votes for Fairly Important)

    1.4 Create a prioritized list of architectural attributes (from 1.3)

    1. Using the tabular structure shown on the previous slide:
    • Map each value stream component against architectural quality attributes.
    • For each mapping, indicate its importance using the green, blue, and yellow color scheme.

    Download the Solution Architecture Template and document the list of architectural attributes by priority.

    Input

    • List of Architectural Attributes From 1.3

    Output

    • Prioritized List of Architectural Attributes

    Materials

    • Whiteboard/Flip Charts

    Participants

    • Business Architect
    • Application Architect
    • Integration Architect
    • Database Architect
    • Infrastructure Architect

    End of Phase 1

    At the end of this Phase, you should have completed the following activities:

    • Documented a set of dynamic value stream maps along with selected use cases.
    • Using the SRME framework, identified quality attributes for the system under investigation.
    • Prioritized quality attributes for system use cases.

    Phase 2: Multi-Purpose Data and Security Architecture

    Phase 1

    1.1 Articulate an Architectural Vision
    1.2 Develop Dynamic Value Stream Maps
    1.3 Map Value Streams, Use Cases, and Required Architectural Attributes
    1.4 Create a Prioritized List of Architectural Attributes

    Phase 2

    2.1 Develop a Data Architecture That Supports Transactional and Analytical Needs
    2.2 Document Security Architecture Risks and Mitigations

    Phase 3

    3.1 Document Scalability Architecture
    3.2 Document Performance Enhancing Architecture
    3.3 Combine the Different Architecture Design Decisions Into a Unified Solution Architecture

    This phase will walk you through the following activities:

    • Understand the scalability, performance, resilience, and security needs of the business.

    This phase involves the following participants:

    • Business Architect
    • Product Owner
    • Application Architect
    • Integration Architect
    • Database Architect
    • Enterprise Architect

    Enhance Your Solution Architecture Practice

    Fragmented data environments need something to sew them together

    • A full 93% of enterprises have a multi-cloud strategy, with 87% having a hybrid-cloud environment in place.
    • On average, companies have data stored in 2.2 public and 2.2 private clouds as well as in various on-premises data repositories.
    This image contains a breakdown of the cloud infrastructure, including single cloud versus multi-cloud.

    Source: Flexera

    In addition, companies are faced with:

    • Access and integration challenges (Who is sending the data? Who is getting it? Can we trust them?)
    • Data format challenges as data may differ for each consumer and sender of data
    • Infrastructure challenges as data repositories/processors are spread out over public and private clouds, are on premises, or in multi-cloud and hybrid ecosystems
    • Structured vs. unstructured data

    A robust and reliable integrated data architecture is essential for any organization that aspires to be relevant and impactful in its industry.

    Data’s context and influence on a solution’s architecture cannot be overestimated

    Data used to be the new oil. Now it’s the life force of any organization that has serious aspirations of providing profit-generating products and services to customers. Architectural decisions about managing data have a significant impact on the sustainability of a software system as well as on quality attributes such as security, scalability, performance, and availability.

    Storage and Processing go hand in hand and are the mainstay of any data architecture. Due to their central position of importance, an architecture decision for storage and processing must be well thought through or they become the bottleneck in an otherwise sound system.

    Ingestion refers to a system’s ability to accept data as an input from heterogenous sources, in different formats, and at different intervals.

    Dissemination is the set of architectural design decisions that make a system’s data accessible to external consumers. Major concerns involve security for the data in motion, authorization, data format, concurrent requests for data, etc.

    Orchestration takes care of ensuring data is current and reliable, especially for systems that are decentralized and distributed.

    Data architecture requires alignment with a hybrid data management plan

    Most companies have a combination of data. They have data they own using on-premises data sources and on the cloud. Hybrid data management also includes external data, such as social network feeds, financial data, and legal information amongst many others.

    Data integration architectures have typically been put in one of two major integration patterns:

    Application to Application Integration (or “speed matters”) Analytical Data Integrations (or “send it to me when its all done”)
    • This domain is concerned with ensuring communication between processes.
    • Examples include patterns such as Service-Oriented Architecture, REST, Event Hubs and Enterprise Service Buses.
    • This domain is focused on integrating data from transactional processes towards enterprise business intelligence. It supports activities that require well-managed data to generate evidence-based insights.
    • Examples of this pattern are ELT, enterprise data warehouses, and data marts.

    Sidebar

    Difference between real-time, batch, and streaming data movements

    Real-Time

    • Reacts to data in seconds or even quicker.
    • Real-time systems are hard to implement.

    Batch

    • Batch processing deals with a large volume of data all at once and data-related jobs are typically completed simultaneously in non-stop, sequential order.
    • Batch processing is an efficient and low-cost means of data processing.
    • Execution of batch processing jobs can be controlled manually, providing further control over how the system treats its data assets.
    • Batch processing is only useful if there are no requirements for data to be fresh and current. Real-time systems are suited to processing data that requires these attributes.

    Streaming

    • Stream processing allows almost instantaneous analysis of data as it streams from one device to another.
    • Since data is analyzed quickly, storage may not be a concern (since only computed data is stored while raw data can be dispersed).
    • Streaming requires the flow of data into the system to equal the flow of data computing, otherwise issues of data storage and performance can rise.

    Modern data ingestion and dissemination frameworks keep core data assets current and accessible

    Data ingestion and dissemination frameworks are critical for keeping enterprise data current and relevant.

    Data ingestion/dissemination frameworks capture/share data from/to multiple data sources.

    Factors to consider when designing a data ingestion/dissemination architecture

    What is the mode for data movement?

    • The mode for data movement is directly influenced by the size of data being moved and the downstream requirements for data currency.
    • Data can move in real-time, as a batch, or as a stream.

    What is the ingestion/dissemination architecture deployment strategy?

    • Outside of critical security concerns, hosting on the cloud vs. on premises leads to a lower total cost of ownership (TCO) and a higher return on investment (ROI).

    How many different and disparate data sources are sending/receiving data?

    • Stability comes if there is a good idea about the data sources/recipient and their requirements.

    What are the different formats flowing through?

    • Is the data in the form of data blocks? Is it structured, semi-unstructured, or unstructured?

    What are expected performance SLAs as data flow rate changes?

    • Data change rate is defined as the size of changes occurring every hour. It helps in selecting the appropriate tool for data movement.
    • Performance is a derivative of latency and throughput, and therefore, data on a cloud is going to have higher latency and lower throughput then if it is kept on premises.
    • What is the transfer data size? Are there any file compression and/or file splits applied on the data? What is the average and maximum size of a block object per ingestion/dissemination operation?

    What are the security requirements for the data being stored?

    • The ingestion/dissemination framework should be able to work through a secure tunnel to collect/share data if needed.

    Sensible storage and processing strategy can improve performance and scalability and be cost-effective

    The range of options for data storage is staggering...

    … but that’s a good thing because the range of data formats that organizations must deal with is also richer than in the past.

    Different strokes for different workloads.

    The data processing tool to use may depend upon the workloads the system has to manage.

    Expanding upon the Risk Management use case (as part of the Loan Provision Capability), one of the outputs for risk assessment is a report that conducts a statistical analysis of customer profiles and separates those that are possibly risky. The data for this report is spread out across different data systems and will need to be collected in a master data management storage location. The business and data architecture team have discussed three critical system needs, noted below:

    Data Management Requirements for Risk Management Reporting Data Design Decision
    Needs to query millions of relational records quickly
    • Strong indexing
    • Strong caching
    • Message queue
    Needs a storage space for later retrieval of relational data
    • Data storage that scales as needed
    Needs turnkey geo-replication mechanism with document retrieval in milliseconds
    • Add NoSQL with geo-replication and quick document access

    Keep every core data source on the same page through orchestration

    Data orchestration, at its simplest, is the combination of data integration, data processing, and data concurrency management.

    Data pipeline orchestration is a cross-cutting process that manages the dependencies between your data integration tasks and scheduled data jobs.

    A task or application may periodically fail, and therefore, as a part of our data architecture strategy, there must be provisions for scheduling, rescheduling, replaying, monitoring, retrying, and debugging the entire data pipeline in a holistic way.

    Some of the functionality provided by orchestration frameworks are:

    • Job scheduling
    • Job parametrization
    • SLAs tracking, alerting, and notification
    • Dependency management
    • Error management and retries
    • History and audit
    • Data storage for metadata
    • Log aggregation
    Data Orchestration Has Three Stages
    Organize Transform Publicize
    Organizations may have legacy data that needs to be combined with new data. It’s important for the orchestration tool to understand the data it deals with. Transform the data from different sources into one standard type. Make transformed data easily accessible to stakeholders.

    2.1 Discuss and document data architecture decisions

    1. Using the value maps and associated use cases from Phase 1, determine the data system quality attributes.
    2. Use the sample tabular layout on the next slide or develop one of your own.

    Download the Solution Architecture Template for documenting data architecture decisions.

    Input

    • Value Maps and Use Cases

    Output

    • Initial Set of Data Design Decisions

    Materials

    • Whiteboard/Flip Charts

    Participants

    • Business Architect
    • Application Architect
    • Integration Architect
    • Database Architect
    • Infrastructure Architect

    Example: Data Architecture

    Data Management Requirements for Risk Management Reporting Data Design Decision
    Needs to query millions of relational records quickly
    • Strong indexing
    • Strong caching
    • Message queue
    Needs a storage space for later retrieval of relational data
    • Data storage that scales as needed
    Needs turnkey geo-replication mechanism with document retrieval in milliseconds
    • Add NoSQL with geo-replication and quick document access

    There is no free lunch when making the most sensible security architecture decision; tradeoffs are a necessity

    Ensuring that any real system is secure is a complex process involving tradeoffs against other important quality attributes (such as performance and usability). When architecting a system, we must understand:

    • Its security needs.
    • Its security threat landscape.
    • Known mitigations for those threats to ensure that we create a system with sound security fundamentals.

    The first thing to do when determining security architecture is to conduct a threat and risk assessment (TRA).

    This image contains a sample threat and risk assessment. The steps are Understand: Until we thoroughly understand what we are building, we cannot secure it. Structure what you are building, including: System boundary, System structure, Databases, Deployment platform; Analyze: Use techniques like STRIDE and attack trees to analyze what can go wrong and what security problems this will cause; Mitigate: The security technologies to use, to mitigate your concerns, are discussed here. Decisions about using single sign-on (SSO) or role-based access control (RBAC), encryption, digital signatures, or JWT tokens are made. An important part of this step is to consider tradeoffs when implementing security mechanisms; validate: Validation can be done by experimenting with proposed mitigations, peer discussion, or expert interviews.

    Related Research

    Optimize Security Mitigation Effectiveness Using STRIDE

    • Have a clear picture of:
      • Critical data and data flows
      • Organizational threat exposure
      • Security countermeasure deployment and coverage
    • Understand which threats are appropriately mitigated and which are not.
    • Generate a list of initiatives to close security gaps.
    • Create a quantified risk and security model to reassess program and track improvement.
    • Develop measurable information to present to stakeholders.

    The 3A’s of strong security: authentication, authorization, and auditing

    Authentication

    Authentication mechanisms help systems verify that a user is who they claim to be.

    Examples of authentication mechanisms are:

    • Two-Factor Authentication
    • Single Sign-On
    • Multi-Factor Authentication
    • JWT Over OAUTH

    Authorization

    Authorization helps systems limit access to allowed features, once a user has been authenticated.

    Examples of authentication mechanisms are:

    • RBAC
    • Certificate Based
    • Token Based

    Auditing

    Securely recording security events through auditing proves that our security mechanisms are working as intended.

    Auditing is a function where security teams must collaborate with software engineers early and often to ensure the right kind of audit logs are being captured and recorded.

    Info-Tech Insight

    Defects in your application software can compromise privacy and integrity even if cryptographic controls are in place. A security architecture made after thorough TRA does not override security risk introduced due to irresponsible software design.

    Examples of threat and risk assessments using STRIDE and attack trees

    STRIDE is a threat modeling framework and is composed of:

    • Spoofing or impersonation of someone other than oneself
    • Tampering with data and destroying its integrity
    • Repudiation by bypassing system identity controls
    • Information disclosure to unauthorized persons
    • Denial of service that prevents system or parts of it from being used
    • Elevation of privilege so that attackers get rights they should not have
    Example of using STRIDE for a TRA on a solution using a payment system This image contains a sample attack tree.
    Spoofing PayPal Bad actor can send fraudulent payment request for obtaining funds.
    Tampering PayPal Bad actor accesses data base and can resend fraudulent payment request for obtaining funds.
    Repudiation PayPal Customer claims, incorrectly, their account made a payment they did not authorize.
    Disclosure PayPal Private service database has details leaked and made public.
    Denial of Service PayPal Service is made to slow down through creating a load on the network, causing massive build up of requests
    Elevation of Privilege PayPal Bad actor attempts to enter someone else’s account by entering incorrect password a number of times.

    2.2 Document security architecture risks and mitigations

    1. Using STRIDE, attack tree, or any other framework of choice:
    • Conduct a TRA for use cases identified in Phase 1.2
  • For each threat identified through the TRA, think through the implications of using authentication, authorization, and auditing as a security mechanism.
  • Download the Solution Architecture Template for documenting data architecture decisions.

    Input

    • Dynamic Value Stream Maps

    Output

    • Security Architecture Risks and Mitigations

    Materials

    • Whiteboard/Flip Charts

    Participants

    • Business Architect
    • Product Owner
    • Security Team
    • Application Architect
    • Integration Architect

    Examples of threat and risk assessments using STRIDE

    Example of using STRIDE for a TRA on a solution using a payment system
    Threat System Component Description Quality Attribute Impacted Resolution
    Spoofing PayPal Bad actor can send fraudulent payment request for obtaining funds. Confidentiality Authorization
    Tampering PayPal Bad actor accesses data base and can resend fraudulent payment request for obtaining funds. Integrity Authorization
    Repudiation PayPal Customer claims, incorrectly, their account made a payment they did not authorize. Integrity Authentication and Logging
    Disclosure PayPal Private service database has details leaked and made public. Confidentiality Authorization
    Denial of Service PayPal Service is made to slow down through creating a load on the network, causing massive build up of requests Availability N/A
    Elevation of Privilege PayPal Bad actor attempts to enter someone else’s account by entering incorrect password a number of times. Confidentiality, Integrity, and Availability Authorization

    Phase 3: Upgrade Your System’s Availability

    Phase 1

    1.1 Articulate an Architectural Vision
    1.2 Develop Dynamic Value Stream Maps
    1.3 Map Value Streams, Use Cases, and Required Architectural Attributes
    1.4 Create a Prioritized List of Architectural Attributes

    Phase 2

    2.1 Develop a Data Architecture That Supports Transactional and Analytical Needs
    2.2 Document Security Architecture Risks and Mitigations

    Phase 3

    3.1 Document Scalability Architecture
    3.2 Document Performance Enhancing Architecture
    3.3 Combine the Different Architecture Design Decisions Into a Unified Solution Architecture

    This phase will walk you through the following activities:

    • Examine architecture for scalable and performant system designs
    • Integrate all design decisions made so far into a solution design decision log

    This phase involves the following participants:

    • Business Architect
    • Product Owner
    • Application Architect
    • Integration Architect
    • Database Architect
    • Enterprise Architect

    Enhance Your Solution Architecture Practice

    In a cloud-inspired system architecture, scalability takes center stage as an architectural concern

    Scale and scope of workloads are more important now than they were, perhaps, a decade and half back. Architects realize that scalability is not an afterthought. Not dealing with it at the outset can have serious consequences should an application workload suddenly exceed expectations.

    Scalability is …

    … the ability of a system to handle varying workloads by either increasing or decreasing the computing resources of the system.

    An increased workload could include:

    • Higher transaction volumes
    • A greater number of users

    Architecting for scalability is …

    … not easy since organizations may not be able to accurately judge, outside of known circumstances, when and why workloads may unexpectedly increase.

    A scalable architecture should be planned at the:

    • Application Level
    • Infrastructure Level
    • Database Level

    The right amount and kind of scalability is …

    … balancing the demands of the system with the supply of attributes.

    If demand from system > supply from system:

    • Services and products are not useable and deny value to customers.

    If supply from system > demand from system:

    • Excess resources have been paid for that are not being used.

    When discussing the scalability needs of a system, investigate the following, at a minimum:

    • In case workloads increase due to higher transaction volumes, will the system be able to cope with the additional stress?
    • In situations where workloads increase, will the system be able to support the additional stress without any major modifications being made to the system?
    • Is the cost associated with handling the increased workloads reasonable for the benefit it provides to the business?
    • Assuming the system doesn’t scale, is there any mechanism for graceful degradation?

    Use evidence-based decision making to ensure a cost-effective yet appropriate scaling strategy

    The best input for an effective scaling strategy is previously gathered traffic data mapped to specific circumstances.

    In some cases, either due to lack of monitoring or the business not being sure of its needs, scalability requirements are hard to determine. In such cases, use stated tactical business objectives to design for scalability. For example, the business might state its desire to achieve a target revenue goal. To accommodate this, a certain number of transactions would need to be conducted, assuming a particular conversion rate.

    Scaling strategies can be based on Vertical or Horizontal expansion of resources.
    Pros Cons
    Vertical
    Scale up through use of more powerful but limited number of resources
    • May not require frequent upgrades.
    • Since data is managed through a limited number of resources, it is easier to share and keep current.
    • Costly upfront.
    • Application, database, and infrastructure may not be able to make optimal use of extra processing power.
    • As the new, more powerful resource is provisioned, systems may experience downtime.
    • Lacks redundancy due to limited points of failure.
    • Performance is constrained by the upper limits of the infrastructure involved.
    Horizontal
    Scale out through use of similarly powered but larger quantity of resources
    • Cost-effective upfront.
    • System downtime is minimal, when scaling is being performed.
    • More redundance and fault-tolerance is possible since there are many nodes involved, and therefore, can replace failed nodes.
    • Performance can scale out as more nodes are added.
    • Upgrades may occur more often than in vertical scaling.
    • Increases machine footprints and administrative costs over time.
    • Data may be partitioned on multiple nodes, leading to administrative and data currency challenges.

    Info-Tech Insight

    • Scalability is the one attribute that sparks a lot of trade-off discussions. Scalable solutions may have to compromise on performance, cost, and data reliability.
    • Horizontal scalability is mostly always preferable over vertical scalability.

    Sidebar

    The many flavors of horizontal scaling

    Traffic Shard-ing

    Through this mechanism, incoming traffic is partitioned around a characteristic of the workload flowing in. Examples of partitioning characteristics are user groups, geo-location, and transaction type.

    Beware of:

    • Lack of data currency across shards.

    Copy and Paste

    As the name suggests, clone the compute resources along with the underlying databases. The systems will use a load balancer as the first point of contact between itself and the workload flowing in.

    Beware of:

    • Though this is a highly scalable model, it does introduce risks related to data currency across all databases.
    • In case master database writes are frequent, it could become a bottleneck for the entire system.

    Productization Through Containers

    This involves breaking up the system into specific functions and services and bundling their business rules/databases into deployable containers.

    Beware of:

    • Too many containers introduce the need to orchestrate the distributed architecture that results from a service-oriented approach.

    Start a scalability overview with a look at the database(s)

    To know where to go, you must know where you are. Before introducing architectural changes to database designs, use the right metrics to get an insight into the root cause of the problem(s).

    In a nutshell, the purpose of scaling solutions is to have the technology stack do less work for the most requested services/features or be able to effectively distribute the additional workload across multiple resources.

    For databases, to ensure this happens, consider these techniques:

    • Reuse data through caching on the server and/or the client. This eliminates the need for looking up already accessed data. Examples of caching are:
      • In-memory caching of data
      • Caching database queries
    • Implement good data retrieval techniques like indexes.
    • Divide labor at the database level.
      • Through setting up primary-secondary distribution of data. In such a setup, the primary node is involved in writing data to itself and passes on requests to secondary nodes for fulfillment.
      • Through setting up database shards (either horizontally or vertically).
        • In a horizontal shard, a data table is broken into smaller pieces with the same data model but unique data in it. The sum total of the shared databases contains all the data in the primary data table.
        • In a vertical shard, a data table is broken into smaller pieces, but each piece may have a subset of the data columns. The data’s corresponding columns are put into the table where the column resides.

    Info-Tech Insight

    A non-scalable architecture has more than just technology-related ramifications. Hoping that load balancers or cloud services will manage scalability-related issues is bound to have economic impacts as well.

    Sidebar

    Caching Options

    CSA PRINCIPLE 5 applies to any decision that supports system scalability.
    “X-ilities Over Features”

    Database Caching
    Fetches and stores result of database queries in memory. Subsequent requests to the database for the same queries will investigate the cache before making a connection with the database.
    Tools like Memcached or Redis are used for database caching.

    Precompute Database Caching
    Unlike database caching, this style of caching precomputes results of queries that are popular and frequently used. For example, a database trigger could execute several predetermined queries and have them ready for consumption. The precomputed results may be stored in a database cache.

    Application Object Caching
    Stores computed results in a cache for later retrieval. For data sources, which are not changing frequently and are part of a computation output, application caching will remove the need to connect with a database.

    Proxy Caching
    Caches retrieved web pages on a proxy server and makes them available for the next time the page is requested.

    The intra- and inter-process communication of the systems middle tier can become a bottleneck

    To synchronize or not to synchronize?

    A synchronous request (doing one thing at a time) means that code execution will wait for the request to be responded to before continuing.

    • A synchronous request is a blocking event and until it is completed, all following requests will have to wait for getting their responses.
    • An increasing workload on a synchronous system may impact performance.
    • Synchronous interactions are less costly in terms of design, implementation, and maintenance.
    • Scaling options include:
    1. Vertical scale up
    2. Horizontal scale out of application servers behind a load balancer and a caching technique (to minimize data retrieval roundtrips)
    3. Horizonal scale out of database servers with data partitioning and/or data caching technique

    Use synchronous requests when…

    • Each request to a system sets the necessary precondition for a following request.
    • Data reliability is important, especially in real-time systems.
    • System flows are simple.
    • Tasks that are typically time consuming, such as I/O, data access, pre-loading of assets, are completed quickly.

    Asynchronous requests (doing many things at the same time) do not block the system they are targeting.

    • It is a “fire and forget” mechanism.
    • Execution on a server/processor is triggered by the request, however, additional technical components (callbacks) for checking the state of the execution must be designed and implemented.
    • Asynchronous interactions require additional time to be spent on implementation and testing.
    • With asynchronous interactions, there is no guarantee the request initiated any processing until the callbacks check the status of the executed thread.

    Use asynchronous requests when…

    • Tasks are independent in nature and don’t require inter-task communication.
    • Systems flows need to be efficient.
    • The system is using event-driven techniques for processing.
    • Many I/O tasks are involved.
    • The tasks are long running.

    Sidebar

    Other architectural tactics for inter-process communication

    STATELESS SERVICES VERSUS STATEFUL SERVICES
    • Does not require any additional data, apart from the bits sent through with the request.
    • Without implementing a caching solution, it is impossible to access the previous data trail for a transaction session.
    • In addition to the data sent through with the request, require previous data sent to complete processing.
    • Requires server memory to store the additional state data. With increasing workloads, this could start impacting the server’s performance.
    It is generally accepted that stateless services are better for system scalability, especially if vertical scaling is costly and there is expectation that workloads will increase.
    MICROSERVICES VERSUS SERVERLESS FUNCTIONS
    • Services are designed as small units of code with a single responsibility and are available on demand.
    • A microservices architecture is easily scaled horizontally by adding a load balancer and a caching mechanism.
    • Like microservices, these are small pieces of code designed to fulfill a single purpose.
    • Are provided only through cloud vendors, and therefore, there is no need to worry about provisioning of infrastructure as needs increase.
    • Stateless by design but the life cycle of a serverless function is vendor controlled.
    Serverless function is an evolving technology and tightly controlled by the vendor. As and when vendors make changes to their serverless products, your own systems may need to be modified to make the best use of these upgrades.

    A team that does not measure their system’s scalability is a team bound to get a 5xx HTTP response code

    A critical aspect of any system is its ability to monitor and report on its operational outcomes.

    • Using the principle of continuous testing, every time an architectural change is introduced, a thorough load and stress testing cycle should be executed.
    • Effective logging and use of insightful metrics helps system design teams make data-driven decisions.
    • Using principle of site reliability engineering and predictive analytics, teams can be prepared for any unplanned exaggerated stimulus on the system and proactively set up remedial steps.

    Any system, however well architected, will break one day. Strategically place kill-switches to counter any failures and thoroughly test their functioning before releasing to production.

    • Using Principles 2 and 9 of the CSA, (include kill-switches and architect for x-ilities over features), introduce tactics at the code and higher levels that can be used to put a system in its previous best state in case of failure.
    • Examples of such tactics are:
      • Feature flags for turning on/off code modules that impact x-ilities.
      • Implement design patterns like throttling, autoscaling, and circuit breaking.
      • Writing extensive log messages that bubble up as exceptions/error handling from the code base. *Logging can be a performance drag. Use with caution as even logging code is still code that needs CPU and data storage.

    Performance is a system’s ability to satisfy time-bound expectations

    Performance can also be defined as the ability for a system to achieve its timing requirements, using available resources, under expected full-peak load:

    (International Organization for Standardization, 2011)

    • Performance and scalability are two peas in a pod. They are related to each other but are distinct attributes. Where scalability refers to the ability of a system to initiate multiple simultaneous processes, performance is the system’s ability to complete the processes within a mandated average time period.
    • Degrading performance is one of the first red flags about a system’s ability to scale up to workload demands.
    • Mitigation tactics for performance are very similar to the tactics for scalability.

    System performance needs to be monitored and measured consistently.

    Measurement Category 1: System performance in terms of end-user experience during different load scenarios.

    • Response time/latency: Length of time it takes for an interaction with the system to complete.
    • Turnaround time: Time taken to complete a batch of tasks.
    • Throughput: Amount of workload a system is capable of handling in a unit time period.

    Measurement Category 2: System performance in terms of load managed by computational resources.

    • Resource utilization: The average usage of a resource (like CPU) over a period. Peaks and troughs indicate excess vs. normal load times.
    • Number of concurrent connections: Simultaneous user requests that a resource like a server can successfully deal with at once.
    • Queue time: The turnaround time for a specific interaction or category of interactions to complete.

    Architectural tactics for performance management are the same as those used for system scalability

    Application Layer

    • Using a balanced approach that combines CSA Principle 7 (Good architecture comes in small packages) and Principle 10 (Architect for products, not projects), a microservices architecture based on domain-driven design helps process performance. Microservices use lightweight HTTP protocols and have loose coupling, adding a degree of resilience to the system as well. *An overly-engineered microservices architecture can become an orchestration challenge.
    • The code design must follow standards that support performance. Example of standards is SOLID*.
    • Serverless architectures can run application code from anywhere – for example, from edge servers close to an end user – thereby reducing latency.

    Database Layer

    • Using the right database technologies for persistence. Relational databases have implicit performance bottlenecks (which get exaggerated as data size grows along with indexes), and document store database technologies (key-value or wide-column) can improve performance in high-read environments.
    • Data sources, especially those that are frequently accessed, should ideally be located close to the application servers. Hybrid infrastructures (cloud and on premises mixed) can lead to latency when a cloud-application is accessing on-premises data.
    • Using a data partitioning strategy, especially in a domain-driven design architecture, can improve the performance of a system.

    Performance modeling and continuous testing makes the SRE a happy engineer

    Performance modeling and testing helps architecture teams predict performance risks as the solution is being developed.
    (CSA Principle 12: Test the solution architecture like you test your solution’s features)

    Create a model for your system’s hypothetical performance testing by breaking an end-to-end process or use case into its components. *Use the SIPOC framework for decomposition.

    This image contains an example of modeled performance, showing the latency in the data flowing from different data sources to the processing of the data.

    In the hypothetical example of modeled performance above:

    • The longest period of latency is 15ms.
    • The processing of data takes 30ms, while the baseline was established at 25ms.
    • Average latency in sending back user responses is 21ms – 13ms slower than expected.

    The model helps architects:

    • Get evidence for their assumptions
    • Quantitatively isolate bottlenecks at a granular level

    Model the performance flow once but test it periodically

    Performance testing measures the performance of a software system under normal and abnormal loads.

    Performance testing process should be fully integrated with software development activities and as automated as possible. In a fast-moving Agile environment, teams should attempt to:

    • Shift-left performance testing activities.
    • Use performance testing to pinpoint performance bottlenecks.
    • Take corrective action, as quickly as possible.

    Performance testing techniques

    • Normal load testing: Verifies the system’s behavior under the expected normal load to ensure that its performance requirements are met. Load testing can be used to measure response time, responsiveness, turnaround time, and throughput.
    • Expected maximum load testing: Like the normal load testing process, ensures system meets its performance requirements under expected maximum load.
    • Stress testing: Evaluates system behavior when processing loads beyond the expected maximum.

    *In a real production scenario, a combination of these tests are executed on a regular basis to monitor the performance of the system over a given period.

    3.1-3.2 Discuss and document initial decisions made for architecture scalability and performance

    1. Use the outcomes from either or both Phases 1.3 and 1.4.
    • For each value stream component, list the architecture decisions taken to ensure scalability and performance at client-facing and/or business-rule layers.

    Download the Solution Architecture Template for documenting data architecture decisions.

    Input

    • Output From Phase 1.3 and/or From Phase 1.4

    Output

    • Initial Set of Design Decisions Made for System Scalability and Performance

    Materials

    • Whiteboard/Flip Charts

    Participants

    • Business Architect
    • Application Architect
    • Integration Architect
    • Database Architect
    • Infrastructure Architect

    Example: Architecture decisions for scalability and performance

    Value Stream Component Design Decision for User Interface Layer Design Decisions for Middle Processing Layer
    Loan Application Scalability: N/A
    Resilience: Include circuit breaker design in both mobile app and responsive websites.
    Performance: Cache data client.
    Scalability: Scale vertically (up) since loan application processing is very compute intensive.
    Resilience: Set up fail-over replica.
    Performance: Keep servers in the same geo-area.
    Disbursement of Funds *Does not have a user interface Scalability: Scale horizontal when traffic reaches X requests/second.
    Resilience: Create microservices using domain-driven design; include circuit breakers.
    Performance: Set up application cache; synchronous communication since order of data input is important.
    …. …. ….

    3.3 Combine the different architecture design decisions into a unified solution architecture

    Download the Solution Architecture Template for documenting data architecture decisions.

    Input

    • Output From Phase 1.3 and/or From Phase 1.4
    • Output From Phase 2.1
    • Output From Phase 2.2
    • Output From 3.1 and 3.2

    Output

    • List of Design Decisions for the Solution

    Materials

    • Whiteboard/Flip Charts

    Participants

    • Business Architect
    • Application Architect
    • Integration Architect
    • Database Architect
    • Infrastructure Architect

    Putting it all together is the bow that finally ties this gift

    This blueprint covered the domains tagged with the yellow star.

    This image contains a screenshot of the solution architecture framework found earlier in this blueprint, with stars next to Data Architecture, Security, Performance, and Stability.

    TRADEOFF ALERT

    The right design decision is never the same for all perspectives. Along with varying opinions, comes the “at odds with each other set” of needs (scalability vs. performance, or access vs. security).

    An evidence-based decision-making approach using a domain-driven design strategy is a good mix of techniques for creating the best (right?) solution architecture.

    This image contains a screenshot of a table that summarizes the themes discussed in this blueprint.

    Summary of accomplishment

    • Gained understanding and clarification of the stakeholder objectives placed on your application architecture.
    • Completed detailed use cases and persona-driven scenario analysis and their architectural needs through SRME.
    • Created a set of design decisions for data, security, scalability, and performance.
    • Merged the different architecture domains dealt with in this blueprint to create a holistic view.

    Bibliography

    Ambysoft Inc. “UML 2 Sequence Diagrams: An Agile Introduction.” Agile Modeling, n.d. Web.

    Bass, Len, Paul Clements, and Rick Kazman. Software Architecture in Practices: Third Edition. Pearson Education, Inc. 2003.

    Eeles, Peter. “The benefits of software architecting.” IBM: developerWorks, 15 May 2006. Web.

    Flexera 2020 State of the Cloud Report. Flexera, 2020. Web. 19 October 2021.

    Furdik, Karol, Gabriel Lukac, Tomas Sabol, and Peter Kostelnik. “The Network Architecture Designed for an Adaptable IoT-based Smart Office Solution.” International Journal of Computer Networks and Communications Security, November 2013. Web.

    Ganzinger, Matthias, and Petra Knaup. “Requirements for data integration platforms in biomedical research networks: a reference model.” PeerJ, 5 February 2015. (https://peerj.com/articles/755/).

    Garlan, David, and Mary Shaw. An Introduction to Software Architecture. CMU-CS-94-166, School of Computer Science Carnegie Mellon University, January 1994.

    Gupta, Arun. “Microservice Design Patterns.” Java Code Geeks, 14 April 2015. Web.

    How, Matt. The Modern Data Warehouse in Azure. O’Reilly, 2020.

    ISO/IEC 17788:2014: Information technology – Cloud computing, International Organization for Standardization, October 2014. Web.

    ISO/IEC 18384-1:2016: Information technology – Reference Architecture for Service Oriented Architecture (SOA RA), International Organization for Standardization, June 2016. Web.

    ISO/IEC 25010:2011(en) Systems and software engineering — Systems and software Quality Requirements and Evaluation (SQuaRE) — System and software quality models. International Organization for Standardization, March 2011. Web.

    Kazman, R., M. Klein, and P. Clements. ATAM: Method for Architecture Evaluation. S Carnegie Mellon University, August 2000. Web.

    Microsoft Developer Network. “Chapter 16: Quality Attributes.” Microsoft Application Architecture Guide. 2nd Ed., 13 January 2010. Web.

    Microsoft Developer Network. “Chapter 2: Key Principles of Software Architecture.” Microsoft Application Architecture Guide. 2nd Ed., 13 January 2010. Web.

    Microsoft Developer Network. “Chapter 3: Architectural Patterns and Styles.” Microsoft Application Architecture Guide. 2nd Ed., 14 January 2010. Web.

    Microsoft Developer Network. “Chapter 5: Layered Application Guidelines.” Microsoft Application Architecture Guide. 2nd Ed., 13 January 2010. Web.

    Mirakhorli, Mehdi. “Common Architecture Weakness Enumeration (CAWE).” IEEE Software, 2016. Web.

    Moore, G. A. Crossing the Chasm, 3rd Edition: Marketing and Selling Disruptive Products to Mainstream Customers (Collins Business Essentials) (3rd ed.). Harper Business, 2014.

    OASIS. “Oasis SOA Reference Model (SOA RM) TC.” OASIS Open, n.d. Web.

    Soni, Mukesh. “Defect Prevention: Reducing Costs and Enhancing Quality.” iSixSigma, n.d. Web.

    The Open Group. TOGAF 8.1.1 Online, Part IV: Resource Base, Developing Architecture Views. TOGAF, 2006. Web.

    The Open Group. Welcome to the TOGAF® Standard, Version 9.2, a standard of The Open Group. TOGAF, 2018. Web.

    Watts, S. “The importance of solid design principles.” BMC Blogs, 15 June 2020. 19 October 2021.

    Young, Charles. “Hexagonal Architecture–The Great Reconciler?” Geeks with Blogs, 20 Dec 2014. Web.

    APPENDIX A

    Techniques to enhance application architecture.

    Consider the numerous solutions to address architecture issues or how they will impact your application architecture

    Many solutions exist for improving the layers of the application stack that may address architecture issues or impact your current architecture. Solutions range from capability changes to full stack replacement.

    Method Description Potential Benefits Risks Related Blueprints
    Business Capabilities:
    Enablement and enhancement
    • Introduce new business capabilities by leveraging unused application functionalities or consolidate redundant business capabilities.
    • Increase value delivery to stakeholders.
    • Lower IT costs through elimination of applications.
    • Increased use of an application could overload current infrastructure.
    • IT cannot authorize business capability changes.
    Use Info-Tech’s Document Your Business Architecture blueprint to gain better understanding of business and IT alignment.
    Removal
    • Remove existing business capabilities that don’t contribute value to the business.
    • Lower operational costs through elimination of unused and irrelevant capabilities.
    • Business capabilities may be seen as relevant or critical by different stakeholder groups.
    • IT cannot authorize business capability changes.
    Use Info-Tech’s Build an Application Rationalization Framework to rationalize your application portfolio.
    Business Process:
    Process integration and consolidation
    • Combine multiple business processes into a single process.
    • Improved utilization of applications in each step of the process.
    • Reduce business costs through efficient business processes.
    • Minimize number of applications required to execute a single process.
    • Significant business disruption if an application goes down and is the primary support for business processes.
    • Organizational pushback if process integration involves multiple business groups.
    Business Process (continued):
    Process automation
    • Automate manual business processing tasks.
    • Reduce manual processing errors.
    • Improve speed of delivery.
    • Significant costs to implement automation.
    • Automation payoffs are not immediate.
    Lean business processes
    • Eliminate redundant steps.
    • Streamline existing processes by focusing on value-driven steps.
    • Improve efficiency of business process through removal of wasteful steps.
    • Increase value delivered at the end of the process.
    • Stakeholder pushback from consistently changing processes.
    • Investment from business is required to fit documentation to the process.
    Outsource the process
    • Outsource a portion of or the entire business process to a third party.
    • Leverage unavailable resources and skills to execute the business process.
    • Loss of control over process.
    • Can be costly to bring the process back into the business if desired in the future.
    Business Process (continued):
    Standardization
    • Implement standards for business processes to improve uniformity and reusability.
    • Consistently apply the same process across multiple business units.
    • Transparency of what is expected from the process.
    • Improve predictability of process execution.
    • Process bottlenecks may occur if a single group is required to sign off on deliverables.
    • Lack of enforcement and maintenance of standards can lead to chaos if left unchecked.
    User Interface:
    Improve user experience (UX)
    • Eliminate end-user emotional, mechanical, and functional friction by improving the experience of using the application.
    • UX encompasses both the interface and the user’s behavior.
    • Increase satisfaction and adoption rate from end users.
    • Increase brand awareness and user retention.
    • UX optimizations are only focused on a few user personas.
    • Current development processes do not accommodate UX assessments
    Code:
    Update coding language
    Translate legacy code into modern coding language.
    • Coding errors in modern languages can have lesser impact on the business processes they support.
    • Modern languages tend to have larger pools of coders to hire.
    • Increase availability of tools to support modern languages.
    • Coding language changes can create incompatibilities with existing infrastructure.
    • Existing coding translation tools do not offer 100% guarantee of legacy function retention.
    Code (continued):
    Open source code
    • Download pre-built code freely available in open source communities.
    • Code is rapidly evolving in the community to meet current business needs.
    • Avoid vendor lock-in from proprietary software
    • Community rules may require divulgence of work done with open source code.
    • Support is primarily provided through community, which may not address specific concerns.
    Update the development toolchain
    • Acquire new or optimize development tools with increased testing, build, and deployment capabilities.
    • Increase developer productivity.
    • Increase speed of delivery and test coverage with automation.
    • Drastic IT overhauls required to implement new tools such as code conversion, data migration, and development process revisions.
    Update source code management
    • Optimize source code management to improve coding governance, versioning, and development collaboration.
    • Ability to easily roll back to previous build versions and promote code to other environments.
    • Enable multi-user development capabilities.
    • Improve conflict management.
    • Some source code management tools cannot support legacy code.
    • Source code management tools may be incompatible with existing development toolchain.
    Data:
    Outsource extraction
    • Outsource your data analysis and extraction to a third party.
    • Lower costs to extract and mine data.
    • Leverage unavailable resources and skills to translate mined data to a usable form.
    • Data security risks associated with off-location storage.
    • Data access and control risks associated with a third party.
    Update data structure
    • Update your data elements, types (e.g. transactional, big data), and formats (e.g. table columns).
    • Standardize on a common data definition throughout the entire organization.
    • Ease data cleansing, mining, analysis, extraction, and management activities.
    • New data structures may be incompatible with other applications.
    • Implementing data management improvements may be costly and difficult to acquire stakeholder buy-in.
    Update data mining and data warehousing tools
    • Optimize how data is extracted and stored.
    • Increase the speed and reliability of the data mined.
    • Perform complex analysis with modern data mining and data warehousing tools.
    • Data warehouses are regularly updated with the latest data.
    • Updating data mining and warehousing tools may create incompatibilities with existing infrastructure and data sets.
    Integration:
    Move from point-to-point to enterprise service bus (ESB)
    • Change your application integration approach from point-to-point to an ESB.
    • Increase the scalability of enterprise services by exposing applications to a centralized middleware.
    • Reduce the number of integration tests to complete with an ESB.
    • Single point of failure can cripple the entire system.
    • Security threats arising from centralized communication node.
    Leverage API integration
    • Leverage application programming interfaces (APIs) to integrate applications.
    • Quicker and more frequent transfers of lightweight data compared to extract, load, transfer (ETL) practices.
    • Increase integration opportunities with other modern applications and infrastructure (including mobile devices).
    • APIs are not as efficient as ETL when handling large data sets.
    • Changing APIs can break compatibility between applications if not versioned properly.

    Become a Strategic CIO

    • Buy Link or Shortcode: {j2store}80|cart{/j2store}
    • member rating overall impact: 9.5/10 Overall Impact
    • member rating average dollars saved: $10,000 Average $ Saved
    • member rating average days saved: 15 Average Days Saved
    • Parent Category Name: IT Strategy
    • Parent Category Link: /it-strategy
    • As a CIO, you are currently operating in a stable and trusted IT environment, but you would like to advance your role to strategic business partner.
    • CIOs are often overlooked as a strategic partner by their peers, and therefore face the challenge of proving they deserve a seat at the table.

    Our Advice

    Critical Insight

    • To become a strategic business partner, you must think and act as a business person that works in IT, rather than an IT person that works for the business.
    • Career advancement is not a solo effort. Building relationships with your executive business stakeholders will be critical to becoming a respected business partner.

    Impact and Result

    • Create a personal development plan and stakeholder management strategy to accelerate your career and become a strategic business partner. For a CIO to be considered a strategic business partner, he or she must be able to:
      • Act as a business person that works in IT, rather than an IT person that works for the business. This involves meeting executive stakeholder expectations, facilitating innovation, and managing stakeholder relationships.
      • Align IT with the customer. This involves providing business stakeholders with information to support stronger decision making, keeping up with disruptive technologies, and constantly adapting to the ever-changing end-customer needs.
      • Manage talent and change. This involves performing strategic workforce planning, and being actively engaged in identifying opportunities to introduce change in your organization, suggesting ways to improve, and then acting on them.

    Become a Strategic CIO Research & Tools

    Start here – read the Executive Brief

    Read our concise Executive Brief to find out why you should become a strategic CIO, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. Launch

    Analyze strategic CIO competencies and assess business stakeholder satisfaction with IT using Info-Tech's CIO Business Vision Diagnostic and CXO-CIO Alignment Program.

    • Become a Strategic CIO – Phase 1: Launch

    2. Assess

    Evaluate strategic CIO competencies and business stakeholder relationships.

    • Become a Strategic CIO – Phase 2: Assess
    • CIO Strategic Competency Evaluation Tool
    • CIO Stakeholder Power Map Template

    3. Plan

    Create a personal development plan and stakeholder management strategy.

    • Become a Strategic CIO – Phase 3: Plan
    • CIO Personal Development Plan
    • CIO Stakeholder Management Strategy Template

    4. Execute

    Develop a scorecard to track personal development initiatives.

    • Become a Strategic CIO – Phase 4: Execute
    • CIO Strategic Competency Scorecard
    [infographic]

    Workshop: Become a Strategic CIO

    Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

    1 Assess Competencies & Stakeholder Relationships

    The Purpose

    Gather and review information from business stakeholders.

    Assess strategic CIO competencies and business stakeholder relationships.

    Key Benefits Achieved

    Gathered information to create a personal development plan and stakeholder management strategy.

    Analyzed the information from diagnostics and determined the appropriate next steps.

    Identified and prioritized strategic CIO competency gaps.

    Evaluated the power, impact, and support of key business stakeholders.

    Activities

    1.1 Conduct CIO Business Vision diagnostic

    1.2 Conduct CXO-CIO Alignment program

    1.3 Assess CIO competencies

    1.4 Assess business stakeholder relationships

    Outputs

    CIO Business Vision results

    CXO-CIO Alignment Program results

    CIO competency gaps

    Executive Stakeholder Power Map

    2 Take Control of Your Personal Development

    The Purpose

    Create a personal development plan and stakeholder management strategy.

    Track your personal development and establish checkpoints to revise initiatives.

    Key Benefits Achieved

    Identified personal development and stakeholder engagement initiatives to bridge high priority competency gaps.

    Identified key performance indicators and benchmarks/targets to track competency development.

    Activities

    2.1 Create a personal development plan

    2.2 Create a stakeholder management strategy

    2.3 Establish key performance indicators and benchmarks/targets

    Outputs

    Personal Development Plan

    Stakeholder Management Strategy

    Strategic CIO Competency Scorecard

    Build Your First RPA Bot

    • Buy Link or Shortcode: {j2store}238|cart{/j2store}
    • member rating overall impact: 9.4/10 Overall Impact
    • member rating average dollars saved: $53,126 Average $ Saved
    • member rating average days saved: 24 Average Days Saved
    • Parent Category Name: Optimization
    • Parent Category Link: /optimization
    • Your organization has many business processes that rely on manual, routine, and repetitive data collection and processing work. These processes need to be automated to meet strategic priorities.
    • Your stakeholders decided to invest in robotic process automation (RPA). They are ready to begin the planning and delivery of their first RPA bot.
    • However, your organization lacks the critical foundations involved in successful RPA delivery, such as analysis of the suitability of candidate processes, business and IT collaboration, and product ownership.

    Our Advice

    Critical Insight

    • Manage your business and IT debt before you adopt RPA. RPA doubles down on your process inefficiencies, lack of operations and architectural standardization, and unenforced quality standards. RPA solutions will be fragile and prone to failure if debt is not managed.
    • Adopt BizDevOps. RPA will not be successful if your lines-of-business (LOBs) and IT are not working together. IT must empathize with how LOBs operate and proactively support the underlying operational systems. LOBs must be accountable for all products leveraging RPA and be able to rationalize RPA’s technical feasibility.
    • Start with RPA 1.0. Don’t get caught up in the AI and machine learning (RPA 2.0) hype. Evaluate the acceptance and value of RPA 1.0 to establish a sustainable and collaborative foundation for its delivery and management. Then use the lessons learned to prepare for future RPA 2.0 adoption. In many cases, RPA 1.0 is good enough.

    Impact and Result

    • Establish the right expectations. Gain a grounded understanding of RPA value and limitations in your context. Discuss current IT and business operations challenges to determine if they will impact RPA success.
    • Build your RPA governance. Clarify the roles, processes, and tools needed to support RPA delivery and management through IT and business collaboration.
    • Evaluate the fit of RPA. Obtain a thorough view of the business and technical complexities of your candidate processes. Indicate where and how RPA is expected to generate the most return.

    Build Your First RPA Bot Research & Tools

    Start here – read the Executive Brief

    Read our concise Executive Brief to find out how you should build your first RPA bot, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. Define your RPA governance

    Set the expectations of your first RPA bot. Define the guiding principles, ethics, and delivery capabilities that will govern RPA delivery and support.

    • Build Your First RPA Bot – Phase 1: Define Your RPA Governance

    2. Deliver and manage your bots

    Validate the fit of your candidate business processes for RPA and ensure the support of your operational system. Shortlist the features of your desired RPA vendor. Modernize your delivery process to accommodate RPA.

    • Build Your First RPA Bot – Phase 2: Deliver and Manage Your Bots

    3. Roadmap your RPA adoption

    Build a roadmap of initiatives to implement your first bot and build the foundations of your RPA practice.

    • Build Your First RPA Bot – Phase 3: Roadmap Your RPA Adoption
    [infographic]

    Workshop: Build Your First RPA Bot

    Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

    1 Define Your RPA Governance

    The Purpose

    State the success criteria of your RPA adoption through defined objectives and metrics.

    Define your RPA guiding principles and ethics.

    Build the RPA capabilities that will support the delivery and management of your bots.

    Key Benefits Achieved

    Grounded stakeholder expectations

    RPA guiding principles

    RPA capabilities and the key roles to support RPA delivery and management

    Activities

    1.1 State Your RPA Objectives.

    1.2 Define Your RPA Principles

    1.3 Develop Your RPA Capabilities

    Outputs

    RPA objectives and metrics

    RPA guiding principles and ethics

    RPA and product ownership, RPA capabilities, RPA role definitions

    2 Deliver and Manage Your Bots

    The Purpose

    Evaluate the fit of your candidate business processes for automation.

    Define the operational platform to support your RPA solution.

    Shortlist the desired RPA vendor features.

    Optimize your product delivery process to support RPA.

    Key Benefits Achieved

    Verifies the decision to implement RPA for the candidate business process

    The system changes and modifications needed to support RPA

    Prioritized list of RPA vendor features

    Target state RPA delivery process

    Activities

    2.1 Prepare Your RPA Platform

    2.2 Select Your RPA Vendor

    2.3 Deliver and Manage Your Bots

    Outputs

    Assessment of candidate business processes and supporting operational platform

    List of desired RPA vendor features

    Optimized delivery process

    3 Roadmap Your RPA Adoption

    The Purpose

    Build your roadmap to implement your first RPA bot and build the foundations of your RPA practice.

    Key Benefits Achieved

    Implementation initiatives

    RPA adoption roadmap

    Activities

    3.1 Roadmap Your RPA Adoption

    Outputs

    RPA adoption roadmap

    Explore the Secrets of Oracle Cloud Licensing

    • Buy Link or Shortcode: {j2store}142|cart{/j2store}
    • member rating overall impact: 9.5/10 Overall Impact
    • member rating average dollars saved: 5 Average Days Saved
    • member rating average days saved: After each Info-Tech experience, we ask our members to quantify the real-time savings, monetary impact, and project improvements our research helped them achieve.
    • Parent Category Name: Licensing
    • Parent Category Link: /licensing
    • Organizations are considering moving workloads to the cloud; however, they often struggle to understand Oracle's licensing and services models.
    • Complexity of licensing and high price tags can make the renewal process an overwhelming experience.
    • Oracle’s SaaS applications are the most mature, but Oracle’s on-premises E-Business Suite still has functionality gaps in comparison to Oracle’s cloud apps.

    Our Advice

    Critical Insight

    • Understand the Oracle agenda. Oracle has established a unique approach to their cloud offerings – they want all of your workloads on the Red Stack.
    • Communicate effectively. Be aware that Oracle will reach out to members at your organization at various levels. Having your executives on the same page is critical to successfully managing Oracle.
    • Negotiate hard. Oracle needs the deal more than the customer. Oracle's top leaders are heavily incentivized to drive massive cloud adoption and increase Oracle's share price. Use this to your advantage.

    Impact and Result

    • Conducting business with Oracle is not typical compared to other vendors. To emerge successfully from a commercial transaction with Oracle, customers must learn the “Oracle way” of conducting business, which includes a best-in-class sales structure, highly unique contracts, and license use policies coupled with a hyper-aggressive compliance function.
    • Leverage cloud spend to retire support on shelf-ware licenses, or gain virtualization rights for an on-premises environment.
    • Map out the process of how to negotiate from a position of strength, examining terms and conditions, discount percentages, and agreement pitfalls.
    • Carefully review key clauses in the Oracle Cloud Services Agreement to avoid additional spend and compliance risks.

    Explore the Secrets of Oracle Cloud Licensing Research & Tools

    Start here – read the Executive Brief

    Read our concise Executive Brief to find out why you should explore the secrets of Oracle Cloud licensing, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. Evaluate licensing requirements

    Review current licensing options and models to determine which cloud products will most appropriately fit the organization's environment.

    • Oracle Cloud Services Agreement Terms and Conditions Evaluation Tool
    [infographic]

    Prepare for the Upgrade to Windows 11

    • Buy Link or Shortcode: {j2store}166|cart{/j2store}
    • member rating overall impact: N/A
    • member rating average dollars saved: N/A
    • member rating average days saved: N/A
    • Parent Category Name: End-User Computing Devices
    • Parent Category Link: /end-user-computing-devices
    • Windows 10 is going EOL in 2025.That is closer than you think.
    • Many of your endpoints are not eligible for the Windows 11 upgrade. You can’t afford to replace all your endpoints this year. How do you manage this Microsoft initiated catastrophe?
    • You want to stay close to the leading edge of technology and services, but how do you do that while keeping your spending in check and within budget?

    Our Advice

    Critical Insight

    Windows 11 is a step forward in security, which is one of the primary reasons for the release of the new operating system. Windows 11 comes with a list of hardware requirements that enable the use of tools and features that, when combined, will reduce malware infections.

    Impact and Result

    Windows 11 hardware requirements will result in devices that are not eligible for the upgrade. Companies will be left to spend money on replacement devices. Following the Info-Tech guidance will help clients properly budget for hardware replacements before Windows 10 is no longer supported by Microsoft. Eligible devices can be upgraded, but Info-Tech guidance can help clients properly plan the upgrade using the upgrade ring approach.

    Prepare for the Upgrade to Windows 11 Research & Tools

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. Prepare for the Upgrade to Windows 11 Deck – A look into some of the pros and cons of Microsoft’s latest desktop operating system, along with guidance on moving forward with this inevitable upgrade.

    Discover the reason for the release of Windows 11, what you require to be eligible for the upgrade, what features were added or updated, and what features were removed. Our guidance will assist you with a planned and controlled rollout of the Windows 11 upgrade. We also provide guidance on how to approach a device refresh plan if some devices are not eligible for Windows 11. The upgrade is inevitable, but you have time, and you have options.

    • Prepare for the Upgrade to Windows 11 Storyboard

    2. What Are My Options If My Devices Cannot Upgrade to Windows 11? – Build a Windows 11 Device Replacement budget with our Hardware Asset Management Budgeting Tool.

    This tool will help you budget for a hardware asset refresh and to adjust the budget as necessary to accommodate any unexpected changes. The tool can easily be modified to assist in developing and justifying the budget for hardware assets for a Windows 11 project. Follow the instructions on each tab and feel free to play with the HAM budgeting tool to fit your needs.

    • HAM Budgeting Tool
    [infographic]

    Further reading

    Prepare for the Upgrade to Windows 11

    The upgrade is inevitable, but you have time, and you have options.

    Analyst Perspective

    Upgrading to Windows 11 is easy, and while it should be properly investigated and planned, it should absolutely be an activity you undertake.

    “You hear that Mr. Anderson? That is the sound of inevitability.” ("The Matrix Quotes" )

    The fictitious Agent Smith uttered those words to Keanu Reeves’ character, Neo, in The Matrix in 1999, and while Agent Smith was using them in a very sinister and figurative context, the words could just as easily be applied to the concept of upgrading to the Windows 11 operating system from Microsoft in 2022.

    There have been two common, recurring themes in the media since late 2019. One is the global pandemic and the other is cyber-related crime. Microsoft is not in a position to make an impact on a novel coronavirus, but it does have the global market reach to influence end-user technology and it appears that it has done just that. Windows 11 is a step forward in endpoint security and functionality. It also solidifies the foundation for future innovations in end-user operating systems and how they are delivered. Windows-as-a-Service (WAAS) is the way forward for Microsoft. Windows 10 is living on borrowed time, with a defined end of support date of October 14, 2025. Upgrading to Windows 11 is easy, and while it should be properly investigated and planned, it should absolutely be an activity you undertake.

    It is inevitable!

    P.J. Ryan

    Research Director, Infrastructure & Operations

    Info-Tech Research Group

    Executive Summary

    Your Challenge

    • Windows 10 is going EOL in 2025. That is closer than you think.
    • Many of your endpoints are not eligible for the Windows 11 upgrade. You can’t afford to replace all your endpoints this year. How do you manage this Microsoft-initiated catastrophe?
    • You want to stay close to the leading edge of technology and services, but how do you do that while keeping your spending in check and within budget?

    Common Obstacles

    • The difference between Windows 10 and Windows 11 is not clear. Windows 11 looks like Windows 10 with some minor changes, mostly cosmetic. Many online users don’t see the need. Why upgrade? What are the benefits?
    • The cost of upgrading devices just to be eligible for Windows 11 is high.
    • Your end users don’t like change. This is not going to go over well!

    Info-Tech's Approach

    • Spend wisely. Space out your endpoint replacements and upgrades over several years. You do not have to upgrade everything right away.
    • Be patient. Windows 11 contained some bugs when it was initially released. Microsoft fixed most of the issues through monthly quality updates, but you should ensure that you are comfortable with the current level of functionality before you upgrade.
    • Use the upgrade ring approach. Test your applications with a small group first, and then stage the rollout to increasingly larger groups over time.

    Info-Tech Insight

    There is a lot of talk about Windows 11, but this is only an operating system upgrade, and it is not a major one. Understand what is new, what is added, and what is missing. Check your devices to determine how many are eligible and ineligible. Many organizations will have to spend capital on endpoint upgrades. Solid asset management practices will help.

    Insight summary

    Windows 11 is a step forward in security, which is one of the primary reasons for the release of the new operating system.

    Windows 11 comes with a list of hardware requirements that enable the use of tools and features that, when combined, will reduce malware infections.

    The hardware requirements for Windows 11 enable security features such as password-less logon, disk encryption, increased startup protection with secure boot, and virtualization-based security.

    Many organizations will have to spend capital on endpoint upgrades.

    Microsoft now insists that modern hardware is required for Windows 11 for not only security but also for improved stability. That same hardware requirement will mean that many devices that are only three or four years old (as well as older ones) may not be eligible for Windows 11.

    Windows 11 is a virtualization challenge for some providers.

    The hardware requirements for physical devices are also required for virtual devices. The TPM module appears to be the biggest challenge. Oracle VirtualBox and Citrix Hypervisor as well as AWS and Google are unable to support Windows 11 virtual devices as of the time of writing.

    Windows 10 will be supported by Microsoft until October 2025.

    That will remove some of the pressure felt due to the ineligibility of many devices and the need to refresh them. Take your time and plan it out, keeping within budget constraints. Use the upgrade ring approach for systems that are eligible for the Windows 11 upgrade.

    New look and feel, and a center screen taskbar.

    Corners are rounded, some controls look a little different, but overall Windows 11 is not a dramatic shift from Windows 10. It is easier to navigate and find features. Oh, and yes, the taskbar (and start button) is shifted to the center of the screen, but you can move them back to the left if desired.

    The education industry gets extra attention with the release of Windows 11.

    Windows 11 comes with multiple subscription-based education offerings, but it also now includes a new lightweight SE edition that is intended for the K-8 age group. Microsoft also released a Windows 11 Education SE specific laptop, at a very attractive price point. Other manufacturers also offer Windows 11 SE focused devices.

    Why Windows 11?

    Windows 10 was supposed to be the final desktop OS from Microsoft, wasn’t it?

    Maybe. It depends who you ask.

    Jerry Nixon, a Microsoft developer evangelist, gained notoriety when he uttered these words while at a Microsoft presentation as part of Microsoft Ignite in 2015: “Right now we’re releasing Windows 10, and because Windows 10 is the last version of Windows, we’re all still working on Windows 10,” (Hachman). Microsoft never officially made that statement. Interestingly enough, it never denied the comments made by Jerry Nixon either.

    Perhaps Microsoft released a new operating system as a financial grab, a way to make significant revenue?

    Nope.

    Windows 11 is a free upgrade or is included with any new computer purchase.

    Market share challenges?

    Doubtful.

    It’s true that Microsoft's market share of desktop operating systems is dropping while Apple OS X and Google Chrome OS are rising.

    In fact, Microsoft has relinquished over 13% of the market share since 2012 and Apple has almost doubled its market share. BUT:

    Microsoft is still holding 75.12% of the market while Apple is in the number 2 spot with 14.93% (gs.statcounter.com).

    The market share is worth noting for Microsoft but it hardly warrants a new operating system.

    New look and feel?

    Unlikely

    New start button and taskbar orientation, new search window, rounded corners, new visual look on some controls like the volume bar, new startup sound, new Windows logo, – all minor changes. Updates could achieve the same result.

    Security?

    Likely the main reason.

    Windows 11 comes with a list of hardware requirements that enable the use of tools and features that, when combined, will reduce malware infections.

    The hardware requirements for Windows 11 enable security features such as password-less logon, disk encryption, increased startup protection with secure boot, and virtualization-based security.

    The features are available on all Windows 11 physical devices, due to the common hardware requirements.

    Windows 11 hardware-based security

    These hardware options and features were available in Windows 10 but not enforced. With Windows 11, they are no longer optional. Below is a description and explanation of the main features.

    Feature What it is How it works
    TPM 2.0 (Trusted Platform Module) Chip TPM is a chip on the motherboard of the computer. It is used to store encryption keys, certificates, and passwords. TPM does this securely with tamper-proof prevention. It can also generate encryption keys and it includes its own unique encryption key that cannot be altered (helpdeskgeek.com). You do not need to enter your password once you setup Windows Hello, so the password is no longer easy to capture and steal. It is set up on a device per device basis, meaning if you go to a different device to sign in, your Windows Hello authentication will not follow you and you must set up your Hello pin or facial recognition again on that particular device. TPM (Trusted Platform Module) can store the credentials used by Windows Hello and encrypt them on the module.
    Windows Hello Windows Hello is an alternative to using a password for authentication. Users can use a pin, a fingerprint, or facial recognition to authenticate.
    Device Encryption Device encryption is only on when your device is off. It scrambles the data on your disk to make it unreadable unless you have the key to unscramble it. If your endpoint is stolen, the contents of the hard drive will remain encrypted and cannot be accessed by anyone unless they can properly authenticate on the device and allow the system to unscramble the encrypted data.
    UEFI Secure Boot Capable UEFI is an acronym for Unified Extensible Firmware Interface. It is an interface between the operating system and the computer firmware. Secure Boot, as part of the firmware interface, ensures that only unchangeable and approved software and drivers are loaded at startup and not any malware that may have infiltrated the system (Lumunge). UEFI, with Secure Boot, references a database containing keys and signatures of drivers and runtime code that is approved as well as forbidden. It will not let the system boot up unless the signature of the driver or run-time code that is trying to execute is approved. This UEFI Secure boot recognition process continues until control is handed over to the operating system.
    Virtualization Based Security (VBS) and Hypervisor-Protected Code Integrity (HVCI) VBS is security based on virtualization capabilities. It uses the virtualization features of the Windows operating system, specifically the Hyper-V hypervisor, to create and isolate a small chunk of memory that is isolated from the operating system. HVCI checks the integrity of code for violations. The Code Integrity check happens in the isolated virtual area of memory protected by the hypervisor, hence the acronym HVCI (Hypervisor Protected Code Integrity) (Murtaza). In the secure, isolated region of memory created by VBS with the hypervisor, Windows will run checks on the integrity of the code that runs various processes. The isolation protects the stored item from tampering by malware and similar threats. If they run incident free, they are released to the operating system and can run in the standard memory space. If issues are detected, the code will not be released, nor will it run in the standard memory space of the operating system, and damage or compromise will be prevented.

    How do all the hardware-based security features work?

    This scenario explains how a standard boot up and login should happen.

    You turn on your computer. Secure Boot authorizes the processes and UEFI hands over control to the operating system. Windows Hello works with TPM and uses a pin to authenticate the user and the operating systems gives you access to the Windows environment.

    Now imagine the same process with various compromised scenarios.

    You turn on your computer. Secure Boot does not recognize the signature presented to it by the second process in the boot sequence. You will be presented with a “Secure Boot Violation” message and an option to reboot. Your computer remains protected.

    You boot up and get past the secure boot process and UEFI passes control over to the Windows 11 operating system. Windows Hello asks for your pin, but you cannot remember the pin and incorrectly enter it three times before admitting temporary defeat. Windows Hello did not find a matching pin on the TPM and will not let you proceed. You cannot log in but in the eyes of the operating system, it has prevented an unauthorized login attempt.

    You power up your computer, log in without issue, and go about your morning routine of checking email, etc. You are not aware that malware has infiltrated your system and modified a page in system memory to run code and access the operating system kernel. VBS and HVCI check the integrity of that code and detect that it is malicious. The code remains isolated and prevented from running, protecting your system.

    TPM, Hello, UEFI with Secure Boot, VBS and HVCI all work together like a well-oiled machine.

    “Microsoft's rationale for Windows 11's strict official support requirements – including Secure Boot, a TPM 2.0 module, and virtualization support – has always been centered on security rather than raw performance.” – Andrew Cunningham, arstechnica.com

    “Windows 11 raises the bar for security by requiring hardware that can enable protections like Windows Hello, Device Encryption, virtualization-based security (VBS), hypervisor-protected code integrity (HVCI), and Secure Boot. These features in combination have been shown to reduce malware by 60% on tested devices.” – Steven J. Vaughan-Nichols, Computerworld

    Can any device upgrade to Windows 11?

    In addition to the security-related hardware requirements listed previously, which may exclude some devices from Windows 11 eligibility, Windows 11 also has a minimum requirement for other hardware components.

    Windows 7 and Windows 10 were publicized as being backward compatible and almost any hardware would be able to run those operating systems. That changed with Windows 11. Microsoft now insists that modern hardware is required for Windows 11 for not only security but also improved stability.

    Software Requirement

    You must be running Windows 10 version 2004 or greater to be eligible for a Windows 11 upgrade (“Windows 11 Requirements”).

    Complete hardware requirements for Windows 11

    • 1 GHz (or faster) compatible 64-bit processor with two or more cores
    • 4 GB RAM
    • 64 GB or more of storage space
    • Compatible with DirectX 12 or later with WDDM 2.0 driver
      • DirectX connects the hardware in your computer with Windows. It allows software to display graphics using the video card or play audio, as long as that software is DirectX compatible. Windows 11 requires version 12 (“What are DirectX 12 compatible graphics”).
      • WDDM is an acronym for Windows Display Driver Model. WDDM is the architecture for the graphics driver for Windows (“Windows Display Driver Model”).
      • Version 2.0 of WDDM is required for Windows 11.
    • 720p display greater than 9" diagonally with 8 bits per color channel
    • UEFI Secure Boot capable
    • TPM 2.0 chip
    • (“Windows 11 Requirements”)

    Windows 11 may challenge your virtual environment

    When Windows 11 was initially released, some IT administrators experienced issues when trying to install or upgrade to Windows 11 in the virtual world.

    The Challenge

    The issues appeared to be centered around the Windows 11 hardware requirements, which must be detected by the Windows 11 pre-install check before the operating system will install.

    The TPM 2.0 chip requirement was indeed a challenge and not offered as a configuration option with Citrix Hypervisor, the free VMware Workstation Player or Oracle VM VirtualBox when Windows 11 was released in October 2021, although it is on the roadmap for Oracle and Citrix Hypervisor. VMware provides alternative products to the free Workstation Player that do support a virtual TPM. Oracle and Citrix reported that the feature would be available in the future and Windows 11 would work on their platforms.

    Short-Term Solutions

    VMware and Microsoft users can add a vTPM hardware type when configuring a virtual Windows 11 machine. Microsoft Azure does offer Windows 11 as an option as a virtual desktop. Citrix Desktop-As-A-Service (DAAS) will connect to Azure, AWS, or Google Cloud and is only limited by the features of the hosting cloud service provider.

    Additional Insight

    According to Microsoft, any VM running Windows 11 must meet the following requirements (“Virtual Machine Support”):

    • It must be a generation 2 VM, and upgrading a generation 1 VM to Windows 11 (in-place) is not possible
    • 64 GB of storage or greater
    • Secure Boot capable with the virtual TPM enabled
    • 4 GB of memory or greater
    • 2 or more virtual processors
    • The CPU of the physical computer that is hosting the VM must meet the Windows 11 (“Windows Processor Requirements”)

    What’s new or updated in Windows 11?

    The following two slides highlight some of the new and updated features in Windows 11.

    Security

    The most important change with Windows 11 is what you cannot see – the security. Windows 11 adds requirements and controls to make the user and device more secure, as described in previous slides.

    Taskbar

    The most prominent change in relation to the look and feel of Windows 11 is the shifting of the taskbar (and Start button) to the center of the screen. Some users may find this more convenient but if you do not and prefer the taskbar and start button back on the left of your screen, you can change it in taskbar settings.

    Updated Apps

    Paint, Photos, Notepad, Media Player, Mail, and other standard Windows apps have been updated with a new look and in some cases minor enhancements.

    User Interface

    The first change users will notice after logging in to Windows 11 is the new user interface – the look and feel. You may not notice the additional colors added to the Windows palette, but you may have thought that the startup sound was different, and the logo also looks different. You would be correct. Other look-and-feel items that changed include the rounded corners on windows, slightly different icons, new wallpapers, and controls for volume and brightness are now a slide bar. File explorer and the settings app also have a new look.

    Microsoft Teams

    Microsoft Teams is now installed on the taskbar by default. Note that this is for a personal Microsoft account only. Teams for Work or School will have to be installed separately if you are using a work or school account.

    What’s new or updated in Windows 11?

    Snap Layouts

    Snap layouts have been enhanced and snap group functionality has been added. This will allow you to quickly snap one window to the side of the screen and open other Windows in the other side. This feature can be accessed by dragging the window you wish to snap to the left or right edge of the screen. The window should then automatically resize to occupy that half of the screen and allow you to select other Windows that are already open to occupy the remaining space on the screen. You can also hover your mouse over the maximize button in the upper right-hand corner of the window. A small screen with multiple snap layouts will appear for your selection. Multiple snapped Windows can be saved as a “Snap Group” that will open together if one of the group windows are snapped in the future.

    Widgets

    Widgets are expanding. Microsoft started the re-introduction of widgets in Windows 10, specifically focusing on the weather. Widgets now include other services such as news, sports, stock prices, and others.

    Android Apps

    Android apps can now run in Windows 11. You will have to use the Amazon store to access and install Android apps, but if it is available in the Amazon store, you can install it on Windows 11.

    Docking

    Docking has improved with Windows 11. Windows knows when you are docked and will minimize apps when you undock so they are not lost. They will appear automatically when you dock again.

    This is not intended to be an inclusive list but does cover some of the more prominent features.

    What’s missing from Windows 11?

    The following features are no longer found in Windows 11:

    • Backward compatibility
      • The introduction of the hardware requirements for Windows 11 removed the backward compatibility (from a hardware perspective) that made the transition from previous versions of Windows to their successor less of a hardware concern. If a computer could run Windows 7, then it could also run Windows 10. That does not automatically mean it can also run Windows 11.
    • Internet Explorer
      • Internet Explorer is no longer installed by default in Windows 11. Microsoft Edge is now the default browser for Windows. Other browsers can also be installed if preferred.
    • Tablet mode
      • Windows 11 does not have a "tablet" mode, but the operating system will maximize the active window and add more space between icons to make selecting them easier if the 2-in-1 hardware detects that you wish to use the device as a tablet (keyboard detached or device opened up beyond 180 degrees, etc.).
    • Semi-annual updates
      • It may take six months or more to realize that semi-annual feature updates are missing. Microsoft moved to an annual feature update schema but continued with monthly quality updates with Windows 11.
    • Specific apps
      • Several applications have been removed (but can be manually added from the Microsoft Store by the user). They include:
        • OneNote for Windows 10
        • 3D Viewer
        • Paint 3D
        • Skype
    • Cortana (by default)
      • Cortana is missing from Windows 11. It is installed but not enabled by default. Users can turn it on if desired.

    Microsoft included a complete list of features that have been removed or deprecated with Windows 11, which can be found here Windows 11 Specs and System Requirements.

    Windows 11 editions

    • Windows 11 is offered in several editions:
      • Windows 11 Home
      • Windows 11 Pro
      • Windows 11 Pro for Workstations
      • Windows 11 Enterprise Windows 11 for Education
      • Windows 11 SE for Education
    • Windows 11 hardware requirements and security features are common throughout all editions.
    • The new look and feel along with all the features mentioned previously are common to all editions as well.
    • Windows Home
      • Standard offering for home users
    • Pro versus Pro for Workstations
      • Windows 11 Pro and Pro for Workstations are both well suited for the business environment with available features such as support for Active Directory or Azure Active Directory, Windows Autopilot, OneDrive for Business, etc.
      • Windows Pro for Workstations is designed for increased demands on the hardware with the higher memory limits (2 TB vs. 6 TB) and processor count (2 CPU vs. 4 CPU).
      • Windows Pro for Workstations also features Resilient File System, Persistent Memory, and SMB Direct. Neither of these features are available in the Windows 11 Pro edition.
      • Windows 11 Pro and Pro for Workstations are both very business focused, although Pro may also be a common choice for non-business users (Home and Education).
    • Enterprise Offerings
      • Enterprise licenses are subscription based and are part of the Microsoft 365 suite of offerings.
      • Windows 11 Enterprise is Windows 11 Pro with some additional addons and functionality in areas such as device management, collaboration, and security services.
      • The level of the Microsoft 365 Enterprise subscription (E3 or E5) would dictate the additional features and functionality, such as the complete Microsoft Defender for Endpoint suite or the Microsoft phone system and Audio Conferencing, which are only available with the E5 subscription.

    Windows 11 Education Editions

    With the release of a laptop targeted specifically at the education market, Microsoft must be taking notice of the Google Chrome educational market penetration, especially with headlines like these.

    “40 Million Chromebooks in Use in Education” (Thurrott)

    “The Unprecedented Growth of the Chromebook Education Market Share” (Carklin)

    “Chromebooks Gain Market Share as Education Goes Online” (Hruska)

    “Chromebooks Gain Share of Education Market Despite Shortages” (Mandaro)

    “Chromebook sales skyrocketed in Q3 2020 with online education fueling demand” (Duke)

    • Education licenses are subscription based and are part of the Microsoft 365 suite of offerings. Educational pricing is one benefit of the Microsoft 365 Education model.
    • Windows 11 Education is Windows 11 Pro with some additional addons and functionality similar to the Enterprise offerings for Windows 11 in areas such as device management, collaboration, and security services. Windows 11 Education also adds some education specific settings such as Classroom Tools, which allow institutions to add new students and their devices to their own environment with fewer issues, and includes OneNote Class Notebook, Set Up School PCs app, and Take a Test app.
    • The level of the Microsoft 365 Education subscription (A3 or A5) would dictate the additional features and functionality, such as the complete Microsoft Defender for Endpoint suite or the Microsoft phone system and Audio Conferencing, which are only available with the A5 subscription.
    • Windows 11 SE for Education:
      • A cloud-first edition of Windows 11 specifically designed for the K-8 education market.
      • Windows 11 SE is a light version of Windows 11 that is designed to run on entry-level devices with better performance and security on that hardware.
      • Windows 11 SE requires Intune for Education and only IT admins can install applications.
    • Microsoft and others have come out with Windows SE specific devices at a low price point.
      • The Microsoft Surface Laptop SE comes pre-loaded with Windows 11 SE and can be purchased for US$249.00.
      • Dell, Asus, Acer, Lenovo, and others also offer Windows 11 SE specific devices (“Devices for Education”).

    Initial Reactions

    Below you can find some actual initial reactions to Windows 11.

    Initial reactions are mixed, as is to be expected with any new release of an operating system. The look and feel is new, but it is not a huge departure from the Windows 10 look and feel. Some new features are well received such as the snap feature.

    The shift of the taskbar (and start button) is the most popular topic of discussion online when it comes to Windows 11 reactions. Some love it and some do not. The best part about the shift of the taskbar is that you can adjust it in settings and move it back to its original location.

    The best thing about reactions is that they garner attention, and thanks in part to all the online reactions and comments, Microsoft is continually improving Windows 11 through quality updates and annual feature releases.

    “My 91-year-old Mum has found it easy!” Binns, Paul ITRG

    “It mostly looks quite nice and runs well.” Jmbpiano, Reddit user

    “It makes me feel more like a Mac user.” Chang, Ben Info-Tech

    “At its core, Windows 11 appears to be just Windows 10 with a fresh coat of paint splashed all over it.” Rouse, Rick RicksDailyTips.com

    “Love that I can snap between different page orientations.” Roberts, Jeremy Info-Tech

    “I finally feel like Microsoft is back on track again.” Jawed, Usama Neowin

    “A few of the things that seemed like issues at first have either turned out not to be or have been fixed with patches.” Jmbpiano, Reddit user

    “The new interface is genuinely intuitive, well-designed, and colorful.” House, Brett AnandTech

    “No issues. Have it out on about 50 stations.” Sandrews1313, Reddit User

    “The most striking change is to the Start menu.” Grabham, Dan pocket-lint.com

    How do I upgrade to Windows 11?

    The process is very similar to applying updates in Windows 10.

    • Windows 11 is offered as an upgrade through the standard Windows 10 update procedure. Windows Update will notify you when the Windows 11 upgrade is ready (assuming your device is eligible for Windows 11).
      • Allow the update (upgrade in this case) to proceed, reboot, and your endpoint will come back to life with Windows 11 installed and ready for you.
    • A fresh install can be delivered by downloading the required Windows 11 installation media from the Microsoft Software Download site for Windows 11.
    • Business users can control the timing and schedule of the Windows 11 rollout to corporate endpoints using Microsoft solutions such as WSUS, Configuration Manager, Intune and Endpoint Manager, or by using other endpoint management solutions.
    • WSUS and Configuration Manager will have to sync the product category for Windows 11 to manage the deployment.
    • Windows Update for Business policies will have to use the target version capability rather than using the feature update referrals alone.
    • Organizations using Intune and a Microsoft 365 E3 license will be able to use the Feature Update Deployments page to select Windows 11.
    • Other modern endpoint management solutions may also allow for a controlled deployment.

    Info-Tech Insight

    The upgrade itself may be a simple process but be prepared for the end-user reactions that will follow. Some will love it but others will despise it. It is not an optional upgrade in the long run, so everyone will have to learn to accept it.

    When can I upgrade to Windows 11?

    You can upgrade right now BUT there is no need to rush. Windows 11 was released in October 2021 but that doesn’t mean you have to upgrade everyone right away. Plan this out.

    • Build deployment rings into your Windows 11 upgrade approach: This approach, also referred to as Canary Releases or deployment rings, allows you to ensure that IT can support users if there's a major problem with the upgrade. Instead of disrupting all end users, you are only disrupting a portion of end users.
      • Deploy the initial update to your test environment.
      • After testing is successful or changes have been made, deploy Windows 11 to your pilot group of users.
      • After the pilot group gives you the thumbs up, deploy to the rest of production in phases. Phases are sometimes by office/location, sometimes by department, sometimes by persona (i.e. defer people that don't handle updates well), and usually by a combination of these factors.
      • Increase the size of each ring as you progress.
    • Always back up your data before any upgrade.

    Deployment Ring Example

    Pilot Ring - Individuals from all departments - 10 users

    Ring #1 - Dev, Finance - 20 Users

    Ring #2 - Research - 100 Users

    Ring #3 - Sales, IT, Marketing - 500 Users

    Upgrade your eligible devices and users to Windows 11

    Build Windows 11 Deployment Rings

    Instructions:

    1. Identify who will be in the pilot group. Use individuals instead of user groups.
    2. Identify how many standard rings you need. This number will be based on the total number of employees per office.
    3. Map groups to rings. Define which user groups will be in each ring.
    4. Allow some time to elapse between upgrades. Allow the first group to work with Windows 11 and identify any potential issues that may arise before upgrading the next group.
    5. Track and communicate. Record all information into a spreadsheet like the one on the right. This will aid in communication and tracking.
    Ring Department or Group Total Users Delay Time Before Next Group
    Pilot Ring Individuals from all departments 10 Three weeks
    Ring 1 Dev Finance 20 Two weeks
    Ring 2 Research 100 One week
    Ring 3 Sales, IT Marketing 500 N/A

    What are my options if my devices cannot upgrade to Windows 11?

    Don’t rush out to replace all the ineligible endpoint devices. You have some time to plan this out. Windows 10 will be available and supported by Microsoft until October 2025.

    Use asset management strategies and budget techniques in your Windows 11 upgrade approach:

    • Start with current inventory and determine which devices will not be eligible for upgrade to Windows 11.
    • Prioritize the devices for replacement, taking device age, the role of the user the device supports, and delivery times for remote users into consideration.
    • Take this opportunity to review overall device offerings and end-user compute strategy. This will help decide which devices to offer going forward while improving end-user satisfaction.
    • Determine the cost for replacement devices:
      • Compare vendor offerings using an RFP process.
    • Use the hardware asset management planning spreadsheet on the next slide to budget for the replacements over the coming months leading up to October 2025.

    Leverage Info-Tech research to improve your end-user computing strategy and hardware asset management processes:

    New to End User Computing Strategies? Start with Modernize and Transform Your End-User Computing Strategy.

    New to IT asset management? Use Info-Tech’s Implement Hardware Asset Management blueprint.

    Use Info-Tech’s HAM Budgeting Tool to plan your hardware asset budget

    Build a Windows 11 Device Replacement Budget

    The link below will open up a hardware asset management (HAM) budgeting tool. This tool can easily be modified to assist in developing and justifying the budget for hardware assets for the Windows 11 project. The tool will allow you to budget for hardware asset refresh and to adjust the budget as needed to accommodate any changes. Follow the instructions on each tab to complete the tool.

    A sample of a possible Windows 11 budgeting spreadsheet is shown on the right, but feel free to play with the HAM budgeting tool to fit your needs.

    HAM Budgeting Tool

    Windows 11 Replacement Schedule
    2022 2023 2024 2025
    Department Total to replace Q3 Q4 Q1 Q2 Q3 Q4 Q1 Q2 Q3 Q4 Q1 Q2 Q3 Left to allocate
    Finance 120 20 20 20 10 10 20 20 0
    HR 28 15 13 0
    IT 30 15 15 0
    Research 58 8 15 5 20 5 5 0
    Planning 80 10 15 15 10 15 15 0
    Other 160 5 30 5 15 15 30 30 30 0
    Totals 476 35 38 35 35 35 35 38 35 50 35 35 35 35 0

    Related Info-Tech Research

    Modernize and Transform Your End-User Computing Strategy

    This project helps support the workforce of the future by answering the following questions: What types of computing devices, provisioning models, and operating systems should be offered to end users? How will IT support devices? What are the policies and governance surrounding how devices are used? What actions are we taking and when? How do end-user devices support larger corporate priorities and strategies?

    Implement Hardware Asset Management

    This project will help you analyze the current state of your HAM program, define assets that will need to be managed, and build and involve the ITAM team from the beginning to help embed the change. It will also help you define standard policies, processes, and procedures for each stage of the hardware asset lifecycle, from procurement through to disposal.

    Bibliography

    aczechowski, et al. “Windows 11 Requirements.” Microsoft, 3 June 2022. Accessed 13 June 2022.

    Binns, Paul. Personal interview. 07 June 2022.

    Butler, Sydney. “What Is Trusted Platform Module (TPM) and How Does It Work?” Help Desk Geek, 5 August 2021. Accessed 18 May 2022.

    Carklin, Nicolette. “The Unprecedented Growth of the Chromebook Education Market Share.” Parallels International GmbH, 26 October 2021. Accessed 19 May 2022.

    Chang, Ben. Personal interview. 26 May 2022.

    Cunningham, Andrew. “Why Windows 11 has such strict hardware requirements, according to Microsoft.” Ars Technica, 27 August 2021. Accessed 19 May 2022.

    Dealnd-Han, et al. “Windows Processor Requirements.” Microsoft, 9 May 2022. Accessed 18 May 2022.

    “Desktop Operating Systems Market Share Worldwide.” Statcounter Globalstats, June 2021–June 2022. Accessed 17 May 2022.

    “Devices for education.” Microsoft, 2022. Accessed 13 June 2022.

    Duke, Kent. “Chromebook sales skyrocketed in Q3 2020 with online education fueling demand.” Android Police, 16 November 2020. Accessed 18 May 2022.

    Grabham, Dan. “Windows 11 first impressions: Our initial thoughts on using Microsoft's new OS.” Pocket-Lint, 24 June 2021. Accessed 3 June 2022.

    Hachman, Mark. “Why is there a Windows 11 if Windows 10 is the last Windows?” PCWorld, 18 June 2021. Accessed 17 May 2022.

    Howse, Brett. “What to Expect with Windows 11: A Day One Hands-On.” Anandtech, 16 November 2020. Accessed 3 June 2022.

    Hruska, Joel. “Chromebooks Gain Market Share as Education Goes Online.” Extremetech, 26 October 2020. Accessed 19 May 2022.

    Jawed, Usama. “I am finally excited about Windows 11 again.” Neowin, 26 February 2022. Accessed 3 June 2022.

    Jmbpiano. “Windows 11 - What are our initial thoughts and feelings?” Reddit, 22 November 2021. Accessed 3 June 2022.

    Lumunge, Erick. “UEFI and Legacy boot.” OpenGenus, n.d. Accessed 18 May 2022.

    Bibliography

    Mandaro, Laura. “Chromebooks Gain Share of Education Market Despite Shortages.” The Information, 9 September 2020. Accessed 19 May 2022.

    Murtaza, Fawad. “What Is Virtualization Based Security in Windows?” Valnet Inc, 24 October 2021. Accessed 17 May 2022.

    Roberts, Jeremy. Personal interview. 27 May 2022.

    Rouse, Rick. “My initial thoughts about Windows 11 (likes and dislikes).” RicksDailyTips.com, 5 September 2021. Accessed 3 June 2022.

    Sandrews1313. “Windows 11 - What are our initial thoughts and feelings?” Reddit, 22 November 2021. Accessed 3 June 2022.

    “The Matrix Quotes." Quotes.net, n.d. Accessed 18 May 2022.

    Thurrott, Paul.” Google: 40 Million Chromebooks in Use in Education.” Thurrott, 21 January 2020. Accessed 18 May 2022.

    Vaughan-Nichols, Steven J. “The real reason for Windows 11.” Computerworld, 6 July 2021, Accessed 19 May 2022.

    “Virtual Machine Support.” Microsoft,3 June 2022. Accessed 13 June 2022.

    “What are DirectX 12 compatible graphics and WDDM 2.x.” Wisecleaner, 20 August 2021. Accessed 19 May 2022.

    “Windows 11 Specs and System Requirements.” Microsoft, 2022. Accessed 13 June 2022.

    “Windows Display Driver Model.” MiniTool, n.d. Accessed 13 June 2022.

    Tactics to Retain IT Talent

    • Buy Link or Shortcode: {j2store}549|cart{/j2store}
    • member rating overall impact: N/A
    • member rating average dollars saved: N/A
    • member rating average days saved: N/A
    • Parent Category Name: Engage
    • Parent Category Link: /engage
    • Regrettable turnover is impacting organizational productivity and leading to significant costs associated with employee departures and the recruitment required to replace them.
    • Many organizations focus on increasing engagement to improve retention, but this approach doesn’t address the entire problem.

    Our Advice

    Critical Insight

    • Engagement surveys mask the volatility of the employee experience and hide the reason why individual employees leave. You must also talk to employees to understand the moments that matter and engage managers to understand turnover triggers.

    Impact and Result

    • Build the case for creating retention plans by leveraging employee data and feedback to identify the key reasons for turnover that need to be addressed.
    • Target employee segments and work with management to develop solutions to retain top talent.

    Tactics to Retain IT Talent Research & Tools

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. Tactics to Retain IT Talent Storyboard – Use this storyboard to develop a targeted talent retention plan to retain top and core talent in the organization.

    Integrate data from exit surveys and interviews, engagement surveys, and stay interviews to understand the most commonly cited reasons for employee departure in order to select and prioritize tactics that improve retention. This blueprint will help you identify reasons for regrettable turnover, select solutions, and create an action plan.

    • Tactics to Retain IT Talent Storyboard

    2. Retention Plan Workbook – Capture key information in one place as you work through the process to assess and prioritize solutions.

    Use this tool to document and analyze turnover data to find suitable retention solutions.

    • Retention Plan Workbook

    3. Stay Interview Guide – Managers will use this guide to conduct regular stay interviews with employees to anticipate and address turnover triggers.

    The Stay Interview Guide helps managers conduct interviews with current employees, enabling the manager to understand the employee's current engagement level, satisfaction with current role and responsibilities, suggestions for potential improvements, and intent to stay with the organization.

    • Stay Interview Guide

    4. IT Retention Solutions Catalog – Use this catalog to select and prioritize retention solutions across the employee lifecycle.

    Review best-practice solutions to identify those that are most suitable to your organizational culture and employee needs. Use the IT Retention Solutions Catalog to explore a variety of methods to improve retention, understand their use cases, and determine stakeholder responsibilities.

    • IT Retention Solutions Catalog
    [infographic]

    Workshop: Tactics to Retain IT Talent

    Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

    1 Identify Reasons for Regrettable Turnover

    The Purpose

    Identify the main drivers of turnover at the organization.

    Key Benefits Achieved

    Find out what to explore during focus groups.

    Activities

    1.1 Review data to determine why employees join, stay, and leave.

    1.2 Identify common themes.

    1.3 Prepare for focus groups.

    Outputs

    List of common themes/pain points recorded in the Retention Plan Workbook.

    2 Conduct Focus Groups

    The Purpose

    Conduct focus groups to explore retention drivers.

    Key Benefits Achieved

    Explore identified themes.

    Activities

    2.1 Conduct four 1-hour focus groups with the employee segment(s) identified in the pre-workshop activities.

    2.2 Info-Tech facilitators independently analyze results of focus groups and group results by theme.

    Outputs

    Focus group feedback.

    Focus group feedback analyzed and organized by themes.

    3 Identify Needs and Retention Initiatives

    The Purpose

    Home in on employee needs that are a priority.

    Key Benefits Achieved

    A list of initiatives to address the identified needs

    Activities

    3.1 Create an empathy map to identify needs.

    3.2 Shortlist retention initiatives.

    Outputs

    Employee needs and shortlist of initiatives to address them.

    4 Prepare to Communicate and Launch

    The Purpose

    Prepare to launch your retention initiatives.

    Key Benefits Achieved

    A clear action plan for implementing your retention initiatives.

    Activities

    4.1 Select retention initiatives.

    4.2 Determine goals and metrics.

    4.3 Plan stakeholder communication.

    4.4 Build a high-level action plan.

    Outputs

    Finalized list of retention initiatives.

    Goals and associated metrics recorded in the Retention Plan Workbook.

    Further reading

    Tactics to Retain IT Talent

    Keep talent from walking out the door by discovering and addressing moments that matter and turnover triggers.

    Executive Summary

    Your Challenge

    Many organizations are facing an increase in voluntary turnover as low unemployment, a lack of skilled labor, and a rise in the number of vacant roles have given employees more employment choices.

    Common Obstacles

    Regrettable turnover is impacting organizational productivity and leading to significant costs associated with employee departures and the recruitment required to replace them.

    Many organizations tackle retention from an engagement perspective: Increase engagement to improve retention. This approach doesn't consider the whole problem.

    Info-Tech's Approach

    Build the case for creating retention plans by leveraging employee data and feedback to identify the key reasons for turnover that need to be addressed.

    Target employee segments and work with management to develop solutions to retain top talent.

    Info-Tech Insight

    Engagement surveys mask the volatility of the employee experience and hide the reason why individual employees leave. You must also talk to employees to understand the moments that matter and engage managers to understand turnover triggers.

    This research addresses regrettable turnover

    This is an image of a flow chart with three levels. The top level has only one box, labeled Turnover.  the Second level has 2 boxes, labeled Voluntary, and Involuntary.  The third level has two boxes under Voluntary, labeled Non-regrettable: The loss of employees that the organization did not wish to keep, e.g. low performers, and Regrettable:  The loss of employees that the organization wishes it could have kept.

    Low unemployment and rising voluntary turnover makes it critical to focus on retention

    As the economy continues to recover from the pandemic, unemployment continues to trend downward even with a looming recession. This leaves more job openings vacant, making it easier for employees to job hop.

    This image contains a graph of the US Employment rate between 2020 - 2022 from the US Bureau of Economic Analysis and Bureau of Labor Statistics (BLS), 2022, the percentage of individuals who change jobs every one to five years from 2022 Job Seeker Nation Study, Jobvite, 2022, and voluntary turnover rates from BLS, 2022

    With more employees voluntarily choosing to leave jobs, it is more important than ever for organizations to identify key employees they want to retain and put plans in place to keep them.

    Retention is a challenge for many organizations

    The number of HR professionals citing retention/turnover as a top workforce management challenge is increasing, and it is now the second highest recruiting priority ("2020 Recruiter Nation Survey," Jobvite, 2020).

    65% of employees believe they can find a better position elsewhere (Legaljobs, 2021). This is a challenge for organizations in that they need to find ways to ensure employees want to stay at the organization or they will lose them, which results in high turnover costs.

    Executives and IT are making retention and turnover – two sides of the same coin – a priority because they cost organizations money.

    • 87% of HR professionals cited retention/turnover as a critical and high priority for the next few years (TINYpulse, 2020).
    • $630B The cost of voluntary turnover in the US (Work Institute, 2020).
    • 66% of organizations consider employee retention to be important or very important to an organization (PayScale, 2019).

    Improving retention leads to broad-reaching organizational benefits

    Cost savings: the price of turnover as a percentage of salary

    • 33% Improving retention can result in significant cost savings. A recent study found turnover costs, on average, to be around a third of an employee's annual salary (SHRM, 2019).
    • 37.9% of employees leave their organization within the first year. Employees who leave within the first 90 days of being hired offer very little or no return on the investment made to hire them (Work Institute, 2020).

    Improved performance

    Employees with longer tenure have an increased understanding of an organization's policies and processes, which leads to increased productivity (Indeed, 2021).

    Prevents a ripple effect

    Turnover often ripples across a team or department, with employees following each other out of the organization (Mereo). Retaining even one individual can often have an impact across the organization.

    Transfer of knowledge

    Retaining key individuals allows them to pass it on to other employees through communities of practice, mentoring, or other knowledge-sharing activities.

    Info-Tech Insight

    Improving retention goes beyond cost savings: Employees who agree with the statement "I expect to be at this organization a year from now" are 71% more likely to put in extra hours and 32% more likely to accomplish more than what is expected of their role (McLean & Company Engagement Survey, 2021; N=77,170 and 97,326 respectively).

    However, the traditional engagement-focused approach to retention is not enough

    Employee engagement is a strong driver of retention, with only 25% of disengaged employees expecting to be at their organization a year from now compared to 92% of engaged employees (McLean & Company Engagement Survey, 2018-2021; N=117,307).

    Average employee Net Promoter Score (eNPS)

    This image contains a graph of the Average employee Net Promoter Score (eNPS)

    Individual employee Net Promoter Scores (eNPS)

    This image contains a graph of the Individual employee Net Promoter Scores (eNPS)

    However, engagement surveys mask the volatility of the employee experience and hide the reason why individual employees leave.

    This analysis of McLean & Company's engagement survey results shows that while an organization's average employee net promoter score (eNPS) stays relatively static, at an individual level there is a huge amount of volatility.

    This demonstrates the need for an approach that is more capable of responding to or identifying employees' in-the-moment needs, which an annual engagement survey doesn't support.

    Turnover triggers and moments that matter also have an impact on retention

    Retention needs to be monitored throughout the employee lifecycle. To address the variety of issues that can appear, consider three main paths to turnover:

    1. Employee engagement – areas of low engagement.
    2. Turnover triggers that can quickly lead to departures.
    3. Moments that matter in the employee experience (EX).

    Employee engagement

    Engagement drivers are strong predictors of turnover.

    Employees who are highly engaged are 3.6x more likely to believe they will be with the organization 12 months from now than disengaged employees (McLean & Company Engagement Survey, 2018-2021; N=117,307).

    Turnover triggers

    Turnover triggers are events that act as shocks or catalysts that quickly lead to an employee's departure.

    Turnover triggers are a cause for voluntary turnover more often than accumulated issues (Lee et al.).

    Moments that matter

    Employee experience is the employee's perception of the accumulation of moments that matter within their employee lifecycle.

    Retention rates increase from 21% to 44% when employees have positive experiences in the following categories: belonging, purpose, achievement, happiness, and vigor at work. (Workhuman, 2020).

    While managers do not directly impact turnover, they do influence the three main paths to turnover

    Research shows managers do not appear as one of the common reasons for employee turnover.

    Top five most common reasons employees leave an organization (McLean & Company, Exit Survey, 2018-2021; N=107 to 141 companies,14,870 to 19,431 responses).

    Turnover factorsRank
    Opportunities for career advancement1
    Satisfaction with my role and responsibilities2
    Base pay3
    Opportunities for career-related skill development4
    The degree to which my skills were used in my job5

    However, managers can still have a huge impact on the turnover of their team through each of the three main paths to turnover:

    Employee engagement

    Employees who believe their managers care about them as a person are 3.3x more likely to be engaged than those who do not (McLean & Company, 2021; N=105,186).

    Turnover triggers

    Managers who are involved with and aware of their staff can serve as an early warning system for triggers that lead to turnover too quickly to detect with data.

    Moments that matter

    Managers have a direct connection with each individual and can tailor the employee experience to meet the needs of the individuals who report to them.

    Gallup has found that 52% of exiting employees say their manager could have done something to prevent them from leaving (Gallup, 2019). Do not discount the power of managers in anticipating and preventing regrettable turnover.

    Addressing engagement, turnover triggers, and moments that matter is the key to retention

    This is an image of a flow chart with four levels. The top level has only one box, labeled Turnover.  the Second level has 2 boxes, labeled Voluntary, and Involuntary.  The third level has two boxes under Voluntary, labeled Non-regrettable, and Regrettable.  The fourth level has three boxes under Regrettable, labeled Employee Engagement, Turnover triggers, and Moments that matter

    Info-Tech Insight

    HR traditionally seeks to examine engagement levels when faced with retention challenges, but engagement is only a part of the full picture. You must also talk to employees to understand the moments that matter and engage managers to understand turnover triggers.

    Follow Info-Tech's two-step process to create a retention plan

    1. Identify Reasons for Regrettable Turnover

    2. Select Solutions and Create an Action Plan

    Step 1

    Identify Reasons for Regrettable Turnover

    After completing this step you will have:

    • Analyzed and documented why employees join, stay, and leave your organization.
    • Identified common themes and employee needs.
    • Conducted employee focus groups and prioritized employee needs.

    Step 1 focuses on analyzing existing data and validating it through focus groups

    Employee engagement

    Employee engagement and moments that matter are easily tracked by data. Validating employee feedback data by speaking and empathizing with employees helps to uncover moments that matter. This step focuses on analyzing existing data and validating it through focus groups.

    Engagement drivers such as compensation or working environment are strong predictors of turnover.
    Moments that matter
    Employee experience (EX) is the employee's perception of the accumulation of moments that matter with the organization.
    Turnover triggers
    Turnover triggers are events that act as shocks or catalysts that quickly lead to an employee's departure.

    Turnover triggers

    This step will not touch on turnover triggers. Instead, they will be discussed in step 2 in the context of the role of the manager in improving retention.

    Turnover triggers are events that act as shocks or catalysts that quickly lead to an employee's departure.

    Info-Tech Insight

    IT managers often have insights into where and why retention is an issue through their day-to-day work. Gathering detailed quantitative and qualitative data provides credibility to these insights and is key to building a business case for action. Keep an open mind and allow the data to inform your gut feeling, not the other way around.

    Gather data to better understand why employees join, stay, and leave

    Start to gather and examine additional data to accurately identify the reason(s) for high turnover. Begin to uncover the story behind why these employees join, stay, and leave your organization through themes and trends that emerge.

    Look for these icons throughout step 2.

    Join

    Why do candidates join your organization?

    Stay

    Why do employees stay with your organization?

    Leave

    Why do employees leave your organization?

    For more information on analysis, visualization, and storytelling with data, see Info-Tech's Start Making Data-Driven People Decisions blueprint.

    Employee feedback data to look at includes:

    Gather insights through:

    • Focus groups
    • Verbatim comments
    • Exit interviews
    • Using the employee value proposition (EVP) as a filter (does it resonate with the lived experience of employees?)

    Prepare to draw themes and trends from employee data throughout step 1.

    Uncover employee needs and reasons for turnover by analyzing employee feedback data.

    • Look for trends (e.g. new hires join for career opportunities and leave for the same reason, or most departments have strong work-life balance scores in engagement data).
    • Review if there are recurring issues being raised that may impact turnover.
    • Group feedback to highlight themes (e.g. lack of understanding of EVP).
    • Identify which key employee needs merit further investigation or information.

    This is an image showing how you can draw out themes and trends using employee data throughout step 1.

    Classify where key employee needs fall within the employee lifecycle diagram in tab 2 of the Retention Plan Workbook. This will be used in step 2 to pinpoint and prioritize solutions.

    Info-Tech Insight

    The employee lifecycle is a valuable way to analyze and organize engagement pain points, moments that matter, and turnover triggers. It ensures that you consider the entirety of an employee's tenure and the different factors that lead to turnover.

    Examine new hire data and begin to document emerging themes

    Join

    While conducting a high-level analysis of new hire data, look for these three key themes impacting retention:

    Issues or pain points that occurred during the hiring process.

    Reasons why employees joined your organization.

    The experience of their first 90 days. This can include their satisfaction with the onboarding process and their overall experience with the organization.

    Themes will help to identify areas of strength and weakness organization-wide and within key segments. Document in tab 3 of the Retention Plan Workbook.

    1. Start by isolating the top reasons employees joined your organization. Ask:
      • Do the reasons align with the benefits you associate with working at your organization?
      • How might this impact your EVP?
      • If you use a new hire survey, look at the results for the following questions:
      • For which of the following reasons did you apply to this organization?
      • For what reasons did you accept the job offer with this organization?
    2. then, examine other potential problem areas that may not be covered by your new hire survey, such as onboarding or the candidate experience during the hiring process.
      • If you conduct a new hire survey, look at the results in the following sections:
        • Candidate Experience
        • Acclimatization
        • Training and Development
        • Defining Performance Expectations

      Analyze engagement data to identify areas of strength that drive retention

      Employees who are engaged are 3.6x more likely to believe they will be with the organization 12 months from now (McLean & Company Engagement Survey, 2018-2021; N=117,307). Given the strength of this relationship, it is essential to identify areas of strength to maintain and leverage.

      1. Look at the highest-performing drivers in your organization's employee engagement survey and drivers that fall into the "leverage" and "maintain" quadrants of the priority matrix.
        • These drivers provide insight into what prompts broader groups of employees to stay.

      This is an image of a quadrant analysis, with the following quadrants in order from left to right, top to bottom.  Improve; Leverage; Evaluate; Maintain.

      1. Look into what efforts have been made to maintain programs, policies, and practices related to these drivers and ensure they are consistent across the entire organization.
      2. Document trends and themes related to engagement strengths in tab 2 of the Retention Plan Workbook.

      If you use Info-Tech's Engagement Survey, look in detail at what are classified as "Retention Drivers": total compensation, working environment, and work-life balance.

      Identify areas of weakness that drive turnover in your engagement data

      1. Look at the lowest-performing drivers in your organization's employee engagement survey and drivers that fall into the "improve" and "evaluate" quadrants of the priority matrix.
        • These drivers provide insight into what pushes employees to leave the organization.
      2. Delve into organizational efforts that have been made to address issues with the programs, policies, and practices related to these drivers. Are there any projects underway to improve them? What are the barriers preventing improvements?
      3. Document trends and themes related to engagement weaknesses in tab 2 of the Retention Plan Workbook.

      If you use a product other than Info-Tech's Engagement Survey, your results will look different. The key is to look at areas of weakness that emerge from the data.

      This is an image of a quadrant analysis, with the following quadrants in order from left to right, top to bottom.  Improve; Leverage; Evaluate; Maintain.

      If you use Info-Tech's Engagement Survey, look in detail at what are classified as "Retention Drivers": total compensation, working environment, and work-life balance.

      Mine exit surveys to develop an integrated, holistic understanding of why employees leave

      Conduct a high-level analysis of the data from your employee exit diagnostic. While analyzing this data, consider the following:

      • What are the trends and quantitative data about why employees leave your organization that may illuminate employee needs or issues at specific points throughout the employee lifecycle?
      • What are insights around your key segments? Data on key segments is easily sliced from exit survey results and can be used as a starting point for digging deeper into retention issues for specific groups.
      • Exit surveys are an excellent starting point. However, it is valuable to validate the data gathered from an exit survey using exit interviews.
      1. Isolate results for key segments of employees to target with retention initiatives (e.g. by age group or by department).
      2. Identify data trends or patterns over time; for example, that compensation factors have been increasing in importance.
      3. Document trends and themes taken from the exit survey results in tab 2 of the Retention Plan Workbook.

      If your organization conducts exit interviews, analyze the results alongside or in lieu of exit survey data.

      Compare new hire data with exit data to identify patterns and insights

      Determine if new hire expectations weren't met, prompting employees to leave your organization, to help identify where in the employee lifecycle issues driving turnover may be occurring.

      1. Look at your new hire data for the top reasons employees joined your organization.
        • McLean & Company's New Hire Survey database shows that the top three reasons candidates accept job offers on average are:
          1. Career opportunities
          2. Nature of the job
          3. Development opportunities
      2. Next, look at your exit data and the top reasons employees left your organization.
        1. McLean & Company's Exit Survey database shows that the top three reasons employees leave on average are:
          1. Opportunities for career advancement
          2. Base pay
          3. Satisfaction with my role and responsibilities
      3. Examine the results and ask:
        • Is there a link between why employees join and leave the organization?
        • Did they cite the same reasons for joining and for leaving?
        • What do the results say about what your employees do and do not value about working at your organization?
      4. Document the resulting insights in tab 2 of the Retention Plan Workbook.

      Example:

      A result where employees are leaving for the same reason they're joining the organization could signal a disconnect between your organization's employee value proposition and the lived experience.

      Revisit your employee value proposition to uncover misalignment

      Your employee value proposition (EVP), formal or informal, communicates the value your organization can offer to prospective employees.

      If your EVP is mismatched with the lived experience of your employees, new hires will be in for a surprise when they start their new job and find out it isn't what they were expecting.

      Forty-six percent of respondents who left a job within 90 days of starting cited a mismatch of expectations about their role ("Job Seeker Nation Study 2020," Jobvite, 2020).

      1. Use the EVP as a filter through which you look at all your employee feedback data. It will help identify misalignment between the promised and the lived experience.
      2. If you have EVP documentation, start there. If not, go to your careers page and put yourself in the shoes of a candidate. Ask what the four elements of an EVP look like for candidates:
        • Compensation and benefits
        • Day-to-day job elements
        • Working conditions
        • Organizational elements
      3. Next, compare this to your own day-to-day experiences. Does it differ drastically? Are there any contradictions with the lived experience at your organization? Are there misleading statements or promises?
      4. Document any insights or patterns you uncover in tab 2 of the Retention Plan Workbook.

      Conduct focus groups to examine themes

      Through focus groups, explore the themes you have uncovered with employees to discover employee needs that are not being met. Addressing these employee needs will be a key aspect of your retention plan.

      Identify employee groups who will participate in focus groups:

      • Incorporate diverse perspectives (e.g. employees, managers, supervisors).
      • Include employees from departments and demographics with strong and weak engagement for a full picture of how engagement impacts your employees.
      • Invite boomerang employees to learn why an individual might return to your organization after leaving.

      image contains two screenshots Mclean & Company's Standard Focus Group Guide.

      Customize Info-Tech's Standard Focus Group Guide based on the themes you have identified in tab 3 of the Retention Plan Workbook.

      The goal of the focus group is to learn from employees and use this information to design or modify a process, system, or other solution that impacts retention.

      Focus questions on the employees' personal experience from their perspective.

      Key things to remember:

      • It is vital for facilitators to be objective.
      • Keep an open mind; no feelings are wrong.
      • Beware of your own biases.
      • Be open and share the reason for conducting the focus groups.

      Info-Tech Insight

      Maintaining an open dialogue with employees will help flesh out the context behind the data you've gathered and allow you to keep in mind that retention is about people first and foremost.

      Empathize with employees to identify moments that matter

      Look for discrepancies between what employees are saying and doing.

      1. Say

      "What words or quotes did the employee use?"

      3.Think

      "What might the employee be thinking?"

      Record feelings and thoughts discussed, body language observed, tone of voice, and words used.

      Look for areas of negative emotion to determine the moments that matter that drive retention.

      2. Do

      "What actions or behavior did the employee demonstrate?"

      4. Feel

      "What might the employee be feeling?"

      Record them in tab 3 of the Retention Plan Workbook.

      5. Identify Needs

      "Needs are verbs (activities or desires), not nouns (solutions)"

      Synthesize focus group findings using Info-Tech's Empathy Map Template.

      6. Identify Insights

      "Ask yourself, why?"

      (Based on Stanford d.school Empathy Map Method)

      Distill employee needs into priority issues to address first

      Take employee needs revealed by your data and focus groups and prioritize three to five needs.

      Select a limited number of employee needs to develop solutions to ensure that the scope of the project is feasible and that the resources dedicated to this project are not stretched too thin. The remaining needs should not be ignored – act on them later.

      Share the needs you identify with stakeholders so they can support prioritization and so you can confirm their buy-in and approval where necessary.

      Ask yourself the following questions to determine your priority employee needs:

      • Which needs will have the greatest impact on turnover?
      • Which needs have the potential to be an easy fix or quick win?
      • Which themes or trends came up repeatedly in different data sources?
      • Which needs evoked particularly strong or negative emotions in the focus groups?

      This image contains screenshots of two table templates found in tab 5 of the Retention Plan Workbook

      In the Retention Plan Workbook, distill employee needs on tab 2 into three to five priorities on tab 5.

      Step 2

      Select Solutions and Create an Action Plan

      After completing this step, you will have:

      • Selected and prioritized solutions to address employee needs.
      • Created a plan to launch stay interviews.
      • Built an action plan to implement solutions.

      Select IT-owned solutions and implement people leader–driven initiatives

      Solutions

      First, select and prioritize solutions to address employee needs identified in the previous step. These solutions will address reasons for turnover that influence employee engagement and moments that matter.

      • Brainstorm solutions using the Retention Solutions Catalog as a starting point. Select a longlist of solutions to address your priority needs.
      • Prioritize the longlist of solutions into a manageable number to act on.

      People leaders

      Next, create a plan to launch stay interviews to increase managers' accountability in improving retention. Managers will be critical to solving issues stemming from turnover triggers.

      • Clarify the importance of harnessing the influence of people leaders in improving retention.
      • Discover what might cause individual employees to leave through stay interviews.
      • Increase trust in managers through training.

      Action plan

      Finally, create an action plan and present to senior leadership for approval.

      Look for these icons in the top right of slides in this step.

      Select solutions to employee needs, starting with the Retention Solutions Catalog

      Based on the priority needs you have identified, use the Retention Solutions Catalog to review best-practice solutions for pain points associated with each stage of the lifecycle.

      Use this tool as a starting point, adding to it and iterating based on your own experience and organizational culture and goals.

      This image contains three screenshots from Info-Tech's Retention Solutions Catalog.

      Use Info-Tech's Retention Solutions Catalog to start the brainstorming process and produce a shortlist of potential solutions that will be prioritized on the next slide.

      Info-Tech Insight

      Unless you have the good fortune of having only a few pain points, no single initiative will completely solve your retention issues. Combine one or two of these broad solutions with people-leader initiatives to ensure employee needs are addressed on an individual and an aggregate level.

      Prioritize solutions to be implemented

      Target efforts accordingly

      Quick wins are high-impact, low-effort initiatives that will build traction and credibility within the organization.

      Long-term initiatives require more time and need to be planned for accordingly but will still deliver a large impact. Review the planning horizon to determine how early these need to begin.

      Re-evaluate low-impact and low-effort initiatives and identify ones that either support other higher impact initiatives or have the highest impact to gain traction and credibility. Look for low-hanging fruit.

      Deprioritize initiatives that will take a high degree of effort to deliver lower-value results.

      When assessing the impact of potential solutions, consider:

      • How many critical segments or employees will this solution affect?
      • Is the employee need it addresses critical, or did the solution encompass several themes in the data you analyzed?
      • Will the success of this solution help build a case for further action?
      • Will the solution address multiple employee needs?

      Info-Tech Insight

      It's better to master a few initiatives than under-deliver on many. Start with a few solutions that will have a measurable impact to build the case for further action in the future.

      Solutions

      Low ImpactMedium ImpactLarge Impact
      Large EffortThis is an image of the used to help you prioritize solutions to be implemented.
      Medium Effort
      Low Effort

      Use tab 3 of the Retention Plan Workbook to prioritize your shortlist of solutions.

      Harness the influence of people leaders to improve employee retention

      Leaders at all levels have a huge impact on employees.

      Effective people leaders:

      • Manage work distribution.
      • Create a motivating work environment.
      • Provide development opportunities.
      • Ensure work is stimulating and challenging, but not overwhelming.
      • Provide clear, actionable feedback.
      • Recognize team member contributions.
      • Develop positive relationships with their teams.
      • Create a line of sight between what the employee is doing and what the organization's objectives are.

      Support leaders in recommitting to their role as people managers through Learning & Development initiatives with particular emphasis on coaching and building trust.

      For coaching training, see Info-Tech's Build a Better Manager: Team Essentials – Feedback and Coaching training deck.

      For more information on supporting managers to become better people leaders, see Info-Tech's Build a Better Manager: Manage Your People blueprint.

      "HR can't fix turnover. But leaders on the front line can."
      – Richard P. Finnegan, CEO, C-Suite Analytics

      Equip managers to conduct regular stay interviews to address turnover triggers

      Managers often have the most visibility into their employees' personal and work lives and have a key opportunity to anticipate and address turnover triggers.

      Stay interviews are an effective way of uncovering potential retention issues and allowing managers to act as an early warning system for turnover triggers.

      Examples of common turnover triggers and potential manager responses:

      • Moving, creating a long commute to the office.
        • Through stay interviews, a manager can learn that a long commute is an issue and can help find workarounds such as flexible/remote work options.
      • Not receiving an expected promotion.
        • A trusted manager can anticipate issues stemming from this, discuss why the decision was made, and plan development opportunities for future openings.

      Stay interview best practices

      1. Conducted by an employee's direct manager.
      2. Happen regularly as a part of an ongoing process.
      3. Based on the stay interview, managers produce a turnover forecast for each direct report.
        1. The method used by stay interview expert Richard P. Finnegan is simple: red for high risk, yellow for medium, and green for low.
      4. Provide managers with training and a rough script or list of questions to follow.
        1. Use and customize Info-Tech's Stay Interview Guide to provide a guide for managers on how to conduct a stay interview.
      5. Managers use the results to create an individualized retention action plan made up of concrete actions the manager and employee will take.

      Sources: Richard P. Finnegan, CEO, C-Suite Analytics; SHRM

      Build an action plan to implement the retention plan

      For each initiative identified, map out timelines and actions that need to be taken.

      When building actions and timelines:

      • Refer to the priority needs you identified in tab 4 of the Retention Plan Workbook and ensure they are addressed first.
      • Engage internal stakeholders who will be key to the development of the initiatives to ensure they have sufficient time to complete their deliverables.
        • For example, if you conduct manager training, Learning & Development needs to be involved in the development and launch of the program.
      • Include a date to revisit your baseline retention and engagement data in your project milestones.
      • Designate process owners for new processes such as stay interviews.

      Plan for stay interviews by determining:

      • Whether stay interviews will be a requirement for all employees.
      • How much flexibility managers will have with the process.
      • How you will communicate the stay interview approach to managers.
      • If manager training is required.
      • How managers should record stay interview data and how you will collect this data from them as a way to monitor retention issues.
        • For example, managers can share their turnover forecasts and action plans for each employee.

      Be clear about manager accountabilities for initiatives they will own, such as stay interviews. Plan to communicate the goals and timelines managers will be asked to meet, such as when they must conduct interviews or their responsibility to follow up on action items that come from interviews.

      Track project success to iterate and improve your solutions

      Analyze measurements

      • Regularly remeasure your engagement and retention levels to identify themes and trends that provide insights into program improvements.
      • For example, look at the difference in manager relationship score to see if training has had an impact, or look at changes in critical segment turnover to calculate cost savings.

      Revisit employee and manager feedback

      • After three to six months, conduct additional surveys or focus groups to determine the success of your initiatives and opportunities for improvement. Tweak the program, including stay interviews, based on manager and employee feedback.

      Iterate frequently

      • Revisit your initiatives every two or three years to determine if a refresh is necessary to meet changing organizational and employee needs and to update your goals and targets.

      Key insights

      Insight 1Insight 2Insight 3

      Retention and turnover are two sides of the same coin. You can't fix retention without first understanding turnover.

      Engagement surveys mask the volatility of the employee experience and hide the reason why individual employees leave. You must also talk to employees to understand the moments that matter and engage managers to understand turnover triggers.

      Improving retention isn't just about lowering turnover, it's about discovering what healthy retention looks like for your organization.

      Insight 4Insight 5Insight 6

      HR professionals often have insights into where and why retention is an issue. Gathering detailed employee feedback data through surveys and focus groups provides credibility to these insights and is key to building a case for action. Keep an open mind and allow the data to inform your gut feeling, not the other way around.

      Successful retention plans must be owned by both IT leaders and HR.

      IT leaders often have the most visibility into their employees' personal and work lives and have a key opportunity to anticipate and address turnover triggers.

      Stay interviews help managers anticipate potential retention issues on their teams.

      Workshop Overview

      Contact your account representative for more information.
      workshops@infotech.com 1-888-670-8889

      Info-Tech AnalystsPre-workPost-work
      Client Data Gathering and PlanningImplementation Supported Through Analyst Calls

      1.1 Discuss participants, logistics, overview of workshop activities

      1.2 Provide support to client for below activities through calls.

      2.1 Schedule follow-up calls to work through implementation of retention solutions based on identified needs.
      Client

      1.Gather results of engagement survey, new hire survey, exit survey, and any exit and stay interview feedback.

      2.Gather and analyze turnover data.

      3.Identify key employee segment(s) and identify and organize participants for focus groups.

      4.Complete cost of turnover analysis.

      5.Review turnover data and prioritize list of employee segments.

      1.Obtain senior leader approval to proceed with retention plan.

      2.Finalize and implement retention solutions.

      3.Prepare managers to conduct stay interviews.

      4.Communicate next steps to stakeholders.

      Workshop Overview

      Contact your account representative for more information.
      workshops@infotech.com 1-888-670-8889

      ActivitiesDay 1Day 2Day 3Day 4
      Assess Current StateConduct Focus GroupsIdentify Needs and Retention InitiativesPrepare to Communicate and Launch

      1.1 Review data to determine why employees join, stay, and leave.

      1.2 Identify common themes.

      1.3 Prepare for focus groups.

      2.1 Conduct four 1-hour focus groups with the employee segment(s) identified in the pre-workshop activities..

      2.2 Info-Tech facilitators independently analyze results of focus groups and group results by theme.

      3.1 Create an empathy map to identify needs

      3.2 Shortlist retention initiatives

      4.1 Select retention initiatives

      4.2 Determine goals and metrics

      4.3 Plan stakeholder communication4.4 Build a high-level action plan

      Deliverables

      1.List of common themes/pain points recorded in the Retention Plan Workbook

      2.Plan for focus groups documented in the Focus Group Guide

      1.Focus group feedback

      2.Focus group feedback analyzed and organized by themes

      1.Employee needs and shortlist of initiatives to address them1.Finalized list of retention initiatives

      Info-Tech offers various levels of support to best suit your needs

      DIY Toolkit

      “Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful.”

      Guided Implementation

      “Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track.”

      Workshop

      “We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place.”

      Consulting

      “Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project.”

      Diagnostics and consistent frameworks used throughout all four options

      Research Contributors and Experts

      Jeff Bonnell
      VP HR
      Info-Tech Research Group

      Phillip Kotanidis
      CHRO
      Michael Garron Hospital

      Michael McGuire
      Director, Organizational Development
      William Osler Health System

      Dr. Iris Ware
      Chief Learning Officer
      City of Detroit

      Richard P. Finnegan
      CEO
      C-Suite Analytics

      Dr. Thomas Lee
      Professor of Management
      University of Washington

      Jane Moughon
      Specialist in increasing profits, reducing turnover, and maximizing human potential in manufacturing companies

      Lisa Kaste
      Former HR Director
      Citco

      Piyush Mathur
      Head of Workforce Analytics
      Johnson & Johnson

      Gregory P. Smith
      CEO
      Chart Your Course

      Works Cited

      "17 Surprising Statistics about Employee Retention." TINYpulse, 8 Sept. 2020. Web.
      "2020 Job Seeker Nation Study." Jobvite, April 2020. Web.
      "2020 Recruiter Nation Survey." Jobvite, 2020. Web.
      "2020 Retention Report: Insights on 2019 Turnover Trends, Reasons, Costs, & Recommendations." Work Institute, 2020. Web.
      "25 Essential Productivity Statistics for 2021." TeamStage, 2021. Accessed 22 Jun. 2021.
      Agovino, Theresa. "To Have and to Hold." SHRM, 23 Feb. 2019. Web.
      "Civilian Unemployment Rate." Bureau of Labor Statistics, June 2020. Web.
      Foreman, Paul. "The domino effect of chief sales officer turnover on salespeople." Mereo, 19 July 2018. Web.
      "Gross Domestic Product." U.S. Bureau of Economic Analysis, 27 May 2021. Accessed 22 Jun. 2020.
      Kinne, Aaron. "Back to Basics: What is Employee Experience?" Workhuman, 27August 2020. Accessed 21 Jun. 2021.
      Lee, Thomas W, et al. "Managing employee retention and turnover with 21st century ideas." Organizational Dynamics, vol 47, no. 2, 2017, pp. 88-98. Web.
      Lee, Thomas W. and Terence R. Mitchell. "Control Turnover by Understanding its Causes." The Blackwell Handbook of Principles of Organizational Behaviour. 2017. Print.
      McFeely, Shane, and Ben Wigert. "This Fixable Problem Costs U.S. Businesses $1 Trillion." Gallup. 13 March 2019. Web.
      "Table 18. Annual Quit rates by Industry and Region Not Seasonally Adjusted." Bureau of Labor Statistics. June 2021. Web.
      "The 2019 Compensation Best Practices Report: Will They Stay or Will They Go? Employee Retention and Acquisition in an Uncertain Economy." PayScale. 2019. Web.
      Vuleta, Branka. "30 Troubling Employee Retention Statistics." Legaljobs. 1 Feb. 2021. Web.
      "What is a Tenured Employee? Top Benefits of Tenure and How to Stay Engaged as One." Indeed. 22 Feb. 2021. Accessed 22 Jun. 2021.

      Build a More Effective Go-to-Market Strategy

      • Buy Link or Shortcode: {j2store}559|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Marketing Solutions
      • Parent Category Link: /marketing-solutions
      • A weak or poorly defined Go-to-Market strategy is often the root cause of slow product revenue growth or missed product revenue targets.
      • Many agile-driven product teams rush to release, skipping key GTM steps leaving Sales and Marketing misaligned and not ready to fully monetize precious product investments.
      • Guessing at buyer persona and journey or competitive SWOT analyses – two key deliverables of an effective GTM strategy – cause poor marketing and sales outcomes.
      • Without the sales and product-aligned business case for launch called for in a successful GTM strategy, companies see low buyer adoption, wasted sales and marketing investments, and a failure to claim product and launch campaign success.

      Our Advice

      Critical Insight

      • Having an updated and compelling Go-to-Market strategy is a critical capability – as important as financial strategy, sales operations, and even corporate business development, given its huge impact on the many drivers of sustainable growth.
      • Establishing alignment through the GTM process builds long-term operational strength.
      • With a sound GTM strategy, marketers give themselves a 50% greater chance of product launch success.

      Impact and Result

      • Align stakeholders on a common vision and execution plan prior to the Build and Launch phases.
      • Build a foundation of buyer and competitive understanding to drive a successful product hypothesis, then validate with buyers.
      • Deliver a team-aligned launch plan that enables launch readiness and outlines commercial success.

      Build a More Effective Go-to-Market Strategy Research & Tools

      Build Your Go-to-Market Strategy

      Use this storyboard and its deliverables to build a baseline market, understand your buyer, and gain competitive insights. It will also help you design your initial product and business case, and align stakeholder plans to prep for build.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      • Build a More Effective Go-to-Market Strategy – Executive Brief

        Almost there!

        Please enter your email and a few details and you're on your way to an efficient process.

        Download ×
      • Build a More Effective Go-to-Market Strategy – Phases 1-3
      • Go-to-Market Strategy Presentation Template
      • Go-to-Market Strategy RACI and Launch Checklist Workbook
      • Product Market Opportunity Sizing Workbook
      • Go-to-Market Strategy Cost Budget and Revenue Forecast Workbook

      Infographic

      Workshop: Build a More Effective Go-to-Market Strategy

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Align on GTM Vision & Plan, Craft Initial Strategy

      The Purpose

      Align on GTM vision and plan; craft initial strategy.

      Key Benefits Achieved

      Confidence that market opportunity is sufficient.

      Deeper buyer understanding to drive product design and messaging and launch campaign asset design.

      Steering committee approval for next phase.

      Activities

      1.1 Outline a vision for GTM, roles required, identify Steering Committee lead, workstream leads, and teams.

      1.2 Capture GTM strategy hypothesis by working through initial draft of the Go-to-Market Strategy Presentation and business case.

      1.3 Capture team knowledge on buyer persona and journey and competitive SWOT.

      1.4 Identify info./data gaps, sources, and plan for capturing/gathering including buyer interviews.

      Outputs

      Documented Steering Committee and Working team.

      Aligned on GTM vision and process.

      Documented buyer persona and journey. Competitive SWOT analysis.

      Document team knowledge on initial GTM strategy, buyer personas, and business case.

      2 Identify Initial Business Case, Sales Forecast, and Launch Plan

      The Purpose

      Identify Initial Business Case, Sales Forecast, and Launch Plan.

      Key Benefits Achieved

      Confidence in size of market opportunity.

      Alignment of Sales and Product on product forecast.

      Assessment of marketing tech stack.

      Initial business case.

      Activities

      2.1 Size Product Market Opportunity and initial revenue forecast.

      2.2 Craft initial product hypothesis from buyer interviews including feature priorities, pricing, packaging, competitive differentiation, channel/route to market.

      2.3 Craft initial launch campaign, product release and sales and CX readiness plans.

      2.4 Identify launch budgets across each investment area.

      2.5 Discuss initial product launch business case and key activities.

      Outputs

      Product Serviceable Obtainable Market (SOM), Serviceable Available Market (SAM) and Total Available Market (TAM).

      Definition of product-market fit, uniqueness, and competitive differentiation.

      Preliminary campaign, targets, and readiness plans.

      Incremental budgets for each key stakeholder area.

      Preliminary product launch business case.

      3 Develop Launch Plans (I of II)

      The Purpose

      Develop final Launch plans and budgets in product and marketing.

      Key Benefits Achieved

      Align Product release/launch plans with the marketing campaign for launch.

      Understand incremental budgets from product and marketing for launch.

      Activities

      3.1 Apply product interviews to scope, MVP, roadmap, competitive differentiation, pricing, feature prioritization, routes to market, and sales forecast.

      3.2 Develop a more detailed launch campaign plan complete with asset-types, messaging, digital plan to support buyer journey, media buy plan and campaign metrics.

      Outputs

      Minimally Viable Product defined with feature prioritization. Product competitive differentiation documented Routes to market identified Sales forecast aligned with product team expectations.

      Marketing campaign launch plan Content marketing asset-creation/acquisition plan Campaign targets and metrics.

      4 Develop Launch Plans (II of II)

      The Purpose

      Develop final Launch Plans and budgets for remaining areas.

      Key Benefits Achieved

      Align Product release/launch plans with the marketing campaign for launch.

      Understand incremental budgets from Product and Marketing for launch.

      Activities

      4.1 Develop detailed launch/readiness plans with final budgets for: Sales enablement , Sales training, Tech stack, Customer onboarding & success, Product marketing, AR, PR, Corp Comms/Internal Comms, Customer Events, Employee Events, etc.

      Outputs

      Detailed launch plans, budgets for Product Marketing, Sales, Customer Success, and AR/PR/Corp. Comms.

      5 Present Final Business Case

      The Purpose

      To gain approval to move to Build and Launch phases.

      Key Benefits Achieved

      Align business case with Steering Committee expectations

      Approvals to Build and Launch targeted offering

      Activities

      5.1 Review final launch/readiness plans with final budgets for all key areas.

      5.2 Move all key findings into Steering Committee presentation slides.

      5.3 Present to Steering Committee; receive feedback.

      5.4 Incorporate Steering Committee feedback; update finial business case.

      Outputs

      Combined budgets across all areas. Final launch/readiness plans.

      Final Steering Committee-facing slides.

      Final approvals for Build and Launch.

      Further reading

      Build a More Effective Go-to-Market Strategy

      Maximize GTM success through deeper market and buyer understanding and competitive differentiation and launch team readiness that delivers target revenues.

      Table of Contents

      Section Title
      1 Executive Brief
      • Executive Summary
      • Analyst Perspective
      • Go-to-Market (GTM) strategy critical success factors
      • Key GTM challenges
      • Essential deliverables for GTM success
      • Benefits of a more effective GTM Strategy
      • Our methodology to support your success
      • Insight Summary
      • Blueprint deliverables and guided implementation steps
      2 Build baseline market, buyer, and competitive insights
      • Establish your team
      • Build buyer personas and journeys – develop initial messaging
      • Build initial product hypothesis
      • Size product market opportunity
      • Outline your key tech, app, and digital requirements
      • Develop your competitive differentiation
      • Select routes to market
      3 Design initial product and business case
      • Branding check
      • Formulate packaging and pricing
      • Craft buyer-valid product concept
      • Build campaign plan and targets
      • Develop budgets for creative, content, and media purchases
      • Draft product business case
      • Update GTM Strategy deck
      4 Align stakeholder plans to prep for build
      • Assess tech/tools support for all GTM phases
      • Outline sales enablement and customer success plan
      • Build awareness plan
      • Finalize business case
      • Final GTM plan deck

      Executive Brief

      Analyst Perspective

      Go-to-Market Strategy.

      A successful go-to-market (GTM) strategy aligns marketing, product, sales and customer success, sees decision making based on deep buyer understanding, and tests many basic assumptions often overlooked in today’s agile-driven product development/management environment.

      The disciplines you build using our methodology will not only support your team’s effort building and launching more successful products, but also can be modified for use in other strategic initiatives such as branding, M&A integration, expanding into new markets, and other initiatives that require a cross-functional and multidisciplined process.

      Photo of Jeff Golterman, Managing Director, SoftwareReviews Advisory.

      Jeff Golterman
      Managing Director
      SoftwareReviews Advisory

      Executive Summary

      An ineffective go-to-market strategy is often a root cause of:
      • Failure to attain new product revenue targets.
      • A loss of customer focus and poor new product/feature release buyer adoption.
      • Product releases misaligned with marketing, sales, and customer success readiness.
      • Low win rates compared to key competitors’.
      • Low contact-to-lead conversion rates.
      • Loss of executive/investor support for further new product development and marketing investments.
      Hurdles to go-to-market success include:
      • An unclear product-market opportunity.
      • A lack of well defined and prioritized buyer personas and needs that are well understood.
      • Poor competitive analysis that fails to pinpoint key areas of competitive differentiation.
      • Guessing at buyer journey and buyer-described ideal engagement within your lead gen engine.
      • A business case that calls for levels of customer value delivery (vs. feature MVPs) that can actually deliver wins and targeted revenue goals.
      Apply SoftwareReviews approach for greater GTM success.

      Our blueprint is designed to help you:

      • Align stakeholders on a common vision and execution plan prior to the build and launch phases.
      • Build a foundation of buyer and competitive understanding to drive a successful product hypothesis, then validate with buyers.
      • Deliver a team-aligned launch plan that enables launch readiness and outlines commercial success.

      SoftwareReviews Insight

      Creating a compelling go-to-market strategy, and keeping it current, is a critical software company function – as important as financial strategy, sales operations, and even corporate business development – given its huge impact on the many drivers of sustainable growth.

      Go-to-Market Strategy Critical Success Factors

      Your GTM Strategy is where a multi-disciplined team builds a strong foundation for overall product plan, build, launch, and manage success

      A GTM Strategy is not all art and not all science but requires both. Software leaders will establish a set of core capabilities upon which they will plan, build, launch and manage product success. Executives, when resourcing their GTM strategies, will begin with:
      • Strong Program Leadership – An experienced Program Manager will guide the team through each step of GTM Strategy and test team readiness before advancing to the next step.
      • Few Shortcuts – Successful teams will have navigated the process through all steps together at least once. Then future launches can skip steps where prior decisions still hold.
      • Stakeholder Buy-In – Strong collaboration among Sales, Marketing, and Product wins the day.
      • Strong Team Skills – Success depends on having the right talent, making the right decisions, and delivering the right outcomes enabled with the right set of technologies and integrated to reach the right buyers at the right moment.
      • Discipline and perseverance – Given that GTM Strategy is not easy, it’s not surprising that 75% of marketers cite a significant level of dissatisfaction with the outcomes of their GTM plan, build, and launch phases.
      Diagram titled 'Go-to-Market Phases' with phases 'Manage', 'Launch', 'Build', and highlighted as 'This blueprint focus': 'Plan'.

      SoftwareReviews Advisory Insight:
      Marketers who get GTM Strategy “right” give themselves a 50% greater chance of Build and Launch success.

      Sample of the 'PLAN' section of the GTM Strategy optimization diagram shown later.

      Go-to-Market Success is Challenging

      Getting GTM right is like winning an Olympic first-place crew finish. It takes teamwork, practice, and well-functioning tools and equipment.

      Stock image of a rowing team.

      • The goal of any Go-to-Marketing Strategy is not only to do it right once, but to do it over and over consistently.
      • A lack of GTM consistency often results in decelerating growth, and a weak GTM Strategy is likely the root cause when companies observe any of the following challenges:
        • Product opportunity is unclear and well-defined business cases are lacking
        • Buyer adoption slows of new features and launch revenue targets are missed
        • Sales and marketing are not ready when development releases new features
        • Sales win/loss ratios drop as customers tell us products are not competitively differentiated
        • Loss of executive support for new product investments
      • A company experiencing any one of these symptoms will find a remedy in plugging gaps in the way they Go-to-Market.

      “Figuring out a Go-to-Market approach is no trivial exercise – it separates the companies that will be successful and sustainable from those that won’t.” (Harvard Business Review)

      Slowing growth may be due to missing GTM Strategy essentials

      Marketers – Large and Small – will further test their GTM Strategy strength by asking “Are we missing any of the following?”

      • Product, Marketing, and Sales Alignment
      • Buyer personas and journeys
      • Product market opportunity size
      • Competitively differentiated product hypothesis
      • Buyer validated commercial concept
      • Sales revenue plan and program cost budget
      • Compelling business case for build and launch

      SoftwareReviews Advisory Insight:

      Marketers will go through the GTM Strategy process together across all disciplines at least once in order to establish a consistent process, make key foundational decisions (e.g. tech stack, channel strategy, pricing structure, etc.), and assess strengths and weaknesses to be addressed. Future releases to existing products don’t need to be re-thought but instead check-listed against prior foundational decisions.

      Is Your GTM Strategy Led and Staffed Properly?

      Staffing tree outlining GTM Strategy essentials. At the top are 'Steering Committee: CEO/GM in larger company, CFO/Senior Finance, Key functional leaders'. Next is 'Program Manager: Leads the GTM program. Workstream leads are “dotted line” for the program.' Followed by 'Workstream Leads: (PM) Product Marketing – Program leadership, (PD) Product Mgt. – Aligned with PM, (MO) Marketing Ops – SMB optional, (BR) Branding/Creative – SMB optional, (CI) Competitive Intel. – SMB optional, (DG) Demand Gen./Field Marketing. – crucial, (SE) Sales Enablement – crucial, (PR) PR/AR/Comms – SMB optional, and (CS) Customer Success – SMB optional'. In a 'Large Enterprise' each role is assigned to a separate person, but in a 'Small' Enterprise each person has multiple roles. 'SMB – as employees wear many hats, teams comprise members with requisite skills vs. specific roles/titles.'

      Benefits of a more effective go-to-market strategy

      Our research shows a more effective GTM Strategy delivers key benefits, including:
      • Increased product development ROI – with a finance-aligned business case, a buyer-validated value proposition, and the readiness of marketing and sales to product launch.
      • Launch campaign effectiveness – increases dramatically when messaging resonates with buyers and where they are in their journey.
      • Seller effectiveness – increases with buyer validated value proposition, competitive differentiation, and the ability to articulate to buyers.
      • Executive support – is achieved when an aligned sales, marketing, and product team proves consistent in delivering against release targets over and over again.

      SoftwareReviews Advisory Insight:
      Many marketers experiencing the value of the GTM Steering Committee, extend its use into a “Product and Pricing Council” (PPC) in order to move product-related decision making from ad-hoc to structured, and to reinforce GTM Strategy guardrails and best practices across the company.

      “Go-to-Market Strategies aren’t just for new products or services, they can also be used for:
      • Acquiring other businesses
      • Changing your business’s focus
      • Announcing a new feature
      • Entering a new market
      • Rebranding
      • Positioning or repositioning

      And while each GTM strategy is unique, there are a series of steps that every product marketer should follow.” (Product Marketing Alliance)

      Is your GTM Strategy optimized?

      Large detailed layout of the steps needed to 'Make Your Go-to-Market Strategy More Successful'. 'GTM Planning Success Can Be Elusive'; '75% of high-tech marketers desire a more effective GTM strategy...'. Steps: '1 Your Challenges - Are You Feeling Any of These Pains?', '2 Framework - Stay Aligned', '3 Planning - Check Your GTM Plan Steps', '4 Insight - Deliver Key Output', and '5 Results - Reap Key Benefits'. Source: SoftwareReviews, powered by Info-Tech Research Group.

      Marketers, in order to optimize a go-to-market strategy, will:

      1. Self assess for symptoms of a sub-optimized approach.
      2. Align marketing, sales, product, and customer success with a common vision and execution plan.
      3. Diagnose for missing steps.
      4. Ensure creation of key deliverables.
      5. And then be able to reap the rewards.

      Who benefits from an optimized go-to-market strategy?

      This research is designed for:
      • High-tech marketers who are:
        • Looking to improve any aspect of their go-to-market strategy.
        • Looking for a checklist of roles and responsibilities across the product planning, build, and launch processes.
        • Looking to foster better alignment among key stakeholders such as product marketing, product management, sales, field marketing/campaigners, and customer success.
        • Looking to build a stronger business case for new product development and launch.
      This research will help you:
      • Explain the benefits of a more effective go-to-market strategy to stakeholders.
      • Size the market opportunity for a product/solution.
      • Organize stakeholders for GTM operational success.
      • More easily present the GTM strategy to executives and colleagues.
      • Build and present a solid business case for product build and launch.
      This research will also assist:
      • High-tech marketing and product leaders who are:
        • Looking for a framework of best practices to improve and scale their GTM planning.
        • Looking to align team members from all the key teams that support high-tech product planning, build, launch, and manage.
      This research will help them:
      • Align stakeholders on an overall GTM strategy.
      • Coordinate tasks and activities involved across plan, build, launch, and manage – the product lifecycle.
      • Avoid low market opportunity pursuits.
      • Avoid poorly defined product launch business cases.
      • Build competence in managing cross-functional complex programs.

      SoftwareReviews’ Approach

      1

      Build baseline market, buyer, and competitive insights

      Sizing your opportunity, building deep buyer understanding, competitive differentiation, and routes to market are fundamental first steps.

      2

      Design initial product and business case

      Validate positioning and messaging against brand, develop packaging and pricing, and develop digital approach, launch campaign approach and supporting budgets across all areas.

      3

      Align stakeholder plans to prep for build

      Rationalize product release and concept to sales/financial plan and further develop customer success, PR/AR, MarTech, and analytics/metrics plans.

      Our methodology provides a step-by-step approach to build a more effective go-to-market strategy

      1.Build baseline market, buyer, and competitive insights 2. Design initial product and business case 3. Align stakeholder plans to prep for build
      Phase Steps
      1. Select Steering Committee, GTM team, and outline roles and responsibilities. Build an aligned vision.
      2. Build initial product hypothesis based on sales and buyer “jobs to be done” research.
      3. Size the product market opportunity.
      4. Outline digital and tech requirements to support the full GTM process.
      5. Clarify target buyer personas and the buyer journey.
      6. Identify competitive gaps, parity, and differentiators.
      7. Select the most effective routes to market.
      8. Craft initial GTM Strategy presentation for executive review and status check.
      1. Compare emerging messaging and positioning with existing brand for consistency.
      2. Formulate packaging and pricing.
      3. Build a buyer-validated product concept.
      4. Build an initial campaign plan and targets.
      5. Develop initial budgets across all areas.
      6. Draft an initial product business case.
      7. Update GTM Strategy for executive review and status check.
      1. Assess technology and tools support for GTM strategy as well as future phases of GTM build, launch, and manage.
      2. Outline support for customer onboarding and ongoing engagement.
      3. Build an awareness plan covering media, social media, and industry analysts.
      4. Finalize product business case with collaborative input from product, sales, and marketing.
      5. Develop a final executive presentation for request for approval to proceed to GTM build phase.
      Phase Outcomes
      1. Properly sized market opportunity and a unique buyer value proposition
      2. Buyer persona and journey mapping with buyer needs and competitive SWOT
      3. Tech stack modernization requirements
      4. First draft of business case
      1. Customer-validated value proposition and product-market fit
      2. Initial product business case with sales alignment
      3. Initial launch plans including budgets across all areas
      1. Key stakeholders and their plans are fully aligned
      2. Executive sign-off to move to GTM build phases

      Insight summary

      Your go-to-market strategy ability is a strategic asset

      Having an updated and compelling go-to-market strategy is a critical capability – as important as financial strategy, sales operations, and even corporate business development – given its huge impact on the many drivers of sustainable growth.

      Build the GTM Steering Committee into a strategic decision-making body

      Many marketers experiencing the value of the GTM Steering Committee extend its use into a “Product and Pricing Council” (PPC) in order to move product-related decision making from ad-hoc to structured, and to reinforce GTM Strategy guardrails and best practices across the company.

      A strong MarTech apps and analytics stack differentiates GTM leaders from laggards

      Marketers that collaborate closely with Marketing Ops., Sales Ops., and IT early in the process of a go-to-market strategy will be best able to assess whether current website/digital, marketing applications, CRM/sales automation apps, and tools can support the complete Go-to-Market process effectively.

      Establishing alignment through the GTM process builds long term operational strength

      Marketers will go through the GTM Strategy process together across all disciplines at least once in order to establish a consistent process, make key foundational decisions (e.g. tech stack, channel strategy, pricing structure, etc.), and assess strengths and weaknesses to be addressed.

      Build speed and agility

      Future releases to existing products don’t need be re-thought but instead check-listed against prior foundational decisions.

      GTM Strategy builds launch success

      Marketers who get GTM Strategy “right” give themselves a 50% greater chance of build and launch success.

      Blueprint deliverables

      Each step of this blueprint is accompanied by supporting deliverables to help you accomplish your goals:

      Key deliverable:

      Go-to-Market Strategy Presentation Template

      Capture key findings for your GTM Strategy within the Go-to-Market Strategy Presentation Template.

      Sample of the key deliverable, the Go-to-Market Strategy Presentation Template.

      Go-to-Market Strategy RACI and Launch Checklist Workbook

      Includes a RACI model and launch checklist that helps scope your working team’s roles and responsibilities.

      Sample of the Go-to-Market Strategy RACI and Launch Checklist Workbook deliverable.

      Go-to-Market Strategy Cost Budget and Revenue Forecast Workbook

      Capture launch incremental costs that, when weighed against the forecasted revenue, illustrate gross margins as a crucial part of the business case.

      Sample of the Go-to-Market Strategy Cost Budget and Revenue Forecast Workbook deliverable.

      Product Market Opportunity Sizing

      While not a deliverable of this blueprint per se, the Product Market Opportunity blueprint is required.

      Sample of the Product Market Opportunity Sizing deliverable. This blueprint calls for downloading the following additional blueprint:

      Buyer Persona and Journey blueprint

      While not a deliverable of this blueprint per se, the Buyer Persona and Journey blueprint is required

      Sample of the Buyer Persona and Journey blueprint deliverable.

      Info-Tech offers various levels of support to best suit your needs

      DIY Toolkit

      Guided Implementation

      Workshop

      Consulting

      "Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful." "Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track." "We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place." "Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project."
      Included within advisory membership Optional add-ons

      Guided Implementation

      A Guided Implementation (GI) is a series of calls with a SoftwareReviews Advisory analyst to help implement our best practices in your organization.

      For guidance on marketing applications, we can arrange a discussion with an Info-Tech analyst.

      Your engagement managers will work with you to schedule analyst calls.

      What does our GI on Build a More Effective Go-to-Market Strategy look like?

      Build baseline market, buyer, and competitive insights

      Design initial product and business case

      Align stakeholder plans to prep for build

      Call #1: Share GTM vision and outline team activities for the GTM Strategy process. Plan next call – 1 week.

      Call #2: Outline product market opportunity approach and steps to complete. Plan next call – 1 week.

      Call #3: Hold a series of inquiries to do a modernization check on tech stack. Plan next call – 2 weeks.

      Call #4: Discuss buyer interview process, persona, and journey steps. Plan next call – 2 weeks.

      Call #5: Outline competitive differentiation analysis, routes to market, and review of to-date business case. Plan next call – 1 week.

      Call #6: Discuss brand strength/weakness, pricing, and packaging approach. Plan next call – 3 weeks.

      Call #7: Outline needs to craft assets with right messaging across campaign launch plan and budget. Outline needs to create plans and budgets across rest of marketing, sales, CX, and product. Plan next call – 1 week.

      Call #8: Review template and approach for initial business case and sales and product alignment. Plan next call – 1 week.

      Call #9: Review initial business case and launch plans across marketing, sales, CX, and product. Plan next call – 1 week.

      Call #10: Discuss plans/needs/budgets for tech stack modernization. Plan next call – 3 days.

      Call #11: Discuss plans/needs/budgets for CX readiness for launch. Plan next call – 3 days.

      Call #12: Discuss plans/needs/budgets for digital readiness for launch. Plan next call – 3 days.

      Call #13: Discuss plans/needs/budgets for marketing and sales readiness for launch. Plan next call – 3 days.

      Call #14: Review final business case and coach on Steering Committee Presentation. Plan next call – 1 week.

      A Go-to-Market Workshop Overview

      Contact your engagement manager for more information.
      Day 1 Day 2 Day 3 Day 4 Day 5
      Align on GTM Vision & Plan, Craft Initial Strategy
      Identify Initial Business Case, Sales Forecast and Launch Plan
      Develop Launch Plans (i of ii)
      Develop Launch Plans (ii of ii)
      Present Final Business Case to Steering Committee
      Activities

      1.1 Outline a vision for GTM and roles required, identify Steering Committee lead, workstream leads, and teams.

      1.2 Capture GTM strategy hypothesis by working through initial draft of GTM Strategy Presentation and business case.

      1.3 Capture team knowledge on buyer persona and journey and competitive SWOT.

      1.4 Identify information/data gaps and sources and plan for capturing/gathering including buyer interviews.

      Plan next day 2-3 weeks after buyer persona/journey interviews.

      2.1 Size product market opportunity and initial revenue forecast.

      2.2 Craft initial product hypothesis from buyer interviews including feature priorities, pricing, packaging, competitive differentiation, and channel/route to market.

      2.3 Craft initial launch campaign, product release, sales, and CX readiness plans.

      2.4 Identify launch budgets across each investment area.

      2.5 Discuss initial product launch business case and key activities.

      Plan next day 2-3 weeks after product hypothesis-validation interviews with customers and prospects.

      3.1 Apply product interviews to scope, MVP, and roadmap competitive differentiation, pricing, feature prioritization, routes to market and sales forecast.

      3.2 Develop more detailed launch campaign plan complete with asset-types, messaging, digital plan to support buyer journey, media buy plan and campaign metrics.

      4.1 Develop detailed launch/readiness plans with final budgets for:

      • Sales enablement
      • Sales training
      • Tech stack
      • Customer onboarding & success
      • Product marketing
      • AR
      • PR
      • Corp comms/Internal comms
      • Customer events
      • Employee events
      • etc.

      5.1 Review final launch/readiness plans with final budgets for all key areas.

      5.2 Move all key findings up into Steering Committee presentation slides.

      5.3 Present to Steering Committee, receive feedback.

      5.4 incorporate Steering Committee feedback; update finial business case.

      Deliverables
      1. Documented Steering Committee and working team, aligned on GTM vision and process.
      2. Document team knowledge on initial GTM strategy, buyer persona and business case.
      1. Definition of product market fit, uniqueness and competitive differentiation.
      2. Preliminary product launch business case, campaign, targets, and readiness plans.
      1. Detailed launch plans, budgets for product and marketing launch.
      1. Detailed launch plans, budgets for product marketing, sales, customer success, and AR/PR/Corp. comms.
      1. Final GTM Strategy, launch plan and business case.
      2. Approvals to move to GTM build and launch phases.

      Build a More Effective Go-to-Market Strategy

      Phase 1

      Build baseline market, buyer, and competitive insights

      Phase 1

      1.1 Select Steering Cmte/team, build aligned vision for GTM

      1.2 Buyer personas, journey, initial messaging

      1.3 Build initial product hypothesis

      1.4 Size market opportunity

      1.5 Outline digital/tech requirements

      1.6 Competitive SWOT

      1.7 Select routes to market

      1.8 Craft GTM Strategy deck

      Phase 2

      2.1 Brand consistency check

      2.2 Formulate packaging and pricing

      2.3 Craft buyer-valid product concept

      2.4 Build campaign plan and targets

      2.5 Develop cost budgets across all areas

      2.6 Draft product business case

      2.7 Update GTM Strategy deck

      Phase 3

      3.1 Assess tech/tools support for all GTM phases

      3.2 Outline sales enablement and Customer Success plan

      3.3 Build awareness plan

      3.4 Finalize business case

      3.5 Final GTM Plan deck

      This phase will walk you through the following activities:

      • Steering Committee and Team formulation
      • A vision for go-to-market strategy
      • Initial product hypothesis
      • Market Opportunity sizing
      • Tech stack/digital requirements
      • Buyer persona and journey
      • Competitive gaps, parity, differentiators
      • Routes to market
      • GTM Strategy deck

      This phase involves the following stakeholders:

      • Steering Committee
      • Working group leaders

      To complete this phase, you will need:

      Go-to-Market Strategy Presentation Template Go-to-Market Strategy RACI and Launch Checklist Workbook Buyer Persona and Journey blueprint Product Market Opportunity Sizing Workbook
      Sample of the Go-to-Market Strategy Presentation Template deliverable. Sample of the Go-to-Market Strategy RACI and Launch Checklist Workbook deliverable. Sample of the Buyer Persona and Journey blueprint deliverable. Sample of the Product Market Opportunity Sizing Workbook deliverable.
      Use the Go-to-Market Strategy Presentation Template to document the results from the following activities:
      • Documenting your GTM Strategy stakeholders
      • Documenting your GTM Strategy working team
      Use the Go-to-Market Strategy RACI and Launch Checklist Workbook to:
      • Review the scope of roles and responsibilities required
      • Document the roles and responsibilities of your teams
      Use the Buyer Persona and Journey blueprint to:
      • Interview sales and customers/prospects to inform product concepts, understand persona and later, flush out buyer journey
      Use the Product Market Opportunity Sizing blueprint to:
      • Project Serviceable Obtainable Market (SOM), Serviceable Available Market (SAM), and Total Available Market (TAM) from your current penetrated market

      Step 1.1

      Identify a GTM Program Steering Committee and Team. Build an Aligned Vision for Your Go-to-Market Strategy Approach

      Activities
      • 1.1.1 Identify the Steering Committee of key stakeholders whose support will be critical to success
      • 1.1.2 Select your go-to-market strategy program team
      • 1.1.3 Discuss an overview of the GTM process and program roles and responsibilities with stakeholders and GTM workstream leads
      • 1.1.4 Develop a Go-to-Market launch, tiering, time-line, and overall program plan
      • 1.1.5 Work with each workstream lead on their overall project plan and incremental budget requirements

      This step will walk you through the following activities:

      • Identify stakeholders – your Steering Committee
      • Identify team members
      • Present a vision of GTM Strategy

      This step involves the following participants:

      • Steering Committee
      • Program workstream leads

      Outcomes of this step

      • Steering Committee identified
      • Team members identified
      • All aligned on the GTM process
      • Go-to-market strategy timeline and program plan
      Phase 1 - Formulate a hypothesis and run discovery on key fundamentals
      Step 1.1 Step 1.2 Step 1.3 Step 1.4 Step 1.5 Step 1.6 Step 1.7 Step 1.8

      1.1.1 Identify stakeholders critical to success

      1-2 hours

      Input: Steering Committee interviews, Recognition of Steering Committee interest

      Output: List of GTM Strategy stakeholders as Steering Committee members

      Materials: Following slide outlining the key responsibilities required of the Steering Committee members, A high-Level timeline of GTM Strategy phases and key milestone meetings

      Participants: CMO, sponsoring executive, Functional leads - Marketing, Product Marketing, Product Management, Sales, Customer Success

      1. The GTM Strategy initiative manager should meet with the CMO to determine who will comprise the Steering Committee for your GTM Strategy.
      2. Finalize selection of steering committee members.
      3. Meet with members to outline their roles and responsibilities and ensure their willingness to participate.
      4. Document the steering committee members and the milestone/presentation expectations for reporting project progress and results.

      SoftwareReviews Advisory Insight:
      Go To Market Steering Committee’s can become an important ongoing body to steer overall product, pricing and other GTM decisions. Some companies have done so by adding the CEO and CFO to this committee and designated it as a permanent body that meets monthly to give go/no decisions to “all things product related” across all products and business units. Leaders that use this tool well, stay aligned, demonstrate consistency across business units and leverage outcomes across business units to drive greater scale.

      Go-to-Market Strategy Stakeholders

      Understand that aligning key stakeholders around the way your company goes to market is an essential company function.

      Title Key Roles Supporting an Effective Go-to-Market Strategy
      Go-to-Market Strategy Sponsor
      • Owns the function at the management/C-suite level
      • Responsible for breaking down barriers and ensuring alignment with organizational strategy
      • CMO, VP of Marketing, and in SMB Providers, the CEO
      Go-to-Market Strategy Program Manager
      • Typically a senior member of the marketing team
      • Responsible for organizing the GTM Strategy process, preparing summary executive-level communications and approval requests
      • Program manages the GTM Strategy process, and in many cases, the continued phases of build and launch.
      • Product Marketing Director, or other marketing director, that has strong program management skills, has run large scale marketing and/or product programs, and is familiar with the stakeholder roles and enabling technologies
      Functional Workstream Leads
      • Works alongside the Go-to-Market Strategy Initiative Manager on a specific product launch, campaign, rebranding, new market development, etc. and ensures their functional workstreams are aligned with the GTM Strategy
      • With typical GTM B2B a representative from each of the following functions will comprise the team:
        • Product Marketing, Product Management, Field Marketing, Creative, Marketing Ops/Digital, PR/Corporate Comms/AR, Social Media Marketing, Sales Operations, Sales Enablement/Training, and Customer Success
      Digital, Marketing/Sales Ops/IT Team
      • Comprised of individuals whose application and tech tools knowledge and skills are crucial to supporting the entire marketing tech stack and its integration with Sales/CRM
      • Responsible for choosing technology that supports the business requirements behind Go-to-Market Strategy, and eventually the build and launch phases as well
      • Digital Platforms, CRM, Marketing Applications and Analytics managers
      Steering Committee
      • Comprised of C-suite/management-level individuals that guide key decisions, approve of requests, and mitigate any functional conflicts
      • Responsible for validating goals and priorities, defining the scope, enabling adequate resourcing, and managing change especially among C-level leaders in Sales & Product
      • CMO, CTO/CPO, CRO, Head of Customer Success

      Download the Go-to-Market Strategy Presentation Template

      Roles vary by company size. Launch success depends on clear responsibilities

      Sample of the Go-to-Market Strategy RACI and Launch Checklist Workbook.

      Download the Go-to-Market Strategy RACI and Launch Checklist Workbook

      Success improves when you align & assign
      • Go-to-Market, build, and launch success improves when:
        • Phases and steps are outlined
        • Key activities are documented
        • Roles/functions are described
        • At the intersection of activities and role, whether the role is “Responsible,” “Accountable,” “Consulted,” or “Informed” is established across the team
      • Leaders will hold a workshop to establish RACI that fits with the scope and scale of your organization.
      • Confusion, conflict, and friction can be dramatically reduced/eliminated with RACI adoption and practice.
      • Review the RACI model and launch checklist within the Go-to-Market Strategy RACI and Launch Checklist Workbook in order to identify the full scope of roles and responsibilities needed.

      Go-to-Market Strategy Working Team

      Consider the skills and knowledge required for GTM Strategy as well as build and launch functions when choosing teams.

      Work with functional leaders to select workstream leads

      Workstream leads should be strong in collaboration, coordination of effort among others, knowledgeable about their respective function, and highly organized as they may be managing a team of colleagues within their function to deliver their responsible portion of GTM.

      Required Skills/Knowledge

      • Target Buyer
      • Product Roadmap
      • Brand
      • Competitors
      • Campaigns/Lead Gen
      • Sales Enablement
      • Media/Analysts
      • Customer satisfaction

      Suggested Functions

      • Product Marketing
      • Product Management
      • Creative Director
      • Competitive Intelligence
      • Demand Gen./Field Marketing
      • Sales Ops/Training/Enablement
      • PR/AR/Corporate Comms.
      • Customer Success
      Roles Required in Successful GTM Strategy
      For SMB companies, as employees wear many different hats, assign people that have the requisite skills and knowledge vs. the role title.

      Download the Go-to-Market Strategy RACI and Launch Checklist Workbook

      1.1.2 Select the GTM Strategy working team

      1-2 hours

      Input: Stakeholders and leaders across the various functions outlined to the left

      Output: List of go-to-market strategy team members

      Materials: Go-to-Market Strategy Workbook

      Participants: Initiative Manager, CMO, Sponsoring executive, Departmental Leads – Sales, Marketing, Product Marketing, Product Management (and others), Marketing Applications Director, Senior Digital Business Analyst

      1. The GTM Strategy Initiative Manager should meet with the GTM Strategy Sponsor and functional leaders of workstream areas/functions to determine which team members will serve as Steering Committee members and who will serve as workstream leads.
      2. The working team for your go-to-market strategy should have the following roles represented in the working team:
        • Depending on the initiative and the size of the organization, the team will vary.
        • Key business leaders in key areas – Product Marketing, Field Marketing, Digital Marketing, Inside Sales, Sales, Marketing Ops., Product Management, and IT – should be involved.
      3. Document the members of your go-to-market strategy team in the Go-to-Market Strategy Presentation slide entitled “Our Team.”

      Download the Go-To-Market Strategy RACI and Launch Checklist Workbook

      1.1.3 Develop a timeline for key milestones

      1 hour

      Timeline for Key Milestones with row headers 'Go-to-Market Phases', 'Major Milestones', and 'Key Phase Activities'. The phases (each column) and their associated activities are 'PLAN - Create buyer-validated product concept, size opportunity, and build business case', 'BUILD - Build product and enable readiness across the rest of marketing sales and customer success', 'LAUNCH - Release product, launch campaigns, and measure progress toward objectives', and then post-phase is 'MANAGE'. Notes in the 'Major Milestones' row: 'Outline key dates', 'Update with 'Today's Date' as you make progress', and 'Use GTM Plan major milestones or create your own'.

      GTM Program Managers:

      1. Will establish key program milestones working collaboratively with the Steering Cmte. and workstream leads.
      2. Outline key ”Market-facing” or external deliverables & dates, as well as internal.
      3. More detailed deliverable plans are called for working with workstream leads.
      4. This high-level overview will be used in regular Steering Cmte. and working team meets
      5. Record in the Go-to-Market Strategy Presentation

      Download the Go-to-Market Strategy Presentation Template

      1.1.5 Share your GTM strategy vision with your team

      1-2 hours

      Input: N/A

      Output: Team understanding of an effective go-to-market strategy, team roles and responsibilities and initial product and launch concept.

      Materials: The Build a More Effective Go-to-Market Strategy Executive Brief

      Participants: GTM Program Manager, CMO, Sponsoring executive, Workstream leads

      1. Download the Build a More Effective Go-to-Market Strategy Executive Brief and add the additional slides on Team Composition and Key Milestones you have created in prior steps as appropriate.
      2. Convene the Steering Committee and Working Team and take them through the Build a More Effective Go-to-Market Strategy Executive Brief with your additional slides to:
        1. Communicate team composition, roles and responsibilities, and key GTM Strategy program milestones.
        2. Educate them on what comprises a complete GTM Strategy from the Executive Brief.
      3. Optional: As a SoftwareReviews Advisory client, invite a SoftwareReviews analyst to present the Executive Brief if that is of help to you and your team.

      Go to the Build a More Effective Go-to-Market Strategy Executive Brief

      GTM program managers and workstream leads will collaborate on detailed project plans

      Timeline titled 'Workstreams Status' with a legend of shapes and colors, activities listed as row headers, timeline sections 'EXPLORE', 'DESIGN', 'ALIGN', and 'BUILD', and a column at the end of the timelines for the name of the workstream lead. Notes: 'Change names to actual workstream. Create separate pages for each', 'Overlay colored bars to indicate on/off track', 'Describe major deliverables & due dates', 'Outline major milestones', 'Update with your actual month and week-ending dates', 'Add workstream lead names'.

      Program managers will:

      • Outline an overall more detailed way of tracking GTM program workstreams, key dates and on/off track status

      Program managers & workstream leads will:

      • Call out each key workstream and workstream lead
      • Outline key deliverables and due dates
      • Track weekly for communicating status to Steering Cmte and working team meetings

      Use the Launch Checklist when building out full project plans

      Sample Launch Checklist table with project info above, and table columns 'Component', 'Owner', 'Start Date', 'Finish Date', 'G2M Plan', and 'Build'.

      Download the Go-to-Market Strategy RACI and Launch Checklist Workbook

      Continuous improvement is enabled with a repeatable process
      • With ownership assigned and set-back schedules in place, product marketing and management leaders can take the guesswork out of the GTM plan and build and launch process for the entire team.
      • “Lighter” versions are created for lower-tier releases.
      • Checklists ensure “we haven’t missed anything” and drive clarity among the team.
      • Articulating where we are now and what’s next increases management confidence.
      • Rinse and repeat improves overall quality and drives scale.

      1.1.6 Develop a project plan for each workstream

      Work with your workstream leads to see them develop a detailed project plan that spans all their deliverables for a GTM Strategy
      1. It’s essential that GTM initiative managers can rely upon workstream leads to provide the status of their respective workstreams in a shared environment for easy weekly updating and reporting.
      2. We suggest the following approach:
        1. GTM initiative managers should maintain a copy of the GTM Strategy Presentation in a shared drive so workstream leads can provide updates.
        2. Workstream leads should work with their GTM initiative manager to populate a version of the workstream tracker shown on the previous slide that enables team status reporting.
        3. Additional slides that actually show “work completed” (e.g. images of assets created, training plans, screen caps of software functionality, etc.) should be reviewed each week as well.
        4. GTM initiative leaders/program managers are advised to summarize the to-date work completed across the team into the Go-To-Market Product and Launch Business Case slides to demonstrate progress to the Steering Committee.
      3. The goal is to keep tracking manageable. Because status is most easily shown during Steering Committee and Working Team meetings using PowerPoint, we recommend a simple approach to program management by using PowerPoint.
      Using the Go-to-Market Strategy Presentation:
      3-4 hours Initial, 1-2 hours weekly
      1. Work with your workstream leads to create a slide for each workstream that will contain all the key milestones.
      2. Some teams will choose to use project management software, others a PowerPoint representation, which makes for easy presentation during status meets.
      3. Use the following resources:
        • In the Go-to-Market Strategy RACI and Launch Checklist Workbook, reference the Launch Checklist.
        • In the Go-to-Market Presentation, use the Appendix slides and complete for each workstream.
      4. The GTM initiative manager must be able to track status with workstream leads and present status to the rest of the team during Steering Committee and workstream lead meetings.

      Download the Go-to-Market Strategy Presentation Template

      Download the Go-To-Market Strategy RACI and Launch Checklist Workbook

      Step 1.2

      Hold Interviews With Sales Then Customers and Prospects to Inform Your Initial Product Concept

      Activities
      • 1.2.1 Use the SoftwareReviews Buyer Persona and Journey Interview Guide and Data Capture Tool found within the SoftwareReviews Buyer Persona and Journey blueprint.
      • 1.2.2 Follow the instructions within the above blueprint and hold interviews with Sales and customers and prospects to inform your buyer persona, initial product hypothesis, and buyer journey.
      • 1.2.3 Flush out the initial product and launch concept using the slides found within the Go-to-Market Strategy Presentation Template. You will continually refine the Go-to-Market Strategy Presentation Template such that you turn the Product and Launch descriptions into a business case for product build and launch. We advise you and your team to populate the slides to begin to inform an initial concept, then hold interviews with Sales, customers, and prospects to refine. The best way to capture customer and prospect insights is to use the Buyer Persona and Journey blueprint.

      This step will walk you through the following activities:

      • Schedule time with sales/sales advisory to flush out the product concept
      • Develop your customer and prospect interviewee list
      • Consolidate findings for your GTM Strategy program slide deck

      This step involves the following participants:

      • Sales/sales advisory, product management, initiative leader (product marketing)
      • Customers and prospects

      Outcomes of this step

      • Guidance from sales on product concept
      • Initial guidance from customers and prospective buyers
      • Agreement to proceed further

      Phase 1 - Formulate a hypothesis and run discovery on key fundamentals

      Step 1.1 Step 1.2 Step 1.3 Step 1.4 Step 1.5 Step 1.6 Step 1.7 Step 1.8

      Documenting buyer personas enables success beyond marketing

      Documenting buyer personas has several essential benefits to marketing, sales, and product teams:
      • Achieve a better understanding of your target buyer – by building a detailed buyer persona for each type of buyer and keeping it fresh, you take a giant step in becoming a customer-centric organization.
      • Align the team on a common definition – will happen when you build buyer personas collaboratively and among teams that touch the customer.
      • Improved lead generation – increases dramatically when messaging and marketing assets across your lead generation engine better resonate with buyers because you have taken the time to understand them deeply.
      • More effective selling – is possible when sellers apply persona development output to their interactions with prospects and customers.
      • Better product-market fit – increases when product teams more deeply understand for whom they are designing products. Documenting buyer challenges, pain points, and unmet buyer needs gives product teams what they need to optimize product adoption.
      “It’s easier buying gifts for your best friend or partner than it is for a stranger, right? You know their likes and dislikes, you know the kind of gifts they’ll have use for, or the kinds of gifts they’ll get a kick out of. Customer personas work the same way. By knowing what your customer wants and needs, you can present them with content targeted specifically to those wants and needs.” (Emma Bilardi, Product Marketing Alliance, July 8, 2020)

      Buyer persona attributes that need defining

      A well defined buyer persona enables us to:

      • Clarify target org-types, identify buying decision makers and key personas, and determine how they make decisions
      • Align colleagues around a common definition of target buyer(s) to drive improvements in messaging and engagement across marketing, sales, and customer success
      • Identify specific asset-types and tools that, when activated within our lead gen engine and in the hands of sellers, helps a buyer move through a decision process
      Functional – “to find them”
      Job Role Titles Org Chart Dynamics Buying Center Firmographics

      Emotive – “what they do and jobs to be done”
      Initiatives – What programs/projects the persona is tasked with and what are their feelings and aspirations about these initiatives? Motivations? Build credibility? Get promoted? Challenges – Identify the business issues, problems, and pain points, that impede attainment of objectives. What are their fears, uncertainties, and doubts about these challenges? Buyer need – They may have multiple needs; which need is most likely met with the offering? Terminology – What are the keywords/phrases they organically use to discuss the buyer need or business issue?

      Decision Criteria – “how they decide”
      Buyer role – List decision-making criteria and power level. The five common buyer roles are champion, influencer, decision maker, user, and ratifier (purchaser/negotiator). Evaluation and decision criteria – The lens, either strategic, financial, or operational, through which the persona evaluates the impact of purchase.

      Solution Attributes – “what the ideal solution looks like”
      Steps in “Jobs to be Done” Elements of the “Ideal Solution” Business outcomes from ideal solution Opportunity scope – other potential users Acceptable price for value delivered Alternatives that see consideration Solution sourcing – channel, where to buy

      Behavioral Attributes – “how to approach them successfully”
      Content preferences – List the persona’s content preferences, could be blog, infographic, demo, video, or other, vs. long-form assets (e.g. white paper, presentation, analyst report). Interaction preferences – Which among in-person meetings, phone calls, emails, video conferencing, conducting research via web, mobile, and social. Watering holes – Which physical or virtual places do they go to network or exchange info with peers e.g. LinkedIn, etc.

      Buyer journeys are constantly shifting

      If you haven’t re-mapped buyer journeys recently, you may be losing to competitors that have. Leaders re-map buyer journeys frequently.
      • The multi-channel buyer journey is constantly changing – today’s B2B buyer uses industry research sites, vendor content marketing assets, software reviews sites, contacts with vendor salespeople, events participation, peer networking, consultants, emails, social media sites, and electronic media to research purchasing decisions.
      • COVID has dramatically decreased face-to-face – we estimate a B2B buyer spent between 20-25% more time online researching software buying decisions in 2021 than they did pre-COVID. This has diminished the importance of face-to-face selling and has given dramatic rise to digital selling and outbound marketing.
      • Content marketing has exploded – but without mapping the buyer journey and knowing where (by channel) and when (which buyer journey step) to offer content marketing assets, we will fail to convert prospects into buyers.

      SoftwareReviews Advisory Insight:
      Marketers are advised to update their buyer journey annually and with greater frequency when the human vs. digital mix is effected due to events such as COVID, and as emerging media such as Augmented Reality shifts asset-type usage and engagement options.

      “Two out of three B2B buyers today prefer remote human interactions or digital self service.

      And during August 2020-February 2021, use of digital self service leapt by 10%” (McKinsey & Company, 2021.)

      Challenges of not mapping persona and journey

      A lack of buyer persona and journey understanding is frequently the root cause of the following symptoms:
      • Lead generation results are way below expectations.
      • Inconsistent product-market fit.
      • Sellers have low success rates doing discovery with new prospects.
      • Website abandonment rates are really high.

      These challenges are often attributed to messaging and talk tracks that fail to resonate with prospects and products that fail to meet the needs of targeted buyers.

      SoftwareReviews Advisory Insight:
      Marketers developing buyer personas and journeys that lack agreement among Marketing, Sales, and Product of personas to target will squander precious time and resources throughout the customer targeting and acquisition process.

      “Forty-four percent of B2B marketers have already discovered the power of personas.” (Boardview, 2016.)

      1.2.1 Interview Sales and customers/prospects

      12 - 15 Hours, over course of 2-3 weeks

      Input: Insights from Sellers, Insights from customers and prospects

      Output: Completed slides outlining buyer persona, buyer journey, overall product concept, and detailed features and capabilities needed

      Materials: Create a Buyer Persona and Journey blueprint, Go-to-Market Strategy Presentation

      Participants: Product management lead, GTM Program Manager, Select sellers, Workstream leads that wish to participate in interviews

      1. Using the Create a Buyer Journey and Persona Journey blueprint:
        • Follow the instructions to interview a group of Sellers, and most importantly, several customers and prospects
          • For this stage in the GTM Strategy process, the goal is to validate your initial product and launch concept.
          • We urge getting through all the interview questions with interviewees as the answers inform:
            • Product market fit and Minimal Viable Product
            • Competitive differentiation
            • Messaging, positioning, and campaign targeting
            • Launch campaign asset creation.
        • Place summary findings into the Go-to-Market Strategy Presentation, and for reference, place the Buyer Persona and Journey Summaries into the Go-to-Market Strategy Presentation Appendix.

      Download the Go-to-Market Strategy Presentation Template

      Download the Create a Buyer Journey and Persona Journey blueprint

      Step 1.3

      Update Your Product Concept

      Activities
      • 1.3.1 Based on Sales and Customer/Prospect interviews, update:
        • Your product concept slide
        • Detailed prioritization of features and capabilities

      This step calls for the following activities:

      • Update the product concept slide based on interview findings
      • Update/create the stack-ranking of buyer requested feature and capability priorities

      This step involves the following participants:

      • Product management lead
      • GTM initiative leader
      • Select workstream leads who sat in on interview findings

      Outcomes of this step

      • Advanced product concept
      • Prioritized features for development during Build phase
      • Understanding of MVP to deliver customer value and deal “wins”

      Phase 1 - Formulate a hypothesis and run discovery on key fundamentals

      Step 1.1 Step 1.2 Step 1.3 Step 1.4 Step 1.5 Step 1.6 Step 1.7 Step 1.8

      1.3.1 Update Product and Launch concept

      2 Hours

      Input: Insights from Sellers, Insights from customers and prospects

      Output: Completed slides outlining product concept and detailed features and capabilities needed

      Materials: Go-to-Market Strategy Presentation

      Participants: Product management lead, GTM Program Manager, Select sellers, Workstream leads that wish to participate in interviews

      1. Using the Go-to-Market Strategy Presentation:
        • With interview findings, update the Product and Launch Concept, Buyer Journey, and Capture Key Features/Capabilities of High Importance to Buyers slides

      Download the Go-to-Market Strategy Presentation Template

      Product and Launch Concept

      At this early stage, summarize findings from concept interviews to guide further discovery, as well as go-to-market concepts and initial campaign concepts in upcoming steps.

      Job Function Attributes

      Target Persona(s):
      Typical Title:
      Buying Center/functional area/dept.:

      Firmographics:
      Industry specific/All:
      Industry subsegments:
      Sizes (by revenues, # of employees):
      Geographical focus:

      Emotive Attributes

      Initiative descriptions: Buyer description of project/program/initiative. What terms used?

      Business issues: What are the business issues related to this initiative? How is this linked to a CEO-level mission-critical priority?

      Key challenges: What business/process hurdles need to be overcome?

      Pain points: What are the pain points to the business/personally in their role related to the challenges that drove them to seek a solution?

      Success motivations: What motivates our persona to be successful in this area?

      Solution and Opportunity

      Steps to do the job: What are the needed steps to do this job today?

      Key features and capabilities: What are the key solution elements the buyer sees in the ideal solution? (See additional detail slide with prioritized features.)

      Key business outcomes: In business terms, what value (e.g. cost/time/FTE savings, deals won, smarter, etc.) is expected by implementing this solution?

      Other users/opportunities: Are there other users in the role team/company that would benefit from this solution?

      Pricing/Packaging

      What is an acceptable price to pay for this solution? Based on financial benefits and ROI hurdles, what’s a good price to pay? A high price? What are packaging options? Any competitive pricing to compare?

      Alternatives/Competition

      What are alternatives to this solution: How else would you solve this problem? Are there other solutions you’ve investigated?

      Channel Preferences

      Where would it be most convenient to buy?: Direct from provider? Channel partner/reseller? Download from the web?

      Decision Criteria Attributes

      Decision maker – Role, criteria/decision lens:
      User(s) – Role, criteria/decision lens:
      Influencer(s) – Role, criteria/decision lens:
      Ratifier(s) – Role, criteria/decision lens:

      Behavioral Attributes

      Interaction preferences: Best way for us to reach this role? Email? At events? Texting? Video calls?

      Content types: Which content types (specifics; videos, short blog/article, longer whitepapers, etc.) help us stay educated about this initiative area?

      Content sources: What news, data, and insight sources (e.g. specifics) do you use to stay abreast of what’s important for this initiative area?

      Update the Go-to-Market Strategy Presentation with findings from Sales and customer/prospect interviews.

      Capture key features/capabilities of high importance to buyers

      Ask buyers during interviews, as outlined in the Buyer Persona and Journey blueprint, to describe and rate key features by need. You will also review with buyers during the GTM Build phase, so it’s important to establish high priority features now.

      Example bar chart for 'Buyer Feature Importance Ratings' where 'Buyer Need' is rated for each 'Feature'.
      • List key feature areas for buyer importance rating.
      • Establish a rating scheme.
          E.g. a rating of:
        • 4.5 or higher = critical ROI driver
        • 3.5 to 4.5 = must haves
        • 2 to 3.5 = nice to have
        • Less than 2 = low importance
      • Have buyers rate each possible feature 0-5 after explaining the rating scheme. Ask – are we missing any key features?
      • Update this slide, found within the Go-to-Market Strategy Presentation, with customer/prospect interview findings.
      Perform the same buyer interviews for non-feature “capabilities” such as:
      • Ease of use, security, availability of training, service model, etc. – and other “non-feature” areas that you need for your product hypothesis.

      Step 1.4

      Size the Product Market Opportunity

      Activities
      • 1.3.1 Based on the product concept, size, and the product market opportunity and with a focus on your “Obtainable Market”:
        • Clarify the definitions used to size market opportunity.
        • Source data both internally and externally.
        • Calculate the available, obtainable market for your software product.

      This step will walk you through the following activities:

      • Review market sizing definitions and identify required data
      • Identify the target market for your software application
      • Source market and internal data that will support your market sizing
      • Document and validate with team members

      This step involves the following participants:

      • GTM initiative leader
      • CMO, select workstream leads

      Outcomes of this step

      • Definitions on market sizing views
      • Data sourcing established
      • Market sizing and estimated penetration calculations

      Phase 1 - Formulate a hypothesis and run discovery on key fundamentals

      Step 1.1 Step 1.2 Step 1.3 Step 1.4 Step 1.5 Step 1.6 Step 1.7 Step 1.8

      Market opportunity sizing definitions

      Your goal is to assess whether or not the opportunity is significantly sized and if you are well positioned to capture it

      1. This exercise is designed to help size the market opportunity for this particular product GTM launch and not the market opportunity for the entire product line or company. First a few market sizes to define:
        1. Penetrated – is your current revenues and can be expressed in your percentage vs. competitors’.
        2. Serviceable Obtainable Market (SOM) – larger than your currently penetrated market, and a percentage of SAM that can realistically be achieved. It accounts for your current limitations to reach and your ability to sell to buyers. It is restricted by your go-to-market ability and reduced by competitive market share. SOM answers: What increased market can we obtain by further penetrating accounts within current geographical coverage and go-to-market abilities and within our ability to finance our growth?
        3. Serviceable Available Market (SAM) – larger than SOM yet smaller than TAM, SAM accounts for current products and current go-to-market capabilities and answers: What if every potential buyer bought the products we have today and via the type of go-to-market (GTM) especially geographical coverage, we have today? SAM calls for applying our current GTM into unpenetrated portions of currently covered customer segments and regions.
        4. Total Available Market (TAM) – larger than SAM, TAM sizes a market assuming we could penetrate other customer segments within currently covered regions without regard for resources, capabilities, or competition. It answers the question: If every potential buyer within our available market – covered regions – bought, how big would the market be?
        5. Total Global Market – estimates market opportunity if all orgs in all segments and regions bought – with full disregard for resources and without the restrictions of our current GTM abilities.
        6. Develop your market opportunity sizing using the Product Market Opportunity Sizing Workbook.

      Download the Product Market Opportunity Sizing Workbook

      SoftwareReviews Advisory Insight:
      Product marketers that size the product market opportunity and account for the limitations posed by competitors, current sales coverage, brand permission, and awareness, provide their organizations with valuable insights into which inhibitors to growth should be addressed.

      Visualization of market opportunity sizes as circles within bigger circles, 'Penetrated Market' being the smallest and 'Global Market' being the largest.

      1.4.1 Size the product market opportunity

      Your goal is two-fold: Determine the target market size, and develop a realistic 12–24 month forecast to support your business case
      1. Open the Product Market Opportunity Sizing Workbook.
      2. Follow the instructions within.
      3. When finished, download the Go-to-Market Strategy Presentation and update the Product Market Opportunity Size slide with your calculated Product Market Opportunity Size.

      Download the Product Market Opportunity Sizing Workbook

      Download the Go-to-Market Strategy Presentation Template

      “Segmentation, targeting and positioning are the three pillars of modern marketing. Great segmentation is the bedrock for GTM success but is overlooked by so many.” (Product Marketing Alliance)

      Step 1.5

      Outline Digital and Tech Requirements

      Activities

      Designing your go-to-market strategy does not require a robust customer experience management (CXM) platform, but implementing your strategy during the next steps of Go-to-Market – Build then Launch – certainly does.

      Review info-Tech’s CXM blueprint to build a more complete, end-to-end customer interaction solution portfolio that encompasses CRM alongside other critical components.

      The CXM blueprint also allows you to develop strategic requirements for CRM based on customer personas and external market analysis called for during your GTM Strategy design.

      Diagram of 'Customer Relationship Management' surrounded by its components: 'Web Experience Management Platform', 'E-Commerce & Point-of-Sale Solutions', 'Social Media Management Platform', 'Customer Intelligence Platform', 'Customer Service Management Tools', and 'Marketing Management Suite'.

      These steps outlined in the CXM blueprint, will help you:

      • Assess your CRM application(s) and the environment in which they exist. Take a business-first strategy to prioritize optimization efforts.
      • Validate CRM capabilities, user satisfaction, issues around data, vendor management, and costs to build out an optimization strategy
      • Pull this all together to develop a prioritized optimization roadmap.

      This step involves the following participants:

      • Marketing Operations, Digital, IT
      • Project workstream leads as appropriate

      Outcomes of this step

      • After inquiries with appropriate analysts, client will be able to assess what new application and technology support is required to support Go To Market process.

      Phase 1 - Formulate a hypothesis and run discovery on key fundamentals

      Step 1.1 Step 1.2 Step 1.3 Step 1.4 Step 1.5 Step 1.6 Step 1.7 Step 1.8

      Step 1.6

      Identify features and capabilities that will drive competitive differentiation

      Activities
      • 1.6.1 Hold a session with key stakeholders including sales, customer success, product, and product marketing to develop a hypothesis of features and capabilities vs. competitors: differentiators, parity areas, and gaps (DPG).
      • Optional for clients with buyer reviews and key competitive reviews within target product category:
        • 1.6.2 Request from SoftwareReviews a 2X2 Matrix Report of Importance vs. Satisfaction for both features and capabilities within your product market/category to identify areas of competitive DPG.
        • 1.6.3 Hold an Inquiry with covering ITRG analysts in your product category to have them validate key areas of competitive DPG.
      • 1.6.4 Document competitive DPG and build out your hypothesis for product build as you ready for customer interviews to validate that hypothesis.

      This step will provide processes to help you:

      • Understand and document competitive differentiation, parity, and gaps

      This step involves the following participants:

      • Project workstream leads in product marketing, competitive intelligence, product management, and customer success

      Outcomes of this step

      • Develop a clear understanding of what differentiated capabilities to promote, which parity items to mention in marketing, and which areas are competitive gaps
      • Develop a hypothesis of what areas need to be developed during the Build phase of the Go-to-Market lifecycle

      Phase 1 - Formulate a hypothesis and run discovery on key fundamentals

      Step 1.1 Step 1.2 Step 1.3 Step 1.4 Step 1.5 Step 1.6 Step 1.7 Step 1.8

      Assess current capabilities and competitive differentiation vs. buyer needs

      Taking buyer needs ratings from step 1.3, assess your current and key competitive capabilities against buyer needs for both feature and non-feature capabilities. Incorporate into your initial product hypothesis.

      Example bar chart for 'Competitive Differentiation, Parity and Gaps – Features' comparing ratings of 'Buyer Need', 'Our Current Capabilities', and 'Competitive Capabilities' for each 'Feature'.

      • Rank features in order of buyer need from step 1.3.
      • Prioritize development needs where current capabilities are rated low. Spot areas for competitive differentiation especially in high buyer-need areas.
      Perform the analysis for non-feature capabilities such as:
      • ease of use
      • security
      • availability of training
      • service model

      Optional: Validate feature and capability importance with buyer reviews

      Request from your SoftwareReviews Engagement Manager the “Importance vs. Satisfaction” analysis for your product(s) feature and non-feature capabilities under consideration for your GTM Strategy

      Satisfaction
      Fix Promote
      Importance

      Low Satisfaction
      High Importance

      These features are important to their market and will highlight any differentiators to avoid market comparison.

      High Satisfaction
      High Importance

      These are real strengths for the organization and should be promoted as broadly as possible.

      Low Satisfaction
      Low Importance

      These features are not important for the market and are unlikely to drive sales if marketing material focuses on them. Rationalize investment in these areas.

      High Satisfaction
      Low Importance

      Features are relatively strong, so highlight that these features can meet customer needs
      Review Maintain

      Overall Category Product Feature Satisfaction Importance

      • Importance is based on how strongly satisfaction for a feature of a software suite correlates to the overall Likeliness to Recommend
      • Importance is relative – low scores do not necessarily indicate the product is not important, just that it’s not as important as other features

      (Optional for clients with buyer reviews and key competitive reviews within target product category.)

      Optional: Feature importance vs. satisfaction

      Example: ERP “Vendor A” ratings and recommended key actions. Incorporate this analysis into your product concept if updating an existing solution. Have versions of the below run for specific competitors.

      Importance vs. Satisfaction map for Features, as shown on the previous slide, but with examples mapped onto it using a legend, purple squares are 'Enterprise Resource Planning' and green triangles are 'Vendor A'.

      Features in the “Fix” quadrant should be addressed in this GTM Strategy cycle.

      Features in the “Review” quadrant are low in both buyer satisfaction and importance, so vendors are wise to hold on further investments and instead focus on “Fix.”

      Features in the “Promote” quadrant are high in buyer importance and satisfaction, and should be called out in marketing and selling.

      Features in the “Maintain” quadrant are high in buyer satisfaction, but lower in importance than other features – maintain investments here.

      (Optional for clients with buyer reviews and key competitive reviews within target product category.)

      Optional: Capabilities importance vs. satisfaction

      Example: ERP “Vendor A” capabilities ratings and recommended key actions. Incorporate this analysis into your product concept for non-feature areas if updating an existing solution. Have versions of the below run for specific competitors.

      Importance vs. Satisfaction map for Capabilities with examples mapped onto it using a legend, purple squares are 'Enterprise Resource Planning' and green triangles are 'Vendor A'.

      Capabilities in the “Fix” quadrant should be addressed in this GTM Strategy cycle.

      Capabilities in the “Review” quadrant are low in both buyer satisfaction and importance, so vendors are wise to hold on further investments and instead focus on “Fix.”

      Capabilities in the “Promote” quadrant are high in buyer importance and satisfaction, and should be called out in marketing and selling.

      Capabilities in the “Maintain” quadrant are high in buyer satisfaction, but lower in importance than other features – maintain investments here.

      (Optional for clients with buyer reviews and key competitive reviews within target product category.)

      Develop a competitively differentiated value proposition

      Combining internal competitive knowledge with insights from buyer interviews and buyer reviews; establish which key features that will competitively differentiate your product when delivered

      Example bar chart for 'Competitive Differentiation, Parity and Gaps – Features and Capabilities' comparing ratings of 'Your Product' and 'Competitor A' with high buyer importance at the top, low at the bottom, and rankings of each 'Differentiator', 'Parity', and 'Gap'.

      • Identify what buyers need that will differentiate your product features and company capabilities from key competitors.
      • Determine which features and company capabilities, ideally lower in buyer importance, can achieve/maintain competitive parity.
      • Determine which features and company capabilities, ideally much lower in buyer importance, that can exist in a state of competitive gap.

      Step 1.7

      Select the Most Effective Routes to Market

      Activities
      • 1.7.1 Understand a framework for deciding how to approach evaluating each available channel including freemium/ecommerce, inside sales, field sales, and channel partner.
      • 1.7.2 Gather data that will inform option consideration.
      • 1.7.3 Apply to decision framework and present to key stakeholders for a decision.

      This step will provide processes to help you:

      • Understand the areas to consider when choosing a sales channel
      • Support your decision by making a specific channel recommendation

      This step involves the following participants:

      • Project workstream leads in Sales, Sales Operations, Product Marketing, and Customer Success

      Outcomes of this step

      • Clarity around channel choice for this specific go-to-market strategy cycle
      • Pros and cons of choices with rationale for selected channel

      Phase 1 - Formulate a hypothesis and run discovery on key fundamentals

      Step 1.1 Step 1.2 Step 1.3 Step 1.4 Step 1.5 Step 1.6 Step 1.7 Step 1.8

      Your “route-to-market” – channel strategy

      Capture buyer channel preferences in Step 1.3, and research alternatives using the following framework

      Inside vs. Field Sales – Selling software during COVID has taught us that you can successfully sell software using virtual conferencing tools, social media, the telephone, and even texting and webchat – so is the traditional model of field/territory-based sellers being replaced with inside/virtual sellers who can either work at home, or is there a benefit to being in the office with colleagues?

      Solutions vs. Individual Products – Do your buyers prefer to buy a complete solution from a channel partner or a solutions integrator that puts all the pieces together, and can handle training and servicing, for a more complete buyer solution?

      Channel Partner vs. Build Sales Force – Are there channel partners that, given your product is targeting a new buyer with whom you have no relationship, can leverage their existing relationships, quicken adoption of your products, and lower your cost of sales?

      Fully Digital – Is your application one where users can get started for free then upgrade with more advanced features without the use of a field or inside sales person? Do you possess the e-commerce platform to support this?

      While there are other considerations beyond the above to consider, decide which channel approach will work best for this GTM Strategy.

      Flowchart on how to capture 'Buyer Channel Preferences' with five possible outcomes: 'Freemium/e-commerce', 'Use specified channel partner', 'Establish channel partner', 'Use Inside Sales', and 'Use Field Sales'.

      Channel Partnerships are Expanding

      “One estimate is that for every dollar a firm spends on its SaaS platform, it spends four times that amount with systems integrators and other channel partners.

      And as technologies are embedded inside other products, services, and solutions, effective selling requires more partners.

      Salesforce, for example, is recruiting thousands of new partners, while Microsoft is reportedly adding over 7,000 partners each month.” (HBR, 2021)

      Step 1.8

      Craft an Initial GTM Strategy Presentation for Executive Review and Status Check

      Activities
      • 1.8.1 Finalize the set of slides within the Go-to-Market Strategy Presentation that best illustrates the many key findings and recommended decisions that have been made during the Explore phase of the GTM Strategy.
        • Test whether all key deliverables have been created, especially those that must be in place in order to support future phases and steps.
        • Schedule a Steering Committee meeting and present your findings with the goal to gain support to proceed to the Design phase of GTM Strategy.

      This step will provide processes to help you:

      • Work with your colleagues to consolidate the findings from Phase 1 of the GTM Strategy
      • Create a slide deck with your colleagues for presentation to the Steering Committee to gain approvals to proceed to Phase 2

      This step involves the following participants:

      • Project workstream leads in Sales, Sales Operations, Product Marketing, and Customer Success
      • Steering Committee

      Outcomes of this step

      • Slide deck to present to the Steering Committee
      • Approvals to move to Phase 2 of the GTM Strategy

      Phase 1 - Formulate a hypothesis and run discovery on key fundamentals

      Step 1.1 Step 1.2 Step 1.3 Step 1.4 Step 1.5 Step 1.6 Step 1.7 Step 1.8

      1.8.1 Build your GTM Strategy deck for Steering Committee approval

      1. As you near completion of the Go-to-Market Strategy Phase, Explore Step, an important test to pass before proceeding to the Design step of GTM Strategy, is to answer several key questions:
        1. Have you properly sized the market opportunity for the focus of this GTM cycle?
        2. Have you defined a unique value proposition of what buyers are looking for?
        3. And have you aligned stakeholders on the target customer persona and flushed out an accurate buyer journey?
      2. If the answer is “no” you need to return to these steps and ensure completion.
      3. Pull together a summary review deck, schedule a meeting with the Steering Committee, present to-date findings for approval to move on to Phase 2.

      Download the Go-to-Market Strategy Presentation Template

      Sample of the 'PLAN' section of the GTM Strategy optimization diagram with 'GTM Explore Review' circled in red.

      The presentation you create contains:

      • Team composition and roles and responsibilities
      • Steps in overall process
      • Goals and objectives
      • Timelines and work plan
      • Initial product and launch concept
      • Buyer persona and journey
      • Competitive differentiation
      • Channel strategy

      Build a More Effective Go-to-Market Strategy

      Phase 2

      Design your initial product and business case

      Phase 1

      1.1 Select Steering Cmte/team, build aligned vision for GTM

      1.2 Buyer personas, journey, initial messaging

      1.3 Build initial product hypothesis

      1.4 Size market opportunity

      1.5 Outline digital/tech requirements

      1.6 Competitive SWOT

      1.7 Select routes to market

      1.8 Craft GTM Strategy deck

      Phase 2

      2.1 Brand consistency check

      2.2 Formulate packaging and pricing

      2.3 Craft buyer-valid product concept

      2.4 Build campaign plan and targets

      2.5 Develop cost budgets across all areas

      2.6 Draft product business case

      2.7 Update GTM Strategy deck

      Phase 3

      3.1 Assess tech/tools support for all GTM phases

      3.2 Outline sales enablement and Customer Success plan

      3.3 Build awareness plan

      3.4 Finalize business case

      3.5 Final GTM Plan deck

      This phase will walk you through the following activities:

      • Branding consistency check
      • Formulate packaging and pricing
      • Craft buyer-validated product concept
      • Build initial campaign plan and targets
      • Develop budgets for creative, content, and media purchases
      • Draft product business case
      • Update GTM Strategy deck

      This phase involves the following stakeholders:

      • Steering Committee
      • Working group leaders

      To complete this phase, you will need:

      Go-to-Market Strategy Presentation TemplateGo-to-Market Strategy RACI and Launch Checklist WorkbookBuyer Persona and Journey blueprintGo-to-Market Strategy Cost Budget and Revenue Forecast Workbook
      Sample of the Go-to-Market Strategy Presentation Template deliverable.Sample of the Go-to-Market Strategy RACI and Launch Checklist Workbook deliverable.Sample of the Buyer Persona and Journey blueprint deliverable.Sample of the Go-to-Market Strategy Cost Budget and Revenue Forecast Workbook deliverable.
      Use the Go-to-Market Strategy Presentation Template to document the results from the following activities:
      • Documenting your GTM strategy stakeholders
      • Documenting your GTM strategy working team
      Use the Go-to-Market Strategy RACI and Launch Checklist Workbook to:
      • Review the scope of roles and responsibilities required
      • Document the roles and responsibilities of your teams
      Use the Buyer Persona and Journey blueprint to:
      • Interview sales and customers/prospects to inform product concepts, understand persona and later, flesh out buyer journeys
      Use the Go-to-Market Cost Budget and Revenue Forecast Workbook to:
      • Tally budgets from across key functions involved in GTM Strategy
      • Compare with forecasted revenues to assess gross margins

      Step 2.1

      Compare Emerging Messaging and Positioning With Existing Brand for Consistency

      Activities

      Share messaging documented with the buyer journey with branding/creative and/or Marketing VP/CMO to ensure consistency with overall corporate messaging. Use the “Brand Diagnostic” on the following slide as a quick check.

      For those marketers that see the need for a re-brand, please:
      Download the Go-to-Market Strategy Presentation Template

      Later during the Build phase of GTM, marketing assets, digital platforms, sales enablement, and sales training will be created where actual messaging can be written with brand guidelines aligned.

      This step is to assess whether you we need to budget extra funds for any rebranding.

      This step will walk you through the following activities:

      • After completing the buyer journey and identifying messaging, test with branding/CMO that new messaging aligns with current:
        • Company positioning
        • Messaging
        • Brand imagery

      This step involves the following participants:

      • Project lead
      • Product marketing
      • Branding/creative
      • CMO

      Outcomes of this step

      • Check – Y/N on brand alignment
      • Adjustments made to current branding or new product messaging to gain alignment

      Phase 2 – Validate designs with buyers and solidify product business case

      Step 2.1 Step 2.2 Step 2.3 Step 2.4 Step 2.5 Step 2.6 Step 2.7

      Brand identity

      Re-think tossing a new product into the same old marketing engine. Ask if your branding today and on this new offering needs help.

      If you answer “no” to any of the following questions, you may need to re-think your brand. Does your brand:

      • recognize buyer pain points and convey clear pain-relief?
      • convey unique value that is clearly distanced from key competitors?
      • resonate with how target personas see themselves (e.g. rebellious, intelligent, playful, wise, etc.) and convey the “feeling” (e.g. relief, security, confidence, inspiration, etc.) buyers seek?
      • offer proof points via customer testimonials (vs. claimed value)?
      • tell a truly customer-centric story that is all about them (vs. what you want them to know about you)?
      • use words (e.g. quality, speed, great service, etc.) that equate to how buyers actually see you? Is your tone of voice going to resonate with your target buyer?
      • present in a clean, simple, and truly unique way? And will your brand identity stand the test of time?
      • represent feedback gleaned from prospects as well as customers?

      “Nailing an impactful brand identity is a critical part of Growth Marketing.

      Without a well-crafted and maintained brand identity, your marketing will always feel flat and one-dimensional.” (Lean Labs, 2021)

      Step 2.2

      Formulate Packaging and Pricing

      Activities
      • 2.2.1 Leverage what was learned in Phase 1 from buyer interviews to create an initial packaging and initial pricing approach.
        • Packaging success is driven by knowing what the buyer values are, how newly proposed functionality may work with other applications, and how well the buyer(s) work in teams.
        • Develop pricing using cost-plus, value/ROI, and competitive/market pricing comparisons.

      This step will walk you through the following activities:

      • Approaches to establishing price points for software products
      • Checking if pricing supports emerging product revenue plan

      This step involves the following participants:

      • Project lead
      • Product Marketing
      • Product Management
      • Pricing (if a function)

      Outcomes of this step

      • Pricing that is validated through buyer interviews and consistent with overall company pricing guardrails
      • Packaging that can be delivered

      Phase 2 – Validate designs with buyers and solidify product business case

      Step 2.1 Step 2.2 Step 2.3 Step 2.4 Step 2.5 Step 2.6 Step 2.7

      2.2.1 Formulate packaging and pricing

      Goal: Incorporate buyer benefits into your MVP that delivers the buyer value that compels them to purchase and drives the business case

      1. Leverage findings from buyer interviews and feature prioritization found in Step 1.3 to arrive at initial feature inclusion.
      2. Leverage feedback from customer interviews and competitive pricing analysis to arrive at an initial target price offer.
      3. Go to the Go-to-Market Strategy Presentation and use the slides labeled “Go-to-Market Strategy, Overall Project Plan.”

      Download the Go-to-Market Strategy Presentation Template

      Refer to the findings from buyer persona interviews

      Sample of the Buyer Persona and Journey blueprint deliverable.

      Step 2.3

      Build a Buyer-Validated Product Concept

      Activities
      • 2.2.1 Add to your initial product concept from Phase 1, the pricing and packaging approach.
        • Take the concept out to buyers to get their feedback – not on UX design, that will come later, but to ensure the value is clear to the buyers, and to raise confidence in the product concept.
        • As with previous customer and prospect interviews, use the Buyer Persona and Journey blueprint with its accompanying interview guide and focus on the product related questions.
        • Generate your slides to present and discuss with buyers, capture feedback, and refine the product concept.

      This step will walk you through the following activities:

      • Hold buyer interviews to review the product design
      • Validate concept and commercial variables – not UX design, that comes later

      This step involves the following participants:

      • Project lead
      • Product Marketing
      • Product Management

      Outcomes of this step

      • Customer validated product concept that meets the business plan

      Phase 2 – Validate designs with buyers and solidify product business case

      Step 2.1 Step 2.2 Step 2.3 Step 2.4 Step 2.5 Step 2.6 Step 2.7

      2.3.1 The best new product hypothesis doesn’t always come from your best customers

      Goal: Validate your product concept and business case

      1. Key areas to validate during product concept feedback:
        1. Feature/capability-build priorities – Which set of features and capabilities (i.e. service model, etc.) must be delivered in a minimum viable product (MVP) that delivers unique and competitively differentiating buyer value so we have win rates that support the business case?
        2. Packaging/Pricing – Are their features/capabilities that are not in base offering but offered as add-ons or not at all? Are their different packaging options that must be delivered given different customer segments and appropriate price points? (E.g. a small- to-medium sized business (SMB) version, Freemium, or Basic vs. Premium offerings?
        3. Routes to Market/Channel – Ensure you validate your channel strategy as work/effort will be needed to arrive at channel sales and marketing enablement.

      Download the Go-to-Market Strategy Presentation Template

      “Innovation opportunities almost always come from understanding a company’s worst customers or customers it doesn’t serve” (Harvard Business School Press, 1997)

      2.3.2 How your prospects buy will inform upcoming campaign design

      Goal: During product validation interviews, further validate the buyer journey to identify asset types to be created/sourced for launch campaign design

      1. Leverage findings from buyer interviews with a focus on buyer journey questions/answers found in Step 1.3 and further validated during product concept feedback in step 2.3.
      2. Your goal is to uncover the following key areas (see next slide for illustration):
        1. Validate the steps buyers take throughout the buyer journey – when you validate buyer steps and what the buyer is doing and thinking as they make a buying decision determines if you are supporting the right process.
        2. Validate the human vs. non-human/digital interaction type for each step – this determines whether your lead gen engine or your salesforce (or channel partner) will deliver the marketing assets and sales collateral.
        3. Describe the asset-types most valued by buyers during each step – this will provide the guidance your demand gen/field marketers need to either work with product marketing and creative to design and build, or source the right marketing asset and sales collateral for your lead gen engine and to support sales enablement.
        4. Identify which channels – this will give your digital team the guidance they need to design the “where” to place the assets within your lead gen engine. Feedback from customer interviews and competitive pricing analysis to arrive at an initial target price for offering is shown on the next slide.
      3. Use the Go-to-Market Strategy Presentation to complete the buyer journey slide with key findings.

      Download the Go-to-Market Strategy Presentation Template

      Refer to the findings from buyer persona interviews

      Sample of the Buyer Persona and Journey blueprint deliverable.

      Answers you need to map buyer journey

      Your buyer interviews – whether during earlier steps or here during product concept validation – will give specific answers to all areas in green text below. Understanding channels, asset-types, and crafting your key messaging are essential for next steps.

      Table outlining an example buyer's journey with fields in green text that are to be to replaced with answers from your buyer interviews.

      Step 2.4

      Build Your Initial Campaign Plan and Targets

      Activities
      • 2.4.1. While product management and marketing is working on the business case, the campaign team is designing their launch campaign.
      • Expand from the product concept and build out the entire launch campaign identifying dates, CTA’s, channels, and asset types needed that will be built during the Build phase.

      This step will walk you through the following activities:

      • Outline deployment plan of activities and outcomes
      • Draw up specs for needed assets, web-page changes, emails, target segments, and targets for leads generated

      This step involves the following participants:

      • Project lead
      • Field Marketing
      • Product Marketing

      Outcomes of this step

      • The initial draft of the campaign plan that outlines multichannel activities, dates, and assets that need to be sourced and/or created

      Phase 2 – Validate designs with buyers and solidify product business case

      Step 2.1 Step 2.2 Step 2.3 Step 2.4 Step 2.5 Step 2.6 Step 2.7

      2.4.1 Document your campaign plan

      2 hours

      On the following Awareness and Lead Gen Engine slide:
      1. Tailor the slide to describe your lead generation engine as you will use it when you get to latter steps to describe the activities in your lead gen engine and weigh them for go-to-market strategy.
      2. Use the template to see what makes up a typical lead gen and awareness building engine to see what you may be missing, as well as to record your current engine “parts.”
        • Note: The “Goal” image in upper right is meant as a reminder that marketers should establish a goal for Sales Qualified Leads (SQL’s) delivered to field sales for each campaign.

      On the Product and Launch Concept slides:

      1. Update the slides with findings from 2.3 and 2.4.

      Download the Go-to-Market Strategy Presentation Template

      “Only 32% of marketers – and 29% of B2B marketers – said the process of planning campaigns went very well. Just over half were sure they had selected the right business goal for a given marketing project and only 42% were confident they identified the right audience – which is, of course, a critical determinant for achieving success.” (MIT Sloan Management Review)

      Launch campaign

      Our Goal for [Campaign name] is to generate X SQL’s

      Flowchart of the steps to take when a campaign is launched, from 'Organic Website Visits' and 'Go Live' to future 'Sales Opportunities'. A key is present to decipher various icons.

      Awareness

      PR/EXTERNAL COMMS:

      Promote release in line with company story

      • [Executive Name] interview with [Publication Y] on [Launch Topic X] – Mo./Day
      • Press Release on new enhancements – Mo./Day
      • [Executive Name] interview with [Publication Z] on [Launch Topic X] – Mo./Day
      ANALYST RELATIONS:

      Receive analyst feedback pre-launch and brief with final releases messaging/positioning

      • Inquiry with [Key Analysts] on [Launch Topic X] – Mo./Day, pre launch
      • Press Release shared on new enhancements – Launch day minus two days
      • Analyst briefing with [Key Analysts] on [Launch Topic X] – Launch day minus two days

      Download the Go-to-Market Strategy Presentation Template

      2.4.2 Campaign targets

      Goal: Establish a Marketing-Influenced Win target that will be achieved for this launch

      We advise setting a target for the launch campaign. Here is a suggested approach:
      1. Understand what % of all sales wins are touched by marketing either through first or last touch attribution. This is the % of Marketing-Influenced Wins (MIWs).
      2. Determine what sales wins are needed to attain product revenue targets for this launch.
      3. Apply the actual company MIW % to the number of deals that must be closed to achieve target product launch revenues. This becomes the MIW target for this launch campaign.
      4. Then, using your average marketing funnel conversion rates working backwards from MIWs to Opportunities, Sales Accepted Leads (SALs), Sales Qualified Leads (SQLs), Marketing Qualified Leads (MQLs), up to website visits.
      5. Update the slides with findings from 2.3 and 2.4.

      Download the Go-to-Market Strategy Presentation Template

      “Marketing should quantify its contribution to the business. One metric many clients have found valuable is Marketing Influenced Wins (MIW). Measured by what % of sales wins had a last-touch marketing attribution, marketers in the 30% – 40% MIW range are performing well.” (SoftwareReviews Advisory Research)

      Step 2.5

      Develop Initial Budgets Across All Areas

      Activities
      • 2.5.1 Use the Go-to-Market Budget Workbook and work with your workstream leads.
        • Capture the costs associated with this GTM Strategy and Launch.
        • Summarize your GTM budget in the Go-to-Market Strategy Presentation, including the details behind the gross margin calculation for your GTM Strategy/campaign if required.

      This step will walk you through the following activities:

      • Field marketing, product marketing, creative, others to identify the specific budget elements needed for this campaign/launch

      This step involves the following participants:

      • Project lead
      • Field Marketing
      • Product Marketing
      • Branding/creative

      Outcomes of this step

      • The initial marketing budget for this campaign/launch

      Phase 2 – Validate designs with buyers and solidify product business case

      Step 2.1 Step 2.2 Step 2.3 Step 2.4 Step 2.5 Step 2.6 Step 2.7

      Download the Go-to-Market Strategy Cost Budget and Revenue Forecast Workbook

      2.5.1 Develop your GTM Strategy/product launch campaign budget

      Goal: Work with your workstream leads to identify all incremental costs associated with this GTM strategy and product launch

      1. Use the Go-to-Market Budget Workbook and adjust to include the areas that are identified by your workstream leads as being applicable to this GTM Strategy and Launch.
        • These should be incremental costs to normal operating and capital budgets and those areas that are fully approved for inclusion by your Steering Committee/Sponsoring Executive.
      2. Begin to Catalog all applicable costs to include all key areas such as:
        • Technology costs for internal use (typically from Marketing Ops), and “core” to product technology costs working with the product team
        • Channel marketing programs, agency (e.g. branding, naming, web design, SEO, content marketing, etc.), T&E, paid media, events, marketing assets, etc.
      3. Note that in the Align Step – Step 3, you will see your workstream leads each develop their individual contributions to both the launch plan as well a budget.

      4. Summarize your initial GTM budget findings in the Go-to-Market Strategy Presentation, including the details behind the gross margin calculation for your GTM Strategy/campaign if required. Again, you will flush out the final costs within each workstream areas in Phase 3, ”Align.”

      Download the Go-to-Market Strategy Cost Budget and Revenue Forecast Workbook

      Download the Go-to-Market Strategy Presentation Template

      Step 2.6

      Draft Initial Product Business Case

      Activities
      • 2.6.1 Here’s where you begin to pull together all the essential elements of your final business case.
        • For many organizations that require a view of return on investment, you will begin here to shape the key elements that your organization requires for a complete business case to go ahead with the needed investments.
        • The goal is to compare estimated costs to estimated revenues to ensure acceptable margins will be delivered for this GTM strategy/product launch.
        • The culmination of work to get to this calculation will continue through Phase 3; however, the following slide illustrates the kind of visualization that will be possible with our approach.

      This step will walk you through the following activities:

      • A product revenue forecast is created, alignment with sales/sales targets is created for a minimum viable product (MVP) that meets the buyer’s needs at the price point established/validated

      This step involves the following participants:

      • Project lead
      • Product management
      • Product marketing
      • Sales leadership

      Outcomes of this step

      • The important measures of:
        • Product revenue forecast
        • Supported MVP features

      Phase 2 – Validate designs with buyers and solidify product business case

      Step 2.1 Step 2.2 Step 2.3 Step 2.4 Step 2.5 Step 2.6 Step 2.7

      Gross Margin Estimates – part of a complete product business case

      Your goal: Earn more than you spend! This projection of estimated gross margins should be part of your product launch business case. The GTM initiative lead and workstream leads are charged with estimating incremental costs, and product and sales must work together on the revenue forecast.

      Net Return

      We estimate our 12 month gross profit to be ….

      Quarterly Revenues

      Based on sales forecast, our quarterly/monthly revenues are ….

      Estimated Expenses

      Incremental up-front costs are expected to be ….

      Example 'P&L waterfall for Product X Launch' with notes. Green bars are 'Increase', red bars are 'Decrease', and blue bars are 'Total'. Red bar note: 'Your estimated incremental up-front costs', Green bar note: 'Your estimated net incremental revenues vs. costs', Blue bar note: 'Your estimated net gross profit for this product launch and campaign', 'END' note: 'Extend for suitable period'.

      2.6.1 Develop your initial product business case

      Goal: Focused on the Product Concept areas related to product Market Fit, Buyer Needs and Market Opportunity, Product Managers will summarize in order to gain approval for Build

      1. Using the Go-to-Market Strategy Presentation, product managers should ensure the product concept slide(s) support the rationale to move to Build phase. Key areas include:
        1. Adequate market opportunity size – that is worth the incremental investment
        2. Acceptable costs/investment to pursue the opportunity – design, creative services for branding, web design, product naming, asset creation, copywriting, translation services not available in-house
        3. Well-defined product market fit – review buyer interviews that identify buyer pain points and ideas that will deliver needed business value
        4. Buyer-validated commercials – buyer-validated pricing and packaging
        5. Product development budget and staffing support to build viable MVP & beyond roadmap – development budget and staffing is in place/budgeted to deliver MVP by target date and continue to ensure attainment of product revenue targets
        6. Unique product value proposition that is competitively differentiated – to drive acceptable win rates
        7. Product Sales Forecast – that when compared to costs meets company investment hurdle rates
        8. Sales Leadership support for achieving sales forecast and supported sales/channel resourcing plan – sales leadership has taken on forecasted revenues as an incremental sales quota and has budget for additional hiring, enablement, and training for attainment.
      2. Go to the Go-to-Market Strategy Presentation and complete the slides summarizing these key areas that support the business case for the next phases of Build and Launch.

      Product Business Case Checklist:

      • Acceptably large enough product market opportunity
      • Well-defined competitive differentiation
      • Buyer-validated product-market fit
      • Buyer-validated and competitive commercials (i.e. pricing, packaging)
      • An MVP with roadmap that aligns to buyer needs and buyer-validated price points
      • A 24–36 month sales forecast with CRO sign-up and support for attainment
      • Costs of launch vs. forecasted revenues to gauge gross margins

      Download the Go-to-Market Strategy Cost Budget and Revenue Forecast Workbook

      Download the Go-to-Market Strategy Presentation Template

      Step 2.7

      Update the GTM Strategy Presentation Deck for Executive Review and Sign-off

      Activities
      • 2.7.1 Update the deck with Phase 2 findings culminating in the business case.

      This step will walk you through the following activities:

      • Drop into the GTM Strategy deck the summary findings from the team’s work
      • Write an executive summary that garners executive support for needed funds, signed-up-for sales targets, agreed upon launch timing
      • Steering Committee alignment on above and next steps

      This step involves the following participants:

      • Project lead
      • Steering Committee
      • Workstream leads

      Outcomes of this step

      • Executive support for the GTM Strategy plan and approval to proceed to Phase 3

      Phase 2 – Validate designs with buyers and solidify product business case

      Step 2.1 Step 2.2 Step 2.3 Step 2.4 Step 2.5 Step 2.6 Step 2.7

      2.7.1 Update your GTM Strategy deck for Design Steering Committee approval

      1. As you near completion of the Go-to-Market Strategy Phase – Design Step, while your emerging business case is important, it will be finalized in the Align Step.
      2. An important test to pass before proceeding to the Align step of the GTM Strategy, is to answer several key questions:
        1. Have you validated the product value proposition with buyers?
        2. Is the competitive differentiation clear for this offering?
        3. Did Sales support the business case by signing up for the incremental quota?
        4. Has product defined an MVP that aligns with the buyer value needed to drive purchases?
        • If the answer is “no” you need to return to these steps and ensure completion
      3. Pull together a summary review deck, schedule a meeting with the Steering Committee, and present to-date findings for approval to move onto Phase 3.

      Download the Go-to-Market Strategy Presentation Template

      Sample of the 'PLAN' section of the GTM Strategy optimization diagram with 'GTM Design Review' circled in red.

      The presentation you create contains:

      • Timelines and a work plan
      • Expanded product concept to include your packaging and pricing approach
      • Feedback from buyers on validated product concept especially commercial elements
      • Expanded campaign plan and marketing budget
      • Initial product business case

      Build a More Effective Go-to-Market Strategy

      Phase 3

      Align stakeholder plans to prep for build

      Phase 1

      1.1 Select Steering Cmte/team, build aligned vision for GTM

      1.2 Buyer personas, journey, initial messaging

      1.3 Build initial product hypothesis

      1.4 Size market opportunity

      1.5 Outline digital/tech requirements

      1.6 Competitive SWOT

      1.7 Select routes to market

      1.8 Craft GTM Strategy deck

      Phase 2

      2.1 Brand consistency check

      2.2 Formulate packaging and pricing

      2.3 Craft buyer-valid product concept

      2.4 Build campaign plan and targets

      2.5 Develop cost budgets across all areas

      2.6 Draft product business case

      2.7 Update GTM Strategy deck

      Phase 3

      3.1 Assess tech/tools support for all GTM phases

      3.2 Outline sales enablement and Customer Success plan

      3.3 Build awareness plan

      3.4 Finalize business case

      3.5 Final GTM Plan deck

      This phase will walk you through the following activities:

      1. Assess tech/tools support for all GTM phases
      2. Map lead generation plan
      3. Outline Customer Success plan
      4. Build awareness plan (PR/AR, etc.)
      5. Finalize product business case
      6. Final GTM planning deck and Steering Committee review

      This phase involves the following stakeholders:

      • Steering Committee
      • Working group leaders

      To complete this phase, you will need:

      Go-to-Market Strategy Presentation Template Go-to-Market Strategy Cost Budget and Revenue Forecast Workbook
      Sample of the Go-to-Market Strategy Presentation Template deliverable. Sample of the Go-to-Market Strategy Cost Budget and Revenue Forecast Workbook deliverable.
      Use the Go-to-Market Strategy Presentation Template to document the results from the following activities:
      • Documenting your GTM Strategy Stakeholders
      • Documenting your GTM Strategy Working Team
      Use the Go-to-Market Cost Budget and Revenue Forecast Workbook to:
      • Tally budgets from across key functions involved in the GTM Strategy
      • Compare with forecasted revenues to assess gross margins

      Step 3.1

      Assess Technology and Tools Support for Your GTM Strategy as Well as Future Phases of GTM

      Activities
      • 3.1.1 Have Marketing Operations document what tech stack improvements are required in order to get the team to a successful launch. Understand costs and implementation timelines and work it into the Go-to-Market Budget Workbook.

      This step will walk you through the following activities:

      • After completing your initial survey in Step 1, complete requirements building for needed technology and tools acquisition/upgrade in campaign management, sales opportunity management, and analytics.

      This step involves the following participants:

      • Project lead
      • Marketing operations/digital
      • IT

      Outcomes of this step

      • Build a business requirement against which to evaluate new/upgraded vendor tools to support the entire GTM process

      Phase 3 – Align functional plans with a compelling business case for product build

      Step 3.1 Step 3.2 Step 3.3 Step 3.4 Step 3.5

      3.1.1 Technology plan and investments

      Goal: Outline the results of our analysis and Info-Tech analyst guidance regarding supporting systems, tools, and technologies to support our go-to-market strategy

      1. Plans, timings, and incremental costs related to, but not limited to, the following apps/tools/technologies:
        1. Lead management/Marketing automation
        2. Marketing analytics
        3. Sales Opportunity Management System (OMS) and Configure, Price, and Quote (CPQ) applications
        4. Sales engagement
        5. Sales analytics
        6. Customer service and support/Customer interaction hub
        7. Customer data management and analytics
        8. Customer experience platforms
        9. Marketing content management
        10. Creative tools
        11. Share of voice and social platform management
        12. Etc.
      2. Go to the Go-to-Market Budget Workbook and complete by adding costs identified in above areas that are specific to this go-to-market strategy, Build, and Launch initiative. Record in the Go-to-Market Strategy Presentation completing the areas within the slides related to the Product and Launch Concepts and Business Case.

      Download the Go-to-Market Strategy Cost Budget and Revenue Forecast Workbook

      Download the Go-to-Market Strategy Presentation Template

      Step 3.2

      Outline Sales Enablement and Support for Customer Success to Include Onboarding and Ongoing Engagement

      Activities
      • 3.3.1 Sales Enablement – develop the sales enablement and training plan for Launch to include activities, responsible parties, dates for delivery, etc.

      This step will walk you through the following activities:

      • Finalize the customer success training and support plan
      • Onboarding scripts
      • Changes to help screens in application
      • Timing to plan for Quality Acceptance

      This step involves the following participants:

      • Project lead
      • Customer Success lead
      • Product management
      • Product marketing

      Outcomes of this step

      • Plan for creation of copy, assets, and rollout pan to support clients and client segments for Launch

      Phase 3 – Align functional plans with a compelling business case for product build

      Step 3.1 Step 3.2 Step 3.3 Step 3.4 Step 3.5

      3.2.1 Outline sales enablement

      Goal: Outline sales collateral, updates to sales proposals, CPQ, Opportunity Management Systems, and sales training

      1. Describe the requirements for sales enablement to include elements such as:
        1. Sales collateral
        2. Client-facing presentations
        3. Sales proposal updates
        4. Updates to Configure, Price, and Quote (CPQ) applications
        5. Updates to Opportunity Management System (OMS) applications
        6. Sales demo versions of the new product
        7. Sales communication plans
        8. Sales training and certification programs
      2. Go to the Go-to-Market Budget Workbook and add the costs identified in above areas that are specific to this go-to-market strategy, Build, and Launch initiative. Record as well in the Go-to-Market Strategy Presentation completing the areas within the slides related to the Product and Launch Concepts and Business Case.

      Download the Go-to-Market Strategy Cost Budget and Revenue Forecast Workbook

      Download the Go-to-Market Strategy Presentation Template

      3.2.2 Outline customer success

      Goal: Outline customer support/success requirements and plan

      1. Plans, timings, and incremental costs for the following:
        1. Onboarding scripts for the new solution
        2. Updates to retention lifecycle
        3. FAQ answers
        4. Updates to online help/support system
        5. “How-to” videos
        6. Live chat updates
        7. Updates to “provide feedback” system
        8. Updates to Quarterly Business Review slides
      2. Go to the Go-to-Market Budget Workbook and add the costs identified in above areas that are specific to this go-to-market strategy, Build, and Launch initiative. Record in the Go-to-Market Strategy Presentation and complete the areas within the slides related to the Product and Launch Concepts and Business Case.

      Download the Go-to-Market Strategy Cost Budget and Revenue Forecast Workbook

      Download the Go-to-Market Strategy Presentation Template

      Step 3.3

      Build an Awareness Plan Covering Media, Social Media, and Industry Analysts

      Activities
      • 3.4.1 Corp Comms/PR/AR – develop the overall awareness plans for executive interviews, articles placed, social drops, analyst briefing dates, and internal associate comms if required.

      This step will walk you through the following activities:

      • Outline outbound communications plans including press releases, social posts, etc.
      • Describe dates for AR outreach to covering analysts
      • Develop the internal communications plan

      This step involves the following participants:

      • Project lead
      • Corporate Comms lead
      • Creative
      • Analyst relations
      • Social media marketing lead

      Outcomes of this step

      • Plan for creation of copy, assets, and rollout pan to support awareness building, external communications, and internal communications if required

      Phase 3 – Align functional plans with a compelling business case for product build

      Step 3.1 Step 3.2 Step 3.3 Step 3.4 Step 3.5

      3.3.1 Internal communications plan

      Goal: Outline complete internal communications plan. For large-scale changes (i.e. rebranding, M&A, etc.) HR may drive significant volume of employee communications working with Corporate Comms

      1. Plans, timings, and incremental costs for the following:
        1. Complete a comms plan with dates, messages, and channels
        2. Team member roles and responsibilities
        3. Intranet article and posting schedules
        4. Creation of new office signage, merchandise, etc. for employee kits
        5. Pre-launch announcements schedule
        6. Launch day communications, events, and activities
        7. Post launch update schedule and messages for launch success
        8. Incremental staffing and resources/budget requirements
      2. Go to the Go-to-Market Budget Workbook and add costs identified in above areas that are specific to this go-to-market strategy, Build, and Launch initiative. Record as well in the Go-to-Market Strategy Presentation completing the areas related to the Product and Launch Concepts and Business Case.

      Download the Go-to-Market Strategy Cost Budget and Revenue Forecast Workbook

      Download the Go-to-Market Strategy Presentation Template

      3.3.2 PR and External Communications Plan

      Goal: Outline complete internal communications plan. For large scale changes (i.e. rebranding, M&A, etc.) HR may drive significant volume of employee communications working with Corporate Comms

      1. Plans, timings, and incremental costs for the following:
        1. List of Tier 1 and Tier 2 media authors covering the [product/initiative] market area
        2. Schedule of launch briefings, with any non-analyst influencers
        3. Timing of press releases
        4. Required supporting executives and stakeholders for each of the above meetings
        5. Slide deck/media kit for the above and planned questions to support needed feedback
        6. Media Site materials especially to support media questions and requests for briefings
        7. Social postings calendar of activities and key messages plan
        8. Publish data of [product/initiative] relevant articles with set-back schedules
        9. Cultivation of reference customers and client testimonials for media outreach
        10. Requirements for additional staffing to cover product/initiative new market and analysts
        11. Internal and external events calendar to invite media
      2. Go to the Go-to-Market Budget Workbook and add the costs identified in the above areas that are specific to this go-to-market strategy, Build, and Launch initiative. Record in the Go-to-Market Strategy Presentation by completing the areas related to the Product and Launch Concepts and Business Case.

      Download the Go-to-Market Strategy Cost Budget and Revenue Forecast Workbook

      Download the Go-to-Market Strategy Presentation Template

      3.3.3 Analyst relations plan

      Goal: Outline incremental costs in analyst communications, engagement, and access to research

      1. Plans, timings, and incremental costs for the following:
        1. List of Tier 1 and Tier 2 analysts for the [product/initiative] market area
        2. Schedule of inquiries, pre-launch briefings, launch briefings, and post-launch feedback
        3. Required supporting executives and stakeholders for each of the above meetings
        4. Analyst deck for each of the above and planned questions to support needed feedback
        5. Analyst Site materials to support 2nd and 3rd Tier analysts’ questions and requests for briefings
        6. Social postings calendar of activities and key messages
        7. Resources to respond to analyst blogs and/or social posts regarding your product/initiative area
        8. Timing of important and relevant analyst document/methodology publishing dates with set-back schedules
        9. Cultivation of reference customers and client testimonials to coincide with analyst outreach for research and for buyer review sites/reviews data gathering
        10. Requirements for additional staffing to cover product/initiative new market and analysts
        11. Events calendar where analysts will be presenting on this product/initiative market
      2. Go to the Go-to-Market Budget Workbook and add the costs identified in the above areas that are specific to this go-to-market strategy, Build and Launch initiative. Record in the Go-to-Market Strategy Presentation by completing the areas related to the Product and Launch Concepts and Business Case.

      Download the Go-to-Market Strategy Cost Budget and Revenue Forecast Workbook

      Download the Go-to-Market Strategy Presentation Template

      Step 3.4

      Finalize Product Business Case With Collaborative Input From Product, Sales, and Marketing

      Activities
      • 3.5.1 Convene the team to align sales, marketing, and product around the business case.

      This step will walk you through the following activities:

      • Refine the product business case initiated in Phase 2
      • Align product revenue forecast with sales revenue forecast
      • Align MVP features to be developed during “GTM – Build” with customer validated product-market fit

      This step involves the following participants:

      • Project lead
      • Product management
      • Product marketing

      Outcomes of this step

      • Product business case

      Phase 3 – Align functional plans with a compelling business case for product build

      Step 3.1 Step 3.2 Step 3.3 Step 3.4 Step 3.5

      3.4.1 Final product Build and Launch business case

      Goal: Beyond the product business case, factor in costs for technology, campaigning, sales enablement, and customer success in order to gain approval for Build and Launch

      1. Using the Go-to-Market Strategy Presentation, workstream leads and Go-to-Market Initiative leaders will finalize the anticipated incremental costs, and when compared to projected product revenues, present to the Steering Committee including CFO for final approval before moving to Build and Launch.
      2. To present a complete business case, key cost areas include:
        1. All the areas outlined up through Step 3.4 plus:
        2. Technology/MarTech Stack incremental costs
        3. Channel programs, branding/agency, pricing, packaging/product, and T&E incremental costs
        4. Campaign related – creative, content marketing, paid media, events, SEO, lists/data
        5. Sales Enablement, Customer Support/Success incremental costs
        6. Internal communications/events/activities/signage costs
        7. PR/AR/Media incremental costs
      3. Compare to final Sales/Product agreed projected revenues, in order to calculate estimated gross margins

      Go to the Go-to-Market Budget Workbook as outlined in prior steps and document final incremental costs and projected revenues and summarize within the Go-to-Market Strategy Presentation.

      Download the Go-to-Market Strategy Cost Budget and Revenue Forecast Workbook

      Download the Go-to-Market Strategy Presentation Template

      Product Build and Launch Business Case Checklist:

      • Acceptably large enough product market opportunity
      • Well-defined competitive differentiation
      • Buyer-validated product-market fit
      • Buyer-validated and competitive commercials (i.e. pricing, packaging)
      • An MVP with roadmap that aligns with buyer needs and buyer validated price points
      • A 24–36 month sales forecast with CRO sign-up and support for attainment
      • Incremental product development, tech, marketing, sales, customer success, AR/PR costs vs. forecasted revenues fall within acceptable margins

      Step 3.5

      Develop Your Final Executive Presentation to Request Approval and Proceed to GTM Build Phase

      Activities
      • 3.6.1 Update the Product, Launch, Journey, and Business Case slides included within the Go-to-Market Strategy Presentation Template with Phase 3 findings culminating in the business case.

      This step will walk you through the following activities:

      • Update the previously created slides with findings from Phase 3
      • Hold a Steering Committee meeting and present findings for approval

      This step involves the following participants:

      • Steering Committee
      • Workstream leads

      Outcomes of this step

      • GTM Strategy approved to move to GTM Build

      Phase 3 – Align functional plans with a compelling business case for product build

      Step 3.1 Step 3.2 Step 3.3 Step 3.4 Step 3.5

      3.5.1 Update your GTM Strategy deck for Align Steering Committee approval

      1. As you near completion of the Go-to-Market Strategy Phase – Align Step, an important test to pass before proceeding to the Design step of GTM Strategy, is to answer several key questions:
        1. Are Sales, Product, and Marketing all aligned and in agreement on the business case?
        2. Are the gross margin calculations acceptable to the Steering Committee? CFO? CEO?
      2. If the answer is “no” you need to return to prior steps and ensure completion.
      3. Pull together a summary review deck, schedule a meeting with the Steering Committee, present to-date findings for approval to move on to Build Phase.
      4. Once your final business case is accepted, you are ready to move on to the GTM Build and Launch phases. These phases are covered in sperate SoftwareReviews blueprints.

      Download the Go-to-Market Strategy Presentation Template

      Sample of the 'PLAN' section of the GTM Strategy optimization diagram with 'GTM Align Review' circled in red.

      The presentation you create contains:

      • Timelines and work plan updates
      • Tech stack needs/modifications
      • An expanded product concept to include packaging and pricing approach
      • Asset-type concepts for marketing campaigns, sales collateral, website, and social
      • Outline of initial Launch dates
      • Outline of initial customer success, awareness/PR/AR plans, and sales training plans
      • Final business case

      Summary of Accomplishment

      Problem Solved – A More Effective Go-to-Market Strategy

      By guiding your team through the Go-to-Market planning process applied to an actual GTM Strategy, you have built an important set of capabilities that underpins today’s well-managed software companies. By following the step-by-step process outlined in this blueprint, you have delivered a host of benefits that include the following:

      • Alignment of Product, Marketing, Sales, and Customer Success around a deeper understanding of your target buyers and what it takes to build competitive differentiation.
      • You have calculated your product market opportunity and whether it’s worth the investment in the long-term, and for the short term you have estimated gross margins as an important part of the business case.
      • Built executive support and confidence by leading a disparate team in complex decision making that is fact and evidence based to make more effective go/no go decisions related to investing in new products.
      • And finally, because you and your team have demonstrated their ability to align programs toward a common goal and program-manage a complex initiative through to successful completion, you have led your team to develop the “institutional muscle” to take on equally complex initiatives such as acquisition integration, rebranding, launching in a new region, etc.

      Therefore, developing the capabilities to manage a complex go-to-market strategy is akin to building company scalability and is sought after as a professional development opportunity that each executive should have on his/her résumé.

      If you would like additional support, contact us and we’ll make sure you get the professional expertise you need.

      Contact your account representative for more information.

      info@softwarereviews.com 1-888-670-8889

      Bibliography

      Acosta, Danette. “Average Customer Retention Rate by Industry.” Profitwell.com. Accessed Jan. 2022.

      Ashkenas, Ron, and Patrick Finn. “The Go-To-Market Approach Startups Need to Adopt.” Harvard Business Review, June 2016. Accessed Jun. 2021.

      Bilardi, Emma. “ How to Create Buyer Personas.” Product Marketing Alliance, July 2020. Accessed Dec. 2021.

      Cespedes, Frank V. “Defining a Post-Pandemic Channel Strategy.” Harvard Business Review, Apr. 2021. Accessed Jul. 2021.

      Chapman, Lawrence. “A Visual Guide to Product Launches.” Product Marketing Alliance. Accessed Jul. 2021.

      Chapman, Lawrence. “Everything You Need To Know About Go-To-Market Strategies.” Product Marketing Alliance. Accessed Jul. 2021.

      Christiansen, Clayton. “The Innovators Dilemma.” Harvard Business School Press, 1997.

      Drzewicki, Matt. “Digital Marketing Maturity: The Path to Success.” MIT Sloan Management Review. Accessed Dec. 2021.

      “Go-To-Market Refresher,” Product Marketing Alliance. Accessed Jul. 2021

      Harrison, Liz; Dennis Spillecke, Jennifer Stanley, and Jenny Tsai. “Omnichannel in B2B sales: The new normal in a year that has been anything but.” McKinsey & Company, 15 March, 2021. Accessed Dec. 2021.

      Jansen, Hasse. “Buyer Personas – 33 Mind Blowing Stats.” Boardview, 19 Feb. 2016. Accessed Jan. 2022.

      Scott, Ryan. “Creating a Brand Identity: 20 Questions to Consider.” Lean Labs, Jun 2021. Accessed Jul. 2021.

      Smith, Michael L., and James Erwin. “Role and Responsibility Charting (RACI).” DOCSearch. Accessed Jan. 2022. Web.

      “What is the Total Addressable Market (TAM).” Corporate Finance Institute (CFI), n.d. Accessed Jan. 2022.

      Related Software Reviews Research

      Sample of the Create a Buyer Persona and Journey research Create a Buyer Persona and Journey
      • A successful go-to-market strategy depends upon deep buyer understanding. Our Create a Buyer Persona and Journey blueprint will give you a step-by-step process that when followed will provide you and your team with that deep buyer understanding you need.
      • The Create a Buyer Persona and Journey blueprint provides you with an interview containing over 75 questions that, after capturing buyer answers and insights during interviews, will strengthen your value proposition, product market fit, lead gen engine and sales effectiveness.
      Sample of the Optimize Lead Generation With Lead Scoring research Optimize Lead Generation With Lead Scoring
      • Save time and money and improve your sales win rates when you apply our methodology to score contacts with your lead gen engine more accurately and pass better qualified leads over to your sellers.
      • Our methodology teaches marketers to develop your own lead scoring approach based upon lead/contact profile vs. your Ideal Customer Profile (ICP) and scores contact engagement. Applying the methodology to arrive at your own approach to scoring will mean reduced lead gen costs, higher conversion rates, and increased marketing influenced wins.

      Considerations for a Hub and Spoke Model When Deploying Infrastructure in the Cloud

      • Buy Link or Shortcode: {j2store}472|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Cloud Strategy
      • Parent Category Link: /cloud-strategy
      • The organization is planning to move resources to cloud or devise a networking strategy for their existing cloud infrastructure to harness value from cloud.
      • The right topology needs to be selected to deploy network level isolation, design the cloud for management efficiencies and provide access to shared services on cloud.
      • A perennial challenge for infrastructure on cloud is planning for governance vs flexibility which is often overlooked.

      Our Advice

      Critical Insight

      Don’t wait until the necessity arises to evaluate your networking in the cloud. Get ahead of the curve and choose the topology that optimizes benefits and supports organizational needs in the present and the future.

      Impact and Result

      • Define organizational needs and understand the pros and cons of cloud network topologies to strategize for the networking design.
      • Consider the layered complexities of addressing the governance vs. flexibility spectrum for your domains when designing your networks.

      Considerations for a Hub and Spoke Model When Deploying Infrastructure in the Cloud Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Considerations for a Hub and Spoke Model When Deploying Infrastructure in the Cloud Deck – A document to guide you through designing your network in the cloud.

      What cloud networking topology should you use? How do you provide access to shared resources in the cloud or hybrid infrastructure? What sits in the hub and what sits in the spoke?

      • Considerations for a Hub and Spoke Model When Deploying Infrastructure in the Cloud Storyboard
      [infographic]

      Further reading

      Considerations for a Hub and Spoke Model When Deploying Infrastructure in the Cloud

      Don't revolve around a legacy design; choose a network design that evolves with the organization.

      Analyst Perspective

      Cloud adoption among organizations increases gradually across both the number of services used and the amount those services are used. However, network builders tend to overlook the vulnerabilities of network topologies, which leads to complications down the road, especially since the structures of cloud network topologies are not all of the same quality. A network design that suits current needs may not be the best solution for the future state of the organization.

      Even if on-prem network strategies were retained for ease of migration, it is important to evaluate and identify the cloud network topology that can not only elevate the performance of your infrastructure in the cloud, but also that can make it easier to manage and provision resources.

      An "as the need arises" strategy will not work efficiently since changing network designs will change the way data travels within your network, which will then need to be adopted to existing application architectures. This becomes more complicated as the number of services hosted in the cloud grows.

      Keep a network strategy in place early on and start designing your infrastructure accordingly. This gives you more control over your networks and eliminates the need for huge changes to your infrastructure down the road.

      This is a picture of Nitin Mukesh

      Nitin Mukesh
      Senior Research Analyst, Infrastructure and Operations
      Info-Tech Research Group

      Executive Summary

      Your Challenge

      The organization is planning to move resources to the cloud or devise a networking strategy for their existing cloud infrastructure to harness value from the cloud.

      The right topology needs to be selected to deploy network level isolation, design the cloud for management efficiencies, and provide access to shared services in the cloud.

      A perennial challenge for infrastructure in the cloud is planning for governance vs. flexibility, which is often overlooked.

      Common Obstacles

      The choice of migration method may result in retaining existing networking patterns and only making changes when the need arises.

      Networking in the cloud is still new, and organizations new to the cloud may not be aware of the cloud network designs they can consider for their business needs.

      Info-Tech's Approach

      Define organizational needs and understand the pros and cons of cloud network topologies to strategize for the networking design.

      Consider the layered complexities of addressing the governance vs. flexibility spectrum for your domains when designing your networks.

      Insight Summary

      Don't wait until the necessity arises to evaluate your networking in the cloud. Get ahead of the curve and choose the topology that optimizes benefits and supports organizational needs in the present and future.

      Your challenge

      Selecting the right topology: Many organizations migrate to the cloud retaining a mesh networking topology from their on-prem design, or they choose to implement the mesh design leveraging peering technologies in the cloud without a strategy in place for when business needs change. While there may be many network topologies for on-prem infrastructure, the network design team may not be aware of the best approach in cloud platforms for their requirements, or a cloud networking strategy may even go overlooked during the migration.

      Finding the right cloud networking infrastructure for:

      • Management efficiencies
      • Network-level isolation of resources
      • Access to shared services

      Deciding between governance and flexibility in networking design: In the hub and spoke model, if a domain is in the hub, the greater the governance over it, and if it sits in the spoke, the higher the flexibility. Having a strategy for the most important domains is key. For example, some security belongs in the hub and some security belongs in the spoke. The tradeoff here is if it sits completely in the spoke, you give it a lot of freedom, but it becomes harder to standardize across the organization.

      Mesh network topology

      A mesh is a design where virtual private clouds (VPCs) are connected to each other individually creating a mesh network. The network traffic is fast and can be redirected since the nodes in the network are interconnected. There is no hierarchical relationship between the networks, and any two networks can connect with each other directly.

      In the cloud, this design can be implemented by setting up peering connections between any two VPCs. These VPCs can also be set up to communicate with each other internally through the cloud service provider's network without having to route the traffic via the internet.

      While this topology offers high redundancy, the number of connections grows tremendously as more networks are added, making it harder to scale a network using a mesh topology.

      Mesh Network on AWS

      This is an image of a Mesh Network on AWS

      Source: AWS, 2018

      Constraints

      The disadvantages of peering VPCs into a mesh quickly arise with:

      • Transitive connections: Transitive connections are not supported in the cloud, unlike with on-prem networking. This means that if there are two networks that need to communicate, a single peering link can be set up between them. However, if there are more than two networks and they all need to communicate, they should all be connected to each other with separate individual connections.
      • Cost of operation: The lack of transitive routing requires many connections to be set up, which adds up to a more expensive topology to operate as the number of networks grows. Cloud providers also usually limit the number of peering networks that can be set up, and this limit can be hit with as few as 100 networks.
      • Management: Mesh tends to be very complicated to set up, owing to the large number of different peering links that need to be established. While this may be manageable for small organizations with small operations, for larger organizations with robust cybersecurity practices that require multiple VPCs to be deployed and interconnected for communications, mesh opens you up to multiple points of failure.
      • Redundancy: With multiple points of failure already being a major drawback of this design, you also cannot have more than one peered connection between any two networks at the same time. This makes designing your networking systems for redundancy that much more challenging.
      Number of virtual networks 10 20 50 100
      Peering links required
      [(n-1)*n]/2
      45 190 1225 4950

      Proportional relationship of virtual networks to required peering links in a mesh topology

      Case study

      INDUSTRY: Blockchain
      SOURCE: Microsoft

      An organization with four members wants to deploy a blockchain in the cloud, with each member running their own virtual network. With only four members on the team, a mesh network can be created in the cloud with each of their networks being connected to each other, adding up to a total of 12 peering connections (four members with three connections each). While the members may all be using different cloud accounts, setting up connections between them will still be possible.

      The organization wants to expand to 15 members within the next year, with each new member being connected with their separate virtual networks. Once grown, the organization will have a total of 210 peering connections since each of the virtual networks will then need 14 peering connections. While this may still be possible to deploy, the number of connections makes it harder to manage and would be that much more difficult to deploy if the organization grows to even 30 or 40 members. The new scale of virtual connections calls for an alternative networking strategy that cloud providers offer – the hub and spoke topology.

      This is an image of the connections involved in a mesh network with four participants.

      Source: Microsoft, 2017

      Hub and spoke network topology

      In hub and spoke network design, each network is connected to a central network that facilitates intercommunication between the networks. The central network, also called the hub, can be used by multiple workloads/servers/services for hosting services and for managing external connectivity. Other networks connected to the hub through network peering are called spokes and host workloads.

      Communications between the workloads/servers/services on spokes pass in or out of the hub where they are inspected and routed. The spokes can also be centrally managed from the hub with IT rules and processes.

      A hub and spoke design enable a larger number of virtual networks to be interconnected as each network only needs one peered connection (to the hub) to be able to communicate with any other network in the system.

      Hub and Spoke Network on AWS

      This is an image of the Hub and Spoke Network on AWS

      What hub and spoke networks do better

      1. Ease of connectivity: Hub and spoke decreases the liabilities of scale that come from a growing business by providing a consistent connection that can be scaled easily. As more networks are added to an organization, each will only need to be connected once – to the hub. The number of connections is considerably lower than in a mesh topology and makes it easier to maintain and manage.
      2. Business agility and scalability: It is easier to increase the number of networks than in mesh, making it easier to grow your business into new channels with less time, investment, and risk.
      3. Data collection: With a hub and spoke design, all data flows through the hub – depending on the design, this includes all ingress and egress to and from the system. This makes it an excellent central network to collect all business data.
      4. Network-level isolation: Hub and spoke enables separation of workloads and tiers into different networks. This is particularly useful to ensure an issue affecting a network or a workload does not affect the rest.
      5. Network changes: Changes to a separated network are much easier to carry out knowing the changes made will not affect all the other connected networks. This reduces work-hours significantly when systems or applications need to be altered.
      6. Compliance: Compliance requirements such as SOC 1 and SOC 2 require separate environments for production, development, and testing, which can be done in a hub and spoke model without having to re-create security controls for all networks.

      Hub and spoke constraints

      While there are plenty of benefits to using this topology, there are still a few notable disadvantages with the design.

      Point-to-point peering

      The total number of total peered connections required might be lower than mesh, but the cost of running independent projects is cheaper on mesh as point-to-point data transfers are cheaper.

      Global access speeds with a monolithic design

      With global organizations, implementing a single monolithic hub network for network ingress and egress will slow down access to cloud services that users will require. A distributed network will ramp up the speeds for its users to access these services.

      Costs for a resilient design

      Connectivity between the spokes can fail if the hub site dies or faces major disruptions. While there are redundancy plans for cloud networks, it will be an additional cost to plan and build an environment for it.

      Leverage the hub and spoke strategy for:

      Providing access to shared services: Hub and spoke can be used to give workloads that are deployed on different networks access to shared services by placing the shared service in the hub. For example, DNS servers can be placed in the hub network, and production or host networks can be connected to the hub to access it, or if the central network is set up to host Active Directory services, then servers in other networks can act as spokes and have full access to the central VPC to send requests. This is also a great way to separate workloads that do not need to communicate with each other but all need access to the same services.

      Adding new locations: An expanding organization that needs to add additional global or domestic locations can leverage hub and spoke to connect new network locations to the main system without the need for multiple connections.

      Cost savings: Apart from having fewer connections than mesh that can save costs in the cloud, hub and spoke can also be used to centralize services such as DNS and NAT to be managed in one location rather than having to individually deploy in each network. This can bring down management efforts and costs considerably.

      Centralized security: Enterprises can deploy a center of excellence on the hub for security, and the spokes connected to it can leverage a higher level of security and increase resilience. It will also be easier to control and manage network policies and networking resources from the hub.

      Network management: Since each spoke is peered only once to the hub, detecting connectivity problems or other network issues is made simpler in hub and spoke than on mesh. A network manager deployed on the cloud can give access to network problems faster than on other topologies.

      Hub and spoke – mesh hybrid

      The advantages of using a hub and spoke model far exceed those of using a mesh topology in the cloud and go to show why most organizations ultimately end up using the hub and spoke as their networking strategy.

      However, organizations, especially large ones, are complex entities, and choosing only one model may not serve all business needs. In such cases, a hybrid approach may be the best strategy. The following slides will demonstrate the advantages and use cases for mesh, however limited they might be.

      Where it can be useful:

      An organization can have multiple network topologies where system X is a mesh and system Y is a hub and spoke. A shared system Z can be a part of both systems depending on the needs.

      An organization can have multiple networks interconnected in a mesh and some of the networks in the mesh can be a hub for a hub-spoke network. For example, a business unit that works on data analysis can deploy their services in a spoke that is connected to a central hub that can host shared services such as Active Directory or NAT. The central hub can then be connected to a regional on-prem network where data and other shared services can be hosted.

      Hub and spoke – mesh hybrid network on AWS

      This is an image of the Hub and spoke – mesh hybrid network on AWS

      Why mesh can still be useful

      Benefits Of Mesh

      Use Cases For Mesh

      Security: Setting up a peering connection between two VPCs comes with the benefit of improving security since the connection can be private between the networks and can isolate public traffic from the internet. The traffic between the networks never has to leave the cloud provider's network, which helps reduce a class of risks.

      Reduced network costs: Since the peered networks communicate internally through the cloud's internal networks, the data transfer costs are typically cheaper than over the public internet.

      Communication speed: Improved network latency is a key benefit from using mesh because the peered traffic does not have to go over the public internet but rather the internal network. The network traffic between the connections can also be quickly redirected as needed.

      Higher flexibility for backend services: Mesh networks can be desirable for back-end services if egress traffic needs to be blocked to the public internet from the deployed services/servers. This also helps avoid having to set up public IP or network address translation (NAT) configurations.

      Connecting two or more networks for full access to resources: For example, consider an organization that has separate networks for each department, which don't all need to communicate with each other. Here, a peering network can be set up only between the networks that need to communicate with full or partial access to each other such as finance to HR or accounting to IT.

      Specific security or compliance need: Mesh or VPC peering can also come in handy to serve specific security needs or logging needs that require using a network to connect to other networks directly and in private. For example, global organizations that face regulatory requirements of storing or transferring data domestically with private connections.

      Systems with very few networks that do not need internet access: Workloads deployed in networks that need to communicate with each other but do not require internet access or network address translation (NAT) can be connected using mesh especially when there are security reasons to keep them from being connected to the main system, e.g. backend services such as testing environments, labs, or sandboxes can leverage this design.

      Designing for governance vs. flexibility in hub and spoke

      Governance and flexibility in managing resources in the cloud are inversely proportional: The higher the governance, the less freedom you have to innovate.

      The complexities of designing an organization's networks grow with the organization as it becomes global and takes on more services and lines of business. Organizations that choose to deploy the hub and spoke model face a dilemma in choosing between governance and flexibility for their networks. Organizations need to find that sweet spot to find the right balance between how much they want to govern their systems, mainly for security- and cost-monitoring, and how much flexibility they want to provide for innovation and other operations, since the two usually tend to have an inverse relationship.

      This decision in hub and spoke usually means that the domains chosen for higher governance must be placed in the hub network, and the domains that need more flexibility in a spoke. The key variables in the following slide will help determine the placement of the domain and will depend entirely on the organization's context.

      The two networking patterns in the cloud have layered complexities that need to be systematically addressed.

      Designing for governance vs. flexibility in hub and spoke

      If a network has more flexibility in all or most of these domains, it may be a good candidate for a spoke-heavy design; otherwise, it may be better designed in a hub-centric pattern.

      • Function: The function the domain network is assigned to and the autonomy the function needs to be successful. For example, software R&D usually requires high flexibility to be successful.
      • Regulations: The extent of independence from both internal and external regulatory constraints the domain has. For example, a treasury reporting domain typically has high internal and external regulations to adhere to.
      • Human resources: The freedom a domain has to hire and manage its resources to perform its function. For example, production facilities in a huge organization have the freedom to manage their own resources.
      • Operations: The freedom a domain has to control its operations and manage its own spending to perform its functions. For example, governments usually have different departments and agencies, each with its own budget to perform its functions.
      • Technology: The independence and the ability a domain has to manage its selection and implementation of technology resources in the cloud. For example, you may not want a software testing team to have complete autonomy to deploy resources.

      Optimal placement of services between the hub and spoke

      Shared services and vendor management

      Resources that are shared between multiple projects or departments or even by the entire organization should be hosted on the hub network to simplify sharing these services. For example, e-learning applications that may be used by multiple business units to train their teams, Active Directory accessed by most teams, or even SAAS platforms such as O365 and Salesforce can leverage buying power and drive down the costs for the organization. Shared services should also be standardized across the organization and for that, it needs to have high governance.

      Services that are an individual need for a network and have no preexisting relationship with other networks or buying power and scale can be hosted in a spoke network. For example, specialized accounting software used exclusively by the accounting team or design software used by a single team. Although the services are still a part of the wider network, it helps separate duties from the shared services network and provides flexibility to the teams to customize and manage their services to suit their individual needs.

      Network egress and interaction

      Network connections, be they in the cloud or hybrid-cloud, are used by everyone to either connect to the internet, access cloud services, or access the organization's data center. Since this is a shared service, a centralized networking account must be placed in the hub for greater governance. Interactions between the spokes in a hub and spoke model happens through the hub, and providing internet access to the spokes through the hub can help leverage cost benefits in the cloud. The network account will perform routing duties between the spokes, on-prem assets, and egress out to the internet.

      For example, NAT gateways in the cloud that are managed services are usually charged by the hour, and deploying NAT on each spoke can be harder to manage and expensive to maintain. A NAT gateway deployed in a central networking hub can be accessed by all spokes, so centralizing it is a great option.

      Note that, in some cases, when using edge locations for data transfers, it may be cost effective to deploy a NAT in the spoke, but such cases usually do not apply to most organizational units.

      A centralized network hub can also be useful to configure network policies and network resources while organizational departments can configure non-network resources, which helps separate responsibilities for all the spokes in the system. For example, subnets and routes can be controlled from the central network hub to ensure standardized network policies across the network.

      Security

      While there needs to be security in the hub and the spokes individually, finding the balance of operation can make the systems more robust. Hub and spoke design can be an effective tool for security when a principal security hub is hosted in the hub network. The central security hub can collect data from the spokes as well as non-spoke sources such as regulatory bodies and threat intelligence providers, and then share the information with the spokes.

      Threat information sharing is a major benefit of using this design, and the hub can take actions to analyze and enrich the data before sharing it with spokes. Shared services such as threat intelligence platforms (TIP) can also benefit from being centralized when stationed in the hub. A collective defense approach between the hub and spoke can be very successful in addressing sophisticated threats.

      Compliance and regulatory requirements such as HIPAA can also be placed in the hub, and the spokes connected to it can make use of it instead of having to deploy it in each spoke individually.

      Cloud metering

      The governance vs. flexibility paradigm usually decides the placement of cloud metering, i.e. if the organization wants higher control over cloud costs, it should be in the central hub, whereas if it prioritizes innovation, the spokes should be allowed to control it. Regardless of the placement of the domain, the costs can be monitored from the central hub using cloud-native monitoring tools such as Azure Monitor or any third-party software deployed in the hub.

      For ease of governance and since resources are usually shared at a project level, most cloud service providers suggest that an individual metering service be placed in the spokes. The centralized billing system of the organization, however, can make use of scale and reserved instances to drive down the costs that the spokes can take advantage of. For example, billing and access control resources are placed in the lower levels in GCP to enable users to set up projects and perform their tasks. These billing systems in the lower levels are then controlled by a centralized billing system to decide who pays for the resources provisioned.

      Don't get stuck with your on-prem network design. Design for the cloud.

      1. Peering VPCs into a mesh design can be an easy way to get onto the cloud, but it should not be your networking strategy for the long run.
      2. Hub and spoke network design offers more benefits than any other network strategy to be adopted only when the need arises. Plan for the design early on and keep a strategy in place to deploy it as early as possible.
      3. Hybrid of mesh and hub and spoke will be very useful in connecting multiple large networks especially when they need to access the same resources without having to route the traffic over the internet.
      4. Governance vs. flexibility should be a key consideration when designing for hub and spoke to leverage the best out of your infrastructure.
      5. Distribute domains across the hub or spokes to leverage costs, security, data collection, and economies of scale, and to foster secure interactions between networks.

      Cloud network design strategy

      This is an image of the framework for developing a Cloud Network Design Strategy.

      Bibliography

      Borschel, Brett. "Azure Hub Spoke Virtual Network Design Best Practices." Acendri Solutions, 13 Jan. 2022. Web.
      Singh, Garvit. "Amazon Virtual Private Cloud Connectivity Options." AWS, January 2018. Web.
      "What Is the Hub and Spoke Information Sharing Model?" Cyware, 16 Aug. 2021. Web.
      Youseff, Lamia. "Mesh and Hub-and-Spoke Networks on Azure." Microsoft, Dec. 2017. Web.

      Optimize IT Project Intake, Approval, and Prioritization

      • Buy Link or Shortcode: {j2store}433|cart{/j2store}
      • member rating overall impact: 9.5/10 Overall Impact
      • member rating average dollars saved: $124,419 Average $ Saved
      • member rating average days saved: 31 Average Days Saved
      • Parent Category Name: Portfolio Management
      • Parent Category Link: /portfolio-management
      • Companies are approving more projects than they can deliver. Most organizations say they have too many projects on the go and an unmanageable and ever-growing backlog of things to get to.
      • While organizations want to achieve a high throughput of approved projects, many are unable or unwilling to allocate an appropriate level of IT resourcing to adequately match the number of approved initiatives.
      • Portfolio management practices must find a way to accommodate stakeholder needs without sacrificing the portfolio to low-value initiatives that do not align with business goals.

      Our Advice

      Critical Insight

      • Approve only the right projects that you have capacity to deliver. Failure to align projects with strategic goals and resource capacity are the most common causes of portfolio waste across organizations.
      • More time spent with stakeholders during the ideation phase to help set realistic expectations for stakeholders and enhance visibility into IT’s capacity and processes is key to both project and organizational success.
      • Too much intake red tape will lead to an underground economy of projects that escape portfolio oversight, while too little intake formality will lead to a wild west of approvals that could overwhelm the PMO. Finding the right balance of intake formality for your organization is the key to establishing a PMO that has the ability to focus on the right things.

      Impact and Result

      • Establish an effective scorecard to create transparency into IT’s capacity and processes. This will help set realistic expectations for stakeholders, eliminate “squeaky wheel” prioritization, and give primacy to the highest value requests.
      • Build a centralized process that funnels requests into a single intake channel to eliminate confusion and doubt for stakeholders and staff while also reducing off-the-grid initiatives.
      • Clearly define a series of project approval steps, and communicate requirements for passing them.
      • Develop practices that incorporate the constraint of resource capacity to cap the amount of project approvals to that which is realistic to help improve the throughput of projects through the portfolio.

      Optimize IT Project Intake, Approval, and Prioritization Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you should optimize project intake, approval, and prioritization process, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Set realistic goals for optimizing project intake, approval, and prioritization process

      Get value early by piloting a scorecard for objectively determining project value, and then examine your current state of project intake to set realistic goals for optimizing the process.

      • Optimize Project Intake, Approval, and Prioritization – Phase 1: Set Realistic Goals for Optimizing Process
      • Project Value Scorecard Development Tool
      • Project Intake Workflow Template - Visio
      • Project Intake Workflow Template - PDF
      • Project Intake, Approval, and Prioritization SOP

      2. Build an optimized project intake, approval, and prioritization process

      Take a deeper dive into each of the three processes – intake, approval, and prioritization – to ensure that the portfolio of projects is best aligned to stakeholder needs, strategic objectives, and resource capacity.

      • Optimize Project Intake, Approval, and Prioritization – Phase 2: Build New Optimized Processes
      • Light Project Request Form
      • Detailed Project Request Form
      • Project Intake Classification Matrix
      • Benefits Commitment Form Template
      • Proposed Project Technology Assessment Tool
      • Fast Track Business Case Template
      • Comprehensive Business Case Template
      • Project Intake and Prioritization Tool

      3. Integrate the new optimized processes into practice

      Plan a course of action to pilot, refine, and communicate the new optimized process using Info-Tech’s expertise in organizational change management.

      • Optimize Project Intake, Approval, and Prioritization – Phase 3: Integrate the New Processes into Practice
      • Intake Process Pilot Plan Template
      • Project Backlog Manager
      • Intake and Prioritization Impact Analysis Tool
      [infographic]

      Workshop: Optimize IT Project Intake, Approval, and Prioritization

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Refocus on Project Value to Set Realistic Goals

      The Purpose

      Set the course of action for optimizing project intake, approval, and prioritization by examining the current state of the process, the team, the stakeholders, and the organization as a whole.

      Key Benefits Achieved

      The overarching goal of optimizing project intake, approval, and prioritization process is to maximize the throughput of the best projects. To achieve this goal, one must have a clear way to determine what are “the best” projects.

      Activities

      1.1 Define the criteria with which to determine project value.

      1.2 Envision your target state for your optimized project intake, approval, and prioritization process.

      Outputs

      Draft project valuation criteria

      Examination of current process, definition of process success criteria

      2 Examine, Optimize, and Document the New Process

      The Purpose

      Drill down into, and optimize, each of the project intake, approval, and prioritization process.

      Key Benefits Achieved

      Info-Tech’s methodology systemically fits the project portfolio into its triple constraint of stakeholder needs, strategic objectives, and resource capacity, to effectively address the challenges of establishing organizational discipline for project intake.

      Activities

      2.1 Conduct retrospectives of each process against Info-Tech’s best practice methodology for project intake, approval, and prioritization process.

      2.2 Pilot and customize a toolbox of deliverables that effectively captures the right amount of data developed for informing the appropriate decision makers for approval.

      Outputs

      Documentation of new project intake, approval, and prioritization process

      Tools and templates to aid the process

      3 Pilot, Plan, and Communicate the New Process

      The Purpose

      Reduce the risks of prematurely implementing an untested process.

      Methodically manage the risks associated with organizational change and maximize the likelihood of adoption for the new process.

      Key Benefits Achieved

      Engagement paves the way for smoother adoption. An “engagement” approach (rather than simply “communication”) turns stakeholders into advocates who can help boost your message, sustain the change, and realize benefits without constant intervention or process command-and-control.

      Activities

      3.1 Create a plan to pilot your intake, approval, and prioritization process to refine it before rollout.

      3.2 Analyze the impact of organizational change through the eyes of PPM stakeholders to gain their buy-in.

      Outputs

      Process pilot plan

      Organizational change communication plan

      Further reading

      Optimize IT Project Intake, Approval, and Prioritization

      Decide which IT projects to approve and when to start them.

      ANALYST PERSPECTIVE

      Capacity-constrained intake is the only sustainable path forward.

      "For years, the goal of project intake was to select the best projects. It makes sense and most people take it on faith without argument. But if you end up with too many projects, it’s a bad strategy. Don’t be afraid to say NO or NOT YET if you don’t have the capacity to deliver. People might give you a hard time in the near term, but you’re not helping by saying YES to things you can’t deliver."

      Barry Cousins,

      Senior Director, PMO Practice

      Info-Tech Research Group

      Our understanding of the problem

      This Research Is Designed For:

      • PMO Directors who have trouble with project throughput
      • CIOs who want to improve IT’s responsive-ness to changing needs of the business
      • CIOs who want to maximize the overall business value of IT’s project portfolio

      This Research Will Help You:

      • Align project intake and prioritization with resource capacity and strategic objectives
      • Balance proactive and reactive demand
      • Reduce portfolio waste on low-value projects
      • Manage project delivery expectations and satisfaction of business stakeholders
      • Get optimized project intake processes off the ground with low-cost, high-impact tools and templates

      This Research Will Also Assist:

      • C-suite executives and steering committee members who want to ensure IT’s successful delivery of projects with high business impact
      • Project sponsors and product owners who seek visibility and transparency toward proposed projects

      This Research Will Help Them:

      • Ensure that high-impact projects are approved and delivered in a timely manner
      • Gain clarity and visibility in IT’s project approval process
      • Improve your understanding of IT’s capacity to set more realistic expectations on what gets done

      Executive summary

      Situation

      • As a portfolio manager, you do not have the authority to decline or defer new projects – but you also lack the capacity to realistically say yes to more project work.
      • Stakeholders have unrealistic expectations of what IT can deliver. Too many projects are approved, and it may be unclear why their project is delayed or in a state of suspended animation.

      Complication

      • The cycle of competition is making it increasingly difficult to follow a longer-term strategy during project intake, making it unproductive to approve projects for any horizon longer than one to two years.
      • As project portfolios become more aligned to “transformative” projects, resourcing for smaller, department-level projects becomes increasingly opaque.

      Resolution

      • Establish an effective scorecard to create transparency into IT’s capacity and processes. This will help set realistic expectations for stakeholders, eliminate “squeaky wheel” prioritization, and give primacy to the highest value requests.
      • Build a centralized process that funnels requests into a single intake channel to eliminate confusion and doubt for stakeholders and staff while also reducing off-the-grid initiatives.
      • Clearly define a series of project approval steps, and communicate requirements for passing them.
      • Developing practices that incorporate the constraint of resource capacity to cap the amount of project approvals to that which is realistic will help improve the throughput of projects through the portfolio.

      Info-Tech Insight

      1. Approve only the right projects… Counterbalance stakeholder needs with strategic objectives of the business and that of IT, in order to maintain the value of your project portfolio at a high level.
      2. …that you have capacity to deliver. Resource capacity-informed project approval process enables you to avoid biting off more than you can chew and, over time, build a track record of fulfilling promises to deliver on projects.

      Most organizations are good at approving projects, but bad at starting them – and even worse at finishing them

      Establishing project intake discipline should be a top priority from a long-term strategy and near-term tactical perspective.

      Most organizations approve more projects than they can finish. In fact, many approve more than they can even start, leading to an ever-growing backlog where project ideas – often good ones – are never heard from again.

      The appetite to approve more runs directly counter to the shortage of resources that plagues most IT departments. This tension of wanting more from less suggests that IT departments need to be more disciplined in choosing what to take on.

      Info-Tech’s data shows that most IT organizations struggle with their project backlog (Source: N=397 organizations, Info-Tech Research Group PPM Current State Scorecard, 2017).

      “There is a minimal list of pending projects”

      A bar graph is depicted. It has 5 bars to show that when it comes to minimal lists of pending projects, 34% strongly disagree, 35% disagree, and 21% are ambivalent. Only 7% agree and 3% strongly agree.

      “Last year we delivered the number of projects we anticipated at the start of the year”

      A bar graph is depicted. It has 5 bars to show that when it comes to the number of projects anticipated at the start of the year, they were delivered. Surveyors strongly disagreed at 24%, disagreed at 31%, and were ambivalent at 30%. Only 13% agreed and 2% strongly agreed.

      The concept of fiduciary duty demonstrates the need for better discipline in choosing what projects to take on

      Unless someone is accountable for making the right investment of resource capacity for the right projects, project intake discipline cannot be established effectively.

      What is fiduciary duty?

      Officers and directors owe their corporation the duty of acting in the corporation’s best interests over their own. They may delegate the responsibility of implementing the actions, but accountability can't be delegated; that is, they have the authority to make choices and are ultimately answerable for them.

      No question is more important to the organization’s bottom line. Projects directly impact the bottom line because they require investment of resource time and money for the purposes of realizing benefits. The scarcity of resources requires that choices be made by those who have the right authority.

      Who approves your projects?

      Historically, the answer would have been the executive layer of the organization. However, in the 1990s management largely abdicated its obligation to control resources and expenditures via “employee empowerment.”

      Controls on approvals became less rigid, and accountability for choosing what to do (and not do) shifted onto the shoulders of the individual worker. This creates a current paradigm where no one is accountable for the malinvestment…

      …of resources that comes from approving too many projects. Instead, it’s up to individual workers to sink or swim as they attempt to reconcile, day after day, seemingly infinite organizational demand with their finite supply of working hours.

      Ad hoc project selection schemes do not work

      Without active management, reconciling the imbalance between demand with available work hours is a struggle that results largely in one of these two scenarios:

      “Squeaky wheel”: Projects with the most vocal stakeholders behind them are worked on first.

      • IT is seen to favor certain lines of business, leading to disenfranchisement of other stakeholders.
      • Everything becomes the highest priority, which reinforces IT’s image as a firefighter, rather than a business value contributor
      • High-value projects without vocal support never get resourced; opportunities are missed.

      “First in, first out”: Projects are approved and executed in the order they are requested.

      • Urgent or important projects for the business languish in the project backlog; opportunities are missed.
      • Low-value projects dominate the project portfolio.
      • Stakeholders leave IT out of the loop and resort to “underground economy” for getting their needs addressed.

      80% of organizations feel that their portfolios are dominated by low-value initiatives that do not deliver value to the business (Source: Cooper).

      Approve the right projects that you have capacity to deliver by actively managing the intake of projects

      Project intake, approval, and prioritization (collectively “project intake”) reconciles the appetite for new projects with available resource capacity and strategic goals.

      Project intake is a key process of project portfolio management (PPM). The Project Management Institute (PMI) describes PPM as:

      "Interrelated organizational processes by which an organization evaluates, selects, prioritizes, and allocates its limited internal resources to best accomplish organizational strategies consistent with its vision, mission, and values."

      (PMI, Standard for Portfolio Management, 3rd ed.)

      Triple Constraint Model of the Project Portfolio

      Project Intake:

      • Stakeholder Need
      • Strategic Objectives
      • Resource Capacity

      All three components are required for the Project Portfolio

      Organizations practicing PPM recognize available resource capacity as a constraint and aim to select projects – and commit the said capacity – to projects that:

      1. Best satisfy the stakeholder needs that constantly change with the market
      2. Best align to the strategic objectives and contribute the most to business
      3. Have sufficient resource capacity available to best ensure consistent project throughput

      92% vs. 74%: 92% of high-performing organizations in PPM report that projects are well aligned to strategic initiatives vs. 74% of low performers (PMI, 2015).

      82% vs. 55%: 82% of high-performing organizations in PPM report that resources are effectively reallocated across projects vs. 55% of low performers (PMI, 2015)

      Info-Tech’s data demonstrates that optimizing project intake can also improve business leaders’ satisfaction of IT

      CEOs today perceive IT to be poorly aligned to business’ strategic goals:

      43% of CEOs believe that business goals are going unsupported by IT (Source: Info-Tech’s CEO-CIO Alignment Survey (N=124)).

      60% of CEOs believe that improvement is required around IT’s understanding of business goals (Source: Info-Tech’s CEO-CIO Alignment Survey (N=124)).

      Business leaders today are generally dissatisfied with IT:

      30% of business stakeholders are supporters of their IT departments (Source: Info-Tech’s CIO Business Vision Survey (N=21,367)).

      The key to improving business satisfaction with IT is to deliver on projects that help the business achieve its strategic goals:

      A chart is depicted to show a list of reported important projects, and then reordering the projects based on actual importance.
      Source: Info-Tech’s CIO Business Vision Survey (N=21,367)

      Optimized project intake not only improves the project portfolio’s alignment to business goals, but provides the most effective way to improve relationships with IT’s key stakeholders.

      Benchmark your own current state with overall & industry-specific data using Info-Tech’s Diagnostic Program.

      However, establishing organizational discipline for project intake, approval, and prioritization is difficult

      Capacity awareness

      Many IT departments struggle to realistically estimate available project capacity in a credible way. Stakeholders question the validity of your endeavor to install capacity-constrained intake process, and mistake it for unwillingness to cooperate instead.

      Many moving parts

      Project intake, approval, and prioritization involve the coordination of various departments. Therefore, they require a great deal of buy-in and compliance from multiple stakeholders and senior executives.

      Lack of authority

      Many PMOs and IT departments simply lack the ability to decline or defer new projects.

      Unclear definition of value

      Defining the project value is difficult because there are so many different and conflicting ways that are all valid in their own right. However, without it, it's impossible to fairly compare among projects to select what's "best."

      Establishing intake discipline requires a great degree of cooperation and conformity among stakeholders that can be cultivated through strong processes.

      Info-Tech’s intake, approval, and prioritization methodology systemically fits the project portfolio to its triple constraint

      Info-Tech’s Methodology

      Info-Tech’s Methodology
      Project Intake Project Approval Project Prioritization
      Project requests are submitted, received, triaged, and scoped in preparation for approval and prioritization. Business cases are developed, evaluated, and selected (or declined) for investment, based on estimated value and feasibility. Work is scheduled to begin, based on relative value, urgency, and availability of resources.
      Stakeholder Needs Strategic Objectives Resource Capacity
      Project Portfolio Triple Constraint

      Info-Tech’s methodology for optimizing project intake delivers extraordinary value, fast

      In the first step of the blueprint, you will prototype a set of scorecard criteria for determining project value.

      Our methodology is designed to tackle your hardest challenge first to deliver the highest-value part of the deliverable. Since the overarching goal of optimizing project intake, approval, and prioritization process is to maximize the throughput of the best projects, one must define how “the best projects” are determined.

      In nearly all instances…a key challenge for the PPM team is reaching agreement over how projects should rank.

      – Merkhofer

      A Project Value Scorecard will help you:

      • Evolve the discussions on project and portfolio value beyond a theoretical concept
      • Enable apples-to-apples comparisons amongst many different kinds of projects

      The Project Value Scorecard Development Tool is designed to help you develop the project valuation scheme iteratively. Download the pre-filled tool with content that represents a common case, and then, customize it with your data.

      A screenshot of Info-Tech's Project Value Scorecard Development Tool

      This blueprint provides a clear path to maximizing your chance of success in optimizing project intake

      Info-Tech’s practical, tactical research is accompanied by a suite of tools and templates to accelerate your process optimization efforts.

      Organizational change and stakeholder management are critical elements of optimizing project intake, approval, and prioritization processes because they require a great degree of cooperation and conformity among stakeholders, and the list of key stakeholders are long and far-reaching.

      This blueprint will provide a clear path to not only optimize the processes themselves, but also for the optimization effort itself. This research is organized into three phases, each requiring a few weeks of work at your team’s own pace – or all in one week, through a workshop facilitated by Info-Tech analysts.

      Set Realistic Goals for Optimizing Project Intake, Approval, and Prioritization

      Tools and Templates:

      • Project Value Scorecard Development Tool (.xlsx)
      • PPM Assessment Report (Info-Tech Diagnostics)
      • Standard Operating Procedure Template (.docx)

      Build Optimized Project Intake, Approval, and Prioritization Processes

      Tools and Templates:

      • Project Request Forms (.docx)
      • Project Classification Matrix (.xlsx)
      • Benefits Commitment Form (.xlsx)
      • Proposed Project Technology Assessment Tool (.xlsx)
      • Business Case Templates (.docx)
      • Intake and Prioritization Tool (.xlsx)

      Integrate the Newly Optimized Processes into Practice

      Tools and Templates:

      • Process Pilot Plan Template (.docx)
      • Impact Assessment and Communication Planning Tool (.xlsx)

      Info-Tech’s approach to PPM is informed by industry best practices and rooted in practical insider research

      Info-Tech uses PMI and ISACA frameworks for areas of this research.

      The logo for PMI is in the picture.

      PMI’s Standard for Portfolio Management, 3rd ed. is the leading industry framework, proving project portfolio management best practices and process guidelines.

      The logo for COBIT 5 is in the picture.

      COBIT 5 is the leading framework for the governance and management of enterprise IT.

      In addition to industry-leading frameworks, our best-practice approach is enhanced by the insights and guidance from our analysts, industry experts, and our clients.

      Info-Tech's logo is shown.

      33,000+

      Our peer network of over 33,000 happy clients proves the effectiveness of our research.

      1,000+

      Our team conducts 1,000+ hours of primary and secondary research to ensure that our approach is enhanced by best practices.

      Deliver measurable project intake success for your organization with this blueprint

      Measure the value of your effort to track your success quantitatively and demonstrate the proposed benefits, as you aim to do so with other projects through improved PPM.

      Optimized project intake, approval, and prioritization processes lead to a high PPM maturity, which will improve the successful delivery and throughput of your projects, resource utilization, business alignment, and stakeholder satisfaction ((Source: BCG/PMI).

      A double bar graph is depicted to show high PPM maturity yields measurable benefits. It covers 4 categories: Management for individual projects, financial performance, strategy implementation, and organizational agility.

      Measure your success through the following metrics:

      • Reduced turnaround time between project requests and initial scoping
      • Number of project proposals with articulated benefits
      • Reduction in “off-the-grid” projects
      • Team satisfaction and workplace engagement
      • PPM stakeholder satisfaction score from business stakeholders: see Info-Tech’s PPM Customer Satisfaction Diagnostics

      $44,700: In the past 12 months, Info-Tech clients have reported an average measured value of $44,700 from undertaking a guided implementation of this research.

      Add your own organization-specific goals, success criteria, and metrics by following the steps in the blueprint.

      Case Study: Financial Services PMO prepares annual planning process with Project Value Scorecard Development Tool

      CASE STUDY

      Industry: Financial Services

      Source: Info-Tech Client

      Challenge

      PMO plays a diverse set of roles, including project management for enterprise projects (i.e. PMI’s “Directive” PMO), standards management for department-level projects (i.e. PMI’s “Supportive” PMO), process governance of strategic projects (i.e. PMI’s “Controlling” PMO), and facilitation / planning / reporting for the corporate business strategy efforts (i.e. Enterprise PMO).

      To facilitate the annual planning process, the PMO needed to develop a more data-driven and objective project intake process that implicitly aligned with the corporate strategy.

      Solution

      Info-Tech’s Project Value Scorecard tool was incorporated into the strategic planning process.

      Results

      The scorecard provided a simple way to list the competing strategic initiatives, objectively score them, and re-sort the results on demand as the leadership chooses to switch between ranking by overall score, project value, ability to execute, strategic alignment, operational alignment, and feasibility.

      The Project Value Scorecard provided early value with multiple options for prioritized rankings.

      A screenshot of the Project Value Scorecard is shown in the image.

      Info-Tech offers various levels of support to best suit your needs

      DIY Toolkit

      “Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful.”

      Guided Implementation

      “Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track.”

      Workshop

      “We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place.”

      Consulting

      “Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project.”

      Diagnostics and consistent frameworks used throughout all four options

      Optimize Project Intake, Approval, and Prioritization – project overview

      1. Set Realistic Goals for Optimizing Process 2. Build New Optimized Processes 3. Integrate the New Processes into Practice
      Best-Practice Toolkit

      1.1 Define the criteria with which to determine project value.


      2.1 Streamline intake to manage stakeholder expectations.

      2.2 Set up steps of project approval to maximize strategic alignment while right-sizing the required effort.

      2.3 Prioritize projects to maximize the value of the project portfolio within the constraint of resource capacity.

      3.1 Pilot your intake, approval, and prioritization process to refine it before rollout.

      3.2 Analyze the impact of organizational change through the eyes of PPM stakeholders to gain their buy-in.

      Guided Implementations
      • Introduce Project Value Scorecard Development Tool and pilot Info-Tech’s example scorecard on your own backlog.
      • Map current project intake, approval, and prioritization process and key stakeholders.
      • Set realistic goals for process optimization.
      • Improve the management of stakeholder expectations with an optimized intake process.
      • Improve the alignment of the project portfolio to strategic objectives with an optimized approval process.
      • Enable resource capacity-constrained greenlighting of projects with an optimized prioritization process.
      • Create a process pilot strategy with supportive stakeholders.
      • Conduct a change impact analysis for your PPM stakeholders to create an effective communication strategy.
      • Roll out the new process and measure success.
      Onsite Workshop

      Module 1:

      Refocus on Project Value to Set Realistic Goals for Optimizing Project Intake, Approval, and Prioritization Process

      Module 2:

      Examine, Optimize, and Document the New Project Intake, Approval, and Prioritization Process

      Module 3:

      Pilot, Plan, and Communicate the New Process and Its Required Organizational Changes

      Phase 1 Outcome:
      • Draft project valuation criteria
      • Examination of current process
      • Definition of process success criteria
      Phase 2 Outcome:
      • Documentation of new project intake, approval, and prioritization process
      • Tools and templates to aid the process
      Phase 3 Outcome:
      • Process pilot plan
      • Organizational change communication plan

      Workshop overview

      Contact your account representative or email Workshops@InfoTech.com for more information.

      Workshop Day 1 Workshop Day 2 Workshop Day 3 Workshop Day 4 Workshop Day 5
      Activities

      Benefits of optimizing project intake and project value definition

      1.1 Complete and review PPM Current State Scorecard Assessment

      1.2 Define project value for the organization

      1.3 Engage key PPM stakeholders to iterate on the scorecard prototype

      Set realistic goals for process optimization

      2.1 Map current intake, approval, and prioritization workflow

      2.2 Enumerate and prioritize process stakeholders

      2.3 Determine the current and target capability levels

      2.4 Define the process success criteria and KPIs

      Optimize project intake and approval processes

      3.1 Conduct focused retrospectives for project intake and approval

      3.2 Define project levels

      3.3 Optimize project intake processes

      3.4 Optimize project approval processes

      3.5 Compose SOP for intake and approval

      3.6 Document the new intake and approval workflow

      Optimize project prioritization process plan for a process pilot

      4.1 Conduct focused retrospective for project prioritization

      4.2 Estimate available resource capacity

      4.3 Pilot Project Intake and Prioritization Tool with your project backlog

      4.4 Compose SOP for prioritization

      4.5 Document the new prioritization workflow

      4.6 Discuss process pilot

      Analyze stakeholder impact and create communication strategy

      5.1 Analyze stakeholder impact and responses to impending organization change

      5.2 Create message canvas for at-risk change impacts and stakeholders

      5.3 Set course of action for communicating change

      Deliverables
      1. PPM Current State Scorecard
      2. Project Value Scorecard prototype
      1. Current intake, approval, and prioritization workflow
      2. Stakeholder register
      3. Intake process success criteria
      1. Project request form
      2. Project level classification matrix
      3. Proposed project deliverables toolkit
      4. Customized intake and approval SOP
      5. Flowchart for the new intake and approval workflow
      1. Estimated resource capacity for projects
      2. Customized Project Intake and Prioritization Tool
      3. Customized prioritization SOP
      4. Flowchart for the new prioritization workflow
      5. Process pilot plan
      1. Completed Intake and Prioritization Impact Analysis Tool
      2. Communication strategy and plan

      Phase 1

      Set Realistic Goals for Optimizing Project Intake, Approval, and Prioritization Process

      Phase 1 outline

      Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.

      Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.

      Guided Implementation 1: Set Realistic Goals for Project Intake, Approval, and Prioritization Process Proposed Time to Completion: 1-2 weeks

      Step 1.1: Define the project valuation criteria

      Start with an analyst kick-off call:

      • Discuss how a project value is currently determined
      • Introduce Info-Tech’s scorecard-driven project valuation approach

      Then complete these activities…

      • Create a first-draft version of a project value-driven prioritized list of projects
      • Review and iterate on the scorecard criteria

      With these tools & templates:

      Project Value Scorecard Development Tool

      Step 1.2: Envision your process target state

      Start with an analyst kick-off call:

      • Introduce Info-Tech’s project intake process maturity model
      • Discuss the use of Info-Tech’s Diagnostic Program for an initial assessment of your current PPM processes

      Then complete these activities…

      • Map your current process workflow
      • Enumerate and prioritize your key stakeholders
      • Define process success criteria

      With these tools & templates:

      Project Intake Workflow Template

      Project Intake, Approval, and Prioritization SOP Template

      Phase 1 Results & Insights:
      • The overarching goal of optimizing project intake, approval, and prioritization process is to maximize the throughput of the best projects. To achieve this goal, one must have a clear way to determine what are “the best” projects.

      Get to value early with Step 1.1 of this blueprint

      Define how to determine a project’s value and set the stage for maximizing the value of your project portfolio using Info-Tech’s Project Value Scorecard Development Tool.

      Where traditional models of consulting can take considerable amounts of time before delivering value to clients, Info-Tech’s methodology for optimizing project intake, approval, and prioritization process gets you to value fast.

      The overarching goal of optimizing project intake, approval, and prioritization process is to maximize the throughput of the best projects. To achieve this goal, one must have a clear way to determine what are “the best” projects.

      In the first step of this blueprint, you will pilot a multiple-criteria scorecard for determining project value that will help answer that question. Info-Tech’s Project Value Scorecard Development Tool is pre-populated with a ready-to-use, real-life example that you can leverage as a starting point for tailoring it to your organization – or adopt as is.

      Introduce objectivity and clarity to your discussion of maximizing the value of your project portfolio with Info-Tech’s practical IT research that drives measurable results.

      Download Info-Tech’s Project Value Scorecard Development Tool.

      A screenshot of Info-Tech's Project Value Scorecard Development Tool

      Step 1.1: Define the criteria with which to determine project value

      PHASE 1 PHASE 2 PHASE 3

      1.1

      Define project valuation criteria

      1.2

      Envision process target state

      2.1

      Streamline intake

      2.2

      Right-size approval steps

      2.3

      Prioritize projects to fit resource capacity

      3.1

      Pilot your optimized process

      3.2

      Communicate organizational change

      This step will walk you through the following activities:

      • Learn how to use the Project Value Scorecard Development Tool
      • Create a first-draft version of a project value-driven prioritized list of projects

      This step involves the following participants:

      • PMO Director/ Portfolio Manager
      • Project Managers
      • Business Analysts
      • CIO (optional)

      Outcomes of this step

      • Understand the importance of devising a consensus criteria for project valuation.
      • Try a project value scorecard-driven prioritization process with your currently proposed.
      • Set the stage for optimizing project intake, approval, and prioritization processes.

      Intake, Approval, and Prioritization is a core process in Info-Tech’s project portfolio management (PPM) framework

      PPM is an infrastructure around projects that aims to ensure that the best projects are worked on at the right time with the right people.

      PPM’s goal is to maximize the throughput of projects that provide strategic and operational value to the organization. To do this, a PPM strategy must help to:

      Info-Tech's Project Portfolio Management Process Model
      3. Status & Progress Reporting
      1. Intake, Approval & Prioritization 2. Resource Management 3. Project Management 4. Project Closure 5. Benefits Tracking
      Intake Execution Closure
      1. Select the best projects
      2. Pick the right time and people to execute the projects
      3. Make sure the projects are okay
      4. Make sure the projects get done
      5. Make sure they were worth doing

      If you don’t yet have a PPM strategy in place, or would like to revisit your existing PPM strategy before optimizing your project intake, approval, and prioritization practices, see Info-Tech’s blueprint, Develop a Project Portfolio Management Strategy.

      A screenshot of Info-Tech's blueprint Develop a Project Portfolio Management Strategy is shown.

      “Too many projects, not enough resources” is the reality of most IT environments

      A profound imbalance between demand (i.e. approved project work and service delivery commitments) and supply (i.e. people’s time) is the top challenge IT departments face today.

      In today’s organizations, the desires of business units for new products and enhancements, and the appetites of senior leadership to approve more and more projects for those products and services, far outstrip IT’s ability to realistically deliver on everything.

      The vast majority of IT departments lack the resourcing to meet project demand – especially given the fact that day-to-day operational demands frequently trump project work.

      As a result, project throughput suffers – and with it, IT’s reputation within the organization.

      An image is depicted that has several projects laid out near a scale filling one side of it and off of it. On the other part of the scale which is higher, has an image of people in it to help show the relationship between resource supply and project demand.

      Info-Tech Insight

      Where does the time go? The portfolio manager (or equivalent) should function as the accounting department for time, showing what’s available in IT’s human resources budget for projects and providing ongoing visibility into how that budget of time is being spent.

      Don’t weigh your portfolio down by starting more than you can finish

      Focus on what will deliver value to the organization and what you can realistically deliver.

      Most of the problems that arise during the lifecycle of a project can be traced back to issues that could have been mitigated during the initiation phase.

      More than simply a means of early problem detection at the project level, optimizing your initiation processes is also the best way to ensure the success of your portfolio. With optimized intake processes you can better guarantee:

      • The projects you are working on are of high value
      • Your project list aligns with available resource capacity
      • Stakeholder needs are addressed, but stakeholders do not determine the direction of the portfolio

      80% of organizations feel their portfolios are dominated by low-value initiatives that do not deliver value to the business (Source: Cooper).

      "(S)uccessful organizations select projects on the basis of desirability and their capability to deliver them, not just desirability" (Source: John Ward, Delivering Value from Information Systems and Technology Investments).

      Establishing project value is the first – and difficult – step for optimizing project intake, approval, and prioritization

      What is the best way to “deliver value to the organization”?

      Every organization needs to explicitly define how to determine project value that will fairly represent all projects and provide a basis of comparison among them during approval and prioritization. Without it, any discussions on reducing “low-value initiatives” from the previous slide cannot yield any actionable plan.

      However, defining the project value is difficult, because there are so many different and conflicting ways that are all valid in their own right and worth considering. For example:

      • Strategic growth vs. operational stability
      • Important work vs. urgent work
      • Return on investment vs. cost containment
      • Needs of a specific line of business vs. business-wide needs
      • Financial vs. intangible benefits

      This challenge is further complicated by the difficulty of identifying the right criteria for determining project value:

      Managers fail to identify around 50% of the important criteria when making decisions (Source: Transparent Choice).

      Info-Tech Insight

      Sometimes it can be challenging to show the value of IT-centric, operational-type projects that maintain critical infrastructure since they don’t yield net-new benefits. Remember that benefits are only half the equation; you must also consider the costs of not undertaking the said project.

      Find the right mix of criteria for project valuation with Info-Tech’s Project Value Scorecard Development Tool

      Scorecard-driven approach is an easy-to-understand, time-tested solution to a multiple-criteria decision-making problem, such as project valuation.

      This approach is effective for capturing benefits and costs that are not directly quantifiable in financial terms. Projects are evaluated on multiple specific questions, or criteria, that each yield a score on a point scale. The overall score is calculated as a weighted sum of the scores.

      Info-Tech’s Project Value Scorecard is pre-populated with a best-practice example of eight criteria, two for each category (see box at bottom right). This example helps your effort to develop your own project scorecard by providing a solid starting point:

      60%: On their own, decision makers could only identify around 6 of their 10 most important criteria for making decisions (Source: Transparent Choice).

      Finally, in addition, the overall scores of approved projects can be used as a metric on which success of the process can be measured over time.

      Download Info-Tech’s Project Value Scorecard Development Tool.

      A screenshot of Info-Tech's Project Value Scorecard Development Tool

      Categories of project valuation criteria

      • Strategic alignment: projects must be aligned with the strategic goals of the business and IT.
      • Operational alignment: projects must be aligned with the operational goals of the business and IT.
      • Feasibility: practical considerations for projects must be taken into account in selecting projects.
      • Financial: projects must realize monetary benefits, in increased revenue or decreased costs, while posing as little risk of cost overrun as possible.

      Review the example criteria and score description in the Project Value Scorecard Development Tool

      1.1.1 Project Value Scorecard Development Tool, Tab 2: Evaluation Criteria

      This tab lists eight criteria that cover strategic alignment, operational alignment, feasibility, and financial benefits/risks. Each criteria is accompanied by a qualitative score description to standardize the analysis across all projects and analysts. While this tool supports up to 15 different criteria, it’s better to minimize the number of criteria and introduce additional ones as the organization grows in PPM maturity.

      A screenshot of Info-Tech's Project Value Scorecard Development Tool, Tab 2: Evaluation Criteria

      Type: It is useful to break down projects with similar overall scores by their proposed values versus ease of execution.

      Scale: Five-point scale is not required for this tool. Use more or less granularity of description as appropriate for each criteria.

      Blank Criteria: Rows with blank criteria are greyed out. Enter a new criteria to turn on the row.

      Score projects and search for the right mix of criteria weighting using the scorecard tab

      1.1.1 Project Value Scorecard Development Tool, Tab 3: Project Scorecard

      In this tab, you can see how projects are prioritized when they are scored according to the criteria from the previous tab. You can enter the scores of up to 30 projects in the scorecard table (see screenshot to the right).

      A screenshot of Info-Tech's Project Value Scorecard Development Tool, Tab 3: Project Scorecard is shown.

      Value (V) or Execution (E) & Relative Weight: Change the relative weights of each criteria and review any changes to the prioritized list of projects change, whose rankings are updated automatically. This helps you iterate on the weights to find the right mix.

      Feasibility: Custom criteria category labels will be automatically updated.

      A screenshot of Info-Tech's Project Value Scorecard Development Tool, Tab 3: Project Scorecard is shown.

      Overall: Choose the groupings of criteria by which you want to see the prioritized list. Available groupings are:

      • Overall score
      • By value or by execution
      • By category

      Ranks and weighted scores for each project is shown.

      For example, click on the drop-down and choose “Execution.”

      A screenshot of Info-Tech's Project Value Scorecard Development Tool, Tab 3: Project Scorecard is shown.

      Project ranks are based only on execution criteria.

      Create a first-draft version of a project value-driven prioritized list of projects

      1.1.1 Estimated Time: 60 minutes

      Follow the steps below to test Info-Tech’s example Project Value Scorecard and examine the prioritized list of projects.

      1. Using your list of proposed, ongoing, and completed projects, identify a representative sample of projects in your project portfolio, varying in size, scope, and perceived value – about 10-20 of them.
      2. Arrange these projects in the order of priority using any processes or prioritization paradigm currently in place in your organization.
      • In the absence of formal process, use your intuition, as well as knowledge of organizational priorities, and your stakeholders.
    • Use the example criteria and score description in Tab 2 of Info-Tech’s Project Value Scorecard Development Tool to score the same list of projects:
      • Avoid spending too much time at this step. Prioritization criteria will be refined in the subsequent parts of the blueprint.
      • If multiple scorers are involved, allow some overlap to benchmark for consistency.
    • Enter the scores in Tab 3 of the tool to obtain the first-draft version of a project value-driven prioritized project list. Compare it with your list from Step 2.
    • INPUT

      • Knowledge of proposed, ongoing, and completed projects in your project portfolio

      OUTPUT

      • Prioritized project lists

      Materials

      • Project Value Scorecard Development Tool

      Participants

      • PMO Director/ Portfolio Manager
      • Project Managers
      • Business Analysts
      • CIO (optional)

      Iterate on the scorecard to set the stage for optimizing project intake, approval, and prioritization

      1.1.2 Estimated Time: 60 minutes

      Conduct a retrospective of the previous activity by asking these questions:

      • How smooth was the overall scoring experience (Step 3 of Activity 1.1.1)?
      • Did you experience challenges in interpreting and applying the example project valuation criteria? Why? (e.g. lack of information, absence of formalized business strategic goals, too much room for interpretation in scoring description)
      • Did the prioritized project list agree with your intuition?

      Iterate on the project valuation criteria:

      • Manipulate the relatives weights of valuation criteria to fine-tune them.
      • Revise the scoring descriptions to provide clarity or customize them to better fit your organization’s needs, then update the project scores accordingly.
      • For projects that did not score well, will this cause concern from any stakeholders? Are the concerns legitimate? If so, this may indicate the need for inclusion of new criteria.
      • For projects that score too well, this may indicate a bias toward a specific type of project or group of stakeholders. Try adjusting the relative weights of existing criteria.

      INPUT

      • Activity 1.1.1

      OUTPUT

      • Retrospective on project valuation
      • Review of project valuation criteria

      Materials

      • Project Value Scorecard Development Tool

      Participants

      • PMO Director/ Portfolio Manager
      • Project Managers
      • Business Analysts
      • CIO (optional)

      Next steps: engage key PPM stakeholders to reach a consensus when establishing how to determine project value

      Engage these key players to create the evaluation criteria that all stakeholders will support:

      • Business units: Projects are undertaken to provide value to the business. Senior management from business units must help define how project will be valued.
      • IT: IT must ensure that technical/practical considerations are taken into account when determining project value.
      • Finance: The CFO or designated representative will ensure that estimated project costs and benefits can be used to manage the budget.
      • PMO: PMO is the administrator of the project portfolio. PMO must provide coordination and support to ensure the process operates smoothly and its goals are realized.
      • Business analysts: BAs carry out the evaluation of project value. Therefore, their understanding of the evaluation criteria and the process as a whole are critical to the success of the process.
      • Project sponsors: Project sponsors are accountable for the realization of benefits for which projects are undertaken.

      Optimize the process with the new project value definition to focus your discussion with stakeholders

      This blueprint will help you not only optimize the process, but also help you work with your stakeholders to realize the benefits of the optimized process.

      In this step, you’ve begun improving the definition of project value. Getting it right will require several more iterations and will require a series of discussions with your key stakeholders.

      The optimized intake process built around the new definition of project value will help evolve a conceptual discussion about project value into a more practical one. The new process will paint a picture of what the future state will look like for your stakeholders’ requested projects getting approved and prioritized for execution, so that they can provide feedback that’s concrete and actionable. To help you with that process, you will be taken through a series of activities to analyze the impact of change on your stakeholders and create a communication plan in the last phase of the blueprint.

      For now, in the next step of this blueprint, you will undergo a series of activities to assess your current state to identify the specific areas for process optimization.

      "To find the right intersection of someone’s personal interest with the company’s interest on projects isn’t always easy. I always try to look for the basic premise that you can get everybody to agree on it and build from there… But it’s sometimes hard to make sure that things stick. You may have to go back three or four times to the core agreement."

      -Eric Newcomer

      Step 1.2: Envision your target state for your optimized project intake, approval, and prioritization process

      PHASE 1 PHASE 2 PHASE 3

      1.1

      Define project valuation criteria

      1.2

      Envision process target state

      2.1

      Streamline intake

      2.2

      Right-size approval steps

      2.3

      Prioritize projects to fit resource capacity

      3.1

      Pilot your optimized process

      3.2

      Communicate organizational change

      This step will walk you through the following activities:

      • Map your current project intake, approval, and prioritization workflow, and document it in a flowchart
      • Enumerate and prioritize your key process stakeholders
      • Determine your process capability level within Info-Tech’s Framework
      • Establish your current and target states for project intake, approval, and prioritization process

      This step involves the following participants:

      • CIO
      • PMO Director/Portfolio Manager
      • Project Managers
      • Business Analysts
      • Other PPM stakeholders

      Outcomes of this step

      • Current project intake, approval, and prioritization process is mapped out and documented in a flowchart
      • Key process stakeholders are enumerated and prioritized to inform future discussion on optimizing processes
      • Current and target organizational process capability levels are determined
      • Success criteria and key performance indicators for process optimization are defined

      Use Info-Tech’s Diagnostic Program for an initial assessment of your current PPM processes

      This step is highly recommended but not required. Call 1-888-670-8889 to inquire about or request the PPM Diagnostics.

      Info-Tech's Project Portfolio Management Assessmentprovides you with a data-driven view of the current state of your portfolio, including your intake processes. Our PPM Assessment measures and communicates success in terms of Info-Tech’s best practices for PPM.

      A screenshot of Info-Tech's Project Portfolio Management Assessment blueprint is shown.

      Use the diagnostic program to:

      • Assess resource utilization across the portfolio.
      • Determine project portfolio reporting completeness.
      • Solicit feedback from your customers on the clarity of your portfolio’s business goals.
      • Rate the overall quality of your project management practices and benchmark your rating over time.
      A screenshot of Info-Tech's Project Portfolio Management Assessment blueprint is shown.

      Scope your process optimization efforts with Info-Tech’s high-level intake, approval, and prioritization workflow

      Info-Tech recommends the following workflow at a high level for a capacity-constrained intake process that aligns to strategic goals and stakeholder need.

      • Intake (Step 2.1)*
        • Receive project requests
        • Triage project requests and assign a liaison
        • High-level scoping & set stakeholder expectations
      • Approval (Step 2.2)*
        • Concept approval by project sponsor
        • High-level technical solution approval by IT
        • Business case approval by business
        • Resource allocation & greenlight projects
      • Prioritization (Step 2.3)*
        • Update project priority scores & available project capacity
        • Identify high-scoring and “on-the-bubble” projects
        • Recommend projects to greenlight or deliberate

      * Steps denote the place in the blueprint where the steps are discussed in more detail.

      Use this workflow as a baseline to examine your current state of the process in the next slide.

      Map your current project intake, approval, and prioritization workflow

      1.2.1 Estimated Time: 60-90 minutes

      Conduct a table-top planning exercise to map out the processes currently in place for project intake, approval, and prioritization.

      1. Use white 4”x6” recipe cards / large sticky notes to write out unique steps of a process. Use the high-level process workflow from the previous slides as a guide.
      2. Arrange the steps into chronological order. Benchmark the arrangement through a group discussion.
      3. Use green cards to identify artifacts or deliverables that result from a step.
      4. Use yellow cards to identify who does the work (i.e. responsible parties), and who makes the decisions (i.e. accountable party). Keep in mind that while multiple parties may be responsible, accountability cannot be shared and only a single party can be accountable for a process.
      5. Use red cards to identify issues, problems, or risks. These are opportunities for optimization.

      INPUT

      • Documentation describing the current process (e.g. standard operating procedures)
      • Info-Tech’s high-level intake workflow

      OUTPUT

      • Current process, mapped out

      Materials

      • 4x6” recipe cards
      • Whiteboard

      Participants

      • PMO Director/ Portfolio Manager
      • Project Managers
      • Business Analysts
      • Other PPM stakeholders

      Document the current project intake, approval, and prioritization workflow in a flowchart

      1.2.2 Estimated Time: 60 minutes

      Document the results of the previous table-top exercise (Activity 1.1.1) into a flow chart. Flowcharts provide a bird’s-eye view of process steps that highlight the decision points and deliverables. In addition, swim lanes can be used to indicate process stages, task ownership, or responsibilities (example below).

      An example is shown for activity 1.2.2

      Review and customize section 1.2, “Overall Process Workflow” in Info-Tech’s Project Intake, Approval, and Prioritization SOP Template.

      "Flowcharts are more effective when you have to explain status and next steps to upper management."

      – Assistant Director-IT Operations, Healthcare Industry

      Browser-based flowchart tool examples

      INPUT

      • Mapped-out project intake process (Activity 1.2.1)

      OUTPUT

      • Flowchart representation of current project intake workflow

      Materials

      • Microsoft Visio, flowchart software, or Microsoft PowerPoint

      Participants

      • PMO Director/ Portfolio Manager
      • Project Managers
      • Business Analysts

      Example of a project intake, approval, and prioritization flow chart – without swim lanes

      An example project intake, approval, and prioritization flow chart without swim lanes is shown.

      Example of a project intake, approval, and prioritization flow chart – with swim lanes

      An example project intake, approval, and prioritization flow chart with swim lanes is shown.

      Download Info-Tech’s Project Intake Workflow Template (Visio and PDF)

      Enumerate your key stakeholders for optimizing intake, approval, and prioritization process

      1.2.3 30-45 minutes

      In the previous activity, accountable and responsible stakeholders for each of the steps in the current intake, approval, and prioritization process were identified.

      1. Based on your knowledge and insight of your organization, ensure that all key stakeholders with accountable and responsible stakeholders are accounted for in the mapped-out process. Note any omissions: it may indicate a missing step, or that the stakeholder ought to be, but are not currently, involved.
      2. For each step, identify any stakeholders that are currently consulted or informed. Then, examine the whole map and identify any other stakeholders that ought to be consulted or informed.
      3. Compile a list of stakeholders from steps 1-2, and write each of their names in two sticky notes.
      4. Put both sets of sticky notes on a wall. Use the wisdom-of-the-crowd approach to arrange one set in a descending order of influence. Record their ranked influence from 1 (least) to 10 (most).
      5. Rearrange the other set in a descending order of interest in seeing the project intake process optimized. Record their ranked interest from 1 (least) to 10 (most).

      INPUT

      • Mapped-out project intake process (Activity 1.2.1)
      • Insight on organizational culture

      OUTPUT

      • List of stakeholders in project intake
      • Ranked list in their influence and interest

      Materials

      • Sticky notes
      • Walls

      Participants

      • PMO Director/ Portfolio Manager
      • Project Managers
      • Business Analysts
      • Other PPM stakeholders

      Prioritize your stakeholders for project intake, approval, and prioritization process

      There are three dimensions for stakeholder prioritization: influence, interest, and support.

      1. Map your stakeholders in a 2D stakeholder power map (top right) according to their relative influence and interest.
      2. Rate their level of support by asking the following question: how likely is it that your stakeholder would welcome an improved process for project intake?

      These parameters will inform how to prioritize your stakeholders according to the stakeholder priority heatmap (bottom right). This priority should inform how to focus your attention during the subsequent optimization efforts.

      A flowchart is shown to show the relationship between influence and interest.

      Level of Support
      Stakeholder Category Supporter Evangelist Neutral Blocker
      Engage Critical High High Critical
      High Medium Low Low Medium
      Low High Medium Medium High
      Passive Low Irrelevant Irrelevant Low

      Info-Tech Insight

      There may be too many stakeholders to be able to achieve complete satisfaction. Focus your attention on the stakeholders that matter the most.

      Most organizations have low to medium capabilities around intake, approval, and prioritization

      1.2.4 Estimated Time: 15 minutes

      Use Info-Tech’s Intake Capability Framework to help define your current and target states for intake, approval, and prioritization.

      Capability Level Capability Level Description
      Capability Level 5: Optimized Our department has effective intake processes with right-sized administrative overhead. Work is continuously prioritized to keep up with emerging challenges and opportunities.
      Capability Level 4: Aligned Our department has very strong intake processes. Project approvals are based on business cases and aligned with future resource capacity.
      Capability Level 3: Engaged Our department has processes in place to track project requests and follow up on them. Priorities are periodically re-evaluated, based largely on the best judgment of one or several executives.
      Capability Level 2: Defined Our department has some processes in place but no capacity to say no to new projects. There is a formal backlog, but little or no method for grooming it.
      Capability Level 1: Unmanaged Our department has no formal intake processes in place. Most work is done reactively, with little ability to prioritize proactive project work.

      Refer to the subsequent slides for more detail on these capability levels.

      Level 1: Unmanaged

      Use these descriptions to place your organization at the appropriate level of intake capability.

      Intake Projects are requested through personal conversations and emails, with minimal documentation and oversight.
      Approval Projects are approved by default and rarely (if ever) declined. There is no definitive list of projects in the pipeline or backlog.
      Prioritization Most work is done reactively, with little ability to prioritize proactive project work.

      Symptoms

      • Poorly defined – or a complete absence of – PPM processes.
      • No formal approval committee.
      • No processes in place to balance proactive and reactive demands.

      Long Term

      PMOs at this level should work to have all requests funneled through a proper request form within six months. Decision rights for approval should be defined, and a scorecard should be in place within the year.

      Quick Win

      To get a handle on your backlog, start tracking all project requests using the “Project Data” tab in Info-Tech’s Project Intake and Prioritization Tool.

      Level 2: Defined

      Use these descriptions to place your organization at the appropriate level of intake capability.

      Intake Requests are formally documented in a request form before they’re assigned, elaborated, and executed as projects.
      Approval Projects are approved by default and rarely (if ever) declined. There is a formal backlog, but little or no method for grooming it.
      Prioritization There is a list of priorities but no process for updating it more than annually or quarterly.

      Symptoms

      • Organization does not have clear concept of project capacity.
      • There is a lack of discipline enforced on stakeholders.
      • Immature PPM processes in general.

      Long Term

      PMOs at this level should strive for greater visibility into the portfolio to help make the case for declining (or at least deferring) requests. Within the year, have a formal PPM strategy up and running.

      Quick Win

      Something PMOs at this level can accomplish quickly without any formal approval is to spend more time with stakeholders during the ideation phase to better define scope and requirements.

      Level 3: Engaged

      Use these descriptions to place your organization at the appropriate level of intake capability.

      Intake Processes and skills are in place to follow up on requests to clarify project scope before going forward with approval and prioritization.
      Approval Projects are occasionally declined based on exceptionally low feasibility or value.
      Prioritization Priorities are periodically re-evaluated based largely on the best judgment of one or several executives.

      Challenges

      • Senior executives’ “best judgement” is frequently fallible or influenced. Pet projects still enter the portfolio and deplete resources.
      • While approval processes “occasionally” filter out some low-value projects, many still get approved.

      Long Term

      PMOs at this level should advocate for a more formal cadence for prioritization and, within the year, establish a formal steering committee that will be responsible for prioritizing and re-prioritizing quarterly or monthly.

      Quick Win

      At the PMO level, employ Info-Tech’s Project Intake and Prioritization Tool to start re-evaluating projects in the backlog. Make this data available to senior executives when prioritization occurs.

      Level 4: Aligned

      Use these descriptions to place your organization at the appropriate level of intake capability.

      Intake Occurs through a centralized process. Processes and skills are in place for follow-up.
      Approval Project approvals are based on business cases and aligned with future resource capacity.
      Prioritization Project prioritization is visibly aligned with business goals.

      Challenges

      • The process of developing business cases can be too cumbersome, distracting resources from actual project work.
      • “Future” resource capacity predictions are unreliable. Reactive support work and other factors frequently change actual resource availability.

      Long Term

      PMOs at this level can strive for more accurate and frequent resource forecasting, establishing a more accurate picture of project vs. non-project work within the year.

      Quick Win

      PMOs at this level can start using Info-Tech’s Business Case Template (Comprehensive or Fast Track) to help simplify the business case process.

      Level 5: Optimizing

      Use these descriptions to place your organization at the appropriate level of intake capability.

      Intake Occurs through a centralized portal. Processes and skills are in place for thorough follow-up.
      Approval Project approvals are based on business cases and aligned with future resource capacity.
      Prioritization Work is continuously prioritized to keep up with emerging challenges and opportunities.

      Challenges

      • Establishing a reliable forecast for resource capacity remains a concern at this level as well.
      • Organizations at this level may experience an increasing clash between Agile practices and traditional Waterfall methodologies.

      A screenshot of Info-Tech's Manage an Agile Portfolio Blueprint

      PMOs at this level should look at Info-Tech’s Manage an Agile Portfolio for comprehensive tools and guidance on maintaining greater visibility at the portfolio level into work in progress and committed work.

      Establish your current and target states for process intake, approval, and prioritization

      1.2.5 Estimated Time: 20 minutes

      • Having reviewed the intake capability framework, you should be able to quickly identify where you currently reside in the model. Document this in the “Current State” box below.
      • Next, spend some time as a group discussing your target state. Make sure to set a realistic target as well as a realistic timeframe for meeting this target. Level 1s will not be able to become Level 5s overnight and certainly not without passing through the other levels on the way.
        • A realistic goal for a Level 1 to become a Level 2 is within six to eight months.
      Current State:
      Target State:
      Timeline for meeting target

      INPUT

      • Intake, approval, and prioritization capability framework (Activity 1.2.4)

      OUTPUT

      • Current and target state, with stated time goals

      Materials

      • Whiteboard

      Participants

      • CIO
      • PMO Director/ Portfolio Manager
      • Project Managers
      • Business Analysts

      Align your intake success with the strategic expectations of overall project portfolio management

      A successful project intake, approval, and prioritization process puts your leadership in a position to best steer the portfolio, like a conductor of an orchestra.

      To frame the discussion on deciding what intake success will look like, review Info-Tech’s PPM strategic expectations:

      • Project Throughput: Maximize throughput of the best projects.
      • Portfolio Visibility: Ensure visibility of current and pending projects.
      • Portfolio Responsiveness: Make the portfolio responsive to executive steering when new projects and changing priorities need rapid action.
      • Resource Utilization: Minimize resource waste and optimize the alignment of skills to assignments.
      • Benefits Realization: Clarify accountability for post-project benefits attainment for each project, and facilitate the process of tracking/reporting those benefits.
      A screenshot of Info-Tech's Develop a Project Portfolio Management Strategy blueprint.

      For a more detailed discussion and insight on PPM strategic expectations see Info-Tech’s blueprint, Develop a Project Portfolio Management Strategy.

      Decide what successful project intake, approval, prioritization process will look like

      1.2.6 Estimated Time: 60 minutes

      While assessing your current state, it is important to discuss and determine as a team how success will be defined.

      • During this process, it is important to consider tentative timelines for success milestones and to ask the question: what will success look like and when should it occur by?
      • Use the below table to help document success factors and timeliness. Follow the lead of our example in row 1.
      Optimization Benefit Objective Timeline Success Factor
      Facilitate project intake, prioritization, and communication with stakeholders to maximize time spent on the most valuable or critical projects. Look at pipeline as part of project intake approach and adjust priorities as required. July 1st Consistently updated portfolio data. Dashboards to show back capacity to customers. SharePoint development resources.

      Review and customize section 1.5, “Process Success Criteria” in Info-Tech’s Project Intake, Approval, and Prioritization SOP Template.

      Info-Tech Insight

      Establish realistic short-term goals. Even with optimized intake procedures, you may not be able to eliminate underground project economies immediately. Make your initial goals realistic, leaving room for those walk-up requests that may still appear via informal channels.

      Prepare to optimize project intake and capture the results in the Intake, Approval, and Prioritization SOP

      Standard Operating Procedure (SOP) is the reference document to get all PPM stakeholders on the same page with the new optimized process.

      The current state explored and documented in this step will serve as a starting point for each step of the next phase of the blueprint. The next phase will take a deeper dive into each of the three components of Info-Tech’s project intake methodology, so that they can achieve the success criteria you’ve defined in the previous activity.

      Info-Tech’s Project Intake, Approval, and Prioritization SOP Template is intended to capture the outcome of your process optimization efforts. This blueprint guides you through numerous activities designed for your core project portfolio management team to customize each section.

      To maximize the chances of success, it is important that the team makes a concerted effort to participate. Schedule a series of working sessions over the course of several weeks for your team to work through it – or get through it in one week, with onsite Info-Tech analyst-facilitated workshops.

      Download Info-Tech’s Project Intake, Approval, and Prioritization SOP.

      A screenshot of Info-Tech's Project Intake, Approval, and Prioritization SOP.

      Contact your account representative or email Workshops@InfoTech.com for more information.

      Case study: PMO develops mature intake and prioritization processes by slowly evolving its capability level

      CASE STUDY

      Industry: Not-for-Profit

      Source: Info-Tech Interview

      Challenge

      • A PMO for a large not-for-profit benefits provider had relatively high project management maturity, but the enterprise had low PPM maturity.
      • There were strong intake processes in place for following up on requests. For small projects, project managers would assist as liaisons to help control scope. For corporate initiates, PMs were assigned to work with a sponsor to define scope and write a charter.

      Solution

      Prioritization was a challenge. Initially, the organization had ad hoc prioritization practices, but they had developed a scoring criteria to give more formality and direction to the portfolio. However, the activity of formally prioritizing proved to be too time consuming.

      Off-the-grid projects were a common problem, with initiatives consuming resources with no portfolio oversight.

      Results

      After trying “heavy” prioritization, the PMO loosened up the process. PMO staff now go through and quickly rank projects, with two senior managers making the final decisions. They re-prioritize quarterly to have discussions around resource availability and to make sure stakeholders are in tune to what IT is doing on a daily basis. IT has a monthly meeting to go over projects consuming resources and to catch anything that has fallen between the cracks.

      "Everything isn't a number one, which is what we were dealing with initially. We went through a formal prioritization period, where we painstakingly scored everything. Now we have evolved: a couple of senior managers have stepped up to make decisions, which was a natural evolution from us being able to assign a formal ranking. Now we are able to prioritize more easily and effectively without having to painstakingly score everything."

      – PMO Director, Benefits Provider

      If you want additional support, have our analysts guide you through this phase as part of an Info-Tech workshop

      Book a workshop with our Info-Tech analysts:

      A photo of an Info-Tech analyst is shown.
      • To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team.
      • Info-Tech analysts will join you and your team onsite at your location or welcome you to Info-Tech’s historic Toronto office to participate in an innovative onsite workshop.
      • Contact your account manager (www.infotech.com/account), or email Workshops@InfoTech.com for more information.

      The following are sample activities that will be conducted by Info-Tech analysts with your team:

      1.1.1-2

      A screenshot of activities 1.1.1 and 1.1.2 are shown.

      Pilot Info-Tech’s Project Value Scorecard-driven prioritization method

      Use Info-Tech’s example to prioritize your current project backlog to pilot a project value-driven prioritization, which will be used to guide the entire optimization process.

      1.2.1-3

      A screenshot of activities 1.2.1 and 1.2.3 are shown.

      Map out and document current project intake, approval, and prioritization process, and the involved key stakeholders

      A table-top planning exercise helps you visualize the current process in place and identify opportunities for optimization.

      Phase 2

      Build an Optimized Project Intake, Approval, and Prioritization Process

      Phase 2 outline

      Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.

      Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.

      Guided Implementation 2: Build an Optimized Project Intake, Approval, and Prioritization Process Proposed Time to Completion: 3-6 weeks

      Step 2.1: Streamline Intake

      Start with an analyst kick-off call:

      • Challenges of project intake
      • Opportunities for improving the management of stakeholder expectations by optimizing intake

      Then complete these activities…

      • Perform a process retrospective
      • Optimize your process to receive, triage, and follow up on project requests

      With these tools & templates:

      • Project Request Form.
      • Project Intake Classification Matrix

      Step 2.2: Right-Size Approval

      Start with an analyst call:

      • Challenges of project approval
      • Opportunities for improving strategic alignment of the project portfolio by optimizing project approval

      Then complete these activities…

      • Perform a process retrospective
      • Clarify accountability at each step
      • Decide on deliverables to support decision makers at each step

      With these tools & templates:

      • Benefits Commitment Form
      • Technology Assessment Tool
      • Business Case Templates

      Step 3.3: Prioritize Realistically

      Start with an analyst call:

      • Challenges in project prioritization
    • Opportunities for installing a resource capacity-constrained intake by optimizing prioritization
    • Then complete these activities…

      • Perform a process retrospective
      • Pilot the Intake and Prioritization Tool for prioritization within estimated resource capacity

      With these tools & templates:

      • Project Intake and Prioritization Tool

      Phase 2 Results & Insights:

      • Info-Tech’s methodology systemically fits the project portfolio into its triple constraint of stakeholder needs, strategic objectives, and resource capacity, to effectively address the challenges of establishing organizational discipline for project intake.

      Step 2.1: Streamline intake to manage stakeholder expectations

      PHASE 1 PHASE 2 PHASE 3

      1.1

      Define project valuation criteria

      1.2

      Envision process target state

      2.1

      Streamline intake

      2.2

      Right-size approval steps

      2.3

      Prioritize projects to fit resource capacity

      3.1

      Pilot your optimized process

      3.2

      Communicate organizational change

      This step will walk you through the following activities:

      • Perform a deeper retrospective on current project intake process
      • Optimize your process to receive project requests
      • Revisit the definition of a project for triaging requests
      • Optimize your process to triage project requests
      • Optimize your process to follow up on project requests

      This step involves the following participants:

      • PMO Director / Portfolio Manager
      • Project Managers
      • Business Analysts
      • PMO Administrative Staff

      Outcomes of this Step

      • Retrospective of the current project intake process: to continue doing, to start doing, and to stop doing
      • A streamlined, single-funnel intake channel with the right procedural friction to receive project requests
      • A refined definition of what constitutes a project, and project levels that will determine the necessary standard of rigor with which project requests should be scoped and developed into a proposal throughout the process
      • An optimized process for triaging and following up on project requests to prepare them for the steps of project approval
      • Documentation of the optimized process in the SOP document

      Understand the risks of poor intake practices

      Too much red tape could result in your portfolio falling victim to underground economies. Too little intake formality could lead to the Wild West.

      Off-the-grid projects, i.e. projects that circumvent formal intake processes, lead to underground economies that can deplete resource capacity and hijack your portfolio.

      These underground economies are typically the result of too much intake red tape. When the request process is made too complex or cumbersome, project sponsors may unsurprisingly seek alternative means to get their projects done.

      While the most obvious line of defence against the appearance of underground economies is an easy-to-use and access request form, one must be cautious. Too little intake formality could lead to a Wild West of project intake where everyone gets their initiatives approved regardless of their business merit and feasibility.

      Benefits of optimized intake Risks of poor intake
      Alignment of portfolio with business goals Portfolio overrun by off-the-grid projects
      Resources assigned to high-value projects Resources assigned to low-value projects
      Better throughput of projects in the portfolio Ever-growing project backlog
      Strong stakeholder relations Stakeholders lose faith in value of PMO

      Info-Tech Insight

      Intake is intimately bound to stakeholder management. Finding the right balance of friction for your team is the key to successfully walking the line between asking for too much and not asking for enough. If your intake process is strong, stakeholders will no longer have any reason to circumvent formal process.

      An excess number of intake channels is the telltale sign of a low capability level for intake

      Excess intake channels are also a symptom of a portfolio in turmoil.

      If you relate to the graphic below in any way, your first priority needs to be limiting the means by which projects get requested. A single, centralized channel with review and approval done in batches is the goal. Otherwise, with IT’s limited capacity, most requests will simply get added to the backlog.

      A graphic is shown to demonstrate how one may receive project requests. The following icons are in a circle: Phone, Intranet Request Form, In person, anywhere, anytime, SharePoint Request Form, Weekly Scrum, Document, and Email.

      Info-Tech Insight

      The PMO needs to have the authority – and needs to exercise the authority – to enforce discipline on stakeholders. Organizations that solicit in verbal requests (by phone, in person, or during scrum) lack the orderliness required for PPM success. In these cases, it needs to be the mission of the PMO to demand proper documentation and accountability from stakeholders before proceeding with requests.

      "The golden rule for the project documentation is that if anything during the project life cycle is not documented, it is the same as if it does not exist or never happened…since management or clients will never remember their undocumented requests or their consent to do something."

      – Dan Epstein, “Project Initiation Process: Part Two”

      Develop an intake workflow

      Info-Tech recommends following a four-step process for managing intake.

      1. Requestor fills out form and submits the request.

      Project Request Form Templates

      2. Requests are triaged into the proper queue.

      1. Divert non-project request
      2. Quickly assess value and urgency
      3. Assign specialist to follow up on request
      4. Inform the requestor

      Project Intake Classification Matrix

      3. BA or PM prepares to develop requests into a project proposal.

      1. Follow up with requestor and SMEs to refine project scope, benefits, and risks
      2. Estimate size of project and determine the required level of detail for proposal
      3. Prepare for concept approval

      Benefits Commitment Form Template

      4. Requestor is given realistic expectations for approval process.

      Perform a start-stop-continue exercise to help determine what is working and what is not working

      2.1.1 Estimated Time: 45 minutes

      Optimizing project intake may not require a complete overhaul of your existing processes. You may only need to tweak certain templates or policies. Perhaps you started out with a strong process and simply lost resolve over time – in which case you will need to focus on establishing motivation and discipline, rather than rework your entire process.

      Perform a start-stop-continue exercise with your team to help determine what should be salvaged, what should be abandoned, and what should be introduced:

      1. On a whiteboard or equivalent, write “Start,” “Stop,” and “Continue” in three separate columns. 3. As a group, discuss the responses and come to an agreement as to which are most valid.
      2. Equip your team with sticky notes or markers and have them populate the columns with ideas and suggestions surrounding your current processes. 4. Document the responses to help structure your game plan for intake optimization.
      Start Stop Continue
      • Explicitly manage follow-up expectations with project requestor
      • Receiving informal project requests
      • Take too long in proposal development
      • Quarterly approval meetings
      • Approve resources for proposal development

      INPUT

      • Current project intake workflow (Activity 1.2.2)
      • Project intake success criteria (Activity 1.2.6)

      OUTPUT

      • Retrospective review of current intake process

      Materials

      • Whiteboard
      • Sticky notes/markers

      Participants

      • PMO Director/ Portfolio Manager
      • Project Managers
      • Business Analysts
      • PMO Admin Staff

      Streamline project requests into a single funnel

      It is important to identify all of the ways through which projects currently get requested and initiated, especially if you have various streams of intake competing with each other for resources and a place in the portfolio. Directing multiple channels into a single, centralized funnel is step number one in optimizing intake.

      To help you identify project sources within your organization, we’ve broken project requests into three archetypes: the good, the bad, and the ugly.

      1. The Good – Proper Requests: written formal requests that come in through one appropriate channel.

      The Bad – Walk-Ups: requests that do not follow the appropriate intake channel(s), but nevertheless make an effort to get into the proper queue. The most common instance of this is a portfolio manager or CIO filling out the proper project request form on behalf of, and under direction from, a senior executive.

      The Ugly – Guerilla Tactics: initiatives that make their way into the portfolio through informal methods or that consume portfolio resources without formal approval, authority, or oversight. This typically involves a key resource getting ambushed to work on a stakeholder’s “side project” without any formal approval from, or knowledge of, the PMO.

      Funnel requests through a single portal to streamline intake

      Decide how you would funnel project requests on a single portal for submitting project requests. Determining the right portal for your organization will depend on your current infrastructure options, as well as your current and target state capability levels.

      Below are examples of a platform for your project request portal.

      Platform Template document, saved in a repository or shared drive Email-based form (Outlook forms) Intranet form (SharePoint, internal CMS) Dedicated intake solution (PPM tool, idea/innovation tool)
      Pros Can be deployed very easily Consolidates requests into a single receiver Users have one place to go from any device All-in-one solution that includes scoring and prioritization
      Cons Manual submission and intake process consumes extra effort Can pose problems in managing requests across multiple people and platforms Requires existing intranet infrastructure and some development effort Solution is costly; requires adoption across all lines of business

      Increasing intake capability and infrastructure availability

      Introduce the right amount of friction into your intake process

      The key to an effective intake process is determining the right amount of friction to include for your organization. In this context, friction comes from the level of granularity within your project request form and the demands or level of accountability your intake processes place on requestors. You will want to have more or less friction on your intake form, depending on your current intake pain points.

      If you are inundated with a high volume of requests:

      • Make your intake form more detailed to deter “half-baked” requests.
      • Have more managerial oversight into the process. Require approval for each request.

      If you want to encourage the use of a formal channel:

      • Make your intake form more concise and lightweight.
      • Have less managerial oversight into the process. Inform managers of each request rather than requiring approval.

      Download Info-Tech’s Detailed Project Request Form.

      Download Info-Tech’s Light Project Request Form.

      A screenshot of Info-Tech's Project Request Form is shown.

      Info-Tech Insight

      Optimizing a process should not automatically mean reducing friction. Blindly reducing friction could generate a tidal wave of poorly thought-out requests, which only drives up unrealistic expectations. Mitigate the risk of unrealistic stakeholder expectations by carefully managing the message: optimize friction.

      Document your process to receive project requests

      2.1.2 Estimated Time: 30-60 minutes

      Review and customize section 2.2, “Receive project requests” in Info-Tech’s Project Intake, Approval, and Prioritization SOP Template.

      The goal of optimizing this process is to consolidate multiple intake channels into a single funnel with the right amount of friction to improve visibility and manageability of incoming project requests.

      The important decisions to document for this step include:

      1. What data will be collected, and from whom? For example, Info-Tech’s Light Project Request Form Template will be used to collect project requests from everyone.
      2. How will requests be collected, and from where? For example, the template will be available as a fillable form on a SharePoint site.
      3. Who will be informed of the requests? For example, the PMO Director and the BA team will be notified with a hyperlink to the completed request form.
      4. Who will handle exceptions? For example, PMO will maintain this process and will handle any questions or issues that pertain to this part of the process.

      INPUT

      • Retrospective of current process (Activity 2.1.1)

      OUTPUT

      • Customized Project Request Form
      • Method of implementation

      Materials

      • Project Request Form Templates

      Participants

      • PMO Director/ Portfolio Manager
      • Business Analysts

      Info-Tech Best Practice

      Whatever method of request collection you choose, ensure there is no doubt about how requesters can access the intake form.

      Establish a triage process to improve portfolio success

      Once a request has been submitted, it will need to be triaged. Triage begins as soon as the request is received. The end goal of the triage process is to set appropriate expectations for stakeholders and to ensure that all requests going forward for approval are valid requests.

      PPM Triage Process

      1. Divert non-project requests by validating that what is described on the request form qualifies as a “project.” Make sure requests are in the appropriate queue – for example, service desk request queue, change and release management queue, etc.
      2. Quickly assess value and urgency to determine whether the request requires fast-tracking or any other special consideration.
      3. Assign a specialist to follow up on the request. Match the request to the most suitable BA, PM, or equivalent. This person will become the Request Liaison (“RL”) for the request and will work with the requestor to define preliminary requirements.
      4. Inform the requestor that the request has been received and provide clear direction on what will happen with the request next, such as who will follow up on it and when. See the next slide for some examples of this follow-up.

      The PMO Triage Team

      • Portfolio Manager, or equivalent
      • Request Liaisons (business analysts, project managers, or equivalent)

      “Request Liaison” Role

      The BAs and PMs who follow up on requests play an especially important role in the triage process. They serve as the main point of contact to the requestor as the request evolves into a business case. In this capacity they perform a valuable stakeholder management function, helping to increase confidence and enhance trust in IT.

      To properly triage project requests, define exactly what a project is

      Bring color to the grey area that can exist in IT between those initiatives that fall somewhere in between “clearly a service ticket” and “clearly a project.”

      What constitutes a project?

      Another way of asking this question that gets more to the point for this blueprint – for what types of initiatives is project intake, approval, and prioritization rigor required?

      This is especially true in IT where, for some smaller initiatives, there can be uncertainty in many organizations during the intake and initiation phase about what should be included on the formal project list and what should go to help desk’s queue.

      As the definitions in the table below show, formal project management frameworks each have similar definitions of “a project.”

      Source Definition
      PMI A temporary endeavor undertaken to create a unique product, service, or result.” (553)
      COBIT A structured set of activities concerned with delivering a defined capability (that is necessary but not sufficient to achieve a required business outcome) to the enterprise based on an agreed‐on schedule and budget.” (74)
      PRINCE2 A temporary organization that is created for the purpose of delivering one or more business products according to an agreed business case.

      For each, a project is a temporary endeavor planned around producing a specific organizational/business outcome. The challenge of those small initiatives in IT is knowing when those endeavors require a business case, formal resource tracking, and project management rigor, and when they don’t.

      Separating small projects from non-projects requires a consideration of approval rights

      While conventional wisdom says to base your project definition on an estimation of cost, risk, etc., you also need to ask, “does this initiative require formal approval?”

      In the next step, we will define a suggested minimum threshold for a small “level 1” project. While these level thresholds are good and necessary for a number of reasons – including triaging your project requests – you may still often need to exercise some critical judgment in separating the tickets from the projects. In addition to the level criteria that we will develop in this step, use the checklist below to help with your differentiating.

      Service Desk Ticket Small Project
      • Approval seems implicit given the scope of the task.
      • No expectations of needing to report on status.
      • No indications that management will require visibility during execution.
      • The scope of the task suggests formal approval may be required.
      • You may have to report on status.
      • Possibility that management may require visibility during execution.

      Info-Tech Insight

      Guard the value of the portfolio. Because tickets carry with them an implicit approval, you need to be wary at the portfolio level of those that might possess a larger scope than their status of ticket implies. Sponsors that, for whatever reason, resist the formal intake process may use the ticketing process to sneak projects in through the backdoor. When assessing tickets and small projects at the portfolio level, you need to ask: is it possible that someone at an executive level might want to get updates on this because of its duration, scope, risk, cost, etc.? Could someone at the management level get upset that the initiative came in as a ticket and is burning up time and driving costs without any visibility?

      Sample Project/Non-Project Separation Criteria

      Non-Project Small Project
      e.g. Time required e.g. < 40 hours e.g. 40 > hours
      e.g. Complexity e.g. Very low e.g. Moderate – Low Difficulty: Does not require highly developed or specialized skill sets
      e.g. Collaboration e.g. None required e.g. Limited coordination and collaboration between resources and departments
      e.g. Repeatability of work e.g. Fully repeatable e.g. Less predictable
      e.g. Frequency of request type e.g. Hourly to daily e.g. Weekly to monthly

      "If you worked for the help desk, over time you would begin to master your job since there is a certain rhythm and pattern to the work…On the other hand, projects are unique. This characteristic makes them hard to estimate and hard to manage. Even if the project is similar to one you have done before, new events and circumstances will occur. Each project typically holds its own challenges and opportunities"

      – Jeffrey and Thomas Mochal

      Define the minimum-threshold criteria for small projects

      2.1.3 Estimated Time: 30 minutes

      Follow the steps below to define the specifics of a “level 1” project for your organization.

      1. Using your project list and/or ticketing system, identify a handful of small projects, large service desk tickets, and especially those items that fall somewhere in the grey area in between (anywhere between 10 to 20 of each). Then, determine the organizationally appropriate considerations for defining your project levels. Options include:
      • Duration
      • Budget/Cost
      • Technology requirements
      • Customer involvement
      • Integration
      • Organizational impact
      • Complexity
      • Number of cross-functional workgroups and teams involved
    • Using the list of projects established in the previous step, determine the organizationally appropriate considerations for defining your project levels –anywhere from four to six considerations is a good number.
    • Using these criteria and your list of small projects, define the minimum threshold for your level one projects across each of these categories. Record these thresholds in the table on the next slide.
    • INPUT

      • Data concerning small projects and service desk tickets, including size, duration, etc.

      OUTPUT

      • Clarity around how to define your level 1 projects

      Materials

      • Whiteboard

      Participants

      • PMO Director/ Portfolio Manager
      • Project Managers
      • Business Analysts

      Remove room for stakeholder doubt and confusion by informing requests forward in a timely manner

      During triaging, requestors should be notified as quickly as possible (a) that their request has been received and (b) what to expect next for the request. Make this forum as productive and informative as possible, providing clear direction and structure for the future of the request. Be sure to include the following:

      • A request ID or ticket number.
      • Some direction on who will be following up on the request –provide an individual’s name when possible.
      • An estimated timeframe of when they can expect to hear from the individual following up.

      The logistic of this follow-up will depend on a number of different factors.

      • The number of requests you receive.
      • Your ability to automate the responses.
      • The amount of detail you would like to, or need to, provide stakeholders with.

      Info-Tech Best Practice

      Assign an official request number or project ID to all requests during this initial response. An official request number anchors the request to a specific and traceable dataset that will accompany the project throughout its lifecycle.

      Sample “request received” emails

      If you receive a high volume of requests or need a quick win for improving stakeholder relations:

      Sample #1: Less detailed, automatic response

      Hello Emma,

      Thank you. Your project request has been received. Requests are reviewed and assigned every Monday. A business analyst will follow up with you in the next 5-10 business days. Should you have any questions in the meantime, please reply to this email.

      Best regards,

      Information Technology Services

      If stakeholder management is a priority, and you want to emphasize the customer-facing focus:

      Sample #2: More detailed, tailored response

      Hi Darren,

      Your project request has been received and reviewed. Your project ID number is #556. Business analyst Alpertti Attar has been assigned to follow up on your request. You can expect to hear from him in the next 5-10 business days to set up a meeting for preliminary requirements gathering.

      If you have any questions in the meantime, please contact Alpertti at aattar@projectco.com. Please include the Project ID provided in this email in all future correspondences regarding this request.

      Thank you for your request. We look forward to helping you bring this initiative to fruition.

      Sincerely,

      Jim Fraser

      PMO Director, Information Technology Services

      Info-Tech Insight

      A simple request response will go a long way in terms of stakeholder management. It will not only help assure stakeholders that their requests are in progress but the request confirmation will also help to set expectations and take some of the mystery out of IT’s processes.

      Document your process to triage project requests

      2.1.4 Estimated Time: 30-60 minutes

      Review and customize section 2.3, “Triage project requests” in Info-Tech’s Project Intake, Approval, and Prioritization SOP Template.

      The goal of optimizing this process is to divert non-project requests and set an appropriate initial set of stakeholder expectations for next steps. The important decisions to document for this step include:

      1. What defines a project? Record the outcomes of Activities 2.1.3 into the SOP.
      2. Who triages the requests and assign request liaisons? Who are they? For example, a lead BA can assign a set roster of BAs to project requests.
      3. What are the steps to follow for sending the initial response? See the previous slides on automated responses vs. detailed, tailored responses.
      4. How will you account for the consumption of resource capacity? For example, impose a maximum of four hours per week per analyst, and track the hours worked for each request to establish a pattern for capacity consumption.
      5. Who will handle exceptions? For example, PMO will maintain this process and will handle any questions or issues that pertain to this part of the process.

      INPUT

      • Results of activity 2.1.3

      OUTPUT

      • SOP for triaging project requests

      Materials

      • SOP Template

      Participants

      • PMO Director/ Portfolio Manager
      • Business Analysts

      Info-Tech Best Practice

      Whatever method of request collection you choose, ensure there is no doubt about how requesters can access the intake form.

      Follow up on requests to define project scope and set realistic expectations

      The purpose of this follow-up is to foster communication among the requestor, IT, and the sponsor to scope the project at a high level. The follow-up should:

      • Clarify the goals and value of the request.
      • Begin to manage expectations based on initial assessment of feasibility.
      • Ensure the right information is available for evaluating project proposals downstream. Every project should have the below key pieces of scope defined before any further commitments are made.

      Focus on Defining Key Pieces of Scope

      • Budget (funding, source)
      • Business outcome
      • Completion criteria
      • Timeframes (start date and duration)
      • Milestones/deliverables

      Structure the Follow-Up Process to Enhance Alignment Between IT and the Business

      Once a Request Liaison (RL) has been assigned to a request, it is their responsibility to schedule time (if necessary) with the requestor to perform a scoping exercise that will help define preliminary requirements. Ideally, this follow-up should occur no later than a week of the initial request.

      Structure the follow-up for each request based on your preliminary estimates of project size (next slide). Use the “Key Pieces of Scope” to the left as a guide.

      It may also be helpful for RLs and stakeholders to work together to produce a rough diagram or mock-up of the final deliverable. This will ensure that the stakeholder’s idea has been properly communicated, and it could also help refine or broaden this idea based on IT’s capabilities.

      After the scoping exercise, it is the RL’s responsibility to inform the requestor of next steps.

      Info-Tech Insight

      More time spent with stakeholders defining high-level requirements during the ideation phase is key to project success. It will not only improve the throughput of projects, but it will enhance the transparency of IT’s capacity and enable IT to more effectively support business processes.

      Perform a preliminary estimation of project size

      Project estimation is a common pain point felt by many organizations. At this stage, a range-of-magnitude (ROM) estimate is sufficient for the purposes of sizing the effort required for developing project proposals with appropriate detail.

      A way to structure ROM estimates is to define a set of standard project levels. It will help you estimate 80% of projects with sufficient accuracy over time with little effort. The remaining 20% of projects that don’t meet their standard target dates can be managed as exceptions.

      The increased consistency of most projects will enable you to focus more on managing the exceptions.

      Example of standard project sizes:

      Level Primary unit of estimation Target completion date*
      1 Weeks 3 weeks – 3 months
      2 Months 3 months – 6 months
      3 Quarters 2 – 4 quarters
      3+ Years 1 year or more

      * Target completion date is simply that – a target, not a service level agreement (SLA). Some exceptions will far exceed the target date, e.g. projects that depend heavily on external or uncontrollable factors.

      Info-Tech Best Practice

      Project levelling is useful for right-sizing many downstream processes; it sets appropriate levels of detail and scrutiny expected for project approval and prioritization steps, as well as the appropriate extent of requirements gathering, project management, and reporting requirements afterwards.

      Set your thresholds for level 2 and level 3 projects

      2.1.5 Estimated Time: 30 minutes

      Now that the minimum threshold for your smallest projects has been identified, it’s time to identify the maximum threshold in order to better apply project intake, approval, and prioritization rigor where it’s needed.

      1. Looking at your project list (e.g. Activity 1.1.1, or your current project backlog), isolate the medium and large projects. Examine the two categories in turn.
      2. Start with the medium projects. Using the criteria identified in Activity 2.1.3, identify where your level one category ends.
      • What are the commonly recurring thresholds that distinguish medium-sized projects from smaller initiatives?
      • Are there any criteria that would need to take on a greater importance when making the distinction? For instance, will cost or duration take on a greater weighting when determining level thresholds?
      • Once you have reached consensus, record these in the table on the next slide.
    • Now examine your largest projects. Once again relying on the criteria from Activity 2.1.3, determine where your medium-sized projects end and your large projects begin.
      • What are the commonly recurring thresholds that distinguish large and extra-large projects from medium-sized initiatives?
      • Once you have reached consensus, records these in the table on the next slide.

      INPUT

      • Leveling criteria from Activity 2.1.3
      • Project backlog, or list of projects from Activity 1.1.1

      OUTPUT

      • Clarity around how to define your level two and three projects

      Materials

      • Whiteboard
      • The project level table on the next slide

      Participants

      • PMO Director/ Portfolio Manager
      • Project Managers
      • Business Analysts
      • PMO Admin Staff

      Sample Project Levels Table

      Project Level Level 1 Level 2 Level 3
      Work Effort 40-100 hours 100-500 hours 500+ hours
      Budget $100,000 and under $100,000 to $500,000 $500,000 and over
      Technology In-house expertise Familiar New or requires system-wide change/training
      Complexity Well-defined solution; no problems expected Solution is known; some problems expected Solution is unknown or not clearly defined
      Cross-Functional Workgroups/Teams 1-2 3-5 > 6

      Apply a computation decision-making method for project levelling

      2.1.5 Project Intake Classification Matrix

      Capture the project levels in Info-Tech’s Project Intake Classification Matrix Tool to benchmark your levelling criteria and to determine project levels for proposed projects.

      Download Info-Tech’s Project Intake Classification Matrix tool.

      A screenshot of Info-Tech's Project Intake Classification Matrix Tool, tab 2 is shown.
      1. Pick a category to define project levels.
      2. Enter the descriptions for each project level.
      3. Assign a relative weight for each category.
      4. A screenshot of Info-Tech's Project Intake Classification Matrix Tool, tab 3 is shown.
      5. Enter a project name.
      6. Choose the description that best fits the project. If unknown, leave it blank.
      7. Suggested project levels are displayed.

      Get tentative buy-in and support from an executive sponsor for project requests

      In most organizations a project requires sponsorship from the executive layer, especially for strategic initiatives. The executive sponsor provides several vital factors for projects:

      • Funding and resources
      • Direct support and oversight of the project leadership
      • Accountability, acting as the ultimate decision maker for the project
      • Ownership of, and commitment to, project benefits

      Sometimes a project request may be made directly by a sponsor; in other times, the Request Liaison may need to connect the project request to a project sponsor.

      In either case, project request has a tentative buy-in and support of an executive sponsor before a project request is developed into a proposal and examined for approval – the subject of this blueprint’s next step.

      PMs and Sponsors: The Disconnect

      A study in project sponsorship revealed a large gap between the perception of the project managers and the perception of sponsors relative to the sponsor capability. The widest gaps appear in the areas of:

      • Motivation: 34% of PMs say sponsors frequently motivate the team, compared to 82% of executive sponsors who say they do so.
      • Active listening: 42% of PMs say that sponsors frequently listen actively, compared to 88% of executive sponsors who say they do so.
      • Effective communication: 47% of PMs say sponsors communicate effectively and frequently, compared to 92% of executive sponsors who say they do so.
      • Managing change: 37% of PMs say sponsors manage change, compared to 82% of executive sponsors who say they do so.

      Source: Boston Consulting Group/PMI, 2014

      Actively engaged executive sponsors continue to be the top driver of whether projects meet their original goals and business intent.

      – PMI Pulse of the Profession, 2017

      76% of respondents [organizations] agree that the role of the executive sponsor has grown in importance over the past five years.

      – Boston Consulting Group/PMI, 2014

      Document your process to follow up on project requests

      2.1.6 45 minutes

      Review and customize section 2.4, “Follow up on project requests” in Info-Tech’s Project Intake, Approval, and Prioritization SOP Template.

      The goal of optimizing this process is to initiate communication among the requestor, IT, and the sponsor to scope the project requests at a high level. The important decisions to document for this step include:

      1. How will you perform a scoping exercise with the requestor? Leverage existing organizational processes (e.g. high-level requirements gathering). Look to the previous slides for suggested outcomes of the exercise.
      2. How will you determine project levels? Record the outcomes of activities 2.1.5 into the SOP.
      3. How will the RL follow up on the scoped project request with a project sponsor? For example, project requests scoped at a high level will be presented to senior leadership whose lines of business are affected by the proposed project to gauge their initial interest.
      4. How will you account for the consumption of resource capacity? For example, impose a maximum of 8 hours per week per analyst, and track the hours worked for each request to establish a pattern for capacity consumption.
      5. Who will handle exceptions? For example, PMO will maintain this process and will handle any questions or issues that pertain to this part of the process.

      INPUT

      • Activity 2.1.5
      • Existing processes for scoping exercises

      OUTPUT

      • SOP for following up on project requests

      Materials

      • SOP Template

      Participants

      • PMO Director/ Portfolio Manager
      • Project Managers
      • Business Analysts
      • PMO Admin Staff

      Examine the new project intake workflow as a whole and document it in a flow chart

      2.1.7 Estimated Time: 30-60 minutes

      Review and customize section 2.1, “Project Intake Workflow” in Info-Tech’s Project Intake, Approval, and Prioritization SOP Template.

      In Step 1.2 of the blueprint, you mapped out the current project intake, approval, and prioritization workflow and documented it in a flow chart. In this step, take the time to examine the new project intake process as a whole, and document the new workflow in the form of a flow chart.

      1. Requestor fills out form and submits the request.
      2. Requests are triaged into the proper queue.
      3. BA or PM prepares to develop requests into a project proposal.
      4. Requestor is given realistic expectations for approval process.

      Consider the following points:

      1. Are the inputs and outputs of each step clear? Who’s doing the work? How long will each step take, on average?
      2. Is the ownership of each step clear? How will we ensure a smooth handoff between each step and prevent requests from falling through the cracks?

      INPUT

      • New process steps for project intake (Activities 2.1.2-6)

      OUTPUT

      • Flowchart representation of new project intake workflow

      Materials

      • Microsoft Visio, flowchart software, or Microsoft PowerPoint

      Participants

      • PMO Director/ Portfolio Manager
      • Project Managers
      • Business Analysts
      • PMO Admin Staff

      Case study: Portfolio manager achieves intake and project success through detailed request follow-up

      Case Study

      Industry: Municipal Government

      Source: Info-Tech Client

      Challenge

      • There is an IT department with a relatively high level of project management maturity.
      • They have approximately 30 projects on the go, ranging from small to large.
      • To help with intake, IT assembled a project initiation team. It was made up of managers from throughout the county. This group “owned the talent” and met once a month to assess requests. As a group, they were able to assemble project teams quickly.

      Solution

      • Project initiation processes kept failing. A lot of time was spent within IT getting estimations precise, only to have sponsors reject business cases because they did not align with what those sponsors had in mind.
      • Off-the-grid projects were a challenge. Directors did not follow intake process and IT talent was torn in multiple directions. There was nothing in place for protecting the talent and enforcing processes on stakeholders.

      Results

      • IT dedicated a group of PMs and BAs to follow up on requests.
      • Working with stakeholders, this group collects specific pieces of information that allows IT to get to work on requests faster. Through this process, requests reach the charter stage more quickly and with greater success.
      • An intake ticketing system was established to protect IT talent. Workers are now better equipped to redirect stakeholders through to the proper channels.

      Step 2.2: Set up steps of project approval to maximize strategic alignment while right-sizing the required effort

      PHASE 1 PHASE 2 PHASE 3

      1.1

      Define project valuation criteria

      1.2

      Envision process target state

      2.1

      Streamline intake

      2.2

      Right-size approval steps

      2.3

      Prioritize projects to fit resource capacity

      3.1

      Pilot your optimized process

      3.2

      Communicate organizational change

      This step will walk you through the following activities:

      • Perform a deeper retrospective on current project approval process
      • Define the approval steps, their accountabilities, and the corresponding terminologies for approval
      • Right-size effort and documentation required for each project level through the approval steps

      This step involves the following participants:

      • PMO Director / Portfolio Manager
      • Project Managers
      • Business Analysts
      • PMO Administrative Staff

      Outcomes of this step

      • Retrospective of the current project intake process: to continue doing, to start doing, and to stop doing
      • A series of approval steps are defined, in which their accountabilities, responsibilities, and the nomenclature for what is approved at each steps are clarified and documented
      • A toolbox of deliverables for proposed projects that captures key information developed to inform project approval decisions at each step of the approval process, and the organizational standard for what to use for which project level
      • Documentation of the optimized process in the SOP document

      Set up an incremental series of approval stage-gates to tackle common challenges in project approval

      This section will help you address key challenges IT leaders face around project approval.

      Challenges Info-Tech’s Advice
      Project sponsors receive funding from their business unit or other source (possibly external, such as a grant), and assume this means their project is “approved” without any regard to IT costs or resource constraints. Clearly define a series of approval steps, and communicate requirements for passing them.
      Business case documentation is rarely updated to reflect unforeseen costs, emerging opportunities, and changing priorities. As a result, time and money is spent finishing diminished priority projects while the value of more recent projects erodes in the backlog. Approve projects in smaller pieces, with early test/pilot phases focused on demonstrating the value of later phases.
      Project business cases often focus on implementation and overlook ongoing operating costs imposed on IT after the project is finished. These costs further diminish IT’s capacity for new projects, unless investment in more capacity (such as hiring) is included in business cases. Make ongoing support and maintenance costs a key element in business case templates and evaluations.
      Organizations approve new projects without regard to the availability of resource capacity (or lack thereof). Project lead times grow and stakeholders become more dissatisfied because IT is unable to show how the business is competing with itself for IT’s time. Increase visibility into what IT is already working on and committed to, and for whom.

      Develop a project approval workflow

      Clearly define a series of approval steps, and communicate requirements for passing them. “Approval” can be a dangerous word in project and portfolio management, so it is important to clarify what is required to pass each step, and how long the process will take.

      1 2 3 4
      Approval step Concept Approval Feasibility Approval Business Case Approval Resource Allocation (Prioritization)
      Alignment Focus Business need / Project sponsorship Technology Organization-wide business need Resource capacity
      Possible dispositions at each gate
      • Approve developing project proposal
      • Reject concept
      • Proceed to business case approval
      • Approve a test/pilot project for feasibility
      • Reject proposal
      • Approve project and funding in full
      • Approve a test/pilot project for viability
      • Reject proposal
      • Begin or continue project work
      • Hold project
      • Outsource project
      • Reject project
      Accountability e.g. Project Sponsor e.g. CIO e.g. Steering Committee e.g. CIO
      Deliverable Benefits Commitment Form Template Proposed Project Technology Assessment Tool Business Case (Fast Track, Comprehensive) Intake and Prioritization Tool

      Identify the decision-making paradigm at each step

      In general, there are three different, mutually exclusive decision-making paradigms for approving projects:

      Paradigm Description Benefits Challenges Recommendation
      Unilateral authority One individual makes decisions. Decisions tend to be made efficiently and unambiguously. Consistency of agenda is easier to preserve. Decisions are subject to one person’s biases and unseen areas. Decision maker should solicit and consider input from others and seek objective rigor.
      Ad hoc deliberation Stakeholders informally negotiate and communicate decisions between themselves. Deliberation helps ensure different perspectives are considered to counterbalance individual biases and unseen areas. Ad hoc decisions tend to lack documentation and objective rationale, which can perpetuate disagreement. Use where unilateral decisions are unfeasible (due to complexity, speed of change, culture, etc.), and stakeholders are very well aligned or highly skilled negotiators and communicators.
      Formal steering committee A select group that represent various parts of the organization is formally empowered to make decisions for the organization. Formal committees can ensure oversight into decisions, with levers available to help resolve uncertainty or disagreement. Formal committees introduce administrative overhead and effort that might not be warranted by the risks involved. Formal steering committees are best where formality is warranted by the risks and costs involved, and the organizational culture has an appetite for administrative oversight.

      Info-Tech Insight

      The individual or party who has the authority to make choices, and who is ultimately answerable for those decisions, is said to be accountable. Understanding the needs of the accountable party is critical to the success of the project approval process optimization efforts.

      Perform a start-stop-continue exercise to help determine what is working and what is not working

      2.2.1 Estimated Time: 45 minutes

      Optimizing project approval may not require a complete overhaul of your existing processes. You may only need to tweak certain templates or policies. Perhaps you started out with a strong process and simply lost resolve over time – in which case you will need to focus on establishing motivation and discipline, rather than rework your entire process.

      Perform a start-stop-continue exercise with your team to help determine what should be salvaged, what should be abandoned, and what should be introduced:

      1.On a whiteboard or equivalent, write “Start,” “Stop,” and “Continue” in three separate columns. 3.As a group, discuss the responses and come to an agreement as to which are most valid.
      2.Equip your team with sticky notes or markers and have them populate the columns with ideas and suggestions surrounding your current processes. 4.;Document the responses to help structure your game plan for intake optimization.
      StartStopContinue
      • Inject technical feasibility approval step as an input to final approval
      • Simplify business cases
      • Approve low-value projects
      • Take too long in proposal development
      • Quarterly approval meetings
      • Approve resources for proposal development

      INPUT

      • Current project approval workflow (Activity 1.2.2)
      • Project approval success criteria (Activity 1.2.6)

      OUTPUT

      • Retrospective review of current approval process

      Materials

      • Whiteboard
      • Sticky notes/markers

      Participants

      • PMO Director/ Portfolio Manager
      • Project Managers
      • Business Analysts
      • PMO Admin Staff

      Customize the approval steps and describe them at a high level

      2.2.2 Estimated Time: 30-60 minutes

      Review and customize section 3.2, “Project Approval Steps” in Info-Tech’s Project Intake, Approval, and Prioritization SOP Template.

      The goal of this activity is to customize the definition of the approval steps for your organization, so that it makes sense for the existing organizational governance structure, culture, and need. Use the results of the start-stop-continue to inform what to customize. Consider the following factors:

      1. Order of steps: given the current decision-making paradigm, does it make sense to reorder the steps?
      2. Dispositions at each step: what are the possible dispositions, and who is accountable for making the dispositions?
      3. Project levels: do all projects require three-step approval before they’re up for prioritization? For example, IT steering committee may wish to be involved only for Level 3 projects and Level 2 projects with significant business impact, and not for Level 1 projects and IT-centric Level 2 projects.
      4. Accountability at each step: who makes the decisions?
      5. Who will handle exceptions? Aim to prevent the new process from being circumvented by vocal stakeholders, but also allow for very urgent requests. A quick win to strike this balance is to clarify who will exercise this discretion.

      INPUT

      • Retrospective of current process (Activity 2.2.1)
      • Project level definition
      • Approval steps in the previous slide

      OUTPUT

      • Customized project approval steps for each project level

      Materials

      • Whiteboard

      Participants

      • PMO Director/ Portfolio Manager
      • Project Managers
      • Business Analysts
      • PMO Admin Staff

      Specify what “approval” really means to manage expectations for what project work can be done and when

      2.2.3 Estimated Time: 15 minutes

      Review and customize section 3.2, “Project Approval Steps” in Info-Tech’s Project Intake, Approval, and Prioritization SOP Template.

      In the old reality, projects were approved and never heard back from again, which effectively gave your stakeholders a blanket default expectation of “declined.” With the new approval process, manage your stakeholder expectations more explicitly by refining your vocabulary around approval.

      Within this, decision makers should view their role in approval as approving that which can and should be done. When a project is approved and slated to backlog, the intention should be to allocate resources to it within the current intake cycle.

      Customize the table to the right with organizationally appropriate definitions, and update your SOP.

      “No” Declined.
      “Not Now” “It’s a good idea, but the time isn’t right. Try resubmitting next intake cycle.”
      “Concept Approval” Approval to add the item to the backlog with the intention of starting it this intake cycle.
      “Preliminary Approval” Approval for consumption of PMO resources to develop a business case.
      “Full Approval” Project is greenlighted and project resources are being allocated to it.

      Info-Tech Insight

      Refine the nomenclature. Add context to “approved” and “declined.” Speak in terms of “not now” or “you can have it when these conditions are met.” With clear expectations of the resources required to support each request, you can place accountability for keeping the request alive back on the sponsors.

      Continuously work out a balance between disciplined decision making and “analysis paralysis"

      A graph is depicted to show the relationship between disciplined decision making and analysis paralysis. The sweet spot for disciplined decisions changes between situations and types of decisions.

      A double bar graph is depicted to show the relative effort spent on management practice. The first bar shows that 20% has a high success of portfolio management. 35% has a low success of portfolio management. A caption on the graph: Spending additional time assessing business cases doesn’t necessarily improve success.

      Info-Tech Insight

      Estimates that form the basis of business cases are often based on flawed assumptions. Use early project phases or sprints to build working prototypes to test the assumptions on which business cases are built, rather than investing time improving precision of estimates without improving accuracy.

      Right-size project approval process with Info-Tech’s toolbox of deliverables

      Don’t paint every project with the same brush. Choose the right set of information needed for each project level to maximize the throughput of project approval process.

      The next several slides will take you through a series of tools and templates that help guide the production of deliverables. Each deliverable wireframes the required analysis of the proposed project for one step of the approval process, and captures that information in a document. This breaks down the overall work for proposal development into digestible chunks.

      As previously discussed, aim to right-size the approval process rigor for project levels. Not all project levels may call for all steps of approval, or the extent of required analysis within an approval step may differ. This section will conclude by customizing the requirement for deliverables for each project level.

      Tools and Templates for the Project Approval Toolbox

      • Benefits Commitment Form Template (.xlsx) Document the project sponsor’s buy-in and commitment to proposed benefits in a lightweight fashion.
      • Proposed Technology Assessment Tool (.xlsx) Determine the proposed project’s readiness for adoption from a technological perspective.
      • Business Case Templates (.docx) Guide the analysis process for the overall project proposal development in varying levels of detail.

      Use Info-Tech’s lightweight Benefits Commitment Form Template to document the sponsor buy-in and support

      2.2.4 Benefits Commitment Form Template

      Project sponsors are accountable for the realization of project benefits. Therefore, for a project to be approved by a project sponsor, they must buy-in and commit to the proposed benefits.

      Defining project benefits and obtaining project sponsor commitment has been demonstrated to improve the project outcome by providing the focal point of the project up-front. This will help reduce wasted efforts to develop parts of the proposals that are not ultimately needed.

      A double bar graph titled: Benefits realization improves project outcome is shown.

      Download Info-Tech’s Benefits Commitment Form Template.

      Contents of a Benefits Commitment Form

      • One-sentence highlight of benefits and risks
      • Primary benefit, hard (quantitative) and soft (qualitative)
      • Proposed measurements for metrics
      • Responsible and accountable parties for benefits
      A screenshot of Info-Tech's Establish the Benefits Realization Process blueprint is shown.

      For further discussion on benefits realization, use Info-Tech’s blueprint, Establish the Benefits Realization Process.

      Use Info-Tech’s Proposed Project Technology Assessment Tool to analyze a technology’s readiness for adoption

      2.2.4 Proposed Project Technology Assessment Tool

      In some projects, there needs to be an initial idea of what the project might look like. Develop a high-level solution for projects that:

      • Are very different from previous projects.
      • Are fairly complex, or not business as usual.
      • Require adoption of new technology or skill set.

      IT should advise and provide subject matter expertise on the technology requirements to those that ultimately approve the proposed projects, so that they can take into account additional costs or risks that may be borne from it.

      Info-Tech’s Proposed Project Technology Assessment Tool has a series of questions to address eight categories of considerations to determine the project’s technological readiness for adoption. Use this tool to ensure that you cover all the bases, and help you devise alternate solutions if necessary – which will factor into the overall business case development.

      Download Info-Tech’s Proposed Project Technology Assessment Tool.

      A screenshot of Info-Tech's Proposed Project Technology Assessment Tool is shown.

      Enable project valuation beyond financial metrics with Info-Tech’s Business Case Templates

      2.2.4 Business Case Template (Comprehensive and Fast Track)

      Traditionally, a business case is centered around financial metrics. While monetary benefits and costs are matters of bottom line and important, financial metrics are only part of a project’s value. As the project approval decisions must be based on the holistic comparison of project value, the business case document must capture all the necessary – and only those that are necessary – information to enable it.

      However, completeness of information does not always require comprehensiveness. Allow for flexibility to speed up the process of developing business plan by making a “fast-track” business case template available. This enables the application of the project valuation criteria with all other projects, with right-sized effort.

      Alarming business case statistics

      • Only one-third of companies always prepare a business case for new projects.
      • Nearly 45% of project managers admit they are unclear on the business objectives of their IT projects.

      (Source: Wrike)

      Download Info-Tech’s Comprehensive Business Case Template.

      A screenshot of Info-Tech's Comprehensive Business Case Template is shown.

      Download Info-Tech’s Fast Track Business Case Template.

      A screenshot of Info-Tech's Fast Track Business Case Template is shown.

      Info-Tech Insight

      Pass on that which is known. Valuable information about projects is lost due to a disconnect between project intake and project initiation, as project managers are typically not brought on board until project is actually approved. This will be discussed more in Phase 3 of this blueprint.

      Document the right-sized effort and documentation required for each project level

      2.2.4 Estimated Time:60-90 minutes

      Review and customize section 3.3, “Project Proposal Deliverables” in Info-Tech’s Project Intake, Approval, and Prioritization SOP Template.

      The goal of this activity is to customize the requirements for project proposal deliverables, so that it properly informs each of the approval steps discussed in the previous activity. The deliverables will also shape the work effort required for projects of various levels. Consider the following factors:

      1. Project levels: what deliverables should be required, recommended, or suggested for each of the project levels? How will exceptions be handled, and who will be accountable?
      2. Existing project proposal documents: what existing proposal documents, tools and templates can we leverage for the newly optimized approval steps?
      3. Skills availability: do these tools and templates represent a significant departure from the current state? If so, is there capacity (time and skill) to achieve the desired target state?
      4. How will you account for the consumption of resource capacity? Do a rough order of estimate for the resource capacity consumed the new deliverable standard.
      5. Who will handle exceptions? For example, PMO will maintain this process and will handle any questions or issues that pertain to this part of the process.

      INPUT

      • Process steps (Activity 2.2.2)
      • Current approval workflow(Activity 1.2.1)
      • Artifacts introduced in the previous slides

      OUTPUT

      • Requirement for artifacts and effort for each approval step

      Materials

      • Whiteboard

      Participants

      • PMO Director/ Portfolio Manager
      • Project Managers
      • Business Analysts
      • PMO Admin Staff

      Examine the new project approval workflow as a whole and document it in a flow chart

      2.2.5 Estimated Time: 30-60 minutes

      Review and customize section 3.1, “Project Approval Workflow” in Info-Tech’s Project Intake, Approval, and Prioritization SOP Template.

      In Step 1.2 of the blueprint, you mapped out the current project intake, approval, and prioritization workflow and documented it in a flow chart. In this step, take the time to examine the new project intake process as a whole, and document the new workflow in the form of a flow chart.

      1 2 3 4
      Approval Step Concept Approval Feasibility Approval Business Case Approval Resource Allocation (Prioritization)
      Alignment Focus Business need/ Project Sponsorship Technology

      Organization-wide

      Business need

      Resource capacity

      Consider the following points:

      1. Are the inputs and outputs of each step clear? Who’s doing the work? How long will each step take, on average?
      2. Is the ownership of each step clear? How will we ensure a smooth hand-off between each step and prevent requests from falling through the cracks?

      INPUT

      • New process steps for project approval (Activities 2.2.2-4)

      OUTPUT

      • Flowchart representation of new project approval workflow

      Materials

      • Microsoft Visio, flowchart software, or Microsoft PowerPoint

      Participants

      • PMO Director/ Portfolio Manager
      • Project Managers
      • Business Analysts
      • PMO Admin Staff

      Step 2.3: Prioritize projects to maximize the value of the project portfolio within the constraint of resource capacity

      PHASE 1 PHASE 2 PHASE 3

      1.1

      Define project valuation criteria

      1.2

      Envision process target state

      2.1

      Streamline intake

      2.2

      Right-size approval steps

      2.3

      Prioritize projects to fit resource capacity

      3.1

      Pilot your optimized process

      3.2

      Communicate organizational change

      This step will walk you through the following activities:

      • Perform a deeper retrospective on current project prioritization process
      • Optimize your process to maintain resource capacity supply and project demand data
      • Optimize your process to formally make disposition recommendations to appropriate decision makers

      This step involves the following participants:

      • PMO Director / Portfolio Manager
      • Project Managers
      • Business Analysts
      • PMO Administrative Staff

      Outcomes of this step

      • Retrospective of the current project prioritization process: to continue doing, to start doing, and to stop doing
      • Realistic estimate of available resource capacity, in the absence of a resource management practice
      • Optimized process for presenting the decision makers with recommendations and facilitating capacity-constrained steering of the project portfolio
      • Project Intake and Prioritization Tool for facilitating the prioritization process
      • Documentation of the optimized process in the SOP document

      The availability of staff time is rarely factored into IT project and service delivery commitments

      A lot gets promised and worked on, and staff are always busy, but very little actually gets done – at least not within given timelines or to expected levels of quality.

      Organizations tend to bite off more than they can chew when it comes to project and service delivery commitments involving IT resources.

      While the need for businesses to make an excess of IT commitments is understandable, the impacts of systemically over-allocating IT are clearly negative:

      • Stakeholder relations suffer. Promises are made to the business that can’t be met by IT.
      • IT delivery suffers. Project timelines and quality frequently suffer, and service support regularly lags.
      • Employee engagement suffers. Anxiety and stress levels are consistently high among IT staff, while morale and engagement levels are low.

      76%: 76% of organizations say they have too many projects on the go and an unmanageable and ever-growing backlog of things to get to.

      – Cooper, 2014

      70%: Almost 70% of workers feel as though they have too much work on their plates and not enough time to do it.

      – Reynolds, 2016

      Unconstrained, unmanaged demand leads to prioritization of work based on consequences rather than value

      Problems caused by the organizational tendency to make unrealistic delivery commitments is further complicated by the reality of the matrix environment.

      Today, many IT departments use matrix organization. In this system, demands on a resource’s time come from many directions. While resources are expected to prioritize their work, they lack the authority to formally reject any demand. As a result, unconstrained, unmanaged demand frequently outstrips the supply of work-hours the resource can deliver.

      When this happens, the resource has three options:

      1. Work more hours, typically without compensation.
      2. Choose tasks not to do in a way that minimizes personal consequences.
      3. Diminish work quality to meet quantity demands.

      The result is an unsustainable system for all those involved:

      1. Individual workers cannot meet expectations, leading to frustration and disengagement.
      2. Managers cannot deliver on the projects or services they manage and struggle to retain skilled resources who are looking elsewhere for “greener pastures.”
      3. Executives cannot execute strategic plans as they lose decision-making power over their resources.

      Prioritize project demand by project value to get the most out of constrained project capacity – but practicing it is difficult

      The theory may be simple and intuitive, but the practice is extremely challenging. There are three practical challenges to making project prioritization effective.

      Project Prioritization

      Capacity awareness

      Many IT departments struggle to realistically estimate available project capacity in a credible way. Stakeholders question the validity of your endeavor to install capacity-constrained intake process, and mistake it for unwillingness to cooperate instead.

      Lack of authority

      Many PMOs and IT departments simply lack the ability to decline or defer new projects.

      Many moving parts

      Project intake, approval, and prioritization involve the coordination of various departments. Therefore, they require a great deal of buy-in and compliance from multiple stakeholders and senior executives.

      Project Approval

      Unclear definition of value

      Defining the project value is difficult, because there are so many different and conflicting ways that are all valid in their own right. However, without it, it's impossible to fairly compare among projects to select what's "best."

      Unclear definition of value

      In Step 1.1 of the blueprint, we took the first step toward resolving this challenge by prototyping a project valuation scorecard.

      A screenshot of Step 1.1 of this blueprint is shown.

      "Prioritization is a huge issue for us. We face the simultaneous challenges of not having enough resources but also not having a good way to say no. "

      – CIO, governmental health agency

      Address the challenges of capacity awareness and authority with a project prioritization workflow

      Info-Tech recommends following a four-step process for managing project prioritization.

      1. Collect and update supply and demand data
        1. Re-evaluate project value for all proposed, on-hold and ongoing projects
        2. Estimate available resource capacity for projects
      2. Prioritize project demand by value
        1. Identify highest-value, “slam-dunk” projects
        2. Identify medium-value, “on-the-bubble” projects
        3. Identify lower-value projects that lie beyond the available capacity
      3. Approve projects for initiation or continuation
        1. Submit recommendations for review
        2. Adjust prioritized list with business judgment
        3. Steering committee approves projects to work on
      4. Manage a realistically defined project portfolio
      • Stakeholder Need
      • Strategic Objectives
      • Resource Capacity

      Intake and Prioritization Tool

      Perform a start-stop-continue exercise to help determine what is working and what is not working

      2.3.1 Estimated Time: 60 minutes

      Optimizing project prioritization may not require a complete overhaul of your existing processes. You may only need to tweak certain templates or policies. Perhaps you started out with a strong process and simply lost resolve over time – in which case you will need to focus on establishing motivation and discipline, rather than rework your entire process.

      Perform a start-stop-continue exercise with your team to help determine what should be salvaged, what should be abandoned, and what should be introduced:

      1. On a whiteboard or equivalent, write “Start,” “Stop,” and “Continue” in three separate columns. 3. As a group, discuss the responses and come to an agreement as to which are most valid.
      2. Equip your team with sticky notes or markers and have them populate the columns with ideas and suggestions surrounding your current processes. 4. Document the responses to help structure your game plan for intake optimization.
      Start Stop Continue
      • Periodically review the project value scorecard with business stakeholders
      • “Loud Voices First” prioritization
      • Post-prioritization score changes
      • Updating project value scores for current projects

      INPUT

      • Current project prioritization workflow (Activity 1.2.2)
      • Project prioritization success criteria (Activity 1.2.6)

      OUTPUT

      • Retrospective review of current prioritization process

      Materials

      • Whiteboard
      • Sticky notes/markers

      Participants

      • PMO Director/ Portfolio Manager
      • Project Managers
      • Business Analysts
      • PMO Admin Staff

      Use Info-Tech’s lightweight Intake and Prioritization Tool to get started on capacity-constrained project prioritization

      Use Info-Tech’s Project Intake and Prioritization Tool to facilitate the scorecard-driven prioritization and ensure effective flow of data.

      This tool builds on the Project Valuation Scorecard Tool to address the challenges in project prioritization:

      1. Lack of capacity awareness: quickly estimate a realistic supply of available work hours for projects for a given prioritization period, in the absence of a reliable and well-maintained resource utilization and capacity data.
      2. Using standard project sizing, quickly estimate the size of the demand for proposed and ongoing projects and produce a report that recommends the list of projects to greenlight – and highlight the projects within that list that are at risk of being short-charged of resources – that will aim to help you tackle:

      3. Lack of authority to say “no” or “not yet” to projects: save time and effort in presenting the results of project prioritization analysis that will enable the decision makers to make well-informed, high-quality portfolio decisions.
      4. The next several slides will walk you through the tool and present activities to facilitate its use for your organization.

      Download Info-Tech’s Project Intake and Prioritization Tool.

      A screenshot of Info-Tech's Project Intake Prioritization Tool is shown.

      Create a high-level estimate of available project capacity to inform how many projects can be greenlighted

      2.3.2 Project Intake and Prioritization Tool, Tab 2: Project Capacity

      Estimate how many work-hours are at your disposal for projects using Info-Tech’s resource calculator.

      A screenshot of Info-Tech's Project Intake and Prioritization Tool, Tab 2: Project Capacity

      1. Compile a list of each role within your department, the number of staff, and the hours in a typical work week.

      2. Enter the foreseeable out-of-office time (vacation, sick time, etc.). Typically, this value is 12-16% depending on the region.

      3. Enter how much working time is spent on non-projects for each role: administrative duties and “keep the lights on” work.

      4. Select a period of time for breaking down available resource capacity in hours.

      Project Work (%): Percentage of your working time that goes toward project work is calculated as what’s left after your non-project working time allocations have been subtracted.

      Project (h) Total Percentage: Take a note of this percentage as your project capacity. This number will put the estimated project demand in context for the rest of the tool.

      Example for a five-day work week:

      • 2 weeks (10 days) of statutory holidays
      • 3 weeks of vacation
      • 1.4 weeks (7 days) of sick days on average
      • 1 week (5 days) for company holidays

      Result: 7.4/52 weeks’ absence = 14%

      Estimate your available project capacity for the next quarter, half-year, or year

      2.3.2 Estimated Time: 30 minutes

      Discover how many work-hours are at your disposal for project work.

      1. Use the wisdom-of-the-crowd approach or resource utilization data to fill out Tab 2 of the tool. This is intended to be somewhat of a rough estimate; avoid the pitfall of being too granular in role or in time split.
      2. Choose a time period that corresponds to your project prioritization period: monthly, quarterly, 4 months, semi-annually (6 months), or annually.
      3. Examine the pie graph representation of your overall capacity breakdown, like the one shown below.

      Screenshot from Tab 2 of Project Intake and Prioritization Tool

      INPUT

      • Knowledge of organization’s personnel and their distribution of time

      OUTPUT

      • Estimate of available project capacity

      Materials

      • Project Intake and Prioritization Tool

      Participants

      • PMO Director/ Portfolio Manager
      • Project Managers
      • Business Analysts
      • PMO Admin Staff

      On average, only about half of the available project capacity results in productive project work

      Place realistic expectations on your resources’ productivity.

      Info-Tech’s PPM Current State Scorecard diagnostic provides a comprehensive view of your portfolio management strengths and weaknesses, including project portfolio management, project management, customer management, and resource utilization.

      A screenshot of Info-Tech's PPM Current State Scorecard diagnostic

      Use the wisdom of the crowd to estimate resource waste in:

      • Cancelled projects
      • Inefficiency
      • Suboptimal assignment of resources
      • Unassigned resources
      • Analyzing, fixing, and redeploying

      50% of PPM resource is wasted on average, effectively halving your available project capacity.

      Source: Info-Tech PPM Current State Scorecard

      Define project capacity and project t-shirt sizes

      2.3.3 Project Intake and Prioritization Tool, Tab 3: Settings

      The resource capacity calculator in the previous tab yields a likely optimistic estimate for how much project capacity is available. Based on this estimate as a guide, enter your optimistic (maximum) and pessimistic (minimum) estimates of project capacity as a percentage of total capacity:

      A screenshot of Info-Tech's Project Intake and Prioritization Tool Tab 3

      Info-Tech’s data shows that only about 50% of time spent on project work is wasted: cancelled projects, inefficiency, rework, etc. As a general rule, enter half of your maximum estimate of your project capacity.

      Capacity in work hours is shown here from the previous tab, to put the percentages in context. This example shows a quarterly breakdown (Step 4 from the previous slide; cell N5 in Tab 2.).

      Next, estimate the percentage of your maximum estimated project capacity that a single project would typically consume in the given period for prioritization.

      A screenshot of Info-Tech's Project Intake and Prioritization Tool Tab 3

      These project sizes might not line up with the standard project levels from Step 2.1 of the blueprint: for example, an urgent mid-sized project that requires all hands on deck may need to consume almost 100% of maximum available project capacity.

      Estimate available project capacity and standard project demand sizes for prioritizing project demand

      2.3.3 Estimated Time: 30 minutes

      Refine your estimates of project capacity supply and demand as it applies to a prioritization period.

      1. The estimated project capacity from Activity 2.3.2 represents a theoretical limit. It is most likely an overestimation (see box below). As a group, discuss and decide on a more realistic available project capacity:
        1. Optimistic estimate, assuming sustained peak productivity from everyone in your organization;
        2. Pessimistic estimate, taking into account the necessary human downtime and the PPM resource waste (see previous slide).
      2. Refine the choices of standard project effort sizes, expressed as percentages of maximum project capacity. As a reminder, this sizing is for the chosen prioritization period, and is independent from the project levels set previously in Activity 2.1.4 and 2.1.5.

      Dedicated work needs dedicated break time

      In a study conducted by the Draugiem Group, the ideal work-to-break ratio for maximizing focus and productivity was 52 minutes of work, followed by 17 minutes of rest (Evans). This translates to 75% of resource capacity yielding productive work, which could inform your optimistic estimate of project capacity.

      INPUT

      • Project capacity (Activity 2.3.2)
      • PPM Current State Scorecard (optional)

      OUTPUT

      • Capacity and demand estimate data for tool use

      Materials

      • Project Intake and Prioritization Tool

      Participants

      • PMO Director/ Portfolio Manager
      • Project Managers
      • Business Analysts
      • PMO Admin Staff

      Finish setting up the Project Intake and Prioritization Tool

      2.3.4 Project Intake and Prioritization Tool, Tab 3: Settings

      Enter the scoring criteria, which was worked out from Step 1.1 of the blueprint. This workbook supports up to ten scoring criteria; use of more than ten may make the prioritization step unwieldy.

      A screenshot of Info-Tech's Project Intake and Prioritization Tool Tab 3

      Leave unused criteria rows blank.

      Choose “value” or “execution” from a drop-down.

      Score does not need to add up to 100.

      Finally, set up the rest of the drop-downs used in the next tab, Project Data. These can be customized to fit your unique project portfolio needs.

      A screenshot of Info-Tech's Project Intake and Prioritization Tool Tab 3

      Enter project data into the Project Intake and Prioritization Tool

      2.3.4 Project Intake and Prioritization Tool, Tab 4: Project Data

      A screenshot of Info-Tech's Project Intake and Prioritization Tool Tab 4

      Ensure that each project has a unique name.

      Completed (or cancelled) projects will not be included in prioritization.

      Choose the standard project size defined in the previous tab.

      Change the heading when you customize the workbook.

      Days in Backlog is calculated from the Date Added column.

      A screenshot of Info-Tech's Project Intake and Prioritization Tool Tab 4

      Overall weighted project prioritization score is calculated as a sum of value and execution scores.

      Weighted value and execution scores are calculated according to the scoring criteria table in the 2. Settings tab.

      Enter the raw scores. Weights will be taken into calculation behind the scenes.

      Spaces for unused intake scores will be greyed out. You can enter data, but they will not affect the calculated scores.

      Document your process to maintain resource capacity supply and project demand data

      2.3.4 Estimated Time: 30 minutes

      Review and customize section 4.2, “Maintain Supply and Demand Data” in Info-Tech’s Project Intake, Approval, and Prioritization SOP Template.

      The goal of this activity is to document the process with which the supply and demand information will be updated for projects. Consider the following factors:

      1. Estimates of resource supply: how often will the resource supply be updated? How are you estimating the range (maximum vs. minimum, optimistic vs. pessimistic)? Leverage your existing organizational process assets for resource management.
      2. Updating project data for proposed projects: when and how often will the project valuation scores be updated? Do you have sufficient inputs? Examine the overall project approval process from Step 2.2 of the blueprint, and ensure that sufficient information is available for project valuation (Activity 2.2.3).
      3. Updating project data for ongoing projects: will you prioritize ongoing projects along with proposed projects? When and how often will the project valuation scores be updated? Do you have sufficient inputs?
      4. How will you account for the consumption of resource capacity? Do a rough order of estimate for the resource capacity consumed in this process.
      5. Who will handle exceptions? For example, PMO will maintain this process and will handle any questions or issues that pertain to this part of the process.

      INPUT

      • Organizational process assets for resource management, strategic planning, etc.
      • Activity 2.3.3
      • Activity 2.2.3

      OUTPUT

      • Process steps for refreshing supply and demand data

      Materials

      • SOP Template
      • Project Intake and Prioritization Tool

      Participants

      • PMO Director/ Portfolio Manager
      • Project Managers
      • Business Analysts
      • PMO Admin Staff

      Prioritized list of projects shows what fits under available project capacity for realizing maximum value

      2.3.5 Project Intake and Prioritization Tool, Tab 5: Results

      The output of the Project Intake and Prioritization Tool is a prioritized list of projects with indicators to show that their demand on project capacity will fit within the estimated available project capacity for the prioritization period.

      A screenshot of Info-Tech's Project Intake and Prioritization Tool Tab 5

      Status indicates whether the project is proposed or ongoing; completed projects are excluded.

      Disposition indicates the course of recommended action based on prioritization.

      Proposed projects display how long they have been sitting in the backlog.

      Projects highlighted yellow are marked as “deliberate” for their dispositions. These projects pose risks of not getting properly resourced. One must proceed with caution if they are to be initiated or continued.

      Provide better support to decision makers with the prioritized list, and be prepared for their steering

      It is the portfolio manager’s responsibility to provide the project portfolio owners with reliable data and enable them to make well-informed decisions for the portfolio.

      The prioritized list of proposed and ongoing projects, and an approximate indication for how they fill out the estimated available resource capacity, provide a meaningful starting ground for discussion on which projects to continue or initiate, to hold, or to proceed with caution.

      However, it is important to recognize the limitation of the prioritization methodology. There may be legitimate reasons why some projects should be prioritized over another that the project valuation method does not successfully capture. At the end of the day, it’s the prerogative of the portfolio owners who carry on the accountabilities to steer the portfolio.

      The portfolio manager has a responsibility to be prepared for reconciling the said steering with the unchanged available resource capacity for project work. What comes off the list of projects to continue or initiate? Or, will we outsource capacity if we must meet irreconcilable demand? The next slide will show how Info-Tech’s tool helps you with this process.

      Info-Tech Best Practice

      Strive to become the best co-pilot. Constantly iterate on the scoring criteria to better adapt to the portfolio owners’ preference in steering the project portfolio.

      Manipulate the prioritized list with the Force Disposition list

      2.3.5 Project Intake and Prioritization Tool, Tab 5: Results

      The Force Disposition list enables you to inject subjective judgment in project prioritization. Force include and outsource override project prioritization scores and include the projects for approval:

      • Force include counts the project demand against capacity.
      • Outsource, on the other hand, does not count the project demand.
      • Force exclude removes a project from prioritized list altogether, without deleting the row and losing its data.

      A screenshot of Info-Tech's Project Intake and Prioritization Tool Tab 5

      Choose a project name and a disposition using a drop-down.

      Use this list to test out various scenarios, useful for what-if analysis.

      A screenshot of Info-Tech's Project Intake and Prioritization Tool Tab 5

      Document your process to formally make disposition recommendations to appropriate decision-making party

      2.3.5 Estimated Time: 60 minutes

      Review and customize section 4.3, “Approve projects for initiation or continuation” in Info-Tech’s Project Intake, Approval, and Prioritization SOP Template.

      The goal of this activity is to formalize the process of presenting the prioritized list of projects for review, modify the list based on steering decisions, and obtain the portfolio owners’ approval for projects to initiate or continue, hold, or terminate. Consider the following factors:

      1. Existing final approval process: what are the new injections to the current decision-making process for final approval?
      2. Meeting prep, agenda, and follow-up: what are the activities that must be carried out by PMO / portfolio manager to support the portfolio decision makers and obtain final approval?
      3. “Deliberate” projects: what additional information should portfolio owners be presented with, in order to deliberate on the projects at risk of being not properly resourced? For example, consider a value-execution plot (right).

      A screenshot of Info-Tech's Project Intake and Prioritization Tool Tab 5

      INPUT

      • Approval process steps (Activity 2.2.2)
      • Steering Committee process documentation

      OUTPUT

      • Activities for supporting the decision-making body

      Materials

      • SOP Template
      • Project Intake and Prioritization Tool

      Participants

      • CIO
      • PMO Director/ Portfolio Manager
      • Project Managers
      • Business Analysts

      Once a project is approved, pass that which is known on to those responsible for downstream processes

      Aim to be responsible stewards of important and costly information developed throughout project intake, approval, and prioritization processes.

      Once the proposed project is given a green light, the project enters an initiation phase.

      No matter what project management methodology is employed, it is absolutely vital to pass on the knowledge gained and insights developed through the intake, approval, and prioritization processes. This ensures that the project managers and team are informed of the project’s purpose, business benefits, rationale for the project approval, etc. and be able to focus their efforts in realizing the project’s business goals.

      Recognize that this does not aim to create any new artifacts. It is simply a procedural safeguard against the loss of important and costly information assets for your organization.

      A flowchart is shown as an example of business documents leading to the development of a project charter.

      Information from the intake process directly feeds into, for example, developing a project charter.

      Source: PMBOK, 6th edition

      "If the project manager can connect strategy to the project they are leading (and therefore the value that the organization desires by sanctioning the project), they can ensure that the project is appropriately planned and managed to realize those benefits."

      – Randall T. Black, P.Eng., PMP; source: PMI Today

      Examine the new project intake workflow as a whole and document it in a flow chart

      2.3.6 Estimated Time: 30-60 minutes

      Review and customize section 4.1, “Project Prioritization Workflow” in Info-Tech’s Project Intake, Approval, and Prioritization SOP Template.

      In Step 1.2 of the blueprint, you mapped out the current project intake, approval, and prioritization workflow and documented it in a flow chart. In this step, take the time to examine the new project intake process as a whole, and document the new workflow in the form of a flow chart.

      1. Collect and update supply and demand data
      2. Prioritize project demand by value
      3. Approve projects for initiation or continuation
      4. Manage a realistically defined project portfolio

      Consider the following points:

      1. Are the inputs and outputs of each step clear? Who’s doing the work? How long will each step take, on average?
      2. Is the ownership of each step clear? How will we ensure a smooth handoff between each step and prevent requests from falling through the cracks?

      INPUT

      • New process steps for project prioritization (Activities 2.3.x-y)

      OUTPUT

      • Flowchart representation of new project prioritization workflow

      Materials

      • Microsoft Visio, flowchart software, or Microsoft PowerPoint

      Participants

      • CIO
      • PMO Director/ Portfolio Manager
      • Project Managers
      • Business Analysts

      Leverage Info-Tech’s other blueprints to complement your project prioritization processes

      The project capacity estimates overlook a critical piece of the resourcing puzzle for the sake of simplicity: skills. You need the right skills at the right time for the right project.

      Use Info-Tech’s Balance Supply and Demand with Realistic Resource Management Practices blueprint to enhance the quality of information on your project supply.

      A screenshot of Info-Tech's Balance Supply and Demand with Realistic Resource Management Practices blueprint.

      There is more to organizing your project portfolio than a strict prioritization by project value. For example, as with a financial investment portfolio, project portfolio must achieve the right investment mix to balance your risks and leverage opportunities.

      Use Info-Tech’s Maintain an Organized Portfolio blueprint to refine the makeup of your project portfolio.

      A screenshot of Info-Tech's Maintain an Organized Portfolio blueprint.

      Continuous prioritization of projects allow organizations to achieve portfolio responsiveness.

      Use Info-Tech’s Manage an Agile Portfolio blueprint to take prioritization of your project portfolio to the next level.

      A screenshot of Info-Tech's Manage an Agile Portfolio blueprint

      46% of organizations use a homegrown PPM solution. Info-Tech’s Grow Your Own PPM Solution blueprint debuts a spreadsheet-based Portfolio Manager tool that provides key functionalities that integrates those of the Intake and Prioritization Tool with resource management, allocation and portfolio reporting capabilities.

      A screenshot of Info-Tech's Grow Your Own PPM Solution blueprint

      If you want additional support, have our analysts guide you through this phase as part of an Info-Tech workshop

      Book a workshop with our Info-Tech analysts:

      A picture of an Info-Tech analyst is shown.

      • To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team.
      • Info-Tech analysts will join you and your team onsite at your location or welcome you to Info-Tech’s historic Toronto office to participate in an innovative onsite workshop.
      • Contact your account manager (www.infotech.com/account), or email Workshops@InfoTech.com for more information.

      The following are sample activities that will be conducted by Info-Tech analysts with your team:

      2.1.2-6

      A screenshot of activities 2.1.2-6 is shown.

      Optimize your process to receive, triage, and follow up on project requests

      Discussion on decision points and topics of consideration will be facilitated to leverage the diverse viewpoints amongst the workshop participants.

      2.3.2-5

      A screenshot of activities 2.3.2-5 is shown.

      Set up a capacity-informed project prioritization process using Info-Tech’s Project Intake and Prioritization Tool

      A table-top planning exercise helps you visualize the current process in place and identify opportunities for optimization.

      Phase 3

      Integrate the New Optimized Processes into Practice

      Phase 3 outline

      Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.

      Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.

      Guided Implementation 3: Integrate the New Optimized Processes into Practice

      Proposed Time to Completion: 6-12 weeks

      Step 3.1: Pilot your process to refine it prior to rollout

      Start with an analyst kick-off call:

      • Review the proposed intake, approval, and prioritization process

      Then complete these activities…

      • Select receptive stakeholders to work with
      • Define the scope of your pilot and determine logistics
      • Document lessons learned and create an action plan for any changes

      With these tools & templates:

      • Process Pilot Plan
      • Project Backlog Manager Job Description

      Step 3.2: Analyze the impact of organizational change

      Review findings with analyst:

      • Results of the process pilot and the finalized intake SOP
      • Key PPM stakeholders
      • Current organizational climate

      Then complete these activities…

      • Analyze the stakeholder impact and responses to impending organizational change
      • Create message canvases for at-risk change impacts and stakeholders to create an effective communication plan

      With these tools & templates:

      • Intake Process Implementation Impact Analysis Tool

      Phase 3 Results & Insights:

      • Engagement paves the way for smoother adoption. An “engagement” approach (rather than simply “communication”) turns stakeholders into advocates who can help boost your message, sustain the change, and realize benefits without constant intervention or process command-and-control.

      Step 3.1: Pilot your intake, approval, and prioritization process to refine it before rollout

      PHASE 1 PHASE 2 PHASE 3

      1.1

      Define project valuation criteria

      1.2

      Envision process target state

      2.1

      Streamline intake

      2.2

      Right-size approval steps

      2.3

      Prioritize projects to fit resource capacity

      3.1

      Pilot your optimized process

      3.2

      Communicate organizational change

      This step will walk you through the following activities:

      • Select receptive managers to work with during your pilot
      • Define the scope of your pilot and determine logistics
      • Plan to obtain feedback, document lessons learned, and create an action plan for any changes
      • Finalize Project Intake, Approval, and Prioritization SOP

      This step involves the following participants:

      • PMO Director / Portfolio Manager
      • Project Managers
      • Business Analysts

      Outcomes of this step

      • A pilot team
      • A process pilot plan that defines the scope, logistics, and process for retrospection
      • Project Backlog Manager job description
      • Finalized Project Intake, Approval, and Prioritization SOP for rollout

      Pilot your new processes to test feasibility and address issues before a full deployment

      Adopting the right set of practices requires a significant degree of change that necessitates buy-in from varied stakeholders throughout IT and the business.

      Rome wasn’t built in a day. Similarly, benefits of optimized project intake, approval, and prioritization process will not be realized overnight.

      Resist the urge to deploy a big-bang roll out of your new intake practices. The approach is ill advised for two main reasons:

      • It will put more of a strain on the implementation team in the near term, with a larger pool of end users to train and collect data from.
      • Putting untested practices in a department-wide spotlight could lead to mass confusion in the near-term and color the new processes in a negative light, leading to a loss of stakeholder trust and engagement right out-of-the-gate.

      Start with a pilot phase. Identify receptive lines of business and IT resources to work with, and leverage their insights to help iron out the kinks in your process before unveiling your practices to IT and all business users at large.

      This step will help you to:

      • Plan and execute a pilot of the processes we developed in Phase 2.
      • Incorporate the lessons learned from that pilot to strengthen your SOP and ease the communication process.

      Info-Tech Insight

      Engagement paves the way for smoother adoption. An “engagement” approach (rather than simply “communication”) turns stakeholders into advocates who can help boost your message, sustain the change, and realize benefits without constant intervention or process command-and-control.

      Plan your pilot like you would any project to ensure it’s well defined and its goals are clearly articulated

      Use Info-Tech’s Intake Process Pilot Plan Template to help define the scope of your pilot and set appropriate goals for the test-run of your new processes.

      A process pilot is a limited scope of an implementation (constrained by time and resources involved) in order to test the viability and effectiveness of the process as it has been designed.

      • Investing time and energy into a pilot phase can help to lower implementation risk, enhance the details and steps within a process, and improve stakeholder relations prior to a full scale rollout.
      • More than a dry run, however, a pilot should be approached strategically, and planned out to limit the scope of it and achieve specific outcomes.
      • Leverage a planning document to ensure your process pilot is grounded in a common set of definitions, that the pilot is delivering value and insight, and that ultimately the pilot can serve as a starting point for a full-scale process implementation.

      Download Info-Tech’s Process Pilot Plan Template

      A screenshot of Info-Tech's Process Pilot Plan Template is shown.

      "The advantages to a pilot are several. First, risk is constrained. Pilots are closely monitored so if a problem does occur, it can be fixed immediately. Second, the people working in the pilot can become trainers as you roll the process out to the rest of the organization. Third, the pilot is another opportunity for skeptics to visit the pilot process and learn from those working in it. There’s nothing like seeing a new process working for people to change their minds."

      Daniel Madison

      Select receptive stakeholders to work with during your pilot

      3.1.1 Estimated Time: 20-60 minutes

      Info-Tech recommends selecting PPM stakeholders who are aware of your role and some of the challenges in project intake, approval, and prioritization to assist in the implementation process.

      1. If receptive PPM stakeholders are known, schedule a 15-minute meeting with them to inquire if they would be willing to be part of the pilot process.
      2. If receptive project managers are not known, use Info-Tech’s Stakeholder Engagement Workbook to conduct a formal selection process.
        1. Enter a list of potential participants for pilot in tab 3.
        2. Rate project managers in terms of influence, pilot interest, and potential deployment contribution within tab 4.
        3. Review tab 5 in the workbook. Receptive PPM stakeholders will appear in the top quadrants. Ideal PPM stakeholders for the pilot are located in the top right quadrant of the graph.

      A screenshot of Info-Tech's Stakeholder Engagement Workbook Tab 5 is shown.

      INPUT

      • Project portfolio management stakeholders (Activity 1.2.3)

      OUTPUT

      • Pilot project team

      Materials

      • Stakeholder Engagement Workbook
      • Process Pilot Plan Template

      Participants

      • PMO Director/ Portfolio Manager
      • CIO (optional)

      Document the PPM stakeholders involved in your pilot in Section 3 of Info-Tech’s Process Pilot Plan Template.

      Define the scope of your pilot and determine logistics

      3.1.2 Estimated Time: 60-90 minutes

      Use Info-Tech’s Process Pilot Plan Template to design the details of your pilot.

      Investing time into planning your pilot phase strategically will ensure a clear scope, better communications for those piloting the processes, and – overall – better, more actionable results for the pilot phase. The Pilot Plan Template is broken into five sections to assist in these goals:

      • Pilot Overview and Scope
      • Success and Risk Factors
      • Stakeholders Involved and Communications Plan
      • Pilot Retrospective and Feedback Protocol

      The duration of your pilot should go at least one prioritization period, e.g. one to two quarters.

      Estimates of time commitments should be captured for each stakeholder. During the retrospective at the end of the pilot you should capture actuals to help determine the time-cost of the process itself and measure its sustainability.

      Once the Plan Template is completed, schedule time to share and communicate it with the pilot team and executive sponsors of the process.

      While you should invest time in this planning document, continue to lean on the Intake, Approval, and Prioritization SOP throughout the pilot phase.

      INPUT

      • Sections 1 through 4 of the Process Pilot Plan Template

      OUTPUT

      • A process pilot plan

      Materials

      • Process Pilot Plan Template

      Participants

      • PMO Director / Portfolio Manager
      • Project Managers
      • Business Analysts
      • CIO (optional)

      Execute your pilot and prepare to make process revisions before the full rollout

      Hit play! Begin the process pilot and get familiar with the work routine and resource management solution.

      Some things to keep in mind during the pilot include:

      • Depending on the solution you are using, you will likely need to spend one day or less to populate the tool. During the pilot, measure the time and effort required to manage the data within the tool. Determine whether time and effort required is viable on an ongoing basis (i.e. can you do it every month or quarter) and has value.
      • Meet with the pilot team and other stakeholders regularly during the pilot, at least biweekly. Allow the team (and yourself) to speak honestly and openly about what isn’t working. The pilot is your chance to make things better.
      • Keep notes about what will need to change in the SOP. For major changes, you may have to tweak the process during the pilot itself. Update the process documents as needed and communicate the changes and why they’re being made. If required, update the scope of the pilot in the Pilot Plan Template.
      An example is shown on how to begin the process pilot and getting familiar with the work routine and resource management solution.

      Obtain feedback from the pilot group to improve your processes before a wider rollout

      3.1.3 Estimated Time: 30 minutes

      Pilot projects allow you to validate your assumptions and leverage lessons learned. During the planning of the pilot, you should have scheduled a retrospective meeting with the pilot team to formally assess strengths and weaknesses in the process you have drafted.

      • Schedule the retrospective shortly after the pilot is completed. Info-Tech recommends performing a Stop/Start/Continue meeting with pilot participants to obtain and capture feedback.
      • Have members of the meeting record any processes/activities on sticky notes that should:
        • Stop: because they are ineffective or not useful
        • Start: because they would be useful for the tool and have not been incorporated into current processes
        • Continue: because they are useful and positively contribute to intended process outcomes.

      An example of how to structure a Stop/Start/Continue activity on a whiteboard using sticky notes.

      An example of stop, start, and continue is activity is shown.

      INPUT

      • What’s working and what isn’t in the process

      OUTPUT

      • Ideas to improve process

      Materials

      • Whiteboard
      • Sticky notes
      • Process Pilot Plan Template

      Participants

      • Process owner (PMO director or portfolio owner)
      • Pilot team

      See the following slide for additional instructions.

      Document lessons learned and create an action plan for any changes to the processes

      3.1.4 Estimated Time: 30 minutes

      An example of stop, start, and continue is activity is shown.

      As a group, discuss everyone’s responses and organize according to top priority (mark with a 1) and lower priority/next steps (mark with a 2). At this point, you can also remove any sticky notes that are repetitive or no longer relevant.

      Once you have organized based on priority, be sure to come to a consensus with the group regarding which actions to take. For example, if the group agrees that they should “stop holding meetings weekly,” come to a consensus regarding how often meetings will be held, i.e. monthly.

      Priority Action Required Who is Responsible Implementation Date
      Stop: Holding meetings weekly Hold meetings monthly Jane Doe, PMO Next Meeting: August 1, 2017
      Start: Discussing backlog during meetings Ensure that backlog data is up to date for discussion on date of next meeting. John Doe, Portfolio Manager August 1, 2017

      Create an action plan for the top priority items that require changes (the Stops and Starts). Record in this slide, or your preferred medium. Be sure to include who is responsible for the action and the date that it will be implemented.

      Document the outcomes of the start/stop/continue and your action plan in Section 6 of Info-Tech’s Process Pilot Plan Template.

      Use Info-Tech’s Backlog Manager Job Description Template to help fill any staffing needs around data maintenance

      3.1 Project Backlog Manager Job Description

      You will need to determine responsibilities and accountabilities for portfolio management functions within your team.

      If you do not have a clearly identifiable portfolio manager at this time, you will need to clarify who will wear which hats in terms of facilitating intake and prioritization, high-level capacity awareness, and portfolio reporting.

      • Use Info-Tech’s Project Backlog Manager job description template to help clarify some of the required responsibilities to support your intake, approval, and prioritization strategy.
        • If you need to bring in an additional staff member to help support the strategy, you can customize the job description template to help advertise the position. Simply edit the text in grey within the template.
      • If you have other PPM tasks that you need to define responsibilities for, you can use the RASCI chart on the final tab of the PPM Strategy Development Tool.

      Download Info-Tech’s Project Backlog Manager job description template.

      A screenshot of Info-Tech's Project Backlog Manager template is shown.

      Finalize the Intake, Approval, and Prioritization SOP and prepare to communicate your processes

      Once you’ve completed the pilot process and made the necessary tweaks, you should finalize your Intake, Approval, and Prioritization SOP and prepare to communicate it.

      Update section 1.2, “Overall Process Workflow” in Info-Tech’s Project Intake, Approval, and Prioritization SOP Template with the new process flow.

      Revisit your SOP from Phase 2 and ensure it has been updated to reflect the process changes that were identified in activity 3.1.4.

      • If during the pilot process the data was too difficult or time consuming to maintain, revisit the dimensions you have chosen and choose dimensions that are easier to accurately maintain. Tweak your process steps in the SOP accordingly.
      • In the long term, if you are not observing any progress toward achieving your success criteria, revisit the impact analysis that we’ll prepare in step 3.2 and address some of these inhibitors to organizational change.

      Download Info-Tech’s Project Intake, Approval, and Prioritization SOP template.

      A screenshot of Info-Tech's Project Intake, Approval, and Prioritization SOP template.

      Info-Tech Best Practice

      Make your SOP high impact. SOPs are often at risk of being left unmaintained and languishing in disuse. Improve the SOP’s succinctness and usability by making it visual; consult Info-Tech’s blueprint, Create Visual SOP Documents that Drive Process Optimization, Not Just Peace of Mind.

      Step 3.2: Analyze the impact of organizational change through the eyes of PPM stakeholders to gain their buy-in

      PHASE 1 PHASE 2 PHASE 3

      1.1

      Define project valuation criteria

      1.2

      Envision process target state

      2.1

      Streamline intake

      2.2

      Right-size approval steps

      2.3

      Prioritize projects to fit resource capacity

      3.1

      Pilot your optimized process

      3.2

      Communicate organizational change

      This step will walk you through the following activities:

      • Analyze the stakeholder impact and responses to impending organizational change
      • Create message canvases for at-risk change impacts and stakeholders
      • Set the course of action for communicating changes to your stakeholders

      This step involves the following participants:

      • PMO Director / Portfolio Manager
      • Project Managers
      • Business Analysts

      Outcomes of this step

      • A thorough organizational change impact analysis, based on Info-Tech’s expertise in organizational change management
      • Message canvases and communication plan for your stakeholders
      • Go-live for the new intake, approval, and prioritization process

      Manage key PPM stakeholders and communicate changes

      • Business units: Projects are undertaken to provide value to the business. Senior management from business units must help define how project will be valued.
      • IT: IT must ensure that technical/practical considerations are taken into account when determining project value.
      • Finance: The CFO or designated representative will ensure that estimated project costs and benefits can be used to manage the budget.
      • PMO: PMO is the administrator of the project portfolio. PMO must provide coordination and support to ensure the process operates smoothly and its goals are realized.
      • Business analysts: BAs carry out the evaluation of project value. Therefore, their understanding of the evaluation criteria and the process as a whole are critical to the success of the process.
      • Project sponsors: Project sponsors are accountable for the realization of benefits for which projects are undertaken.

      Impacts will be felt differently by different stakeholders and stakeholder groups

      As you assess change impacts, keep in mind that no impact will be felt the same across the organization. Depth of impact can vary depending on the frequency (will the impact be felt daily, weekly, monthly?), the actions necessitated by it (e.g. will it change the way the job is done or is it simply a minor process tweak?), and the anticipated response of the stakeholder (support, resistance, indifference?).

      Use the Organizational Change Depth Scale below to help visualize various depths of impact. The deeper the impact, the tougher the job of managing change will be.

      Procedural Behavioral Interpersonal Vocational Cultural
      Procedural change involves changes to explicit procedures, rules, policies, processes, etc. Behavioral change is similar to procedural change, but goes deeper to involve the changing tacit or unconscious habits. Interpersonal change goes beyond behavioral change to involve changing relationships, teams, locations, reporting structures, and other social interactions. Vocational change requires acquiring new knowledge and skills, and accepting the loss or decline in the value or relevance of previously acquired knowledge and skills. Cultural change goes beyond interpersonal and vocational change to involve changing personal values, social norms, and assumptions about the meaning of good vs. bad or right vs. wrong.
      Example: providing sales reps with mobile access to the CRM application to let them update records from the field. Example: requiring sales reps to use tablets equipped with a custom mobile application for placing orders from the field. Example: migrating sales reps to work 100% remotely. Example: migrating technical support staff to field service and sales support roles. Example: changing the operating model to a more service-based value proposition or focus.

      Perform a change impact analysis to maximize the chances of adoption for the new intake process

      Invest time and effort to analyze the impact of change to create an actionable stakeholder communication plan that yields the desirable result: adoption.

      Info-Tech’s Drive Organizational Change from the PMO blueprint offers the OCM Impact Analysis Tool to helps document the change impact across multiple dimensions, enabling the project team to review the analysis with others to ensure that the most important impacts are captured.

      This tool has been customized for optimizing project intake, approval, and prioritization process to deliver the same result in a more streamlined way. The next several slides will take you through the activities to ultimately create an OCM message canvas and a communication plan for your key stakeholders.

      Download Info-Tech’s Intake and Prioritization Impact Analysis Tool.

      A screenshot of Info-Tech's Intake and Prioritization Impact Analysis Tool is shown.

      "As a general principle, project teams should always treat every stakeholder initially as a recipient of change. Every stakeholder management plan should have, as an end goal, to change recipients’ habits or behaviors."

      -PMI, 2015

      Set up the Intake Process and Prioritization Impact Analysis Tool

      3.2.1 Intake and Prioritization Impact Analysis Tool, Tab 2-3

      In Tab 2, enter your stakeholders’ names. Represent stakeholders as a group if you expect the impact of change on them to be reasonably uniform, as well as their anticipated responses. Otherwise, consider adding them as individuals or subgroups.

      A screenshot of Info-Tech's Intake and Prioritization Impact Analysis Tool, Tab 2 is shown.

      In Tab 3, enter whether you agree or disagree with each statement that represents an element of organizational change that be introduced as the newly optimized intake process is implemented.

      As a result of the change initiative in question:

      A screenshot of Info-Tech's Intake and Prioritization Impact Analysis Tool, Tab 3 is shown.

      Analyze the impact and the anticipated stakeholder responses of each change

      3.2.1 Intake and Prioritization Impact Analysis Tool, Tab 4: Impact Analysis Inputs

      Each change statement that you agreed with in Tab 3 are listed here in Tab 4 of the Intake and Prioritization Impact Analysis Tool. For each stakeholder, estimate and enter the following data:

      1. Frequency of the Impact: how often will the impact of the change be felt?
      2. Effort Associated with Impact: what is the demand on a stakeholder’s effort to implement the change?
      3. Anticipated Response: rate from enthusiastic response to active subversion. Honest and realistic estimates of anticipated responses are critical to the rest of the impact analysis.
      A screenshot of Info-Tech's Intake and Prioritization Impact Analysis Tool, Tab 4 is shown.

      Analyze the stakeholder impact and responses to impending organizational change as a group

      3.2.1 Estimated Time: 60-90 minutes

      Divide and conquer. Leverage the group to get through the seemingly daunting amount of work involved with impact analysis.

      1. Divide the activity participants into subgroups and assign a section of the impact analysis. It may be helpful to do one section together as a group to make sure everyone is roughly on the same page for assessing impact.
      2. Suggested ways to divide up the impact analysis include:

      • By change impact. This would be suitable when the process owners (or would-be process owners) are available and participating.
      • By stakeholders. This would be suitable for large organizations where the activity participants know some stakeholders better than others.

      Tip: use a spreadsheet tool that supports multi-user editing (e.g. Google Sheets, Excel Online).

    • Aggregate the completed work and benchmark one another’s analysis by reviewing them with the entire group.
    • INPUT

      • Organizational and stakeholder knowledge
      • Optimized intake process

      OUTPUT

      • Estimates of stakeholder-specific impact and response

      Materials

      • Intake and Prioritization Impact Analysis Tool

      Participants

      • PMO Director/ Portfolio Manager
      • Project Managers
      • Business Analysts

      Info-Tech Insight

      Beware of bias. Groups are just as susceptible to producing overly optimistic or pessimistic analysis as individuals, just in different ways. Unrealistic change impact analysis will compromise your chances of arriving at a reasonable, tactful stakeholder communication plan.

      Examine your impact analysis report

      3.2.2 Intake and Prioritization Impact Analysis Tool, Tab 5: Impact Analysis Outputs

      These outputs are based on the impacts you analyzed in Tab 4 of the tool (Activity 3.2.1). They are organized in seven sections:

      1. Top Five Highest Risk Impacts, based on the frequency and effort inputs across all impacts.
      2. Overall Process Adoption Rating (top right), showing the overall difficulty of this change given likelihood/risk that the stakeholders involved will absorb the anticipated change impacts.
      3. Top Five Most Impacted Stakeholders, based on the frequency and effort inputs across all impacts.
      4. Top Five Process Supporters and;
      5. Top Five Process Resistors, based on the anticipated response inputs across all impacts.
      6. Impact Register (bottom right): this list breaks down each change’s likelihood of adoption.
      7. Potential Impacts to Watch Out For: this list compiles all of the "Don't Know" responses from Tab 3.
      A screenshot of Info-Tech's Intake and Prioritization Impact Analysis Tool, Tab 5 is shown. It shows Section 2. Overall process adoption rating. A screenshot of Info-Tech's Intake and Prioritization Impact Analysis Tool, Tab 5 is shown. It shows Section 6. Impact Register.

      Tailor messages for at-risk change impacts and stakeholders with Info-Tech’s Message Canvas

      3.2.2 Intake and Prioritization Impact Analysis Tool, Tab 6: Message Canvas

      Use Info-Tech’s Message Canvas on this tab to help rationalize and elaborate the change vision for each group.

      Elements of a Message Canvas

      • Why is there a need for this process change?
      • What will be new for this audience?
      • What will go away for this audience?
      • What will be meaningfully unchanged for this audience?
      • How will this change benefit this audience?
      • When and how will the benefits be realized for this audience?
      • What does this audience have to do for this change to succeed?
      • What does this audience have to stop doing for this change to succeed?
      • What should this audience continue doing?
      • What support will this audience receive to help manage the transition?
      • What should this audience expect to do/happen next?

      A screenshot of Info-Tech's Intake and Prioritization Impact Analysis Tool, Tab 6 is shown.

      Info-Tech Insight

      Change thy language, change thyself.

      Jargon, acronyms, and technical terms represent deeply entrenched cultural habits and assumptions.

      Continuing to use jargon or acronyms after a transition tends to drag people back to old ways of thinking and working.

      You don’t need to invent a new batch of buzzwords for every change (nor should you), but every change is an opportunity to listen for words and phrases that have lost their meaning through overuse and abuse.

      Create message canvases for at-risk change impacts and stakeholders as a group

      3.2.2 Estimated Time: 90-120 minutes

      1. Decide on the number of message canvases to complete. This will be based on the number of at-risk change impacts and stakeholders.
      2. Divide the activity participants into subgroups and assign a section of the message canvas. It may be helpful to do one section together as a group to make sure everyone is roughly on the same page for assessing impact.
      3. Aggregate the completed work and benchmark the message canvases amongst subgroups.

      Remember these guidelines to help your messages resonate:

      • People are busy and easily distracted. Tell people what they really need to know first, before you lose their attention.
      • Repetition is good. Remember the Aristotelian triptych: “Tell them what you’re going to tell them, then tell them, then tell them what you told them.”
      • Don’t use technical terms, jargon, or acronyms. Different groups in organizations tend to develop specialized vocabularies. Everybody grows so accustomed to using acronyms and jargon every day that it becomes difficult to notice how strange it sounds to outsiders. This is especially important when IT communicates with non-technical audiences. Don’t alienate your audience by talking at them in a strange language.
      • Test your message. Run focus groups or deliver communications to a test audience (which could be as simple as asking 2–3 people to read a draft) before delivering messages more broadly.

      – Info-Tech Blueprint, Drive Organizational Change from the PMO

      INPUT

      • Impact Analysis Outputs
      • Organizational and stakeholder knowledge

      OUTPUT

      • Estimates of stakeholder-specific impact and response

      Materials

      • Intake and Prioritization Impact Analysis Tool

      Participants

      • PMO Director/ Portfolio Manager
      • Project Managers
      • Business Analysts

      Distill the message canvases into a comprehensive communication plan

      3.2.3 Intake and Prioritization Impact Analysis Tool, Tab 7: Communication Plan

      The communication plan creates an action plan around the message canvases to coordinate the responsibilities of delivering them, so the risks of “dropping the ball” on your stakeholders are minimized.

      A screenshot of Info-Tech's Intake and Prioritization Impact Analysis Tool, Tab 7: Communication is shown.

      1. Choose a change impact from a drop-down menu.

      2. Choose an intended audience...

      … and the message canvas to reference.

      3. Choose the method of delivery. It will influence how to craft the message for the stakeholder.

      4. Indicate who is responsible for creating and communicating the message.

      A screenshot of Info-Tech's Intake and Prioritization Impact Analysis Tool, Tab 7: Communication is shown.

      5. Briefly indicate goal of the communication and the likelihood of success.

      6. Record the dates to plan and track the communications that take place.

      Set the course of action for communicating changes to your stakeholders

      3.2.2 Estimated Time: 90-120 minutes

      1. Divide the activity participants into subgroups and assign communication topics to each group. There should be one communication topic for each change impact. Based on the message canvas, create a communication plan draft.
      2. Aggregate the completed work and benchmark the communication topic amongst subgroups.
      3. Share the finished communication plan with the rest of the working group. Do not share this file widely, but keep it private within the group.

      Identify critical points in the change curve:

      1. Honeymoon of “Uninformed Optimism”: There is usually tentative support and even enthusiasm for change before people have really felt or understood what it involves.
      2. Backlash of “Informed Pessimism” (leading to “Valley of Despair”): As change approaches or begins, people realize they’ve overestimated the benefits (or the speed at which benefits will be achieved) and underestimated the difficulty of change.
      3. Valley of Despair and beginning of “Hopeful Realism”: Eventually, sentiment bottoms out and people begin to accept the difficulty (or inevitability) of change.
      4. Bounce of “Informed Optimism”: People become more optimistic and supportive when they begin to see bright spots and early successes.
      5. Contentment of “Completion”: Change has been successfully adopted and benefits are being realized.

      Based on Don Kelley and Daryl Conner’s Emotional Cycle of Change.

      INPUT

      • Change impact analysis results
      • Message canvases
      • List of stakeholders

      OUTPUT

      • Communication Plan

      Materials

      • Intake and Prioritization Impact Analysis Tool

      Participants

      • PMO Director/ Portfolio Manager
      • Project Managers
      • Business Analysts

      Roll out the optimized intake, approval, and prioritization process, and continually monitor adoption and success

      As you implement your new project intake process, familiarize yourself with common barriers and challenges.

      There will be challenges to watch for in evaluating the effectiveness of your intake processes. These may include circumvention of process by key stakeholders, re-emergence of off-the-grid projects and low-value initiatives.

      As a quick and easy way to periodically assess your processes, consider the following questions:

      • Are you confident that all work in progress is being tracked via the project list?
      • Are your resources all currently working on high-value initiatives?
      • Since optimizing, have you been able to deliver (or are you on target to deliver) all that has been approved, with no initiatives in states of suspended animation for long periods of time?
      • Thanks to sufficient portfolio visibility and transparency into your capacity, have you been able to successfully decline requests that did not add value or that did not align with resourcing?

      If you answer “no” to any of these questions after a sufficient post-implementation period (approximately six to nine months, depending on the scope of your optimizing), you may need to tweak certain aspects of your processes or seek to align your optimization with a lower capability level in the short term.

      Small IT department struggles to optimize intake and to communicate new processes to stakeholders

      CASE STUDY

      Industry: Government

      Source: Info-Tech Client

      Challenge

      There is an IT department for a large municipal government. Possessing a relatively low level of PPM maturity, IT is in the process of establishing more formal intake practices in order to better track, and respond to, project requests. New processes include a minimalist request form (sent via email) coupled with more thorough follow-up from BAs and PMs to determine business value, ROI, and timeframes.

      Solution

      Even with new user-friendly processes in place, IT struggles to get stakeholders to adopt, especially with smaller initiatives. These smaller requests frequently continue to come in outside of the formal process and, because of this, are often executed outside of portfolio oversight. Without good, reliable data around where staff time is spent, IT lacks the authority to decline new requests.

      Results

      IT is seeking further optimization through better communication. They are enforcing discipline on stakeholders and reiterating that all initiatives, regardless of size, need to be directed through the process. IT is also training its staff to be more critical. “Don’t just start working on an initiative because a stakeholder asks.” With staff being more critical and directing requests through the proper queues, IT is getting better at tracking and prioritizing requests.

      "The biggest challenge when implementing the intake process was change management. We needed to shift our focus from responding to requests to strategically thinking about how requests should be managed. The intake process allows the IT Department to be transparent to customers and enables decision makers."

      If you want additional support, have our analysts guide you through this phase as part of an Info-Tech workshop

      Book a workshop with our Info-Tech analysts:

      A picture of an Info-Tech analyst is shown.

      • To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team.
      • Info-Tech analysts will join you and your team onsite at your location or welcome you to Info-Tech’s historic Toronto office to participate in an innovative onsite workshop.
      • Contact your account manager (www.infotech.com/account), or email Workshops@InfoTech.com for more information.

      The following are sample activities that will be conducted by Info-Tech analysts with your team:

      3.1.1

      A screenshot of activity 3.1.1 is shown

      Select receptive stakeholders to work with during your pilot

      Identify the right team of supportive PPM stakeholders to carry out the process pilot. Strategies to recruit the right people outside the workshop will be discussed if appropriate.

      3.2.1

      A screenshot of activity 3.2.1 is shown.

      Analyze the stakeholder impact and responses to impending organizational change

      Carry out a thorough analysis of change impact in order to maximize the effectiveness of the communication strategy in support of the implementation of the optimized process.

      Insight breakdown

      Insight 1

      • The overarching goal of optimizing project intake, approval, and prioritization process is to maximize the throughput of the best projects. To achieve this goal, one must have a clear way to determine what are “the best” projects.

      Insight 2

      • Info-Tech’s methodology systemically fits the project portfolio into its triple constraint of stakeholder needs, strategic objectives, and resource capacity to effectively address the challenges of establishing organizational discipline for project intake.

      Insight 3

      • Engagement paves the way for smoother adoption. An “engagement” approach (rather than simply “communication”) turns stakeholders into advocates who can help boost your message, sustain the change, and realize benefits without constant intervention or process command-and-control.

      Summary of accomplishment

      Knowledge Gained

      • Triple constraint model of project portfolio: stakeholder needs, strategic objectives, and resource capacity
      • Benefits of optimizing project intake, approval, and prioritization for managing a well-behaved project portfolio
      • Challenges of installing well-run project intake
      • Importance of piloting the process and communicating impacts to stakeholders

      Processes Optimized

      • Project valuation process: scorecard, weights
      • Project intake process: reception, triaging, follow-up
      • Project approval process: steps, accountabilities, deliverables
      • Project prioritization process: estimation of resource capacity for projects, project demand
      • Communication for organizational change

      Deliverables Completed

      • Optimized Project Intake, Approval, and Prioritization Process
      • Documentation of the optimized process in the form of a Standard Operating Procedure
      • Project valuation criteria, developed with Project Value Scorecard Development Tool and implemented through the Project Intake and Prioritization Tool
      • Standardized project request form with right-sized procedural friction
      • Standard for project level classification, implemented through the Project Intake Classification Matrix
      • Toolbox of deliverables for capturing information developed to inform decision makers for approval: Benefits Commitment Form, Technology Assessment Tool, Business Case Templates
      • Process pilot plan
      • Communication plan for organizational change, driven by a thorough analysis of change impacts on key stakeholders using the Intake and Prioritization Impact Analysis Tool

      Research contributors and experts

      Picture of Kiron D. Bondale

      Kiron D. Bondale, PMP, PMI - RMP

      Senior Project Portfolio & Change Management Professional

      A placeholder photo is shown here.

      Scot Ganshert, Portfolio Group Manager

      Larimer County, CO

      Picture of Garrett McDaniel

      Garrett McDaniel, Business Analyst II – Information Technology

      City of Boulder, CO

      A placeholder photo is shown here.

      Joanne Pandya, IT Project Manager

      New York Property Insurance Underwriters

      Picture of Jim Tom.

      Jim Tom, CIO

      Public Health Ontario

      Related Info-Tech research

      A screenshot of Info-Tech's Develop a Project Portfolio Management Strategy blueprint

      Develop a Project Portfolio Management Strategy blueprint"

      A screenshot of Info-Tech's Grow Your Own PPM Solution blueprint is shown.

      Grow Your Own PPM Solution

      A screenshot of Info-Tech's Balance Supply and Demand with Realistic Resource Management Practices blueprint is shown.

      Balance Supply and Demand with Realistic Resource Management Practices

      A screenshot of Info-Tech's Maintain an Organized Portfolio blueprint is shown.

      Maintain an Organized Portfolio

      A screenshot of Info-Tech's Manage a Minimum Viable PMO blueprint is shown.

      Manage a Minimum Viable PMO

      A screenshot of Info-Tech's Establish the Benefits Realization Process blueprint is shown.

      Establish the Benefits Realization Process

      A screenshot of Info-Tech's Manage an Agile Portfolio blueprint is shown.

      Manage an Agile Portfolio

      A screenshot of Info-Tech's Tailor Project Management Processes to Fit Your Projects blueprint is shown.

      Tailor Project Management Processes to Fit Your Projects

      A screenshot of Info-Tech's Project Portfolio Management Diagnostic Program blueprint is shown.

      Project Portfolio Management Diagnostic Program

      The Project Portfolio Management Diagnostic Program is a low-effort, high-impact program designed to help project owners assess and improve their PPM practices. Gather and report on all aspects of your PPM environment to understand where you stand and how you can improve.

      Bibliography

      Boston Consulting Group. “Executive Sponsor Engagement: Top Driver of Project and Program Success.” PMI, 2014. Web.

      Boston Consulting Group. “Winning Through Project Portfolio Management: the Practitioners’ Perspective.” PMI, 2015. Web.

      Bradberry, Travis. “Why The 8-Hour workday Doesn’t Work.” Forbes, 7 Jun 2016. Web.

      Cook, Scott. Playbook: Best Practices. Business Week

      Cooper, Robert, G. “Effective Gating: Make product innovation more productive by using gates with teeth.” Stage-Gate International and Product Development Institute. March/April 2009. Web.

      Epstein, Dan. “Project Initiation Process: Part Two.” PM World Journal. Vol. IV, Issue III. March 2015. Web.

      Evans, Lisa. “The Exact Amount of Time You Should Work Every Day.” Fast Company, 15 Sep. 2014. Web.

      Madison, Daniel. “The Five Implementation Options to Manage the Risk in a New Process.” BPMInstitute.org. n.d. Web.

      Merkhofer, Lee. “Improve the Prioritization Process.” Priority Systems, n.d. Web.

      Miller, David, and Mike Oliver. “Engaging Stakeholder for Project Success.” PMI, 2015. Web.

      Mind Tools. “Kelley and Conner’s Emotional Cycle of Change.” Mind Tools, n.d. Web.

      Mochal, Jeffrey and Thomas Mochal. Lessons in Project Management. Appress: September 2011. Page 6.

      Newcomer, Eric. “Getting Decisions to Stick.” Standish Group PM2go, 20 Oct 2017. Web.

      “PMI Today.” Newtown Square, PA: PMI, Oct 2017. Web.

      Project Management Institute. “Standard for Portfolio Management, 3rd ed.” Newtown Square, PA: PMI, 2013.

      Project Management Institute. “Pulse of the Profession 2017: Success Rates Rise.” PMI, 2017. Web.

      Transparent Choice. “Criteria for Project Prioritization.” n.p., n.d. Web.

      University of New Hampshire (UNH) Project Management Office. “University of New Hampshire IT Intake and Selection Process Map.” UNH, n.d. Web.

      Ward, John. “Delivering Value from Information Systems and Technology Investments: Learning from Success.” Information Systems Research Centre. August 2006. Web.

      Prevent Data Loss Across Cloud and Hybrid Environments

      • Buy Link or Shortcode: {j2store}377|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Governance, Risk & Compliance
      • Parent Category Link: /governance-risk-compliance
      • Organizations are often beholden to compliance obligations that require protection of sensitive data.
      • All stages of the data lifecycle exist in the cloud and all stages provide opportunity for data loss.
      • Organizations must find ways to mitigate insider threats without impacting legitimate business access.

      Our Advice

      Critical Insight

      • Data loss prevention is the outcome of a well-designed strategy that incorporates multiple, sometimes disparate, tools within your existing security program.
      • The journey to data loss prevention is complex and should be taken in small and manageable steps.

      Impact and Result

      • Organizations will achieve data comprehension.
      • Organizations will align DLP with their current security program and architecture.
      • A DLP strategy will be implemented with a distinct goal in mind.

      Prevent Data Loss Across Cloud and Hybrid Environments Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Prevent Data Loss Across Cloud and Hybrid Environments Storyboard – A guide to handling data loss prevention in cloud services.

      This research describes an approach to strategize and implement DLP solutions for cloud services.

      • Prevent Data Loss Across Cloud and Hybrid Environments Storyboard

      2. Data Loss Prevention Strategy Planner – A workbook designed to guide you through identifying and prioritizing your data and planning what DLP actions should be applied to protect that data.

      Use this tool to identify and prioritize your data, then use that information to make decisions on DLP strategies based on classification and data environment.

      • Data Loss Prevention Strategy Planner
      [infographic]

      Further reading

      Prevent Data Loss Across Cloud and Hybrid Environments

      Leverage existing tools and focus on the data that matters most to your organization.

      Analyst Perspective

      Data loss prevention is an additional layer of protection

      Driven by reduced operational costs and improved agility, the migration to cloud services continues to grow at a steady rate. A recent report by Palo Alto Networks indicates workload in the cloud increased by 13% last year, and companies are expecting to move an additional 11% of their workload to the cloud in the next 24 months1.

      However, moving to the cloud poses unique challenges for cyber security practitioners. Cloud services do not offer the same level of management and control over resources as traditional IT approaches. The result can be reduced visibility of data in cloud services and reduced ability to apply controls to that data, particularly data loss prevention (DLP) controls.

      It’s not unusual for organizations to approach DLP as a point solution. Many DLP solutions are marketed as such. The truth is, DLP is a complex program that uses many different parts of an organization’s security program and architecture. To successfully implement DLP for data in the cloud, an organization should leverage existing security controls and integrate DLP tools, whether newly acquired or available in cloud services, with its existing security program.

      Photo of Bob Wilson
      Bob Wilson
      CISSP
      Research Director, Security and Privacy
      Info-Tech Research Group

      Executive Summary

      Your Challenge

      Organizations must prevent the misuse and leakage of data, especially sensitive data, regardless of where it’s stored.

      Organizations often have compliance obligations requiring protection of sensitive data.

      All stages of the data lifecycle exist in the cloud and all stages provide opportunity for data loss.

      Organizations must find ways to mitigate insider threats without impacting legitimate business access.

      Common Obstacles

      Many organizations must handle a plethora of data in multiple varied environments.

      Organizations don’t know enough about the data they use or where it is located.

      Different systems offer differing visibility.

      Necessary privileges and access can be abused.

      Info-Tech’s Approach

      The path to data loss prevention is complex and should be taken in small and manageable steps.

      First, organizations must achieve data comprehension.

      Organizations must align DLP with their current security program and architecture.

      Organizations need to implement DLP with a distinct goal in mind.

      Once the components are in place it’s important to measure and improve.

      Info-Tech Insight

      Data loss prevention is the outcome of a well-designed strategy that incorporates multiple, sometimes disparate, tools within your existing security program.

      Your challenge

      Protecting data is a critical responsibility for organizations, no matter where it is located.

      45% of breaches occurred in the cloud (“Cost of a Data Breach 2022,” IBM Security, 2022).

      A diagram that shows the mean time to detect and contain.

      It can take upwards of 12 weeks to identify and contain a breach (“Cost of a Data Breach 2022,” IBM Security, 2022).

      • Compliance obligations will require organizations to protect certain data.
      • All data states can exist in the cloud, and each state provides a unique opportunity for data loss.
      • Insider threats, whether intentional or not, are especially challenging for organizations. It’s necessary to prevent illicit data use while still allowing work to happen.

      Info-Tech Insight

      Data loss prevention doesn’t depend on a single tool. Many of the leading cloud service providers offer DLP controls with their services and these controls should be considered.

      Common obstacles

      As organizations increasingly move data into the cloud, their environments become more complex and vulnerable to insider threats

      • It’s not uncommon for an organization not to know what data they use, where that data exists, or how they are supposed to protect it.
      • Cloud systems, especially software as a service (SaaS) applications, may not provide much visibility into how that data is stored or protected.
      • Insider threats are a primary concern, but employees must be able to access data to perform their duties. It isn’t always easy to strike a balance between adequate access and being too restrictive with controls.

      Insider threats are a significant concern

      53%

      53% of a study’s respondents think it is more difficult to detect insider threats in the cloud.

      Source: "2023 Insider Threat Report," Cybersecurity Insiders, 2023

      45%

      Only about 45% of organizations think native cloud app functionality is useful in detecting insider threats.

      Source: "2023 Insider Threat Report," Cybersecurity Insiders, 2023

      Info-Tech Insight

      An insider threat management (ITM) program focuses on the user. DLP programs focus on the data.

      Insight summary

      DLP is not just a single tool. It’s an additional layer of security that depends on different components of your security program, and it requires time and effort to mature.

      Organizations should leverage existing security architecture with the DLP controls available in the cloud services they use.

      Data loss prevention is not a point solution

      Data loss prevention is the outcome of a well-designed strategy that incorporates multiple, sometimes disparate tools within your existing security program.

      Prioritize data

      Start with the data that matters most to your organization.

      Define an objective

      Having a clearly defined objective will make implementing a DLP program much easier.

      DLP is a layer

      Data loss prevention is not foundational, and it depends on many other parts of a mature information security program.

      The low hanging fruit is sweet

      Start your DLP implementation with a quick win in mind and build on small successes.

      DLP is a work multiplier

      Your organization must be prepared to investigate alerts and respond to incidents.

      Prevent data loss across cloud or hybrid environments

      A diagram that shows preventing data loss across cloud or hybrid environments

      Data loss prevention is not a point solution.
      It’s the outcome of a well-designed strategy that incorporates multiple, sometimes disparate tools within your existing security program.

      Info-Tech Insight

      Leverage existing security tools where possible.

      Data loss prevention (DLP) overview

      DLP is an additional layer of security.

      DLP is a set of technologies and processes that provides additional data protection by identifying, monitoring, and preventing data from being illicitly used or transmitted.

      DLP depends on many components of a mature security program, including but not limited to:

      • Acceptable use policy
      • Data classification policy and data handling guidelines
      • Identity and access management

      DLP is achieved through some or all of the following tactics:

      • Identify: Data is detected using policies, rules, and patterns.
      • Monitor: Data is flagged and data activity is logged.
      • Prevent: Action is taken on data once it has been detected.

      Info-Tech Insight

      DLP is not foundational. Your information security program needs to be moderately mature to support a DLP strategy.

      DLP approaches and methods

      DLP uses a handful of techniques to achieve its tactics:

      • Policy and access rights: Limits access to data based on user permissions or other contextual attributes.
      • Isolation or virtualization: Data is isolated in an environment with channels for data leakage made unavailable.
      • Cryptographic approach: Data is encrypted.
      • Quantifying and limiting: Use or transfer of data is restricted by quantity.
      • Social and behavioral analysis: The DLP system detects anomalous activity, such as users accessing data outside of business hours.
      • Pattern matching: Data content is analyzed for specific patterns.
      • Data mining and text clustering: Large sets are analyzed, typically with machine learning (ML), to identify patterns.
      • Data fingerprinting: Data files are matched against a pre-calculated hash or based on file contents.
      • Statistical Analysis: Data content is analyzed for sensitive data. Usually involves machine learning.


      DLP has two primary approaches for applying techniques:

      • Content-based: Data is identified through inspecting its content. Fingerprinting and pattern matching are examples of content-based methods.
      • Context-based: Data is identified based on its situational or contextual attributes. Some factors that may be used are source, destination, and format.

      Some DLP tools use both approaches.

      Info-Tech Insight

      Different DLP products will support different methods. It is important to keep these in mind when choosing a DLP solution.

      Start by defining your data

      Define data by answering the 5 “W”s

      Who? Who owns the data? Who needs access? Who would be impacted if it was lost?
      What? What data do you have? What type of data is it? In what format does it exist?
      When? When is the data generated? When is it used? When is it destroyed?
      Where? Where is the data stored? Where is it generated? Where is it used?
      Why? Why is the data needed?

      Use what you discover about your data to create a data inventory!

      Compliance requirements

      Compliance requirements often dictate what must be done to manage and protect data and vary from industry to industry.

      Some examples of compliance requirements to consider:

      • Healthcare - Health Insurance Portability and Accountability Act (HIPAA)
      • Financial Services - Gramm-Leach-Bliley Act (GLBA)
      • Payment Card Industry Data Security Standards (PCI DSS)

      Info-Tech Insight

      Why is especially important. If you don’t need a specific piece of data, dispose of it to reduce risk and administrative overhead related to maintaining or protecting data.

      Classify your data

      Data classification facilitates making decisions about how data is treated.

      Data classification is a process by which data is categorized.

      • The classifications are often based on the sensitivity of the data or the impact a loss or breach of that data would have on the organization.
      • Data classification facilitates decisions about data handling and how information security controls are implemented. Instead of considering many different types of data individually, decisions are based on a handful of classification levels.
      • A mature data classification should include a formalized policy, handling standards, and a steering committee.

      Refer to our Discover and Classify Your Data blueprint for guidance on data classification.

      Sample data classification schema

      Label

      Category

      Top Secret Data that is mission critical and highly likely to negatively impact the organization if breached. The “crown jewels.”
      Examples: Trade secrets, military secrets
      Confidential Data that must not be disclosed, either because of a contractual or regulatory requirement or because of its value to the organization.
      Examples: Payment card data, private health information, personally identifiable information, passwords
      Internal Data that is intended for organizational use, which should be kept private.
      Examples: Internal memos, sales reports
      Limited Data that isn’t generally intended for public consumption but may be made public.
      Examples: Employee handbooks, internal policies
      Public Data that is meant for public consumption and anonymous access.
      Examples: Press releases, job listings, marketing material

      Info-Tech Insight

      Data classification should be implemented as a continuous program, not a one-time project.

      Understand data risk

      Knowing where and how your data is at risk will inform your DLP strategy.

      Data exists in three states, and each state presents different opportunities for risk. Different DLP methodologies will be appropriate for different states.

      Data states

      In use

      • End-user devices
      • Mobile devices
      • Servers

      In motion

      • Cloud services
      • Email
      • Web/web apps
      • Instant messaging
      • File transfers

      At rest

      • Cloud services
      • Databases
      • End-user devices
      • Email archives
      • Backups
      • Servers
      • Physical storage devices

      Causes of Risk

      The most common causes of data loss can be categorized by people, processes, and technology.

      A diagram that shows the categorization of causes of risk.

      Check out our Combine Security Risk Management Components Into One Program blueprint for guidance on risk management, including how to do a full risk assessment.

      Prioritize your data

      Know what data matters most to your organization.

      Prioritizing the data that most needs protection will help define your DLP goals.

      The prioritization of your data should be a business decision based on your comprehension of the data. Drivers for prioritizing data can include:

      • Compliance-driven: Noncompliance is a risk in itself and your organization may choose to prioritize data based on meeting compliance requirements.
      • Audit-driven: Data can be prioritized to prepare for a specific audit objective or in response to an audit finding.
      • Business-driven: Data could be prioritized based on how important it is to the organization’s business processes.

      Info-Tech Insight

      It’s not feasible for most organizations to apply DLP to all their data. Start with the most important data.

      Activity: Prioritize your data

      Input: Lists of data, data types, and data environments
      Output: A list of data types with an estimated priority
      Materials: Data Loss Prevention Strategy Planner worksheet
      Participants: Security leader, Data owners

      1-2 hours

      For this activity, you will use the Data Loss Prevention Strategy Planner workbook to prioritize your data.

      1. Start with tab “2. Setup” and fill in the columns. Each column features a short explanation of itself, and the following slides will provide more detail about the columns.
      2. On tab “3. Data Prioritization,” work through the rows by selecting a data type and moving left to right. This sheet features a set of instructions at the top explaining each column, and the following slides also provide some guidance. On this tab, you may use data types and data environments multiple times.

      Click to download the Data Loss Prevention Strategy Planner

      Activity: Prioritize your data

      In the Data Loss Prevention Strategy Planner tool, start with tab “2. Setup.”

      A diagram that shows tab 2 setup

      Next, move to tab “3. Data Prioritization.”

      A diagram that shows tab 3 Data Prioritization.

      Click to download the Data Loss Prevention Strategy Planner

      Determine DLP objectives

      Your DLP strategy should be able to function as a business case.

      DLP objectives should achieve one or more of the following:

      • Prevent disclosure or unauthorized use of data, regardless of its state.
      • Preserve usability while providing adequate security.
      • Improve security, privacy, and compliance capabilities.
      • Reduce overall risk for the enterprise.

      Example objectives:

      • Prevent users from emailing ePHI to addresses outside of the organization.
      • Detect when a user is uploading an unusually large amount of data to a cloud drive.

      Most common DLP use cases:

      • Protection of data, primarily from internal threats.
      • Meet compliance requirements to protect data.
      • Automate the discovery and classification of data.
      • Provide better data management and visibility across the enterprise.
      • Manage and protect data on mobile devices.

      Info-Tech Insight

      Having a clear idea of your objectives will make implementing a DLP program easier.

      Align DLP with your existing security program/architecture

      DLP depends on many different aspects of your security program.
      To the right are some components of your existing security program that will support DLP.


      1. Data handling standards or guidelines: These specify how your organization will handle data, usually based on its classification. Your data handling standards will inform the development of DLP rules, and your employees will have a clear idea of data handling expectations.

      2. Identity and access management (IAM): IAM will control the access users have to various resources and data and is integral to DLP processes.

      3. Incident response policy or plan: Be sure to consider your existing incident handling processes when implementing DLP. Modifying your incident response processes to accommodate alerts from DLP tools will help you efficiently process and respond to incidents.

      4. Existing security tools: Firewalls, email gateways, security information and event management (SIEM), and other controls should be considered or leveraged when implementing a DLP solution.

      5. Acceptable use policy: An organization must set expectations for acceptable/unacceptable use of data and IT resources.

      6. User education and awareness: Aside from baseline security awareness training, organizations should educate users about policies and communicate the risks of data leakage to reduce risk caused by user error.

      Info-Tech Insight

      Consider DLP as a secondary layer of protection; a safety net. Your existing security program should do most of the work to prevent data misuse.

      Cloud service models

      A fundamental challenge with implementing DLP with cloud services is the reduced flexibility that comes with managing less of the technology stack. Each cloud model offers varying levels of abstraction and control to the user.

      Infrastructure as a service (IaaS): This service model provides customers with virtualized technology resources, such as servers and networking infrastructure. IaaS allows users to have complete control over their virtualized infrastructure without needing to purchase and maintain hardware resources or server space. Popular examples include Amazon Web Servers, Google Cloud Engine, and Microsoft Azure.

      Platform as a service (PaaS): This service model provides users with an environment to develop and manage their own applications without needing to manage an underlying infrastructure. Popular examples include Google Cloud Engine, OpenShift, and SAP Cloud.

      Software as a service (SaaS): This service model provides customers with access to software that is hosted and maintained by the cloud provider. SaaS offers the least flexibility and control over the environment. Popular examples include Salesforce, Microsoft Office, and Google Workspace.

      A diagram that shows cloud models, including IaaS, PaaS, and SaaS.

      Info-Tech Insight

      Cloud service providers may include DLP controls and functionality for their environments with the subscription. These tools are usually well suited for DLP functions on that platform.

      Different DLP tools

      DLP products often fall into general categories defined by where those tools provide protection. Some tools fit into more than one category.

      Cloud DLP refers to DLP products that are designed to protect data in cloud environments.

      • Cloud access security broker (CASB): This system, either in-cloud or on-premises, sits between cloud service users and cloud service providers and acts as a point of control to enforce policies on cloud-based resources. CASBs act on data in motion, for the most part, but can detect and act on data at rest through APIs.
      • Existing tools integrated within a service: Many cloud services provide DLP tools to manage data loss in their service.

      Endpoint DLP: This DLP solution runs on an endpoint computing device and is suited to detecting and controlling data at rest on a computer as well as data being uploaded or downloaded. Endpoint DLP would be feasible for IaaS.

      Network DLP: Network DLP, deployed on-premises or as a cloud service, enforces policies on network flows between local infrastructure and the internet.

      • “Email DLP”: Detects and enforces security policies specifically on data in motion as emails.

      A diagram of CASB

      Choosing a DLP solution

      You will also find that some DLP solutions are better suited for some cloud service models than others.


      DLP solution types that are better suited for SaaS: CASB and Integrated Tools

      DLP solution types that are better suited for PaaS: CASB, Integrated Tools, Network DLP

      DLP solution types that are better suited for IaaS: CASB, Integrated Tools, Network DLP, and Endpoint DLP

      Your approach for DLP will vary depending on the data state you’ll be acting on and whether you are trying to detect or prevent.

      A diagram that shows DLP tactics by approach and data state

      Click to download the Data Loss Prevention Strategy Planner
      Check the tab labeled “6. DLP Features Reference” for a list of common DLP features.

      Activity: Plan DLP methods

      Input: Knowledge of data states for data types
      Output: A set of technical DLP policy rules for each data type by environment
      Materials: The same Data Loss Prevention Strategy Planner worksheet from the earlier activity
      Participants: Security leader, Data owners

      1-2 hours

      Continue with the same workbook used in the previous activity.

      1. On tab “4. DLP Methods,” indicate the expected data state the DLP control will act on. Then, select the type of DLP control your organization intends to use for that data type in that data environment.
      2. DLP actions are suggested based on the classification of the data type, but these may be overridden by manually selecting your preferred action.
      3. You will find more detail on this activity on the following slide, and you will find some additional guidance in the instructional text at the top of the worksheet.
      4. Once you have populated the columns on this worksheet, a summary of suggested DLP rules can be found on tab “5. Results.”

      Click to download the Data Loss Prevention Strategy Planner

      Activity: Plan DLP methods

      Use tab “4. DLP Methods” to plan DLP rules and technical policies.

      A diagram that shows tab 4 DLP Methods

      See tab “5. Results” for a summary of your DLP policies.

      A diagram that shows tab 5 Results.

      Click to download the Data Loss Prevention Strategy Planner

      Implement your DLP program

      Take the steps to properly implement your DLP program

      1. It’s important to shift the culture. You will need leadership’s support to implement controls and you’ll need stakeholders’ participation to ensure DLP controls don’t negatively affect business processes.
      2. Integrate DLP tools with your security program. Most cloud service providers, like Amazon, Microsoft, and Google provide DLP controls in their native environment. Many of your other security controls, such as firewalls and mail gateways, can be used to achieve DLP objectives.
      3. DLP is best implemented with a crawl, walk, then run approach. Following change management processes can reduce friction.
      4. Communicating controls to users will also reduce friction.

      A diagram of implementing DLP program

      Info-Tech Insight

      After a DLP program is implemented, alerts will need to be investigated and incidents will need a response. Be prepared for DLP to be a work multiplier!

      Measure and improve

      Metrics of effectiveness

      DLP attempts to tackle the challenge of promptly detecting and responding to an incident.
      To measure the effectiveness of your DLP program, compare the number of events, number of incidents, and mean time to respond to incidents from before and after DLP implementation.

      Metrics that indicate friction

      A high number of false positives and rule exceptions may indicate that the rules are not working well and may be interfering with legitimate use.
      It’s important to address these issues as the frustration felt by employees can undermine the DLP program.

      Tune DLP rules

      Establish a process for routinely using metrics to tune rules.
      This will improve performance and reduce friction.

      Info-Tech Insight

      Aside from performance-based tuning, it’s important to evaluate your DLP program periodically and after major system or business changes to maintain an awareness of your data environment.

      Related Info-Tech Research

      Photo of Discover and Classify Your Data

      Discover and Classify Your Data

      Understand where your data lives and who has access to it. This blueprint will help you develop an appropriate data classification system by conducting interviews with data owners and by incorporating vendor solutions to make the process more manageable and end-user friendly.

      Photo of Identify the Components of Your Cloud Security Architecture

      Identify the Components of Your Cloud Security Architecture

      This blueprint and associated tools are scalable for all types of organizations within various industry sectors. It allows them to know what types of risk they are facing and what security services are strongly recommended to mitigate those risks.

      Photo of Data Loss Prevention on SoftwareReviews

      Data Loss Prevention on SoftwareReviews

      Quickly evaluate top vendors in the category using our comprehensive market report. Compare product features, vendor strengths, user-satisfaction, and more.

      Don’t settle for just any vendor – find the one you can trust. Use the Emotional Footprint report to see which vendors treat their customers right.

      Research Contributors

      Andrew Amaro
      CSO and Founder
      Klavan Physical and Cyber Security Services

      Arshad Momin
      Cyber Security Architect
      Unicom Engineering, Inc.

      James Bishop
      Information Security Officer
      StructureFlow

      Michael Mitchell
      Information Security and Privacy Compliance Manager
      Unicom Engineering, Inc.

      One Anonymous Contributor

      Bibliography

      Alhindi, Hanan, Issa Traore, and Isaac Woungang. "Preventing Data Loss by Harnessing Semantic Similarity and Relevance." jisis.org Journal of Internet Services and Information Security, 31 May 2021. Accessed 2 March 2023. https://jisis.org/wp-content/uploads/2022/11/jisis-2021-vol11-no2-05.pdf

      Cash, Lauryn. "Why Modern DLP is More Important Than Ever." Armorblox, 10 June 2022. Accessed 10 February 2023. https://www.armorblox.com/blog/modern-dlp-use-cases/

      Chavali, Sai. "The Top 4 Use Cases for a Modern Approach to DLP." Proofpoint, 17 June 2021. Accessed 7 February 2023. https://www.proofpoint.com/us/blog/information-protection/top-4-use-cases-modern-approach-dlp

      Crowdstrike. "What is Data Loss Prevention?" Crowdstrike, 27 Sept. 2022. Accessed 6 Feb. 2023. https://www.crowdstrike.com/cybersecurity-101/data-loss-prevention-dlp/

      De Groot, Juliana. "What is Data Loss Prevention (DLP)? Definition, Types, and Tips." Digital Guardian, 8 February 2023. Accessed 9 Feb. 2023. https://digitalguardian.com/blog/what-data-loss-prevention-dlp-definition-data-loss-prevention

      Denise. "Learn More About DLP Key Use Cases." CISO Platform, 28 Nov. 2019. Accessed 10 February 2023. https://www.cisoplatform.com/profiles/blogs/learn-more-about-dlp-key-use-cases

      Google. "Cloud Data Loss Prevention." Google Cloud Google, n.d. Accessed 7 Feb. 2023. https://cloud.google.com/dlp#section-6

      Gurucul. "2023 Insider Threat Report." Cybersecurity Insiders, 13 Jan. 2023. Accessed 23 Feb. 2023. https://gurucul.com/2023-insider-threat-report

      IBM Security. "Cost of a Data Breach 2022." IBM Security, 1 Aug. 2022. Accessed 13 Feb. 2023. https://www.ibm.com/downloads/cas/3R8N1DZJ

      Mell, Peter & Grance, Tim. "The NIST Definition of Cloud Computing." NIST CSRC NIST, Sept. 2011. Accessed 7 Feb. 2023. https://csrc.nist.gov/publications/detail/sp/800-145/final

      Microsoft. "Plan for Data Loss Prevention (DLP)." Microsoft 365 Solutions and Architecture Microsoft, 6 Feb. 2023. Accessed 14 Feb. 2023. https://learn.microsoft.com/en-us/microsoft-365/compliance/dlp-overview-plan-for-dlp

      Nanchengwa, Christopher. "The Four Questions for Successful DLP Implementation." ISACA Journal ISACA, 1 Jan. 2019. Accessed 6 Feb. 2023. https://www.isaca.org/resources/isaca-journal/issues/2019/volume-1/the-four-questions-for-successful-dlp-implementation

      Palo Alto Networks. "The State of Cloud Native Security 2023." Palo Alto Networks, 2 March 2023. Accessed 23 March 2023. https://www.paloaltonetworks.com/content/dam/pan/en_US/assets/pdf/reports/state-of-cloud-native-security-2023.pdf

      Pritha. "Top Six Metrics for your Data Loss Prevention Program." CISO Platform, 27 Nov. 2019. Accessed 10 Feb. 2023. https://www.cisoplatform.com/profiles/blogs/top-6-metrics-for-your-data-loss-prevention-program

      Raghavarapu, Mounika. "Understand DLP Key Use Cases." Cymune, 12 June 2021. Accessed 7 Feb. 2023. https://www.cymune.com/blog-details/DLP-key-use-cases

      Sheela, G. P., & Kumar, N. "Data Leakage Prevention System: A Systematic Report." International Journal of Recent Technology and Engineering BEIESP, 30 Nov. 2019. Accessed 2 March 2023. https://www.ijrte.org/wp-content/uploads/papers/v8i4/D6904118419.pdf

      Sujir, Shiv. "What is Data Loss Prevention? Complete Guide [2022]." Pathlock, 15 Sep. 2022. Accessed 7 February 2023. https://pathlock.com/learn/what-is-data-loss-prevention-complete-guide-2022/

      Wlosinski, Larry G. "Data Loss Prevention - Next Steps." ISACA Journal, 16 Feb. 2018. Accessed 21 Feb. 2023. https://www.isaca.org/resources/isaca-journal/issues/2018/volume-1/data-loss-preventionnext-steps

      Create a Buyer Persona and Journey

      • Buy Link or Shortcode: {j2store}558|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Marketing Solutions
      • Parent Category Link: /marketing-solutions
      • Contacts fail to convert to leads because messaging fails to resonate with buyers.
      • Products fail to reach targets given shallow understanding of buyer needs.
      • Sellers' emails go unopened and attempts at discovery fail due to no understanding of buyer challenges, pain points, and needs.

      Our Advice

      Critical Insight

      • Marketing leaders in possession of well-researched and up-to-date buyer personas and journeys dramatically improve product market fit, lead gen, and sales results.
      • Success starts with product, marketing, and sales alignment on targeted personas.
      • Speed to deploy is enabled via initial buyer persona attribute discovery internally.
      • However, ultimate success requires buyer interviews, especially for the buyer journey.
      • Leading marketers update journey maps every six months as disruptive events such as COVID-19 and new media and tech platform advancements require continual innovation.

      Impact and Result

      • Reduce time and treasure wasted chasing the wrong prospects.
      • Improve product-market fit.
      • Increase open and click-through rates in your lead gen engine.
      • Perform more effective sales discovery and increase eventual win rates.

      Create a Buyer Persona and Journey Research & Tools

      Start here – read the Executive Brief

      Our Executive Brief summarizes the challenges faced when buyer persona and journeys are ill-defined. It describes the attributes of, and the benefits that accrue from, a well-defined persona and journey and the key steps to take to achieve success.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Drive an aligned initial draft of buyer persona

      Define and align your team on target persona, outline steps to capture and document a robust buyer persona and journey, and capture current team buyer knowledge.

      • Buyer Persona Creation Template
      • Buyer Persona and Journey Interview Guide and Data Capture Tool

      2. Interview buyers and validate persona and journey

      Hold initial buyer interviews, test initial results, and continue with interviews.

      3. Prepare communications and educate stakeholders

      Consolidate interview findings, present to product, marketing, and sales teams. Work with them to apply to product design, marketing launch/campaigning, and sales and customer success enablement.

      • Buyer Persona and Journey Summary Template
      [infographic]

      Workshop: Create a Buyer Persona and Journey

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Align Team, Identify Persona, and Document Current Knowledge

      The Purpose

      Organize, drive alignment on target persona, and capture initial views.

      Key Benefits Achieved

      Steering committee and project team roles and responsibilities clarified.

      Product, marketing, and sales aligned on target persona.

      Build initial team understanding of persona.

      Activities

      1.1 Outline a vision for buyer persona and journey creation and identify stakeholders.

      1.2 Identify buyer persona choices and settle on an initial target.

      1.3 Document team knowledge about buyer persona (and journey where possible).

      Outputs

      Documented steering committee and working team

      Executive Brief on personas and journey

      Personas and initial targets

      Documented team knowledge

      2 Validate Initial Work and Identify Buyer Interviewees

      The Purpose

      Build list of buyer interviewees, finalize interview guide, and validate current findings with analyst input.

      Key Benefits Achieved

      Interview efficiently using 75-question interview guide.

      Gain analyst help in persona validation, reducing workload.

      Activities

      2.1 Share initial insights with covering industry analyst.

      2.2 Hear from industry analyst their perspectives on the buyer persona attributes.

      2.3 Reconcile differences; update “current understanding.”

      2.4 Identify interviewee types by segment, region, etc.

      Outputs

      Analyst-validated initial findings

      Target interviewee types

      3 Schedule and Hold Buyer Interviews

      The Purpose

      Validate current persona hypothesis and flush out those attributes only derived from interviews.

      Key Benefits Achieved

      Get to a critical mass of persona and journey understanding quickly.

      Activities

      3.1 Identify actual list of 15-20 interviewees.

      3.2 Hold interviews and use interview guides over the course of weeks.

      3.3 Hold review session after initial 3-4 interviews to make adjustments.

      3.4 Complete interviews.

      Outputs

      List of interviewees; calls scheduled

      Initial review – “are you going in the right direction?”

      Completed interviews

      4 Summarize Findings and Provide Actionable Guidance to Colleagues

      The Purpose

      Summarize persona and journey attributes and provide activation guidance to team.

      Key Benefits Achieved

      Understanding of product market fit requirements, messaging, and marketing, and sales asset content.

      Activities

      4.1 Summarize findings.

      4.2 Create action items for supporting team, e.g. messaging, touch points, media spend, assets.

      4.3 Convene steering committee/executives and working team for final review.

      4.4 Schedule meetings with colleagues to action results.

      Outputs

      Complete findings

      Action items for team members

      Plan for activation

      5 Measure Impact and Results

      The Purpose

      Measure results, adjust, and improve.

      Key Benefits Achieved

      Activation of outcomes; measured results.

      Activities

      5.1 Review final copy, assets, launch/campaign plans, etc.

      5.2 Develop/review implementation plan.

      5.3 Reconvene team to review results.

      Outputs

      Activation review

      List of suggested next steps

      Further reading

      Create a Buyer Persona and Journey

      Make it easier to market, sell, and achieve product-market fit with deeper buyer understanding.

      EXECUTIVE BRIEF

      Executive Summary

      Your Challenge

      B2B marketers without documented personas and journeys often experience the following:

      • Contacts fail to convert to leads because messaging fails to resonate with buyers.
      • Products fail to reach targets given shallow understanding of buyer needs.
      • Sellers’ emails go unopened, and attempts at discovery fail due to no understanding of buyer challenges, pain points, and needs.

      Without a deeper understanding of buyer needs and how they buy, B2B marketers will waste time and precious resources targeting the incorrect personas.

      Common Obstacles

      Despite being critical elements, organizations struggle to build personas due to:

      • A lack of alignment and collaboration among marketing, product, and sales.
      • An internal focus; or a lack of true customer centricity.
      • A lack of tools and techniques for building personas and buyer journeys.

      In today’s Agile development environment, combined with the pressure to generate revenues quickly, high tech marketers often skip the steps necessary to go deeper to build buyer understanding.

      SoftwareReviews’ Approach

      With a common framework and target output, clients will:

      • Align marketing, sales, and product, and collaborate together to share current knowledge on buyer personas and journeys.
      • Target 12-15 customers and prospects to interview and validate insights. Share that with customer-facing staff.
      • Activate the insights for more customer-centric lead generation, product development, and selling.

      Clients who activate findings from buyer personas and journeys will see a 50% results improvement.

      SoftwareReviews Insight:
      Buyer personas and buyer journeys are essential ingredients in go-to-market success, as they inform for product, marketing, sales, and customer success who we are targeting and how to engage with them successfully.

      Buyer personas and journeys: A go-to-market critical success factor

      Marketers – large and small – will fail to optimize product-market fit, lead generation, and sales effectiveness without well-defined buyer personas and a buyer journey.

      Critical Success Factors of a Successful G2M Strategy:

      • Opportunity size and business case
      • Buyer personas and journey
      • Competitively differentiated product hypothesis
      • Buyer-validated commercial concept
      • Sales revenue plan and program cost budget
      • Consolidated communications to steering committee

      Jeff Golterman, Managing Director, SoftwareReviews Advisory

      “44% of B2B marketers have already discovered the power of Personas.”
      – Hasse Jansen, Boardview.io!, 2016

      Documenting buyer personas enables success beyond marketing

      Documenting buyer personas has several essential benefits to marketing, sales, and product teams:

      • Achieve a better understanding of your target buyer – by building a detailed buyer persona for each type of buyer and keeping it fresh, you take a giant step toward becoming a customer-centric organization.
      • Team alignment on a common definition – will happen when you build buyer personas collaboratively and among those teams that touch the customer.
      • Improved lead generation – increases dramatically when messaging and marketing assets across your lead generation engine better resonate with buyers because you have taken the time to understand them deeply.
      • More effective selling – is possible when sellers apply persona development output to their interactions with prospects and customers.
      • Better product-market fit – increases when product teams more deeply understand for whom they are designing products. Documenting buyer challenges, pain points, and unmet needs gives product teams what they need to optimize product adoption.

      “It’s easier buying gifts for your best friend or partner than it is for a stranger, right? You know their likes and dislikes, you know the kind of gifts they’ll have use for, or the kinds of gifts they’ll get a kick out of. Customer personas work the same way, by knowing what your customer wants and needs, you can present them with content targeted specifically to their wants and needs.”
      – Emma Bilardi, Product Marketing Alliance, 2020

      Buyer understanding activates just about everything

      Without the deep buyer insights that persona and journey capture enables, marketers are suboptimized.

      Buyer Persona and Journey

      • Product design
      • Customer targeting
      • Personalization
      • Messaging
      • Content marketing
      • Lead gen & scoring
      • Sales Effectiveness
      • Customer retention

      “Marketing eutopia is striking the all-critical sweet spot that adds real value and makes customers feel recognized and appreciated, while not going so far as to appear ‘big brother’. To do this, you need a deep understanding of your audience coming from a range of different data sets and the capability to extract meaning.”
      – Plexure, 2020

      Does your organization need buyer persona and journey updating?

      “Yes,” if experiencing one or more key challenges:

      • Sales time is wasted on unqualified leads
      • Website abandon rates are high
      • Lead gen engine click-through rates are low
      • Ideal customer profile is ill defined
      • Marketing asset downloads are low
      • Seller discovery with prospects is ineffective
      • Sales win/loss rates drop due to poor product-market fit
      • Higher than desired customer churn

      SoftwareReviews Advisory Insight:
      Marketers developing buyer personas and journeys that lack agreement among Marketing, Sales, and Product of personas to target will squander precious time and resources throughout the customer targeting and acquisition process.

      Outcomes and benefits

      Building your buyer persona and journey using our methodology will enable:

      • Greater stakeholder alignment – when marketing, product, and sales agree on personas, less time is wasted on targeting alternate personas.
      • Improved product-market fit – when buyers see both pain-relieving features and value-based pricing, “because you asked vs. guessed,” win rates increase.
      • Greater open and click-through rates – because you understood buyer pain points and motivations for solution seeking, you’ll see higher visits and engagement with your lead gen engine, and because you asked “what asset types do you find most helpful” your CTAs become ”lead-gen magnets” because you’ve offered the right asset types in your content marketing strategy.
      • More qualified leads – because you defined a more accurate ideal customer profile (ICP) and your lead scoring algorithm has improved, sellers see more qualified leads.
      • Increased sales cycle velocity – since you learned from personas their content and engagement preferences and what collateral types they need during the down-funnel sales discussions, sales calls are more productive and sales cycles shrink.

      Our methodology for buyer persona and journey creation

      1. Document Team Knowledge of Buyer Persona and Drive Alignment 2. Interview Target Buyer Prospects and Customers 3. Create Outputs and Apply to Marketing, Sales, and Product
      Phase Steps
      1. Outline a vision for buyer persona and journey creation and identify stakeholders.
      2. Pull stakeholders together, identify initial buyer persona, and begin to document team knowledge about buyer persona (and journey where possible).
      3. Validate with industry and marketing analyst’s initial buyer persona, and identify list of buyer interviewees.
      1. Hold interviews and document and share findings.
      2. Validate initial drafts of buyer persona and create initial documented buyer journey. Review findings among key stakeholders, steering committee, and supporting analysts.
      3. Complete remaining interviews.
      1. Summarize findings.
      2. Convene steering committee/exec. and working team for final review.
      3. Communicate to key stakeholders in product, marketing, sales, and customer success for activation.
      Phase Outcomes
      1. Steering committee and team selection
      2. Team insights about buyer persona documented
      3. Buyer persona validation with industry and marketing analysts
      4. Sales, marketing, and product alignment
      1. Interview guide
      2. Target interviewee list
      3. Buyer-validated buyer persona
      4. Buyer journey documented with asset types, channels, and “how buyers buy” fully documented
      1. Education deck on buyer persona and journey ready for use with all stakeholders: product, field marketing, sales, executives, customer success, partners
      2. Activation will update product-market fit, optimize lead gen, and improve sales effectiveness

      Our approach provides interview guides and templates to help rebuild buyer persona

      Our methodology will enable you to align your team on why it’s important to capture the most important attributes of buyer persona including:

      • Functional – helps you find and locate your target personas
      • Emotive – deepens team understanding of buyer initiatives, motivations for seeking alternatives, challenges they face, pain points for your offerings to address, and terminology that describes the “space”
      • Solution – enables greater product market fit
      • Behavioral – clarifies how to communicate with personas and understand their content preferences
      Functional – “to find them”
      Job Role Title Org. Chart Dynamics Buying Center Firmographics
      Emotive – “what they do and jobs to be done”
      Initiatives: What programs/projects the persona is tasked with and their feelings and aspirations about these initiatives. Motivations? Build credibility? Get promoted? Challenges: Identify the business issues, problems, and pain points that impede attainment of objectives. What are their fears, uncertainties, and doubts about these challenges? Buyer Need: They may have multiple needs; which need is most likely met with the offering? Terminology: What are the keywords/phrases they organically use to discuss the buyer need or business issue?
      Decision Criteria – “how they decide”
      Buyer Role: List decision-making criteria and power level. The five common buyer roles are champion, influencer, decision maker, user, and ratifier (purchaser/negotiator). Evaluation and Decision Criteria: Which lens – strategic, financial, or operational – does the persona evaluate the impact of purchase through?
      Solution Attributes – “what does the ideal solution look like”
      Steps in “Jobs to Be Done” Elements of the “Ideal Solution” Business outcomes from ideal solution Opportunity scope; other potential users Acceptable price for value delivered Alternatives that see consideration Solution sourcing: channel, where to buy
      Behavioral Attributes – “how to approach them successfully”
      Content Preferences: List the persona’s content preferences – blog, infographic, demo, video – vs. long-form assets (e.g. white paper, presentation, analyst report). Interaction Preferences: Which are preferred among in-person meetings, phone calls, emails, videoconferencing, conducting research via Web, mobile, and social? Watering Holes: Which physical or virtual places do they go to network or exchange info with peers (e.g. LinkedIn)?

      Buyer journeys are constantly shifting

      If you didn’t remap buyer journeys in 2021, you may be losing to competitors that did. Leaders remap buyer journey frequently.

      • The multi-channel buyer journey is constantly changing. Today’s B2B buyer uses industry research sites, vendor content marketing assets, software reviews sites, contacts with vendor salespeople, events participation, peer networking, consultants, emails, social media sites, and electronic media to research purchasing decisions.
      • COVID-19 has dramatically decreased face-to-face interaction. We estimate a B2B buyer spent 20-25% more time online in 2021 than pre-COVID-19 researching software buying decisions. This has diminished the importance of face-to-face selling and given dramatic rise to digital selling and outbound marketing.
      • Content marketing has exploded, but without mapping the buyer journey and knowing where – by channel –and when – by buyer journey step – to offer content marketing assets, we will fail to convert prospects into buyers.

      “~2/3 of [B2B] buyers prefer remote human interactions or digital self-service.” And during Aug. ‘20 to Feb. ‘21, use of digital self-service to interact with sales reps leapt by more than 10% for both researching and evaluating new suppliers.”
      – Liz Harrison, Dennis Spillecke, Jennifer Stanley, and Jenny Tsai McKinsey & Company, 2021

      SoftwareReviews Advisory Insight:
      Marketers are advised to update their buyer journey annually and with greater frequency when the human vs. digital mix is affected due to events such as COVID-19 and as emerging media such as AR shifts asset-type usage and engagement options.

      Our approach helps you define the buyer journey

      Because marketing leaders need to reach buyers through the right channel with the right message at the right time during their decision cycle, you’ll benefit by using questionnaires that enable you to build the below easily and quickly.

      You’ll be more successful by following our overall guidance

      Overarching insight

      Buyer personas and buyer journeys are essential ingredients in go-to-market success, as they inform for product, marketing, sales, and customer success who we are targeting and how to engage with them successfully.

      Align Your Team

      Marketers developing buyer personas and journeys that lack agreement among Marketing, Sales, and Product of personas to target will squander precious time and resources throughout the customer targeting and acquisition process.

      Jump-Start Persona Development

      Marketing leaders leverage the buyer persona knowledge not only from in-house experts in areas such as sales and executives but from analysts that speak with their buyers each and every day.

      Buyer Interviews Are a Must

      While leaders will get a fast start by interviewing sellers, executives, and analysts, you will fail to craft the right messages, build the right marketing assets, and design the best buyer journey if you skip buyer interviews.

      Watch for Disruption

      Leaders will update their buyer journey annually and with greater frequency when the human vs. digital mix is effected due to events such as COVID-19 and as emerging media such as AR and VR shifts the way buyers engage.

      Advanced Buyer Journey Discovery

      Digital marketers that ramp up lead gen engine capabilities to capture “wins” and measure engagement back through the lead gen and nurturing engines will build a more data-driven view of the buyer journey. Target to build this advanced capability in your initial design.

      Tools and templates to speed your success

      This blueprint is accompanied by supporting deliverables to help you gather team insights, interview customers and prospects, and summarize results for ease in communications.

      To support your buyer persona and journey creation, we’ve created the enclosed tools

      Buyer Persona Creation Template

      A PowerPoint template to aid the capture and summarizing of your team’s insights on the buyer persona.

      Buyer Persona and Journey Interview Guide and Data Capture Tool

      For interviewing customers and prospects, this tool is designed to help you interview personas and summarize results for up to 15 interviewees.

      Buyer Persona and Journey Summary Template

      A PowerPoint template into which you can drop your buyer persona and journey interviewees list and summary findings.

      SoftwareReviews offers two levels of support to best suit your needs

      DIY Toolkit

      "Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful."

      The "do-it-yourself" step-by-step instructions begin with Phase 1.

      Guided Implementation

      "Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track."

      A Guided Implementation is a series of analysts inquiries with you and your team.

      Diagnostics and consistent frameworks are used throughout each option.

      Guided Implementation

      A Guided Implementation (GI) is series of calls with a SoftwareReviews Advisory analyst to help implement our best practices in your organization.

      For guidance on marketing applications, we can arrange a discussion with an Info-Tech analyst.

      Your engagement managers will work with you to schedule analyst calls.

      What does our GI on buyer persona and journey mapping look like?

      Drive an Aligned Initial Draft of Buyer Persona

      • Call #1: Collaborate on vision for buyer persona and the buyer journey. Review templates and sample outputs. Identify your team.
      • Call #2: Review work in progress on capturing working team knowledge of buyer persona elements.
      • Call #3: (Optional) Review Info-Tech’s research-sourced persona insights.
      • Call #4: Validate the persona WIP with Info-Tech analysts. Review buyer interview approach and target list.

      Interview Buyers and Validate Persona and Journey

      • Call #5: Revise/review interview guide and final interviewee list; schedule interviews.
      • Call #6: Review interim interview finds; adjust interview guide.
      • Call #7: Use interview findings to validate/update persona and build journey map.
      • Call #8: Add supporting analysts to final stakeholder review.

      Prepare Communications and Educate Stakeholders

      • Call #9: Review output templates completed with final persona and journey findings.
      • Call #10: Add supporting analysts to stakeholder education meetings for support and help with addressing questions/issues.

      Workshop overview

      Contact your account representative for more information. workshops@infotech.com 1-888-670-8889

      Day1 Day 2 Day 3 Day 4 Day 5
      Align Team, Identify Persona, and Document Current Knowledge Validate Initial Work and Identify Buyer Interviewees Schedule and Hold Buyer interviews Summarize Findings and Provide Actionable Guidance to Colleagues Measure Impact and Results
      Activities

      1.1 Outline a vision for buyer persona and journey creation and identify stakeholders.

      1.2 Identify buyer persona choices and settle on an initial target.

      1.3 Document team knowledge about buyer persona (and journey where possible).

      2.1 Share initial insights with covering industry analyst.

      2.2 Hear from industry analyst their perspectives on the buyer persona attributes.

      2.3 Reconcile differences; update “current understanding.”

      2.4 Identify interviewee types by segment, region, etc.

      3.1 Identify actual list of 15-20 interviewees.

      A gap of up to a week for scheduling of interviews.

      3.2 Hold interviews and use interview guides (over the course of weeks).

      3.3 Hold review session after initial 3-4 interviews to make adjustments.

      3.4 Complete interviews.

      4.1 Summarize findings.

      4.2 Create action items for supporting team, e.g. messaging, touch points, media spend, assets.

      4.3 Convene steering committee/exec. and working team for final review.

      4.4 Schedule meetings with colleagues to action results.

      5.1 Review final copy, assets, launch/campaign plans, etc.

      5.2 Develop/review implementation plan.

      A period of weeks will likely intervene to execute and gather results.

      5.3 Reconvene team to review results.

      Deliverables
      1. Documented steering committee and working team
      2. Executive Brief on personas and journey
      3. Personas and initial targets
      4. Documented team knowledge
      1. Analyst-validated initial findings
      2. Target interviewee types
      1. List of interviewees; calls scheduled
      2. Initial review – “are we going in the right direction?”
      3. Completed interviews
      1. Complete findings
      2. Action items for team members
      3. Plan for activation
      1. Activation review
      2. List of suggested next steps

      Phase 1
      Drive an Aligned Initial Draft of Buyer Persona

      This Phase walks you through the following activities:

      • Develop an understanding of what comprises a buyer persona and journey, including their importance to overall go-to-market strategy and execution.
      • Sample outputs.

      This Phase involves the following stakeholders:

      • Program leadership
      • Product Marketing
      • Product Management
      • Representative(s) from Sales
      • Executive Leadership

      1.1 Establish the team and align on shared vision

      Input

      • Typically a joint recognition that buyer personas have not been fully documented.
      • Identify working team members/participants (see below), and an executive sponsor.

      Output

      • Communication of team members involved and the make-up of steering committee and working team
      • Alignment of team members on a shared vision of “Why Build Buyer Personas and Journey” and what key attributes define both.

      Materials

      • N/A

      Participants

      • Initiative Manager – individual leading the buyer persona and journey initiative
      • CMO/Sponsoring Executive Working Team – typically representatives in Product Marketing, Product Management, and Sales
      • SoftwareReviews marketing analyst

      60 minutes

      1. Schedule inquiry with working team members and walk the team through the Buyer Persona and Journey Executive Brief PowerPoint presentation.
      2. Optional: Have the (SoftwareReviews Advisory) SRA analyst walk the team through the Buyer Persona and Journey Executive Brief PowerPoint presentation as part of your session.

      Review the Create a Buyer Persona Executive Brief (Slides 3-14)

      1.2 Document team knowledge of buyer persona

      Input

      • Working team member knowledge

      Output

      • Initial draft of your buyer persona

      Materials

      • Buyer Persona Creation Template

      Participants

      • Initiative Manager – individual leading the buyer persona and journey initiative
      • CMO/Sponsoring Executive (optional)
      • Working Team – typically representatives in Product Marketing, Product Management, and Sales

      2-3 sessions of 60 minutes each

      1. Schedule meeting with working team members and, using the Buyer Persona Template, lead the team in a discussion that documents current team knowledge of the target buyer persona.
      2. Lead the team to prioritize an initial, single, most important persona and to collaborate to complete the template (and later, the buyer journey). Once the team learns the process for working on the initial persona, the development of additional personas will become more efficient.
      3. Place the PowerPoint template in a shared drive for team collaboration. Expect to schedule several 60-minute meets. Quicken collaboration by encouraging team to “do their homework” by sharing persona knowledge within the shared drive version of the template. Your goal is to get to an initial agreed upon version that can be shared for additional validation with industry analyst(s) in the next step.

      Download the Buyer Persona Creation Template

      1.3 Validate with industry analysts

      Input

      • Identify gaps in persona from previous steps

      Output

      • Further validated buyer persona

      Materials

      • Bring your Buyer Persona Creation Template to the meeting to share with analysts

      Participants

      • Initiative Manager – individual leading the buyer persona and journey initiative
      • CMO/Sponsoring Executive (Optional)
      • Working Team – typically representatives in Product Marketing, Product Management, and Sales
      • Info-Tech analyst covering your product category and SoftwareReviews marketing analyst

      30 minutes

      1. Schedule meeting with working team members and discuss which persona areas require further validation from an Info-Tech analyst who has worked closely with those buyers within your persona.

      60 minutes

      1. Schedule an inquiry with the appropriate Info-Tech analyst and SoftwareReviews Advisory analyst to share current findings and see:
        1. Info-Tech analyst provide content feedback given what they know about your target persona and product category.
        2. SoftwareReviews Advisory analyst provide feedback on persona approach and to coach any gaps or important omissions.
      2. Tabulate results and update your persona summary. At this point you will likely require additional validation through interviews with customers and prospects.

      1.4 Identify interviewees and prepare for interviews

      Input

      • Identify segments within which you require persona knowledge
      • Understand your persona insight gaps

      Output

      • List of interviewees

      Materials

      • Interviewee recording template on following slide
      • Interview guide questions found within the Buyer Persona and Journey Interview Guide and data Capture Tool

      Participants

      • Initiative Manager – individual leading the buyer persona and journey initiative
      • Working Team – typically representatives in Product Marketing, Product Management, and Sales

      1-2 weeks

      1. Identify the types of customers and prospects that will best represent your target persona. Choose interviewees that when interviewed will inform key differences among key segments (geographies, company size, mix of customers and prospects, etc.).
      2. Recruit interviewees and schedule interviews for 45 minutes.
      3. Keep track of Interviewees using the slide following this one.
      4. In preparation for interviews, review the Buyer Persona and Journey Interview Guide and Data Capture Tool. Review the two sets of questions:
        1. Buyer Persona-Related – use to validate areas where you still have gaps in your persona, OR if you are starting with a blank persona and wish to build your personas entirely based on customer and prospect interviews.
        2. Buyer-Journey Related, which we will focus on in the next phase.

      Download the Buyer Persona and Journey Interview Guide and Data Capture Tool

      The image shows a table titled ‘Interviewee List.’ A note next to the title indicates: Here you will document your interviewee list and outreach plan. A note in the Segment column indicates: Ensure you are interviewing personas across segments that will give you the insights you need, e.g. by size, by region, mix of customers and prospects. A note in the Title column reads: Vary your title types up or down in the “buying center” if you are seeking to strengthen buying center dynamics understanding. A note in the Roles column reads: Vary your role types according to decision-making roles (decision maker, influencer, ratifier, coach, user) if you are seeking to strengthen decision-making dynamics understanding.

      Phase 2
      Interview Buyers and Validate Persona and Journey

      This Phase walks you through the following activities:

      • Developing final interview guide.
      • Interviewing buyers and customers.
      • Adjusting approach.
      • Validating buyer persona.
      • Crafting buyer journey
      • Gaining analyst feedback.

      This Phase involves the following stakeholders:

      • Program leadership
      • Product Marketing
      • Representative(s) from Sales

      2.1 Hold interviews

      Input

      • List of interviewees
      • Final list of questions

      Output

      • Buyer perspectives on their personas and buyer journeys

      Materials

      • Buyer Persona and Journey Interview Guide and data Capture Tool

      Participants

      • Initiative Manager – individual leading the buyer persona and journey initiative
      • Working Team – typically representatives in Product Marketing, Product Management, and Sales

      1-2 weeks

      1. Hold interviews and adjust your interviewing approach as you go along. Uncover where you are not getting the right answers, check with working team and analysts, and adjust.

      Download the Buyer Persona and Journey Interview Guide and Data Capture Tool

      2.2 Use interview findings to validate what’s needed for activation

      Input

      • List of interviewees
      • Final list of questions

      Output

      • Buyer perspectives on their personas and buyer journeys
      • Stakeholder feedback that actionable insights are resulting from interviews

      Materials

      • Buyer Persona Creation Template
      • Buyer Persona and Journey Interview Guide and Data Capture Tool

      Participants

      • Initiative Manager – individual leading the buyer persona and journey initiative
      • Working Team – typically representatives in Product Marketing, Product Management, and Sales
      • SoftwareReviews marketing analyst

      2 hours

      1. Convene your team, with marketing analysts, and test early findings: It’s wise to test initial interview results to check that you are getting the right insights to understand and validate key challenges, pain points, needs, and other vital areas pertaining to the buyer persona. Are the answers you are getting enabling you to complete the Summary slides for later communications and training for Sales?
      2. Check when doing buyer journey interviews that you are getting actionable answers that drive messaging, what asset types are needed, what the marketing channel mix is, and other vital insights to activate the results. Are the answers you are getting adequate to give guidance to campaigners, content marketers, and sales enablement?
      3. See the following slides for detailed questions that need to be answered satisfactorily by your team members that need to “activate” the results.

      Download the Buyer Persona and Journey Interview Guide and Data Capture Tool

      2.2.1 Are you getting what you need from interviews to inform the buyer persona?

      Test that you are on the right track:

      1. Are you getting the functional answers so you can guide sellers to the right roles? Can you guide marketers/campaigners to the right “Ideal Customer Profile” for lead scoring?
      2. Are you capturing the right emotive areas that will support message crafting? Solutioning? SEM/SEO?
      3. Are you capturing insights into “how they decide” so sellers are well informed on the decision-making dynamics?
      4. Are you getting a strong understanding of content, interaction preferences, and news and information sources so sellers can outreach more effectively, you can pinpoint media spend, and content marketing can create the right assets?
      Functional – “to find them”
      Job Role Title Org. Chart Dynamics Buying Center Firmographics
      Emotive – “what they do and jobs to be done”
      Initiatives: What programs/projects the persona is tasked with and their feelings and aspirations about these initiatives. Motivations? Build credibility? Get promoted? Challenges: Identify the business issues, problems, and pain points that impede attainment of objectives. What are their fears, uncertainties, and doubts about these challenges? Buyer Need: They may have multiple needs; which need is most likely met with the offering? Terminology: What are the keywords/phrases they organically use to discuss the buyer need or business issue?
      Decision Criteria – “how they decide”
      Buyer Role: List decision-making criteria and power level. The five common buyer roles are champion, influencer, decision maker, user, and ratifier (purchaser/negotiator). Evaluation and Decision Criteria: Which lens – strategic, financial, or operational – does the persona evaluate the impact of purchase through?
      Solution Attributes – “what does the ideal solution look like”
      Steps in “Jobs to Be Done” Elements of the “Ideal Solution” Business outcomes from ideal solution Opportunity scope; other potential users Acceptable price for value delivered Alternatives that see consideration Solution sourcing: channel, where to buy
      Behavioral Attributes – “how to approach them successfully”
      Content Preferences: List the persona’s content preferences – blog, infographic, demo, video – vs. long-form assets (e.g. white paper, presentation, analyst report). Interaction Preferences: Which are preferred among in-person meetings, phone calls, emails, videoconferencing, conducting research via Web, mobile, and social? Watering Holes: Which physical or virtual places do they go to network or exchange info with peers (e.g. LinkedIn)?

      2.2.2 Are you getting what you need from interviews to support the buyer journey?

      Our approach helps you define the buyer journey

      Because marketing leaders need to reach buyers through the right channel with the right message at the right time during their decision cycle, you’ll benefit by using questionnaires that enable you to build the below easily and quickly.

      2.3 Continue interviews

      Input

      • Final adjustments to list of interview questions

      Output

      • Final buyer perspectives on their personas and buyer journeys

      Materials

      • Buyer Persona Creation Template
      • Buyer Persona and Journey Interview Guide and data Capture Tool

      Participants

      • Initiative Manager – individual leading the buyer persona and journey initiative
      • Working Team – typically representatives in Product Marketing, Product Management, and Sales

      1-2 weeks

      1. Continue customer and prospect interviews.
      2. Ensure you are gaining the segment perspectives needed.
      3. Complete the “Summary” columns within the Buyer Persona and Journey Interview Guide and Data Capture Tool.

      Download the Buyer Persona and Journey Interview Guide and Data Capture Tool

      Phase 3
      Prepare Communications and Educate Stakeholders

      This Phase walks you through the following activities:

      • Creating outputs for key stakeholders
      • Communicating final findings and supporting marketing, sales, and product activation.

      This Phase involves the following stakeholders:

      • Program leadership
      • Product Marketing
      • Product Management
      • Sales
      • Field Marketing/Campaign Management
      • Executive Leadership

      3.1 Summarize interview results and convene full working team and steering committee for final review

      Input

      • Buyer persona and journey interviews detail

      Output

      • Buyer perspectives on their personas and buyer journeys

      Materials

      • Buyer Persona and Journey Interview Guide and Data Capture Tool
      • Buyer Persona and Journey Summary Template

      Participants

      • Initiative Manager – individual leading the buyer persona and journey initiative
      • CMO/Sponsoring Executive (Optional)
      • Working Team – typically representatives in Product Marketing, Product Management, and Sales
      • SoftwareReviews marketing analyst

      1-2 hours

      1. Summarize interview results within the Buyer Persona and Journey Summary Template.

      Download the Buyer Persona and Journey Interview Guide and Data Capture Tool

      Download the Buyer Persona and Journey Summary Template

      3.2 Convene executive steering committee and working team to review results

      Input

      • Buyer persona and journey interviews summary

      Output

      • Buyer perspectives on their personas and buyer journeys

      Materials

      • Buyer Persona and Journey Summary Template

      Participants

      • Initiative Manager – individual leading the buyer persona and journey initiative
      • Working Team – typically representatives in Product Marketing, Product Management, and Sales

      1-2 hours

      1. Present final persona and journey results to the steering committee/executives and to working group using the summary slides interview results within the Buyer Persona and Journey Summary Template to finalize results.

      Download the Buyer Persona and Journey Summary Template

      3.3 Convene stakeholder meetings to activate results

      Input

      • Buyer persona and journey interviews summary

      Output

      Activation of key learnings to drive:

      • Better product –market fit
      • Lead gen
      • Sales effectiveness
      • Awareness

      Materials

      • Buyer Persona and Journey Summary Template

      Participants

      • Initiative Manager – individual leading the buyer persona and journey initiative
      • Working Team – typically representatives in Product Marketing, Product Management, and Sales
      • Stakeholder team members (see left)

      4-5 hours

      Present final persona and journey results to each stakeholder team. Key presentations include:

      1. Product team to validate product market fit.
      2. Content marketing to provide messaging direction for the creation of awareness and lead gen assets.
      3. Campaigners/Field Marketing for campaign-related messaging and to identify asset types required to be designed and delivered to support the buyer journey.
      4. Social media strategists for social post copy, and PR for other awareness-building copy.
      5. Sales enablement/training to enable updating of sales collateral, proposals, and sales training materials. Sellers to help with their targeting, prospecting, and crafting of outbound messaging and talk tracks.

      Download the Buyer Persona and Journey Summary Template

      Summary of Accomplishment

      Problem Solved

      With the help of this blueprint, you have deepened your and your colleagues’ buyer understanding at both the persona “who they are” level and the buyer journey “how do they buy” level. You are among the minority of marketing leaders that have fully documented a buyer persona and journey – congratulations!

      The benefits of having led your team through the process are significant and include the following:

      • Better alignment of customer/buyer-facing teams such as in product, marketing, sales, and customer success.
      • Messaging that can be used by marketing, sales, and social teams that will resonate with buyer initiatives, pain points, sought-after “pain relief,” and value.
      • Places in the digital and physical universe where your prospects “hang out” so you can optimize your media spend.
      • More effective use of marketing assets and sales collateral that align with the way your prospect needs to consume information throughout their buyer journey to make a decision in your solution area.

      And by capturing and documenting your buyer persona and journey even for a single buyer type, you have started to build the “institutional strength” to apply the process to other roles in the decision-making process or for when you go after new and different buyer types for new products. And finally, by bringing your team along with you in this process, you have also led your team in becoming a more customer-focused organization – a strategic shift that all organizations should pursue.

      If you would like additional support, contact us and we’ll make sure you get the professional expertise you need.

      Contact your account representative for more information.

      info@softwarereviews.com

      1-888-670-8889

      Related Software Reviews Research

      Optimize Lead Generation With Lead Scoring

      • Save time and money and improve your sales win rates when you apply our methodology to score contacts with your lead gen engine more accurately and pass better qualified leads over to your sellers.
      • Our methodology teaches marketers to develop your own lead scoring approach based upon lead/contact profile vs. your Ideal Customer Profile (ICP) and scores contact engagement. Applying the methodology to arrive at your own approach to scoring will mean reduced lead gen costs, higher conversion rates, and increased marketing-influenced wins.

      Bibliography

      Bilardi, Emma. “How to Create Buyer Personas.” Product Marketing Alliance, July 2020. Accessed Dec. 2021.

      Harrison, Liz, Dennis Spillecke, Jennifer Stanley, and Jenny Tsai. “Omnichannel in B2B sales: The new normal in a year that has been anything but.” McKinsey & Company, 15 March 2021. Accessed Dec. 2021.

      Jansen, Hasse. “Buyer Personas – 33 Mind Blowing Stats.” Boardview.io!, 19 Feb. 2016. Accessed Jan. 2022.

      Raynor, Lilah. “Understanding The Changing B2B Buyer Journey.” Forbes Agency Council, 18 July 2021. Accessed Dec. 2021.

      Simpson, Jon. “Finding Your Audience: The Importance of Developing a Buyer Persona.” Forbes Agency Council, 16 May 2017. Accessed Dec. 2021.

      “Successfully Executing Personalized Marketing Campaigns at Scale.” Plexure, 6 Jan. 2020. Accessed Dec 2020.

      Ulwick, Anthony W. JOBS TO BE DONE: Theory to Practice. E-book, Strategyn, 1 Jan. 2017. Accessed Jan. 2022.

      Modernize Your Corporate Website to Drive Business Value

      • Buy Link or Shortcode: {j2store}524|cart{/j2store}
      • member rating overall impact: 8.0/10 Overall Impact
      • member rating average dollars saved: $10,399 Average $ Saved
      • member rating average days saved: 10 Average Days Saved
      • Parent Category Name: Marketing Solutions
      • Parent Category Link: /marketing-solutions
      • Users are demanding more valuable web functionalities and improved access to your website services. They are expecting development teams to keep up with their changing needs.
      • The criteria of user acceptance and satisfaction involves more than an aesthetically pleasing user interface (UI). It also includes how emotionally attached the user is to the website and how it accommodates user behaviors.

      Our Advice

      Critical Insight

      Complication

      • Organizations are focusing too much on the UI when they optimize the user experience of their websites. The UI is only one of many components involved in successful websites with good user experience.
      • User experience (UX) is often an afterthought in development, risking late and costly fixes to improve end-user reception after deployment.

      Insights

      • Organizations often misinterpret UX as UI. In fact, UX incorporates both the functional and emotional needs of the user, going beyond the website’s UI.
      • Human behaviors and tendencies are commonly left out of the define and design phases of website development, putting user satisfaction and adoption at risk.

      Impact and Result

      • Gain a deep understanding of user needs and behaviors. Become familiar with the human behaviors, emotions, and pain points of your users in order to shortlist the design elements and website functions that will receive the highest user satisfaction.
      • Perform a comprehensive website review. Leverage satisfaction surveys, user feedback, and user monitoring tools (e.g. heat maps) to reveal high-level UX issues. Use these insights to drill down into the execution and composition of your website to identify the root causes of issues.
      • Incorporate modern UX trends in your design. New web technologies are continuously emerging in the industry to enhance user experience. Stay updated on today’s UX trends and validate their fit for the specific needs of your target audience.

      Modernize Your Corporate Website to Drive Business Value Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you should modernize your website, review Info-Tech’s methodology, and discover the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Define UX requirements

      Reveal the opportunities to heighten the user experience of your website through a deep understanding of the behaviors, emotions, and needs of your end users in order to design a receptive and valuable website.

      • Modernize Your Corporate Website to Drive Business Value – Phase 1: Define UX Requirements
      • Website Design Document Template

      2. Design UX-driven website

      Design a satisfying and receptive website by leveraging industry best practices and modern UX trends and ensuring the website is supported with reliable and scalable data and infrastructure.

      • Modernize Your Corporate Website to Drive Business Value – Phase 2: Design UX-Driven Website
      [infographic]

      Workshop: Modernize Your Corporate Website to Drive Business Value

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Define Your UX Requirements

      The Purpose

      List the business objectives of your website.

      Describe your user personas, use cases, and user workflow.

      Identify current UX issues through simulations, website design, and system reviews.

      Key Benefits Achieved

      Strong understanding of the business goals of your website.

      Knowledge of the behaviors and needs of your website’s users.

      Realization of the root causes behind the UX issues of your website.

      Activities

      1.1 Define the business objectives for the website you want to optimize

      1.2 Define your end-user personas and map them to use cases

      1.3 Build your website user workflow

      1.4 Conduct a SWOT analysis of your website to drive out UX issues

      1.5 Gauge the UX competencies of your web development team

      1.6 Simulate your user workflow to identify the steps driving down UX

      1.7 Assess the composition and construction of your website

      1.8 Understand the execution of your website with a system architecture

      1.9 Pinpoint the technical reason behind your UX issues

      1.10 Clarify and prioritize your UX issues

      Outputs

      Business objectives

      End-user personas and use cases

      User workflows

      Website SWOT analysis

      UX competency assessment

      User workflow simulation

      Website design assessment

      Current state of web system architecture

      Gap analysis of web system architecture

      Prioritized UX issues

      2 Design Your UX-Driven Website

      The Purpose

      Design wireframes and storyboards to be aligned to high priority use cases.

      Design a web system architecture that can sufficiently support the website.

      Identify UX metrics to gauge the success of the website.

      Establish a website design process flow.

      Key Benefits Achieved

      Implementation of key design elements and website functions that users will find stimulating and valuable.

      Optimized web system architecture to better support the website.

      Website design process aligned to your current context.

      Rollout plan for your UX optimization initiatives.

      Activities

      2.1 Define the roles of your UX development team

      2.2 Build your wireframes and user storyboards

      2.3 Design the target state of your web environment

      2.4 List your UX metrics

      2.5 Draw your website design process flow

      2.6 Define your UX optimization roadmap

      2.7 Identify and engage your stakeholders

      Outputs

      Roles of UX development team

      Wireframes and user storyboards

      Target state of web system architecture

      List of UX metrics

      List of your suppliers, inputs, processes, outputs, and customers

      Website design process flow

      UX optimization rollout roadmap

      Redesign Your IT Organizational Structure

      • Buy Link or Shortcode: {j2store}275|cart{/j2store}
      • member rating overall impact: 9.2/10 Overall Impact
      • member rating average dollars saved: $71,830 Average $ Saved
      • member rating average days saved: 25 Average Days Saved
      • Parent Category Name: Organizational Design
      • Parent Category Link: /organizational-design

      Most organizations go through an organizational redesign to:

      • Better align to the strategic objectives of the organization.
      • Increase the effectiveness of IT as a function.
      • Provide employees with clarity in their roles and responsibilities.
      • Support new capabilities.
      • Better align IT capabilities to suit the vision.
      • Ensure the IT organization can support transformation initiatives.

      Our Advice

      Critical Insight

      • Organizational redesign is only as successful as the process leaders engage in. It shapes a story framed in a strong foundation of need and a method to successfully implement and adopt the new structure.
      • Benchmarking your organizational redesign to other organizations will not work. Other organizations have different strategies, drivers, and context. It’s important to focus on your organization, not someone else's.
      • You could have the best IT employees in the world, but if they aren’t structured well your organization will still fail in reaching its vision.

      Impact and Result

      • We are often unsuccessful in organizational redesign because we lack an understanding of why this initiative is required or fail to recognize that it is a change initiative.
      • Successful organizational design requires a clear understanding of why it is needed and what will be achieved by operating in a new structure.
      • Additionally, understanding the impact of the change initiative can lead to greater adoption by core stakeholders.

      Redesign Your IT Organizational Structure Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Redesign Your IT Organizational Structure Deck – A defined method of redesigning your IT structure that is founded by clear drivers and consistently considering change management practices.

      The purpose of this storyboard is to provide a four-phased approach to organizational redesign.

      • Redesign Your IT Organizational Structure – Phases 1-4

      2. Communication Deck – A method to communicate the new organizational structure to critical stakeholders to gain buy-in and define the need.

      Use this templated Communication Deck to ensure impacted stakeholders have a clear understanding of why the new organizational structure is needed and what that structure will look like.

      • Organizational Design Communications Deck

      3. Redesign Your IT Organizational Structure Executive Summary Template – A template to secure executive leadership buy-in and financial support for the new organizational structure to be implemented.

      This template provides IT leaders with an opportunity to present their case for a change in organizational structure and roles to secure the funding and buy-in required to operate in the new structure.

      • Redesign Your IT Organizational Structure Executive Summary

      4. Redesign Your IT Organizational Structure Workbook – A method to document decisions made and rationale to support working through each phase of the process.

      This Workbook allows IT and business leadership to work through the steps required to complete the organizational redesign process and document key rationale for those decisions.

      • Redesign Your IT Organizational Structure Workbook

      5. Redesign Your IT Organizational Structure Operating Models and Capability Definitions – A tool that can be used to provide clarity on the different types of operating models that exist as well as the process definitions of each capability.

      Refer to this tool when working through the redesign process to better understand the operating model sketches and the capability definitions. Each capability has been tied back to core frameworks that exist within the information and technology space.

      • Redesign Your IT Organizational Structure Operating Models and Capability Definitions

      Infographic

      Workshop: Redesign Your IT Organizational Structure

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Establish the Organizational Design Foundation

      The Purpose

      Lay the foundation for your organizational redesign by establishing a set of organizational design principles that will guide the redesign process.

      Key Benefits Achieved

      Clearly articulate why this organizational redesign is needed and the implications the strategies and context will have on your structure.

      Activities

      1.1 Define the org design drivers.

      1.2 Document and define the implications of the business context.

      1.3 Align the structure to support the strategy.

      1.4 Establish guidelines to direct the organizational design process.

      Outputs

      Clear definition of the need to redesign the organizational structure

      Understanding of the business context implications on the organizational structure creation.

      Strategic impact of strategies on organizational design.

      Customized Design Principles to rationalize and guide the organizational design process.

      2 Create the Operating Model Sketch

      The Purpose

      Select and customize an operating model sketch that will accurately reflect the future state your organization is striving towards. Consider how capabilities will be sourced, gaps in delivery, and alignment.

      Key Benefits Achieved

      A customized operating model sketch that informs what capabilities will make up your IT organization and how those capabilities will align to deliver value to your organization.

      Activities

      2.1 Augmented list of IT capabilities.

      2.2 Capability gap analysis

      2.3 Identified capabilities for outsourcing.

      2.4 Select a base operating model sketch.

      2.5 Customize the IT operating model sketch.

      Outputs

      Customized list of IT processes that make up your organization.

      Analysis of which capabilities require dedicated focus in order to meet goals.

      Definition of why capabilities will be outsourced and the method of outsourcing used to deliver the most value.

      Customized IT operating model reflecting sourcing, centralization, and intended delivery of value.

      3 Formalize the Organizational Structure

      The Purpose

      Translate the operating model sketch into a formal structure with defined functional teams, roles, reporting structure, and responsibilities.

      Key Benefits Achieved

      A detailed organizational chart reflecting team structures, reporting structures, and role responsibilities.

      Activities

      3.1 Categorize your IT capabilities within your defined functional work units.

      3.2 Create a mandate statement for each work unit.

      3.3 Define roles inside the work units and assign accountability and responsibility.

      3.4 Finalize your organizational structure.

      Outputs

      Capabilities Organized Into Functional Groups

      Functional Work Unit Mandates

      Organizational Chart

      4 Plan for the Implementation & Change

      The Purpose

      Ensure the successful implementation of the new organizational structure by strategically communicating and involving stakeholders.

      Key Benefits Achieved

      A clear plan of action on how to transition to the new structure, communicate the new organizational structure, and measure the effectiveness of the new structure.

      Activities

      4.1 Identify and mitigate key org design risks.

      4.2 Define the transition plan.

      4.3 Create the change communication message.

      4.4 Create a standard set of FAQs.

      4.5 Align sustainment metrics back to core drivers.

      Outputs

      Risk Mitigation Plan

      Change Communication Message

      Standard FAQs

      Implementation and sustainment metrics.

      Further reading

      Redesign Your IT Organizational Structure

      Designing an IT structure that will enable your strategic vision is not about an org chart – it’s about how you work.

      EXECUTIVE BRIEF

      Analyst Perspective

      Structure enables strategy.

      The image contains a picture of Allison Straker.

      Allison Straker

      Research Director,

      Organizational Transformation

      The image contains a picture of Brittany Lutes.

      Brittany Lutes

      Senior Research Analyst,

      Organizational Transformation

      An organizational structure is much more than a chart with titles and names. It defines the way that the organization operates on a day-to-day basis to enable the successful delivery of the organization’s information and technology objectives. Moreover, organizational design sees beyond the people that might be performing a specific role. People and role titles will and often do change frequently. Those are the dynamic elements of organizational design that allow your organization to scale and meet specific objectives at defined points of time. Capabilities, on the other hand, are focused and related to specific IT processes.

      Redesigning an IT organizational structure can be a small or large change transformation for your organization. Create a structure that is equally mindful of the opportunities and the constraints that might exist and ensure it will drive the organization towards its vision with a successful implementation. If everyone understands why the IT organization needs to be structured that way, they are more likely to support and adopt the behaviors required to operate in the new structure.

      Executive Summary

      Your Challenge

      Your organization needs to reorganize itself because:

      • The current IT structure does not align to the strategic objectives of the organization.
      • There are inefficiencies in how the IT function is currently operating.
      • IT employees are unclear about their role and responsibilities, leading to inconsistencies.
      • New capabilities or a change in how the capabilities are organized is required to support the transformation.

      Common Obstacles

      Many organizations struggle when it comes redesigning their IT organizational structure because they:

      • Jump right into creating the new organizational chart.
      • Do not include the members of the IT leadership team in the changes.
      • Do not include the business in the changes.
      • Consider the context in which the change will take place and how to enable successful adoption.

      Info-Tech’s Approach

      Successful IT organization redesign includes:

      • Understanding the drivers, context, and strategies that will inform the structure.
      • Remaining objective by focusing on capabilities over people or roles.
      • Identifying gaps in delivery, sourcing strategies, customers, and degrees of centralization.
      • Remembering that organizational design is a change initiative and will require buy-in.

      Info-Tech Insight

      A successful redesign requires a strong foundation and a plan to ensure successful adoption. Without these, the organizational chart has little meaning or value.

      Your challenge

      This research is designed to help organizations who are looking to:

      • Redesign the IT structure to align to the strategic objectives of the enterprise.
      • Increase the effectiveness in how the IT function is operating in the organization.
      • Provide clarity to employees around their roles and responsibilities.
      • Ensure there is an ability to support new IT capabilities and/or align capabilities to better support the direction of the organization.
      • Align the IT organization to support a business transformation such as becoming digitally enabled or engaging in M&A activities.

      Organizational design is a challenge for many IT and digital executives

      69% of digital executives surveyed indicated challenges related to structure, team silos, business-IT alignment, and required roles when executing on a digital strategy.

      Source: MIT Sloan, 2020

      Common obstacles

      These barriers make IT organizational redesign difficult to address for many organizations:

      • Confuse organizational design and organizational charts as the same thing.
      • Start with the organizational chart, not taking into consideration the foundational elements that will make that chart successful.
      • Fail to treat organizational redesign as a change management initiative and follow through with the change.
      • Exclude impacted or influential IT leaders and/or business stakeholders from the redesign process.
      • Leverage an operating model because it is trending.

      To overcome these barriers:

      • Understand the context in which the changes will take place.
      • Communicate the changes to those impacted to enable successful adoption and implementation of a new organizational structure.
      • Understand that organizational design is for more than just HR leaders now; IT executives should be driving this change.

      Succeed in Organizational Redesign

      75% The percentage of change efforts that fail.

      Source: TLNT, 2019

      55% The percentage of practitioners who identify how information flows between work units as a challenge for their organization.

      Source: Journal of Organizational Design, 2019

      Organizational design defined

      If your IT strategy is your map, your IT organizational design represents the optimal path to get there.

      IT organizational design refers to the process of aligning the organization’s structure, processes, metrics, and talent to the organization’s strategic plan to drive efficiency and effectiveness.

      Why is the right IT organizational design so critical to success?

      Adaptability is at the core of staying competitive today

      Structure is not just an organizational chart

      Organizational design is a never-ending process

      Digital technology and information transparency are driving organizations to reorganize around customer responsiveness. To remain relevant and competitive, your organizational design must be forward looking and ready to adapt to rapid pivots in technology or customer demand.

      The design of your organization dictates how roles function. If not aligned to the strategic direction, the structure will act as a bungee cord and pull the organization back toward its old strategic direction (ResearchGate.net, 2014). Structure supports strategy, but strategy also follows structure.

      Organization design is not a one-time project but a continuous, dynamic process of organizational self-learning and continuous improvement. Landing on the right operating model will provide a solid foundation to build upon as the organization adapts to new challenges and opportunities.

      Understand the organizational differences

      Organizational Design

      Organizational design the process in which you intentionally align the organizational structure to the strategy. It considers the way in which the organization should operate and purposely aligns to the enterprise vision. This process often considers centralization, sourcing, span of control, specialization, authority, and how those all impact or are impacted by the strategic goals.

      Operating Model

      Operating models provide an architectural blueprint of how IT capabilities are organized to deliver value. The placement of the capabilities can alter the culture, delivery of the strategic vision, governance model, team focus, role responsibility, and more. Operating model sketches should be foundational to the organizational design process, providing consistency through org chart changes.

      Organizational Structure

      The organizational structure is the chosen way of aligning the core processes to deliver. This can be strategic, or it can be ad hoc. We recommend you take a strategic approach unless ad hoc aligns to your culture and delivery method. A good organizational structure will include: “someone with authority to make the decisions, a division of labor and a set of rules by which the organization operates” (Bizfluent, 2019).

      Organizational Chart

      The capstone of this change initiative is an easy-to-read chart that visualizes the roles and reporting structure. Most organizations use this to depict where individuals fit into the organization and if there are vacancies. While this should be informed by the structure it does not necessarily depict workflows that will take place. Moreover, this is the output of the organizational design process.

      Sources: Bizfluent, 2019; Strategy & Business, 2015; SHRM, 2021

      The Technology Value Trinity

      The image contains a diagram of the Technology Value Trinity as described in the text below.

      All three elements of the Technology Value Trinity work in harmony to delivery business value and achieve strategic needs. As one changes, the others need to change as well.

      How do these three elements relate?

      • Digital and IT strategy tells you what you need to achieve to be successful.
      • Operating model and organizational design align resources to deliver on your strategy and priorities. This is done by strategically structuring IT capabilities in a way that enables the organizations vision and considers the context in which the structure will operate.
      • I&T governance is the confirmation of IT’s goals and strategy, which ensures the alignment of IT and business strategy and is the mechanism by which you continuously prioritize work to ensure that what is delivered is in line with the strategy.

      Too often strategy, organizational design, and governance are considered separate practices – strategies are defined without teams and resources to support. Structure must follow strategy.

      Info-Tech’s approach to organizational design

      Like a story, a strategy without a structure to deliver on it is simply words on paper.

      Books begin by setting the foundation of the story.

      Introduce your story by:

      • Defining the need(s) that are driving this initiative forward.
      • Introducing the business context in which the organizational redesign must take place.
      • Outlining what’s needed in the redesign to support the organization in reaching its strategic IT goals.

      The plot cannot thicken without the foundation. Your organizational structure and chart should not exist without one either.

      The steps to establish your organizational chart - with functional teams, reporting structure, roles, and responsibilities defined – cannot occur without a clear definition of goals, need, and context. An organizational chart alone won’t provide the insight required to obtain buy-in or realize the necessary changes.

      Conclude your story through change management and communication.

      Good stories don’t end without referencing what happened before. Use the literary technique of foreshadowing – your change management must be embedded throughout the organizational redesign process. This will increase the likelihood that the organizational structure can be communicated, implemented, and reinforced by stakeholders.

      Info-Tech uses a capability-based approach to help you design your organizational structure

      Once your IT strategy is defined, it is critical to identify the capabilities that are required to deliver on those strategic initiatives. Each initiative will require a combination of these capabilities that are only supported through the appropriate organization of roles, skills, and team structures.

      The image contains a diagram of the various services and blueprints that Info-Tech has to offer.

      Embed change management into organizational design

      Change management practices are needed from the onset to ensure the implementation of an organizational structure.

      For each phase of this blueprint, its important to consider change management. These are the points when you need to communicate the structure changes:

      • Phase 1: Begin to socialize the idea of new organizational structure with executive leadership and explain how it might be impactful to the context of the organization. For example, a new control, governance model, or sourcing approach could be considered.
      • Phase 2: The chosen operating model will influence your relationships with the business and can create/eliminate silos. Ensure IT and business leaders have insight into these possible changes and a willingness to move forward.
      • Phase 3: The new organizational structure could create or eliminate teams, reduce or increase role responsibilities, and create different reporting structures than before. It’s time to communicate these changes with those most impacted and be able to highlight the positive outcomes of the various changes.
      • Phase 4: Should consider the change management practices holistically. This includes the type of change and length of time to reach the end state, communication, addressing active resistors, acquiring the right skills, and measuring the success of the new structure and its adoption.

      Info-Tech Insight

      Do not undertake an organizational redesign initiative if you will not engage in change management practices that are required to ensure its successful adoption.

      Measure the value of the IT organizational redesign

      Given that the organizational redesign is intended to align with the overall vision and objectives of the business, many of the metrics that support its success will be tied to the business. Adapt the key performance indicators (KPIs) that the business is using to track its success and demonstrate how IT can enable the business and improve its ability to reach those targets.

      Strategic Resources

      The percentage of resources dedicated to strategic priorities and initiatives supported by IT operating model. While operational resources are necessary, ensuring people are allocating time to strategic initiatives as well will drive the business towards its goal state. Leverage Info-Tech’s IT Staffing Assessment diagnostic to benchmark your IT resource allocation.

      Business Satisfaction

      Assess the improvement in business satisfaction overall with IT year over year to ensure the new structure continues to drive satisfaction across all business functions. Leverage Info-Tech’s CIO Business Vision diagnostic to see how your IT organization is perceived.

      Role Clarity

      The degree of clarity that IT employees have around their role and its core responsibilities can lead to employee engagement and retention. Consider measuring this core job driver by leveraging Info-Tech’s Employee Engagement Program.

      Customer & User Satisfaction

      Measure customer satisfaction with technology-enabled business services or products and improvements in technology-enabled client acquisition or retention processes. Assess the percentage of users satisfied with the quality of IT service delivery and leverage Info-Tech’s End-User Satisfaction Survey to determine improvements.

      Info-Tech’s methodology for Redesigning Your IT Organization

      Phase

      1. Establish the Organizational Design Foundation

      2. Create the Operating Model Sketch

      3. Formalize the Organizational Structure

      4. Plan for Implementation and Change

      Phase Outcomes

      Lay the foundation for your organizational redesign by establishing a set of organizational design principles that will guide the redesign process.

      Select and customize an operating model sketch that will accurately reflect the future state your organization is striving towards. Consider how capabilities will be sourced, gaps in delivery, and alignment.

      Translate the operating model sketch into a formal structure with defined functional teams, roles, reporting structure, and responsibilities.

      Ensure the successful implementation of the new organizational structure by strategically communicating and involving stakeholders.

      Insight summary

      Overarching insight

      Organizational redesign processes focus on defining the ways in which you want to operate and deliver on your strategy – something an organizational chart will never be able to convey.

      Phase 1 insight

      Focus on your organization, not someone else's’. Benchmarking your organizational redesign to other organizations will not work. Other organizations have different strategies, drivers, and context.

      Phase 2 insight

      An operating model sketch that is customized to your organization’s specific situation and objectives will significantly increase the chances of creating a purposeful organizational structure.

      Phase 3 insight

      If you follow the steps outlined in the first three phases, creating your new organizational chart should be one of the fastest activities.

      Phase 4 insight

      Throughout the creation of a new organizational design structure, it is critical to involve the individuals and teams that will be impacted.

      Tactical insight

      You could have the best IT employees in the world, but if they aren’t structured well your organization will still fail in reaching its vision.

      Blueprint deliverables

      Each step of this blueprint is accompanied by supporting deliverables to help you accomplish your goals:


      Communication Deck

      Communicate the changes to other key stakeholders such as peers, managers, and staff.

      Workbook

      As you work through each of the activities, use this workbook as a place to document decisions and rationale.

      Reference Deck

      Definitions for every capability, base operating model sketches, and sample organizational charts aligned to those operating models.

      Job Descriptions

      Key deliverable:

      Executive Presentation

      Leverage this presentation deck to gain executive buy-in for your new organizational structure.

      Blueprint benefits

      IT Benefits

      • Create an organizational structure that aligns to the strategic goals of IT and the business.
      • Provide IT employees with clarity on their roles and responsibilities to ensure the successful delivery of IT capabilities.
      • Highlight and sufficiently staff IT capabilities that are critical to the organization.
      • Define a sourcing strategy for IT capabilities.
      • Increase employee morale and empowerment.

      Business Benefits

      • IT can carry out the organization’s strategic mission and vision of all technical and digital initiatives.
      • Business has clarity on who and where to direct concerns or questions.
      • Reduce the likelihood of turnover costs as IT employees understand their roles and its importance.
      • Create a method to communicate how the organizational structure aligns with the strategic initiatives of IT.
      • Increase ability to innovate the organization.

      Executive Brief Case Study

      IT design needs to support organizational and business objectives, not just IT needs.

      INDUSTRY: Government

      SOURCE: Analyst Interviews and Working Sessions

      Situation

      IT was tasked with providing equality to the different business functions through the delivery of shared IT services. The government created a new IT organizational structure with a focus on two areas in particular: strategic and operational support capabilities.

      Challenge

      When creating the new IT structure, an understanding of the complex and differing needs of the business functions was not reflected in the shared services model.

      Outcome

      As a result, the new organizational structure for IT did not ensure adequate meeting of business needs. Only the operational support structure was successfully adopted by the organization as it aligned to the individual business objectives. The strategic capabilities aspect was not aligned to how the various business lines viewed themselves and their objectives, causing some partners to feel neglected.

      Info-Tech offers various levels of support to best suit your needs.

      DIY Toolkit

      "Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful."

      Guided Implementation

      "Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track."

      Workshop

      "We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place."

      Consulting

      "Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project."

      Diagnostics and consistent frameworks are used throughout all four options.

      Guided Implementation

      What does a typical GI on this topic look like?

      A Guided Implementation (GI) is a series of calls with an Info-Tech analyst to help implement our best practices in your organization. A typical GI is 8 to 12 calls over the course of 4 to 6 months.

      Phase 1

      Call #1: Define the process, understand the need, and create a plan of action.

      Phase 2

      Call #2: Define org. design drivers and business context.

      Call #3: Understand strategic influences and create customized design principles.

      Call #4: Customize, analyze gaps, and define sourcing strategy for IT capabilities.

      Call #5: Select and customize the IT operating model sketch.

      Phase 3

      Call #6: Establish functional work units and their mandates.

      Call #7: Translate the functional organizational chart to an operational organizational chart with defined roles.

      Phase 4

      Call #8: Consider risks and mitigation tactics associated with the new structure and select a transition plan.

      Call #9: Create your change message, FAQs, and metrics to support the implementation plan.

      Workshop Overview

      Contact your account representative for more information.

      workshops@infotech.com 1-888-670-8889

      Day 1

      Day 2

      Day 3

      Day 4

      Day 5

      Establish the Organizational Redesign Foundation

      Create the Operating Model Sketch

      Formalize the Organizational Structure

      Plan for Implementation and Change

      Next Steps and
      Wrap-Up (offsite)

      Activities

      1.1 Define the org. design drivers.

      1.2 Document and define the implications of the business context.

      1.3 Align the structure to support the strategy.

      1.4 Establish guidelines to direct the organizational design process.

      2.1 Augment list of IT capabilities.

      2.2 Analyze capability gaps.

      2.3 Identify capabilities for outsourcing.

      2.4 Select a base operating model sketch.

      2.5 Customize the IT operating model sketch.

      3.1 Categorize your IT capabilities within your defined functional work units.

      3.2 Create a mandate statement for each work unit.

      3.3 Define roles inside the work units and assign accountability and responsibility.

      3.4 Finalize your organizational structure.

      4.1 Identify and mitigate key org. design risks.

      4.2 Define the transition plan.

      4.3 Create the change communication message.

      4.4 Create a standard set of FAQs.

      4.5 Align sustainment metrics back to core drivers.

      5.1 Complete in-progress deliverables from previous four days.

      5.2 Set up review time for workshop deliverables and to discuss next steps.

      Deliverables

      1. Foundational components to the organizational design
      2. Customized design principles
      1. Heat mapped IT capabilities
      2. Defined outsourcing strategy
      3. Customized operating model
      1. Capabilities organized into functional groups
      2. Functional work unit mandates
      3. Organizational chart
      1. Risk mitigation plan
      2. Change communication message
      3. Standard FAQs
      4. Implementation and sustainment metrics
      1. Completed organizational design communications deck

      This blueprint is part one of a three-phase approach to organizational transformation

      PART 1: DESIGN

      PART 2: STRUCTURE

      PART 3: IMPLEMENT

      IT Organizational Architecture

      Organizational Sketch

      Organizational Structure

      Organizational Chart

      Transition Strategy

      Implement Structure

      1. Define the organizational design drivers, business context, and strategic alignment.

      2. Create customized design principles.

      3. Develop and customize a strategically aligned operating model sketch.

      4. Define the future-state work units.

      5. Create future-state work unit mandates.

      6. Define roles by work unit.

      7. Turn roles into jobs with clear capability accountabilities and responsibilities.

      8. Define reporting relationships between jobs.

      9. Assess options and select go-forward organizational sketch.

      11. Validate organizational sketch.

      12. Analyze workforce utilization.

      13. Define competency framework.

      14. Identify competencies required for jobs.

      15. Determine number of positions per job

      16. Conduct competency assessment.

      17. Assign staff to jobs.

      18. Build a workforce and staffing plan.

      19. Form an OD implementation team.

      20. Develop change vision.

      21. Build communication presentation.

      22. Identify and plan change projects.

      23. Develop organizational transition plan.

      24. Train managers to lead through change.

      25. Define and implement stakeholder engagement plan.

      26. Develop individual transition plans.

      27. Implement transition plans.

      Risk Management: Create, implement, and monitor risk management plan.

      HR Management: Develop job descriptions, conduct job evaluation, and develop compensation packages.

      Monitor and Sustain Stakeholder Engagement

      Phase 1

      Establish the Organizational Redesign Foundation

      This phase will walk you through the following activities:

      1.1 Define the organizational redesign driver(s)

      1.2 Create design principles based on the business context

      1.3a (Optional Exercise) Identify the capabilities from your value stream

      1.3b Identify the capabilities required to deliver on your strategies

      1.4 Finalize your list of design principles

      This phase involves the following participants:

      • CIO
      • IT Leadership
      • Business Leadership

      Embed change management into the organizational design process

      Articulate the Why

      Changes are most successful when leaders clearly articulate the reason for the change – the rationale for the organizational redesign of the IT function. Providing both staff and executive leaders with an understanding for this change is imperative to its success. Despite the potential benefits to a redesign, they can be disruptive. If you are unable to answer the reason why, a redesign might not be the right initiative for your organization.

      Employees who understand the rationale behind decisions made by executive leaders are 3.6 times more likely to be engaged.

      McLean & Company Engagement Survey Database, 2021; N=123,188

      Info-Tech Insight

      Successful adoption of the new organizational design requires change management from the beginning. Start considering how you will convey the need for organizational change within your IT organization.

      The foundation of your organizational design brings together drivers, context, and strategic implications

      All aspects of your IT organization’s structure should be designed with the business’ context and strategic direction in mind.

      Use the following set of slides to extract the key components of your drivers, business context, and strategic direction to land on a future structure that aligns with the larger strategic direction.

      REDESIGN DRIVERS

      Driver(s) can originate from within the IT organization or externally. Ensuring the driver(s) are easy to understand and articulate will increase the successful adoption of the new organizational structure.

      BUSINESS CONTEXT

      Defines the interactions that occur throughout the organization and between the organization and external stakeholders. The context provides insight into the environment by both defining the purpose of the organization and the values that frame how it operates.

      STRATEGY IMPLICATIONS

      The IT strategy should be aligned to the overall business strategy, providing insight into the types of capabilities required to deliver on key IT initiatives.

      Understand IT’s desired maturity level, alignment with business expectations, and capabilities of IT

      Where are we today?

      Determine the current overall maturity level of the IT organization.

      Where do we want to be as an organization?

      Use the inputs from Info-Tech’s diagnostic data to determine where the organization should be after its reorganization.

      How can you leverage these results?

      The result of these diagnostics will inform the design principles that you’ll create in this phase.

      Leverage Info-Tech’s diagnostics to provide an understanding of critical areas your redesign can support:

      CIO Business Vision Diagnostic

      Management & Governance Diagnostic

      IT Staffing Diagnostic

      The image contains a picture of Info-Tech's maturity ladder.

      Consider the organizational design drivers

      Consider organizational redesign if …

      Effectiveness is a concern:

      • Insufficient resources to meet demand
      • Misalignment to IT (and business) strategies
      • Lack of clarity around role responsibility or accountability
      • IT functions operating in silos

      New capabilities are needed:

      • Organization is taking on new capabilities (digital, transformation, M&A)
      • Limited innovation
      • Gaps in the capabilities/services of IT
      • Other external environmental influences or changes in strategic direction

      Lack of business understanding

      • Misalignment between business and IT or how the organization does business
      • Unhappy customers (internal or external)

      Workforce challenges

      • Frequent turnover or inability to attract new skills
      • Low morale or employee empowerment

      These are not good enough reasons …

      • New IT leader looking to make a change for the sake of change or looking to make their legacy known
      • To work with specific/hand-picked leaders over others
      • To “shake things up” to see what happens
      • To force the organization to see IT differently

      Info-Tech Insight

      Avoid change for change’s sake. Restructuring could completely miss the root cause of the problem and merely create a series of new ones.

      1.1 Define the organizational redesign driver(s)

      1-2 hours

      1. As a group, brainstorm a list of current pain points or inhibitors in the current organizational structure, along with a set of opportunities that can be realized during your restructuring. Group these pain points and opportunities into themes.
      2. Leverage the pain points and opportunities to help further define why this initiative is something you’re driving towards. Consider how you would justify this initiative to different stakeholders in the organization.
      3. Questions to consider:
        1. Who is asking for this initiative?
        2. What are the primary benefits this is intended to produce?
        3. What are you optimizing for?
        4. What are we capable of achieving as an IT organization?
        5. Are the drivers coming from inside or outside the IT organization?
      4. Once you’ve determined the drivers for redesigning the IT organization, prioritize those drivers to ensure there is clarity when communicating why this is something you are focusing time and effort on.

      Input

      Output

      • Knowledge of the current organization
      • Pain point and opportunity themes
      • Defined drivers of the initiative

      Materials

      Participants
      • Whiteboard/flip charts (physical or electronic)
      • CIO
      • IT Leadership
      • Business Leadership

      Record the results in the Organizational Design Communications Deck

      Frame the organizational design within the context of the business

      Workforce Considerations:

      • How does your organization view its people resources? Does it have the capacity to increase the number of resources?
      • Do you currently have sufficient staff to meet the demands of the organization? Are you able to outsource resources when demand requires it?
      • Are the members of your IT organization unionized?
      • Is your workforce distributed? Do time zones impact how your team can collaborate?

      Business Context Consideration

      IT Org. Design Implication

      Culture:

      Culture, "the way we do things here,” has huge implications for executing strategy, driving engagement, and providing a guiding force that ensures organizations can work together toward common goals.

      • What is the culture of your organization? Is it cooperative, traditional, competitive, or innovative? (See appendix for details.)
      • Is this the target culture or a stepping-stone to the ideal culture?
      • How do the attitudes and behaviors of senior leaders in the organization reinforce this culture?

      Consider whether your organization’s culture can accept the operating model and organizational structure changes that make sense on paper.

      Certain cultures may lean toward particular operating models. For example, the demand-develop-service operating model may be supported by a cooperative culture. A traditional organization may lean towards the plan-build-run operating model.

      Ensure you have considered your current culture and added exercises to support it.

      If more capacity is required to accomplish the goals of the organization, you’ll want to prepare the leaders and explain the need in your design principles (to reflect training, upskilling, or outsourcing). Unionized environments require additional consideration. They may necessitate less structural changes, and so your principles will need to reflect other alternatives (hiring additional resources, creative options) to support organizational needs. Hybrid or fully remote workforces may impact how your organization interacts.

      Business context considerations

      Business Context Consideration

      IT Org. Design Implication

      Control & Governance:

      It is important to consider how your organization is governed, how decisions are made, and who has authority to make decisions.

      Strategy tells what you do, governance validates you’re doing the right things, and structure is how you execute on what’s been approved.

      • How do decisions get considered and approved in your organization? Are there specific influences that impact the priorities of the organization?
      • Are those in the organization willing to release decision-making authority around specific IT components?
      • Should the organization take on greater accountability for specific IT components?

      Organizations that require more controls may lean toward more centralized governance. Organizations that are looking to better enable and empower their divisions (products, groups, regions, etc.) may look to embed governance in these parts of the organization.

      For enterprise organizations, consider where IT has authority to make decisions (at the global, local, or system level). Appropriate governance needs to be built into the appropriate levels.

      Business context considerations

      Business Context Consideration

      IT Org. Design Implication

      Financial Constraints:

      Follow the money: You may need to align your IT organization according to the funding model.

      • Do partners come to IT with their budgets, or does IT have a central pool that they use to fund initiatives from all partners?
      • Are you able to request finances to support key initiatives/roles prioritized by the organization?
      • How is funding aligned: technology, data, digital, etc.? Is your organization business-line funded? Pooled?
      • Are there special products or digital transformation initiatives with resources outside IT? Product ownership funding?
      • How are regulatory changes funded?
      • Do you have the flexibility to adjust your budget throughout the fiscal year?
      • Are chargebacks in place? Are certain services charged back to business units

      Determine if you can move forward with a new model or if you can adjust your existing one to suit the financial constraints.

      If you have no say over your funding, pre-work may be required to build a business case to change your funding model before you look at your organizational structure – without this, you might have to rule out centralized and focus on hybrid/centralized. If you don’t control the budget (funding comes from your partners), it will be difficult to move to a more centralized model.

      A federated business organization may require additional IT governance to help prioritize across the different areas.

      Budgets for digital transformation might come from specific areas of the business, so resources may need to be aligned to support that. You’ll have to consider how you will work with those areas. This may also impact the roles that are going to exist within your IT organization – product owners or division owners might have more say.

      Business context considerations

      Business Context Consideration

      IT Org. Design Implication

      Business Perspective of IT:

      How the business perceives IT and how IT perceives itself are sometimes not aligned. Make sure the business’ goals for IT are well understood.

      • Are your business partners satisfied if IT is an order taker? Do they agree with the need for IT to become a business partner? Is IT expected to innovate and transform the organization?
      • Is what the business needs from IT the same as what IT is providing currently?

      Business Organization Structure and Growth:

      • How is the overall organization structured: Centralized/decentralized? Functionally aligned? Divided by regions?
      • In what areas does the organization prioritize investments?
      • Is the organization located across a diverse geography?
      • How big is the organization?
      • How is the organization growing and changing – by mergers and acquisitions?

      If IT needs to become more of a business partner, you’ll want to define what that means to your organization and focus on the capabilities to enable this. Educating your partners might also be required if you’re not aligned.

      For many organizations, this will include stakeholder management, innovation, and product/project management. If IT and its business partners are satisfied with an order-taker relationship, be prepared for the consequences of that.

      A global organization will require different IT needs than a single location. Specifically, site reliability engineering (SRE) or IT support services might be deployed in each region. Organizations growing through mergers and acquisitions can be structured differently depending on what the organization needs from the transaction. A more centralized organization may be appropriate if the driver is reuse for a more holistic approach, or the organization may need a more decentralized organization if the acquisitions need to be handled uniquely.

      Business context considerations

      Business Context Consideration

      IT Org. Design Implication

      Sourcing Strategy:

      • What are the drivers for sourcing? Staff augmentation, best practices, time zone support, or another reason?
      • What is your strategy for sourcing?
      • Does IT do all of your technology work, or are parts being done by business or other units?
      • Are we willing/able to outsource, and will that place us into non-compliance (regulations)?
      • Do you have vendor management capabilities in areas that you might outsource?
      • How cloud-driven is your organization?
      • Do you have global operations?

      Change Tolerance:

      • What’s your organization’s tolerance to make changes around organizational design?
      • What's the appetite and threshold for risk?

      Your sourcing strategy affects your organizational structure, including what capabilities you group together. Since managing outsourced capabilities also includes the need for vendor management, you’ll need to ensure there aren’t too many capabilities required per leader. Look closely at what can be achieved through your operating model if IT is done through other groups. Even though these groups may not be in scope of your organization changes, you need to ensure your IT team works with them effectively.

      If your organization is going to push back if there are big structural changes, consider whether the changes are truly necessary. It may be preferred to take baby steps – use an incremental versus big-bang approach.

      A need for incremental change might mean not making a major operating model change.

      Business context considerations

      Business Context Consideration

      IT Org Design. Implication

      Stakeholder Engagement & Focus:

      Identify who your customers and stakeholders are; clarify their needs and engagement model.

      • Who is the customer for IT products and services?
      • Is your customer internal? External? Both?
      • How much of a priority is customer focus for your organization?
      • How will IT interact with customers, end users, and partners? What is the engagement model desired?

      Business Vision, Services, and Products:

      Articulate what your organization was built to do.

      • What does the organization create or provide?
      • Are these products and services changing?
      • What are the most critical capabilities to your organization?
      • What makes your organization a success? What are critical success factors of the organization and how are they measuring this to determine success?

      For a customer or user focus, ensure capabilities related to understanding needs (stakeholder, UX, etc.) are prioritized. Hybrid, decentralized, or demand-develop-service models often have more of a focus on customer needs.

      Outsourcing the service desk might be a consideration if there’s a high demand for the service. A differentiation between these users might mean there’s a different demand for services.

      Think broadly in terms of your organizational vision, not just the tactical (widget creation). You might need to choose an operating model that supports vision.

      Do you need to align your organization with your value stream? Do you need to decentralize specific capabilities to enable prioritization of the key capabilities?

      1.2 Create design principles based on the business context

      1-3 hours

      1. Discuss the business context in which the IT organizational redesign will be taking place. Consider the following standard components of the business context; include other relevant components specific to your organization:
      • Culture
      • Workforce Considerations
      • Control and Governance
      • Financial Constraints
      • Business Perspective of IT
      • Business Organization Structure and Growth
      • Sourcing Strategy
      • Change Tolerance
      • Stakeholder Engagement and Focus
      • Business Vision, Services, and Products
    • Different stakeholders can have different perspectives on these questions. Be sure to consider a holistic approach and engage these individuals.
    • Capture your findings and use them to create initial design principles.
    • Input

      Output

      • Business context
      • Design principles reflecting how the business context influences the organizational redesign for IT

      Materials

      Participants

      • Whiteboard/flip charts (physical or electronic)
      • List of Context Questions
      • CIO
      • IT Leadership
      • Business Leadership

      Record the results in the Organizational Design Communications Deck

      How your IT organization is structured needs to reflect what it must be built to do

      Structure follows strategy – the way you design will impact what your organization can produce.

      Designing your IT organization requires an assessment of what it needs to be built to do:

      • What are the most critical capabilities that you need to deliver, and what does success look like in those different areas?
      • What are the most important things that you deliver overall in your organization?

      The IT organization must reflect your business needs:

      • Understand your value stream and/or your prioritized business goals.
      • Understand the impact of your strategies – these can include your overall digital strategy and/or your IT strategy

      1.3a (Optional Exercise) Identify the capabilities from your value stream

      1 hour

      1. Identify your organization’s value stream – what your overall organization needs to do from supplier to consumer to provide value. Leverage Info-Tech’s industry reference architectures if you haven’t identified your value stream, or use the Document Your Business Architecture blueprint to create yours.
      2. For each item in your value stream, list capabilities that are critical to your organizational strategy and IT needs to further invest in to enable growth.
      3. Also, list those that need further support, e.g. those that lead to long wait times, rework time, re-tooling, down-time, unnecessary processes, unvaluable processes.*
      4. Capture the IT capabilities required to enable your business in your draft principles.
      The image contains a screenshot of the above activity: Sampling Manufacturing Business Capabilities.
      Source: Six Sigma Study Guide, 2014
      Input Output
      • Organization’s value stream
      • List of IT capabilities required to support the IT strategy
      Materials Participants
      • Whiteboard/flip charts (physical or electronic)
      • CIO
      • IT Leadership
      • Business Leadership

      Record the results in the Organizational Design Communications Deck

      Your strategy will help you decide on your structure

      Ensure that you have a clear view of the goals and initiatives that are needed in your organization. Your IT, digital, business, and/or other strategies will surface the IT capabilities your organization needs to develop. Identify the goals of your organization and the initiatives that are required to deliver on them. What capabilities are required to enable these? These capabilities will need to be reflected in your design principles.

      Sample initiatives and capabilities from an organization’s strategies

      The image contains a screenshot of sample initiatives and capabilities from an organization's strategies.

      1.3b Identify the capabilities required to deliver on your strategies

      1 hour

      1. For each IT goal, there may be one or more initiatives that your organization will need to complete in order to be successful.
      2. Document those goals and infinitives. For each initiative, consider which core IT capabilities will be required to deliver on that goal. There might be one IT capability or there might be several.
      3. Identify which capabilities are being repeated across the different initiatives. Consider whether you are currently investing in those capabilities in your current organizational structure.
      4. Highlight the capabilities that require IT investment in your design principles.
      InputOutput
      • IT goals
      • IT initiatives
      • IT, digital, and business strategies
      • List of IT capabilities required to support the IT strategy
      MaterialsParticipants
      • Whiteboard/flip charts (physical or electronic)
      • CIO
      • IT Leadership
      • Business Leadership

      Record the results in the Organizational Design Communications Deck

      Create your organizational design principles

      Your organizational design principles should define a set of loose rules that can be used to design your organizational structure to the specific needs of the work that needs to be done. These rules will guide you through the selection of the appropriate operating model that will meet your business needs. There are multiple ways you can hypothetically organize yourself to meet these needs, and the design principles will point you in the direction of which solution is the most appropriate as well as explain to your stakeholders the rationale behind organizing in a specific way. This foundational step is critical: one of the key reasons for organizational design failure is a lack of requisite time spent on the front-end understanding what is the best fit.

      The image contains an example of organizing design principles as described above.

      1.4 Finalize your list of design principles

      1-3 hours

      1. As a group, review the key outputs from your data collection exercises and their implications.
      2. Consider each of the previous exercises – where does your organization stand from a maturity perspective, what is driving the redesign, what is the business context, and what are the key IT capabilities requiring support. Identify how each will have an implication on your organizational redesign. Leverage this conversation to generate design principles.
      3. Vote on a finalized list of eight to ten design principles that will guide the selection of your operating model. Have everyone leave the meeting with these design principles so they can review them in more detail with their work units or functional areas and elicit any necessary feedback.
      4. Reconvene the group that was originally gathered to create the list of design principles and make any final amendments to the list as necessary. Use this opportunity to define exactly what each design principle means in the context of your organization so everyone has the same understanding of what this means moving forward.
      InputOutput
      • Organizational redesign drivers
      • Business context
      • IT strategy capabilities
      • Organizational design principles to help inform the selection of the right operating model sketch
      MaterialsParticipants
      • Whiteboard/flip charts (physical or electronic)
      • CIO
      • IT Leadership
      • Business Leadership

      Record the results in the Organizational Design Communications Deck

      Example design principles

      Your eight to ten design principles will be those that are most relevant to YOUR organization. Below are samples that other organizations have created, but yours will not be the same.

      Design Principle

      Description

      Decision making

      We will centralize decision making around the prioritization of projects to ensure that the initiatives driving the most value for the organization as a whole are executed.

      Fit for purpose

      We will build and maintain fit-for-purpose solutions based on business units’ unique needs.

      Reduction of duplication

      We will reduce role and application duplication through centralized management of assets and clearly differentiated roles that allow individuals to focus within key capability areas.

      Managed security

      We will manage security enterprise-wide and implement compliance and security governance policies.

      Reuse > buy > build

      We will maximize reuse of existing assets by developing a centralized application portfolio management function and approach.

      Managed data

      We will create a specialized data office to provide data initiatives with the focus they need to enable our strategy.

      Design Principle

      Description

      Controlled technical diversity

      We will control the variety of technology platforms we use to allow for increased operability and reduction of costs.

      Innovation

      R&D and innovation are critical – we will build an innovation team into our structure to help us meet our digital agenda.

      Resourcing

      We will separate our project and maintenance activities to ensure each are given the dedicated support they need for success and to reduce the firefighting mentality.

      Customer centricity

      The new structure will be directly aligned with customer needs – we will have dedicated roles around relationship management, requirements, and strategic roadmapping for business units.

      Interoperability

      We will strengthen our enterprise architecture practices to best prepare for future mergers and acquisitions.

      Cloud services

      We will move toward hosted versus on-premises infrastructure solutions, retrain our data center team in cloud best practices, and build roles around effective vendor management, cloud provisioning, and architecture.

      Phase 2

      Create the Operating Model Sketch

      This phase will walk you through the following activities:

      2.1 Augment the capability list

      2.2 Heatmap capabilities to determine gaps in service

      2.3 Identify the target state of sourcing for your IT capabilities

      2.4 Review and select a base operating model sketch

      2.5 Customize the selected overlay to reflect the desired future state

      This phase involves the following participants:

      • CIO
      • IT Leadership

      Embed change management into the organizational design process

      Gain Buy-In

      Obtain desire from stakeholders to move forward with organizational redesign initiative by involving them in the process to gain interest. This will provide the stakeholders with assurance that their concerns are being heard and will help them to understand the benefits that can be anticipated from the new organizational structure.

      “You’re more likely to get buy-in if you have good reason for the proposed changes – and the key is to emphasize the benefits of an organizational redesign.”

      Source: Lucid Chart

      Info-Tech Insight

      Just because people are aware does not mean they agree. Help different stakeholders understand how the change in the organizational structure is a benefit by specifically stating the benefit to them.

      Info-Tech uses capabilities in your organizational design

      We differentiate between capabilities and competencies.

      Capabilities

      • Capabilities are focused on the entire system that would be in place to satisfy a particular need. This includes the people who are competent to complete a specific task and also the technology, processes, and resources to deliver.
      • Capabilities work in a systematic way to deliver on specific need(s).
      • A functional area is often made up of one or more capabilities that support its ability to deliver on that function.
      • Focusing on capabilities rather then the individuals in organizational redesign enables a more objective and holistic view of what your organization is striving toward.

      Competencies

      • Competencies on the other hand are specific to an individual. It determines if the individual poses the skills or ability to perform.
      • Competencies are rooted in the term competent, which looks to understand if you are proficient enough to complete the specific task at hand.
      • Source: The People Development Magazine, 2020

      Use our IT capabilities to establish your IT organization design

      The image contains a diagram of the various services and blueprints that Info-Tech has to offer.

      2.1 Augment the capability list

      1-3 hours

      1. Using the capability list on the previous slide, go through each of the IT capabilities and remove any capabilities for which your IT organization is not responsible and/or accountable. Refer to the Operating Model and Capability Definition List for descriptions of each of the IT capabilities.
      2. Augment the language of specific capabilities that you feel are not directly reflective of what is being done within your organizational context or that you feel need to be changed to reflect more specifically how work is being done in your organization.
      • For example, some organizations may refer to their service desk capability as help desk or regional support. Use a descriptive term that most accurately reflects the terminology used inside the organization today.
    • Add any core capabilities from your organization that are missing from the provided IT capability list.
      • For example, organizations that leverage DevOps capabilities for their product development may desire to designate this in their operating model.
    • Document the rationale for decisions made for future reference.
    • Input Output
      • Baseline list of IT capabilities
      • IT capabilities required to support IT strategy
      • Customized list of IT capabilities
      Materials Participants
      • Whiteboard/Flip Charts
      • CIO
      • IT Leadership

      Record the results in the Organizational Design Workbook

      Gaps in delivery

      Identify areas that require greater focus and attention.

      Assess the gaps between where you currently are and where you need to be. Evaluate how critical and how effective your capabilities are:

      • Criticality = Importance
        • Try to focus on those which are highly critical to the organization.
        • These may be capabilities that have been identified in your strategies as areas to focus on.
      • Effectiveness = Performance
        • Identify those where the process or system is broken or ineffective, preventing the team from delivering on the capability.
        • Effectiveness could take into consideration how scalable, adaptable, or sustainable each capability is.
        • Focus on the capabilities that are low or medium in effectiveness but highly critical. Addressing the delivery of these capabilities will lead to the most positive outcomes in your organization.

      Remember to identify what allows the highly effective capabilities to perform at the capacity they are. Leverage this when increasing effectiveness elsewhere.

      High Gap

      There is little to no effectiveness (high gap) and the capability is highly important to your organization.

      Medium Gap

      Current ability is medium in effectiveness (medium gap) and there might be some priority for that capability in your organization.

      Low Gap

      Current ability is highly effective (low gap) and the capability is not necessarily a priority for your organization.

      2.2 Heatmap capabilities to determine gaps in delivery

      1-3 hours

      1. At this point, you should have identified what capabilities you need to have to deliver on your organization's goals and initiatives.
      2. Convene a group of the key stakeholders involved in the IT organizational design initiative.
      3. Review your IT capabilities and color each capability border according to the effectiveness and criticality of that capability, creating a heat map.
      • Green indicates current ability is highly effective (low gap) and the capability is not necessarily a priority for your organization.
      • Yellow indicates current ability is medium in effectiveness (medium gap) and there might be some priority for that capability in your organization.
      • Red indicates that there is little to no effectiveness (high gap) and the capability is highly important to your organization.
      Input Output
      • Selected capabilities from activity 2.1
      • Gap analysis in delivery of capabilities currently
      Materials Participants
      • Whiteboard/Flip Charts
      • CIO
      • IT Leadership

      Record the results in the Organizational Design Workbook

      Don’t forget the why: why are you considering outsourcing?

      There are a few different “types” of outsourcing:

      1. Competitive Advantage – Working with a third-party organization for the knowledge, insights, and best practices they can bring to your organization.
      2. Managed Service– The third party manages a capability or function for your organization.
      3. Staff Augmentation – Your organization brings in contractors and third-party organizations to fill specific skills gaps.

      Weigh which sourcing model(s) will best align with the needed capabilities to deliver effectively

      Insourcing

      Staff Augmentation

      Managed Service

      Competitive Advantage

      Description

      The organization maintains full responsibility for the management and delivery of the IT capability or service.

      Vendor provides specialized skills and enables the IT capability or service together with the organization to meet demand.

      Vendor completely manages the delivery of value for the IT capability, product or service.

      Vendor has unique skills, insights, and best practices that can be taught to staff to enable insourced capability and competency.

      Benefits

      • Retains in-house control over proprietary knowledge and assets that provide competitive or operational advantage.
      • Gains efficiency due to integration into the organization’s processes.
      • Provision of unique skills.
      • Addresses variation in demand for resources.
      • Labor cost savings.
      • Improves use of internal resources.
      • Improves effectiveness due to narrow specialization.
      • Labor cost savings.
      • Gain insights into aspects that could provide your organization with advantages over competitors.
      • Long-term labor cost savings.
      • Short-term outsourcing required.
      • Increase in-house competencies.

      Drawbacks

      • Quality of services/capabilities might not be as high due to lack of specialization.
      • No labor cost savings.
      • Potentially inefficient distribution of labor for the delivery of services/capabilities.
      • Potential conflicts in management or delivery of IT services and capabilities.
      • Negative impact on staff morale.
      • Limited control over services/capabilities.
      • Limited integration into organization’s processes.
      • Short-term labor expenses.
      • Requires a culture of continuous learning and improvement.

      Your strategy for outsourcing will vary with capability and capacity

      The image contains a diagram to show the Develop Vendor Management Capabilities, as described in the text below.

      Capability

      Capacity

      Outsourcing Model

      Low

      Low

      Your solutions may be with you for a long time, so it doesn’t matter whether it is a strategic decision to outsource development or if you are not able to attract the talent required to deliver in your market. Look for a studio, agency, or development shop that has a proven reputation for long-term partnership with its clients.

      Low

      High

      Your team has capacity but needs to develop new skills to be successful. Look for a studio, agency, or development shop that has a track record of developing its customers and delivering solutions.

      High

      Low

      Your organization knows what it is doing but is strapped for people. Look at “body shops” and recruiting agencies that will support short-term development contracts that can be converted to full-time staff or even a wholesale development shop acquisition.

      High

      High

      You have capability and capacity for delivering on your everyday demands but need to rise to the challenge of a significant, short-term rise in demand on a critical initiative. Look for a major system integrator or development shop with the specific expertise in the appropriate technology.

      Use these criteria to inform your right sourcing strategy

      Sourcing Criteria

      Description

      Determine whether you’ll outsource using these criteria

      1. Critical or commodity

      Determine whether the component to be sourced is critical to your organization or if it is a commodity. Commodity components, which are either not strategic in nature or related to planning functions, are likely candidates for outsourcing. Will you need to own the intellectual property created by the third party? Are you ok if they reuse that for their other clients?

      2. Readiness to outsource

      Identify how easy it would be to outsource a particular IT component. Consider factors such as knowledge transfer, workforce reassignment or reduction, and level of integration with other components.

      Vendor management readiness – ensuring that you have sufficient capabilities to manage vendors – should also be considered here.

      3. In-house capabilities

      Determine if you have the capability to deliver the IT solutions in-house. This will help you establish how easy it would be to insource an IT component.

      4. Ability to attract resources (internal vs. outsourced)

      Determine if the capability is one that is easily sourced with full-time, internal staff or if it is a specialty skill that is best left for a third-party to source.

      Determine your sourcing model using these criteria

      5. Cost

      Consider the total cost (investment and ongoing costs) of the delivery of the IT component for each of the potential sourcing models for a component.

      6. Quality

      Define the potential impact on the quality of the IT component being sourced by the possible sourcing models.

      7. Compliance

      Determine whether the sourcing model would fit with regulations in your industry. For example, a healthcare provider would only go for a cloud option if that provider is HIPAA compliant.

      8. Security

      Identify the extent to which each sourcing option would leave your organization open to security threats.

      9. Flexibility

      Determine the extent to which the sourcing model will allow your organization to scale up or down as demand changes.

      2.3 Identify capabilities that could be outsourced

      1-3 hours

      1. For each of the capabilities that will be in your future-state operating model, determine if it could be outsourced. Review the sourcing criteria available on the previous slide to help inform which sourcing strategy you will use for each capability.
      2. When looking to outsource or co-source capabilities, consider why that capability would be outsourced:
      • Competitive Advantage – Work with a third-party organization for the knowledge, insights, and best practices they can bring to your organization.
      • Managed Service – The third party manages a capability or function for your organization.
      • Staff Augmentation – Your organization brings in contractors and third-party organizations to fill specific skills gaps.
    • Place an asterisk (*) around the capabilities that will be leveraging one of the three previous sourcing options.
    • InputOutput
      • Customized IT capabilities
      • Sourcing strategy for each IT capability
      MaterialsParticipants
      • Whiteboard/Flip Charts
      • CIO
      • IT Leadership

      Record the results in the Organizational Design Workbook

      What is an operating model?

      Leverage a cohesive operating model throughout the organizational design process.

      An IT operating model sketch is a visual representation of the way your IT organization needs to be designed and the capabilities it requires to deliver on the business mission, strategic objectives, and technological ambitions. It ensures consistency of all elements in the organizational structure through a clear and coherent blueprint.

      The visual should be the optimization and alignment of the IT organization’s structure to deliver the capabilities required to achieve business goals. Additionally, it should clearly show the flow of work so that key stakeholders can understand where inputs flow in and outputs flow out of the IT organization. Investing time in the front end getting the operating model right is critical. This will give you a framework to rationalize future organizational changes, allowing you to be more iterative and your model to change as the business changes.

      The image contains an example of an operating model as described in the text above.

      Info-Tech Insight

      Every structure decision you make should be based on an identified need, not on a trend.Build your IT organization to enable the priorities of the organization.

      Each IT operating model is characterized by a variety of advantages and disadvantages

      Centralized

      Hybrid

      Decentralized

      Advantages
      • Maximum flexibility to allocate IT resources across business units.
      • Low-cost delivery model and greatest economies of scale.
      • Control and consistency offers opportunity for technological rationalization and standardization and volume purchasing at the highest degree.
      • Centralizes processes and services that require consistency across the organization.
      • Decentralizes processes and services that need to be responsive to local market conditions.
      • Eliminates duplication and redundancy by allowing effective use of common resources (e.g. shared services, standardization).
      • Goals are aligned to the distinct business units or functions.
      • Greater flexibility and more timely delivery of services.
      • Development resources are highly knowledgeable about business-unit-specific applications.
      • Business unit has greatest control over IT resources and can set and change priorities as needed.

      Disadvantages

      • Less able to respond quickly to local requirements with flexibility.
      • IT can be resistant to change and unwilling to address the unique needs of end users.
      • Business units can be frustrated by perception of lack of control over resources.
      • Development of special business knowledge can be limited.
      • Requires the most disciplined governance structure and the unwavering commitment of the business; therefore, it can be the most difficult to maintain.
      • Requires new processes as pooled resources must be staffed to approved projects.
      • Redundancies, conflicts, and incompatible technologies can result from business units having differentiated services and applications – increasing cost.
      • Ability to share IT resources is low due to lack of common approaches.
      • Lack of integration limits the communication of data between businesses and reduces common reporting.

      Decentralization can take many forms – define what it means to your organization

      Decentralization can take a number of different forms depending on the products the organization supports and how the organization is geographically distributed. Use the following set of explanations to understand the different types of decentralization possible and when they may make sense for supporting your organizational objectives.

      Line of Business

      Decentralization by lines of business (LoB) aligns decision making with business operating units based on related functions or value streams. Localized priorities focus the decision making from the CIO or IT leadership team. This form of decentralization is beneficial in settings where each line of business has a unique set of products or services that require specific expertise or flexible resourcing staffing between the teams.

      Product Line

      Decentralization by product line organizes your team into operationally aligned product families to improve delivery throughput, quality, and resource flexibility within the family. By adopting this approach, you create stable product teams with the right balance between flexibility and resource sharing. This reinforces value delivery and alignment to enterprise goals within the product lines.

      Geographical

      Geographical decentralization reflects a shift from centralized to regional influences. When teams are in different locations, they can experience a number of roadblocks to effective communication (e.g. time zones, regulatory differences in different countries) that may necessitate separating those groups in the organizational structure, so they have the autonomy needed to make critical decisions.

      Functional

      Functional decentralization allows the IT organization to be separated by specialty areas. Organizations structured by functional specialization can often be organized into shared service teams or centers of excellence whereby people are grouped based on their technical, domain, or functional area within IT (Applications, Data, Infrastructure, Security, etc.). This allows people to develop specialized knowledge and skills but can also reinforce silos between teams.

      2.4 Review and select a base operating model sketch

      1 hour

      1. Review the set of base operating model sketches available on the following slides.
      2. For each operating model sketch, there are benefits and risks to be considered. Make an informed selection by understanding the risks that your organization might be taking on by adopting that particular operating model.
      3. If at any point in the selection process the group is unsure about which operating model will be the right fit, refer back to your design principles established in activity 1.4. These should guide you in the selection of the right operating model and eliminate those which will not serve the organization.
      InputOutput
      • Organizational design principles
      • Customized list of IT capabilities
      • Operating model sketch examples
      • Selected operating model sketch
      MaterialsParticipants
      • Whiteboard/Flip Charts
      • CIO
      • IT Leadership

      Record the results in the Organizational Design Workbook

      Centralized Operating Model #1: Plan-Build-Run

      I want to…

      • Establish a formalized governance process that takes direction from the organization on which initiatives should be prioritized by IT.
      • Ensure there is a clear separation between teams that are involved in strategic planning, building solutions, and delivering operational support.
      • Be able to plan long term by understanding the initiatives that are coming down the pipeline and aligning to an infrequent budgeting plan.

      BENEFITS

      • Effective at implementing long-term plans efficiently; separates maintenance and projects to allow each to have the appropriate focus.
      • More oversight over financials; better suited for fixed budgets.
      • Works across centralized technology domains to better align with the business’ strategic objectives – allows for a top-down approach to decision making.
      • Allows for economies of scale and expertise pooling to improve IT’s efficiency.
      • Well-suited for a project-driven environment that employs waterfall or a hybrid project management methodology that is less iterative.

      RISKS

      • Creates artificial silos between the build (developers) and run (operations staff) teams, as both teams focus on their own responsibilities and often fail to see the bigger picture.
      • Miss opportunities to deliver value to the organization or innovate due to an inability to support unpredictable/shifting project demands as decision making is centralized in the plan function.
      • The portfolio of initiatives being pursued is often determined before requirements analysis takes place, meaning the initiative might be solving the wrong need or problem.
      • Depends on strong hand-off processes to be defined and strong knowledge transfer from build to run functions in order to be successful.
      The image contains an example of a Centralized Operating Model: Plan-Build-Run.

      Centralized Operating Model #2: Demand-Develop-Service

      I want to…

      • Listen to the business to understand new initiatives or service enhancements being requested.
      • Enable development and operations to work together to seamlessly deliver in a DevOps culture.
      • Govern and confirm that initiatives being requested by the business are still aligned to IT’s overarching strategy and roadmap before prioritizing those initiatives.

      BENEFITS

      • Aligns well with an end-to-end services model; constant attention to customer demand and service supply.
      • Centralizes service operations under one functional area to serve shared needs across lines of business.
      • Allows for economies of scale and expertise pooling to improve IT’s efficiency.
      • Elevates sourcing and vendor management as its own strategic function; lends well to managed service and digital initiatives.
      • Development and operations housed together; lends well to DevOps-related initiatives and reduces the silos between these two core groups.

      RISKS

      • IT prioritizes the initiatives it thinks are a priority to the business based on how well it establishes good stakeholder relations and communications.
      • Depends on good governance to prevent enhancements and demands from being prioritized without approval from those with accountability and authority.
      • This model thrives in a DevOps culture but does not mean it ensures your organization is a “DevOps” organization. Be sure you're encouraging the right behaviors and attitudes.

      The image contains an example of a Centralized Operating Model: Demand, Develop, Service.

      Hybrid Operating Model #1: LOB/Functional Aligned

      I want to…

      • Better understand the various needs of the organization to align IT priorities and ensure the right services can be delivered.
      • Keep all IT decisions centralized to ensure they align with the overarching strategy and roadmap that IT has set.
      • Organize your shared services in a strategic manner that enables delivery of those services in a way that fits the culture of the organization and the desired method of operating.

      BENEFITS

      • Best of both worlds of centralization and decentralization; attempts to channel benefits from both centralized and decentralized models.
      • Embeds key IT functions that require business knowledge within functional areas, allowing for critical feedback and the ability to understand those business needs.
      • Places IT in a position to not just be “order takers” but to be more involved with the different business units and promote the value of IT.
      • Achieves economies of scale where necessary through the delivery of shared services that can be requested by the function.
      • Shared services can be organized to deliver in the best way that suits the organization.

      RISKS

      • Different business units may bypass governance to get their specific needs met by functions – to alleviate this, IT must have strong governance and prioritize amongst demand.
      • Decentralized role can be viewed as an order taker by the business if not properly embedded and matured.
      • No guaranteed synergy and integration across functions; requires strong communication, collaboration, and steering.
      • Cannot meet every business unit’s needs – can cause tension from varying effectiveness of the IT functions.

      The image contains an example of a Hybrid Operating Model: LOB/Functional Aligned.

      Hybrid Model #2: Product-Aligned Operating Model

      I want to…

      • Align my IT organization into core products (services) that IT provides to the organization and establish a relationship with those in the organization that have alignment to that product.
      • Have roles dedicated to the lifecycle of their product and ensure the product can continuously deliver value to the organization.
      • Maintain centralized set of standards as it applies to overall IT strategy, security, and architecture to ensure consistency across products and reduce silos.

      BENEFITS

      • Focus is on the full lifecycle of a product – takes a strategic view of how technology enables the organization.
      • Promotes centralized backlog around a specific value creator, rather than a traditional project focus that is more transactional.
      • Dedicated teams around the product family ensure you have all of the resources required to deliver on your product roadmap.
      • Reduces barriers between IT and business stakeholders; focuses on technology as a key strategic enabler.
      • Delivery is largely done through frequent releases that can deliver value.

      RISKS

      • If there is little or no business involvement, it could prevent IT from truly understanding business demand and prioritizing the wrong work.
      • A lack of formal governance can create silos between the IT products, causing duplication of efforts, missed opportunities for collaboration, and redundancies in application or vendor contracts.
      • Members of each product can interpret the definition of standards (e.g. architecture, security) differently.

      The image contains an example of the Hybrid Operating Model: Product-Aligned Operating Model.

      Hybrid Operating Model #3: Service-Aligned Operating Model

      I want to…

      • Decentralize the IT organization by the various IT services it offers to the organization while remaining centralized with IT strategy, governance, security and operational services.
      • Ensure IT services are defined and people resources are aligned to deliver on those services.
      • Enable each of IT’s services to have the autonomy to understand the business needs and be able to manage the operational and new project initiatives with a dedicated service owner or business relationship manager.

      BENEFITS

      • Strong enabler of agility as each service has the autonomy to make decisions around operational work versus project work based on their understanding of the business demand.
      • Individuals in similar roles that are decentralized across services are given coaching to provide common direction.
      • Allows teams to efficiently scale with service demand.
      • This is a structurally baseline DevOps model. Each group will have services built within that have their own dedicated teams that will handle the full gambit of responsibilities, from new features to enhancements and maintenance.

      RISKS

      • Service owners require a method to collaborate to avoid duplication of efforts or projects that conflict with the efforts of other IT services.
      • May result in excessive cost through role redundancies across different services, as each will focus on components like integration, stakeholder management, project management, and user experiences.
      • Silos cause a high degree of specialization, making it more difficult for team members to imagine moving to another defined service group, limiting potential career advancement opportunities.
      • The level of complex knowledge required by shared services (e.g. help desk) is often beyond what they can provide, causing them to rely on and escalate to defined service groups more than with other operating models.

      The image contains an example of the Hybrid Operating Model: Service-Aligned Operating Model.

      Decentralized Model: Division Decentralization (LoB, Geography, Function, Product)

      I want to…

      • Decentralize the IT organization to enable greater autonomy within specific groups that have differing customer demands and levels of support.
      • Maintain a standard level of service that can be provided by IT for all divisions.
      • Ensure each division has access to critical data and reports that supports informed decision making.

      BENEFITS

      • Organization around functions allows for diversity in approach in how areas are run to best serve a specific business unit’s needs.
      • Each functional line exists largely independently, with full capacity and control to deliver service at the committed SLAs.
      • Highly responsive to shifting needs and demands with direct connection to customers and all stages of the solution development lifecycle.
      • Accelerates decision making by delegating authority lower into the function.
      • Promotes a flatter organization with less hierarchy and more direct communication with the CIO.

      RISKS

      • Requires risk and security to be centralized and have oversight of each division to prevent the decisions of one division from negatively impacting other divisions or the enterprise.
      • Less synergy and integration across what different lines of business are doing can result in redundancies and unnecessary complexity.
      • Higher overall cost to the IT group due to role and technology duplication across different divisions.
      • It will be difficult to centralize aspects of IT in the future, as divisions adopt to a culture of IT autonomy.

      The image contains an example of the Decentralized Model: Division Decentralization.

      Enterprise Model: Multi-Modal

      I want to…

      • Have an organizational structure that leverages several different operating models based on the needs and requirements of the different divisions.
      • Provide autonomy and authority to the different divisions so they can make informed and necessary changes as they see fit without seeking approval from a centralized IT group.
      • Support the different initiatives the enterprise is focused on delivering and ensure the right model is adopted based on those initiatives.

      BENEFITS

      • Allows for the organization to work in ways that best support individual areas; for example, areas that support legacy systems can be supported through traditional operating models while areas that support digital transformations may be supported through more flexible operating models.
      • Enables a specialization of knowledge related to each division.

      RISKS

      • Inconsistency across the organization can lead to confusion on how the organization should operate.
      • Parts of the organization that work in more traditional operating models may feel limited in career growth and innovation.
      • Cross-division initiatives may require greater oversight and a method to enable operations between the different focus areas.

      The image contains an example of the Enterprise Model: Multi-Modal.

      Create enabling teams that bridge your divisions

      The following bridges might be necessary to augment your divisions:

      • Specialized augmentation: There might not be a sufficient number of resources to support each division. These teams will be leveraged across the divisions; this means that the capabilities needed for each division will exist in this bridge team, rather than in the division.
      • Centers of Excellence: Capabilities that exist within divisions can benefit from shared knowledge across the enterprise. Your organization might set up centers of excellence to support best practices in capabilities organization wide. These are Forums in the unfix model, or communities of practice and support capability development rather than deliveries of each division.
      • Facilitation teams might be required to support divisions through coaching. This might include Agile or other coaches who can help teams adopt practices and embed learnings.
      • Holistic teams provide an enterprise view as they work with various divisions. This can include capabilities like user experience, which can benefit from the holistic perspective rather than a siloed one. People with these capabilities augment the divisions on an as-needed basis.
      The image contains a diagram to demonstrate the use of bridges on divisions.

      2.5 Customize the selected sketch to reflect the desired future state

      1-3 hours

      1. Using the baseline operating model sketch, walk through each of the IT capabilities. Based on the outputs from activity 2.1:
        1. Remove any capabilities for which your IT organization is not responsible and/or accountable.
        2. Augment the language of specific capabilities that you feel are not directly reflective of what is being done within your organizational context or that you feel need to be changed to reflect more specifically how work is being done in your organization.
        3. Add any core capabilities from your organization that are missing from the provided IT capability list.
      2. Move capabilities to the right places in the operating model to reflect how each of the core IT processes should interact with one another.
      3. Add bridges as needed to support the divisions in your organization. Identify which capabilities will sit in these bridges and define how they will enable the operating model sketch to deliver.
      InputOutput
      • Selected base operating model sketch
      • Customized list of IT capabilities
      • Understanding of outsourcing and gaps
      • Customized operating model sketch
      MaterialsParticipants
      • Whiteboard/flip charts
      • Operating model sketch examples
      • CIO
      • IT Leadership

      Record the results in the Organizational Design Workbook

      Document the final operating model sketch in the Communications Deck

      Phase 3

      Formalize the Organizational Structure

      This phase will walk you through the following activities:

      3.1 Create work units

      3.2 Create work unit mandates

      3.3 Define roles inside the work units

      3.4 Finalize the organizational chart

      3.5 Identify and mitigate key risks

      This phase involves the following participants:

      • CIO
      • IT Leadership
      • Business Leadership

      Embed change management into the organizational design process

      Enable adoption of the new structure.

      You don’t have to make the change in one big bang. You can adopt alternative transition plans such as increments or pilots. This allows people to see the benefits of why you are undergoing the change, allows the change message to be repeated and applied to the individuals impacted, and provides people with time to understand their role in making the new organizational structure successful.

      “Transformational change can be invigorating for some employees but also highly disruptive and stressful for others.”

      Source: OpenStax, 2019

      Info-Tech Insight

      Without considering the individual impact of the new organizational structure on each of your employees, the change will undoubtedly fail in meeting its intended goals and your organization will likely fall back into old structured habits.

      Use a top-down approach to build your target-state IT organizational sketch

      The organizational sketch is the outline of the organization that encompasses the work units and depicts the relationships among them. It’s important that you create the structure that’s right for your organization, not one that simply fits with your current staff’s skills and knowledge. This is why Info-Tech encourages you to use your operating model as a mode of guidance for structuring your future-state organizational sketch.

      The organizational sketch is made up of unique work units. Work units are the foundational building blocks on which you will define the work that IT needs to get done. The number of work units you require and their names will not match your operating model one to one. Certain functional areas will need to be broken down into smaller work units to ensure appropriate leadership and span of control.

      Use your customized operating model to build your work units

      WHAT ARE WORK UNITS?

      A work unit is a functional group or division that has a discrete set of processes or capabilities that it is responsible for, which don’t overlap with any others. Your customized list of IT capabilities will form the building blocks of your work units. Step one in the process of building your structure is grouping IT capabilities together that are similar or that need to be done in concert in the case of more complex work products. The second step is to iterate on these work units based on the organizational design principles from Phase 1 to ensure that the future-state structure is aligned with enablement of the organization’s objectives.

      Work Unit Examples

      Here is a list of example work units you can use to brainstorm what your organization’s could look like. Some of these overlap in functionality but should provide a strong starting point and hint at some potential alternatives to your current way of organizing.

      • Office of the CIO
      • Strategy and Architecture
      • Architecture and Design
      • Business Relationship Management
      • Projection and Portfolio Management
      • Solution Development
      • Solution Delivery
      • DevOps
      • Infrastructure and Operations
      • Enterprise Information Security
      • Security, Risk & Compliance
      • Data and Analytics

      Example of work units

      The image contains an example of work units.

      3.1 Create functional work units

      1-3 hours

      1. Using a whiteboard or large tabletop, list each capability from your operating model on a sticky note and recreate your operating model. Use one color for centralized activities and a second color for decentralized activities.
      2. With the group of key IT stakeholders, review the operating model and any important definitions and rationale for decisions made.
      3. Starting with your centralized capabilities, review each in turn and begin to form logical groups of compatible capabilities. Review the decentralized capabilities and repeat the process, writing additional sticky notes for capabilities that will be repeated in decentralized units.
      4. Note: Not all capabilities need to be grouped. If you believe that a capability has a high enough priority, has a lot of work, or is significantly divergent from others put this capability by itself.
      5. Define a working title for each new work unit, and discuss the pros and cons of the model. Ensure the work units still align with the operating model and make any changes to the operating model needed.
      6. Review your design principles and ensure that they are aligned with your new work units.
      InputOutput
      • Organizational business objectives
      • Customized operating model
      • Defined work units
      MaterialsParticipants
      • Whiteboard/Flip Charts
      • CIO
      • IT Leadership
      • Business Leadership

      Record the results in the Organizational Design Workbook

      Group formation

      Understand the impact of the functional groups you create.

      A group consists of two or more individuals who are working toward a common goal. Group formation is how those individuals are organized to deliver on that common goal. It should take into consideration the levels of hierarchy in your structure, the level of focus you give to processes, and where power is dispersed within your organizational design.

      Importance: Balance highly important capabilities with lower priority capabilities

      Specialization: The scope of each role will be influenced by specialized knowledge and a dedicated leader

      Effectiveness: Group capabilities that increase their efficacy

      Span of Control: Identify the right number of employees reporting to a single leader

      Choose the degree of specialization required

      Be mindful of the number of hats you’re placing on any one role.

      • Specialization exists when individuals in an organization are dedicated to performing specific tasks associated with a common goal and requiring a particular skill set. Aligning the competencies required to carry out the specific tasks based on the degree of complexity associated with those tasks ensures the right people and number of people can be assigned.
      • When people are organized by their specialties, it reduces the likelihood of task switching, reduces the time spent training or cross-training, and increases the focus employees can provide to their dedicated area of specialty.
      • There are disadvantages associated with aligning teams by their specialization, such as becoming bored and seeing the tasks they are performing as monotonous. Specialization doesn’t come without its problems. Monitor employee motivation

      Info-Tech Insight

      Smaller organizations will require less specialization simply out of necessity. To function and deliver on critical processes, some people might be asked to wear several hats.

      Avoid overloading the cognitive capacity of employees

      Cognitive load refers to the number of responsibilities that one can successfully take on.

      • When employees are assigned an appropriate number of responsibilities this leads to:
        • Engaged employees
        • Less task switching
        • Increased effectiveness on assigned responsibilities
        • Reduced bottlenecks
      • While this cognitive load can differ from employee to employee, when assigning role responsibilities, ensure each role isn’t being overburdened and spreading their focus thin.
      • Moreover, capable does not equal successful. Just because someone has the capability to take on more responsibilities doesn’t mean they will be successful.
      • Leverage the cognitive load being placed on your team to help create boundaries between teams and demonstrate clear role expectations.
      Source: IT Revolution, 2021

      Info-Tech Insight

      When you say you are looking for a team that is a “jack of all trades,” you are likely exceeding appropriate cognitive loads for your staff and losing productivity to task switching.

      Factors to consider for span of control

      Too many and too few direct reports have negative impacts on the organization.

      Complexity: More complex work should have fewer direct reports. This often means the leader will need to provide lots of support, even engaging in the work directly at times.

      Demand: Dynamic shifts in demand require more managerial involvement and therefore should have a smaller span of control. Especially if this demand is to support a 24/7 operation.

      Competency Level: Skilled employees should require less hands-on assistance and will be in a better position to support the business as a member of a larger team than those who are new to the role.

      Purpose: Strategic leaders are less involved in the day-to-day operations of their teams, while operational leaders tend to provide hands-on support, specifically when short-staffed.

      Group formation will influence communication structure

      Pick your poison…

      It’s important to understand the impacts that team design has on your services and products. The solutions that a team is capable of producing is highly dependent on how teams are structured. For example, Conway’s Law tells us that small distributed software delivery teams are more likely to produce modular service architecture, where large collocated teams are better able to create monolithic architecture. This doesn’t just apply to software delivery but also other products and services that IT creates. Note that small distributed teams are not the only way to produce quality products as they can create their own silos.

      Sources: Forbes, 2017

      Create mandates for each of your identified work units

      WHAT ARE WORK UNIT MANDATES?

      The work unit mandate should provide a quick overview of the work unit and be clear enough that any reader can understand why the work unit exists, what it does, and what it is accountable for.

      Each work unit will have a unique mandate. Each mandate should be distinguishable enough from your other work units to make it clear why the work is grouped in this specific way, rather than an alternative option. The mandate will vary by organization based on the agreed upon work units, design archetype, and priorities.

      Don’t just adopt an example mandate from another organization or continue use of the organization’s pre-existing mandate – take the time to ensure it accurately depicts what that group is doing so that its value-added activities are clear to the larger organization.

      Examples of Work Unit Mandates

      The Office of the CIO will be a strategic enabler of the IT organization, driving IT organizational performance through improved IT management and governance. A central priority of the Office of the CIO is to ensure that IT is able to respond to evolving environments and challenges through strategic foresight and a centralized view of what is best for the organization.

      The Project Management Office will provide standardized and effective project management practices across the IT landscape, including an identified project management methodology, tools and resources, project prioritization, and all steps from project initiation through to evaluation, as well as education and development for project managers across IT.

      The Solutions Development Group will be responsible for the high-quality development and delivery of new solutions and improvements and the production of customized business reports. Through this function, IT will have improved agility to respond to new initiatives and will be able to deliver high-quality services and insights in a consistent manner.

      3.2 Create work unit mandates

      1-3 hours

      1. Break into teams of three to four people and assign an equal number of work units to each team.
      2. Have each team create a set of statements that describe the overall purpose of that working group. Each mandate statement should:
      • Be clear enough that any reader can understand.
      • Explain why the work unit exists, what it does, and what it is accountable for.
      • Be distinguishable enough from your other work units to make it clear why the work is grouped in this specific way, rather than an alternative option.
    • Have each group present their work unit mandates and make changes wherever necessary.
    • InputOutput
      • Work units
      • Work unit mandates
      MaterialsParticipants
      • Whiteboard/Flip Charts
      • CIO
      • IT Leadership
      • Business Leadership

      Record the results in the Organizational Design Workbook

      Identify the key roles and responsibilities for the target IT organization

      Now that you have identified the main units of work in the target IT organization, it is time to identify the roles that will perform that work. At the end of this step, the key roles will be identified, the purpose statement will be built, and accountability and responsibility for roles will be clearly defined. Make sure that accountability for each task is assigned to one role only. If there are challenges with a role, change the role to address them (e.g. split roles or shift responsibilities).

      The image contains an example of two work units: Enterprise Architecture and PMO. It then lists the roles of the two work units.

      Info-Tech Insight

      Do not bias your role design by focusing on your existing staff’s competencies. If you begin to focus on your existing team members, you run the risk of artificially narrowing the scope of work or skewing the responsibilities of individuals based on the way it is, rather than the way it should be.

      3.3 Define roles inside the work units

      1-3 hours

      1. Select a work unit from the organizational sketch.
      2. Describe the most senior role in that work unit by asking, “what would the leader of this group be accountable or responsible for?” Define this role and move the capabilities they will be accountable for under that leader. Repeat this activity for the capabilities this leader would be responsible for.
      3. Continue to define each role that will be required in that work unit to deliver or provide oversight related to those capabilities.
      4. Continue until key roles are identified and the capabilities each role will be accountable or responsible for are clarified.
      5. Remember, only one role can have accountability for each capability but several can have responsibility.
      6. For each role, use the list of capabilities that the position will be accountable, responsible, or accountable and responsible for to create a job description. Leverage your own internal job descriptions or visit our Job Descriptions page.
      InputOutput
      • Work units
      • Work unit mandates
      • Responsibilities
      • Accountabilities
      • Roles with clarified responsibilities and accountabilities
      MaterialsParticipants
      • Whiteboard/Flip Charts
      • CIO
      • IT Leadership
      • Business Leadership

      Record the results in the Organizational Design Workbook

      Delivery model for product or solution development

      Can add additional complexity or clarity

      • Certain organizational structures will require a specific type of resourcing model to meet expectations and deliver on the development or sustainment of core products and solutions.
      • There are four common methods that we see in IT organizations:
        • Functional Roles: Completed work is handed off from functional team to functional team sequentially as outlined in the organization’s SDLC.
        • Shared Service & Resource Pools (Matrix): Resources are pulled whenever the work requires specific skills or pushed to areas where product demand is high.
        • Product or System: Work is directly sent to the teams who are directly managing the product or directly supporting the requestor.
        • Skills & Competencies: Work is directly sent to the teams who have the IT and business skills and competencies to complete the work.
      • Each of these will lead to a difference in how the functional team is skilled. They could have a great understanding of their customer, the product, the solution, or their service.

      Info-Tech Insight

      Despite popular belief, there is no such thing as the Spotify model, and organizations that structured themselves based on the original Spotify drawing might be missing out on key opportunities to obtain productivity from employees.

      Sources: Indeed, 2020; Agility Scales

      There can be different patterns to structure and resource your product delivery teams

      The primary goal of any product delivery team is to improve the delivery of value for customers and the business based on your product definition and each product’s demand. Each organization will have different priorities and constraints, so your team structure may take on a combination of patterns or may take on one pattern and then transform into another.

      Delivery Team Structure Patterns

      How Are Resources and Work Allocated?

      Functional Roles

      Teams are divided by functional responsibilities (e.g. developers, testers, business analysts, operations, help desk) and arranged according to their placement in the software development lifecycle (SDLC).

      Completed work is handed off from team to team sequentially as outlined in the organization’s SDLC.

      Shared Service and Resource Pools

      Teams are created by pulling the necessary resources from pools (e.g. developers, testers, business analysts, operations, help desk).

      Resources are pulled whenever the work requires specific skills or pushed to areas where product demand is high.

      Product or System

      Teams are dedicated to the development, support, and management of specific products or systems.

      Work is directly sent to the teams who are directly managing the product or directly supporting the requester.

      Skills and Competencies

      Teams are grouped based on skills and competencies related to technology (e.g. Java, mobile, web) or familiarity with business capabilities (e.g. HR, Finance).

      Work is directly sent to the teams who have the IT and business skills and competencies to complete the work.

      Delivery teams will be structured according to resource and development needs

      Functional Roles

      Shared Service and Resource Pools

      Product or System

      Skills and Competencies

      When your people are specialists versus having cross-functional skills

      Leveraged when specialists such as Security or Operations will not have full-time work on the product

      When you have people with cross-functional skills who can self-organize around a product’s needs

      When you have a significant investment in a specific technology stack

      The image contains a diagram of functional roles.The image contains a diagram of shared service and resource pools.The image contains a diagram of product or system.The image contains a diagram of skills and competencies.

      For more information about delivering in a product operating model, refer to our Deliver Digital Products at Scale blueprint.

      3.4 Finalize the organizational chart

      1-3 hours

      1. Import each of your work units and the target-state roles that were identified for each.
      2. In the place of the name of each work unit in your organizational sketch, replace the work unit name with the prospective role name for the leader of that group.
      3. Under each of the leadership roles, import the names of team members that were part of each respective work unit.
      4. Validate the final structure as a group to ensure each of the work units includes all the necessary roles and responsibilities and that there is clear delineation of accountabilities between the work units.

      Input

      Output

      • Work units
      • Work unit mandates
      • Roles with accountabilities and responsibilities
      • Finalized organizational chart

      Materials

      Participants

      • Whiteboard/Flip Charts
      • CIO
      • IT Leadership
      • Business Leadership

      Record the results in the Organizational Design Workbook & Executive Communications Deck

      Proactively consider and mitigate redesign risks

      Every organizational structure will include certain risks that should have been considered and accepted when choosing the base operating model sketch. Now that the final organizational structure has been created, consider if those risks were mitigated by the final organizational structure that was created. For those risks that weren’t mitigated, have a tactic to control risks that remain present.

      3.5 Identify and mitigate key risks

      1-3 hours

      1. For each of the operating model sketch options, there are specific risks that should have been considered when selecting that model.
      2. Take those risks and transfer them into the correct slide of the Organizational Design Workbook.
      3. Consider if there are additional risks that need to be considered with the new organizational structure based on the customizations made.
      4. For each risk, rank the severity of that risk on a scale of low, medium, or high.
      5. Determine one or more mitigation tactic(s) for each of the risks identified. This tactic should reduce the likelihood or impact of the risk event happening.
      InputOutput
      • Final organizational structure
      • Operating model sketch benefits and risks
      • Redesign risk mitigation plan
      MaterialsParticipants
      • Whiteboard/Flip Charts
      • CIO
      • IT Leadership
      • Business Leadership

      Record the results in the Organizational Design Workbook

      Phase 4

      Plan for Implementation & Change

      This phase will walk you through the following activities:

      4.1 Select a transition plan

      4.2 Establish the change communication messages

      4.3 Be consistent with a standard set of FAQs

      4.4 Define org. redesign resistors

      4.5 Create a sustainment plan

      This phase involves the following participants:

      • CIO
      • IT Leadership
      • Business Leadership
      • HR Business Partners

      All changes require change management

      Change management is:

      Managing a change that requires replanning and reorganizing and that causes people to feel like they have lost control over aspects of their jobs.

      – Padar et al., 2017
      People Process Technology

      Embedding change management into organizational design

      PREPARE A

      Awareness: Establish the need for organizational redesign and ensure this is communicated well.

      This blueprint is mostly focused on the prepare and transition components.

      D

      Desire: Ensure the new structure is something people are seeking and will lead to individual benefits for all.

      TRANSITION K

      Knowledge: Provide stakeholders with the tools and resources to function in their new roles and reporting structure.

      A

      Ability: Support employees through the implementation and into new roles or teams.

      FUTURE R

      Reinforcement: Emphasize and reward positive behaviors and attitudes related to the new organizational structure.

      Implementing the new organizational structure

      Implementing the organizational structure can be the most difficult part of the process.

      • To succeed in the process, consider creating an implementation plan that adequately considers these five components.
      • Each of these are critical to supporting the final organizational structure that was established during the redesign process.

      Implementation Plan

      Transition Plan: Identify the appropriate approach to making the transition, and ensure the transition plan works within the context of the business.

      Communication Strategy: Create a method to ensure consistent, clear, and concise information can be provided to all relevant stakeholders.

      Plan to Address Resistance: Given that not everyone will be happy to move forward with the new organizational changes, ensure you have a method to hear feedback and demonstrate concerns have been heard.

      Employee Development Plan: Provide employees with tools, resources, and the ability to demonstrate these new competencies as they adjust to their new roles.

      Monitor and Sustain the Change: Establish metrics that inform if the implementation of the new organizational structure was successful and reinforce positive behaviors.

      Define the type of change the organizational structure will be

      As a result, your organization must adopt OCM practices to better support the acceptance and longevity of the changes being pursued.

      Incremental Change

      Transformational Change

      Organizational change management is highly recommended and beneficial for projects that require people to:

      • Adopt new tools and workflows.
      • Learn new skills.
      • Comply with new policies and procedures.
      • Stop using old tools and workflows.

      Organizational change management is required for projects that require people to:

      • Move into different roles, reporting structures, and career paths.
      • Embrace new responsibilities, goals, reward systems, and values.
      • Grow out of old habits, ideas, and behaviors.
      • Lose stature in the organization.

      Info-Tech Insight

      How you transition to the new organizational structure can be heavily influenced by HR. This is the time to be including them and leveraging their expertise to support the transition “how.”

      Transition Plan Options

      Description

      Pros

      Cons

      Example

      Big Bang Change

      Change that needs to happen immediately – “ripping the bandage off.”

      • It puts an immediate stop to the current way of operating.
      • Occurs quickly.
      • More risky.
      • People may not buy into the change immediately.
      • May not receive the training needed to adjust to the change.

      A tsunami in Japan stopped all imports and exports. Auto manufacturers were unable to get parts shipped and had to immediately find an alternative supplier.

      Incremental Change

      The change can be rolled out slower, in phases.

      • Can ensure that people are bought in along the way through the change process, allowing time to adjust and align with the change.
      • There is time to ensure training takes place.
      • It can be a timely process.
      • If the change is dragged on for too long (over several years) the environment may change and the rationale and desired outcome for the change may no longer be relevant.

      A change in technology, such as HRIS, might be rolled out one application at a time to ensure that people have time to learn and adjust to the new system.

      Pilot Change

      The change is rolled out for only a select group, to test and determine if it is suitable to roll out to all impacted stakeholders.

      • Able to test the success of the change initiative and the implementation process.
      • Able to make corrections before rolling it out wider, to aid a smooth change.
      • Use the pilot group as an example of successful change.
      • Able to gain buy-in and create change champions from the pilot group who have experienced it and see the benefits.
      • Able to prevent an inappropriate change from impacting the entire organization.
      • Lengthy process.
      • Takes time to ensure the change has been fully worked through.

      A retail store is implementing a new incentive plan to increase product sales. They will pilot the new incentive plan at select stores, before rolling it out broadly.

      4.1 Select a transition plan approach

      1-3 hours

      1. List each of the changes required to move from your current structure to the new structure. Consider:
        1. Changes in reporting structure
        2. Hiring new members
        3. Eliminating positions
        4. Developing key competencies for staff
      2. Once you’ve defined all the changes required, consider the three different transition plan approaches: big bang, incremental, and pilot. Each of the transition plan approaches will have drawbacks and benefits. Use the list of changes to inform the best approach.
      3. If you are proceeding with the incremental or the pilot, determine the order in which you will proceed with the changes or the groups that will pilot the new structure first.
      InputOutput
      • Customized operating model sketch
      • New org. chart
      • Current org. chart
      • List of changes to move from current to future state
      • Transition plan to support changes
      MaterialsParticipants
      • Whiteboard/Flip Charts
      • CIO
      • IT Leadership
      • HR Business Partners

      Record the results in the Organizational Design Workbook

      Make a plan to effectively manage and communicate the change

      Success of your new organizational structure hinges on adequate preparation and effective communication.

      The top challenge facing organizations in completing the organizational redesign is their organizational culture and acceptance of change. Effective planning for the implementation and communication throughout the change is pivotal. Make sure you understand how the change will impact staff and create tailored plans for communication.

      65% of managers believe the organizational change is effective when provided with frequent and clear communication.

      Source: SHRM, 2021

      Communicate reasons for organizational structure changes and how they will be implemented

      Leaders of successful change spend considerable time developing a powerful change message, i.e. a compelling narrative that articulates the desired end state, and that makes the change concrete and meaningful to staff.

      The organizational change message should:

      • Explain why the change is needed.
      • Summarize what will stay the same.
      • Highlight what will be left behind.
      • Emphasize what is being changed.
      • Explain how change will be implemented.
      • Address how change will affect various roles in the organization.
      • Discuss the staff’s role in making the change successful.

      Five elements of communicating change

      • What is the change?
      • Why are we doing it?
      • How are we going to go about it?
      • How long will it take us to do it?
      • What will the role be for each department and individual?
      Source: Cornelius & Associates, 2010

      4.2 Establish the change communication messages

      2 hours

      1. The purpose of this activity is to establish a change communication message you can leverage when talking to stakeholders about the new organizational structure.
      2. Review the questions in the Organizational Design Workbook.
      3. Establish a clear message around the expected changes that will have to take place to help realize the new organizational structure.
      InputOutput
      • Customized operating model sketch
      • New org. chart
      • Current org. chart
      • List of changes
      • Transition plan
      • Change communication message for new organizational structure
      MaterialsParticipants
      • Whiteboard/Flip Charts
      • CIO
      • IT Leadership
      • Business Leadership

      Record the results in the Organizational Design Workbook

      Apply the following communication principles to make your IT organization redesign changes relevant to stakeholders

      Be Clear

      • Say what you mean and mean what you say.
      • Choice of language is important: “Do you think this is a good idea? I think we could really benefit from your insights and experience here.” Or do you mean: “I think we should do this. I need you to do this to make it happen.”
      • Don’t use jargon.

      Be Consistent

      • The core message must be consistent regardless of audience, channel, or medium.
      • Test your communication with your team or colleagues to obtain feedback before delivering to a broader audience.
      • A lack of consistency can be interpreted as an attempt at deception. This can hurt credibility and trust.

      Be Concise

      • Keep communication short and to the point so key messages are not lost in the noise.
      • There is a risk of diluting your key message if you include too many other details.

      Be Relevant

      • Talk about what matters to the stakeholder.
      • Talk about what matters to the initiative.
      • Tailor the details of the message to each stakeholder’s specific concerns.
      • IT thinks in processes but stakeholders only care about results: talk in terms of results.
      • IT wants to be understood but this does not matter to stakeholders. Think: “what’s in it for them?”
      • Communicate truthfully; do not make false promises or hide bad news.

      Frequently asked questions (FAQs) provide a chance to anticipate concerns and address them

      As a starting point for building an IT organizational design implementation, look at implementing an FAQ that will address the following:

      • The what, who, when, why, and where
      • The transition process
      • What discussions should be held with clients in business units
      • HR-centric questions

      Questions to consider answering:

      • What is the objective of the IT organization?
      • What are the primary changes to the IT organization?
      • What does the new organizational structure look like?
      • What are the benefits to our IT staff and to our business partners?
      • How will the IT management team share new information with me?
      • What is my role during the transition?
      • What impact is there to my reporting relationship within my department?
      • What are the key dates I should know about?

      4.3 Be consistent with a standard set of FAQs

      1 hour

      1. Beyond the completed communications plans, brainstorm a list of answers to the key “whats” of your organizational design initiative:
      • What is the objective of the IT organization?
      • What are the primary changes to the IT organization?
      • What does the new organizational structure look like?
      • What are the benefits to our IT staff and to our business partners?
    • Think about any key questions that may rise around the transition:
      • How will the IT management team share new information with me?
      • What is my role during the transition?
      • What impact is there to my reporting relationship within my department?
      • What are the key dates I should know about?
    • Determine the best means of socializing this information. If you have an internal wiki or knowledge-sharing platform, this would be a useful place to host the information.
    • InputOutput
      • Driver(s) for the new organizational structure
      • List of changes to move from current to future state
      • Change communication message
      • FAQs to provide to staff about the organizational design changes
      MaterialsParticipants
      • Whiteboard/Flip Charts
      • CIO
      • IT Leadership
      • Business Leadership

      Record the results in the Organizational Design Workbook

      The change reaction model

      The image contains a picture of the change reaction model. The model includes a double arrow pointing in both directions of left and right. On top of the arrow are 4 circles spread out on the arrow. They are labelled: Active Resistance, Detachment, Questioning, Acceptance.

      (Adapted from Cynthia Wittig)

      Info-Tech Insight

      People resist changes for many reasons. When it comes to organizational redesign changes, some of the most common reasons people resist change include a lack of understanding, a lack of involvement in the process, and fear.

      Include employees in the employee development planning process

      Prioritize

      Assess employee to determine competency levels and interests.

      Draft

      Employee drafts development goals; manager reviews.

      Select

      Manager helps with selection of development activities.

      Check In

      Manager provides ongoing check-ins, coaching, and feedback.

      Consider core and supplementary components that will sustain the new organizational structure

      Supplementary sustainment components:

      • Tools & Resources
      • Structure
      • Skills
      • Work Environment
      • Tasks
      • Disincentives

      Core sustainment components:

      • Empowerment
      • Measurement
      • Leadership
      • Communication
      • Incentives

      Sustainment Plan

      Sustain the change by following through with stakeholders, gathering feedback, and ensuring that the change rationale and impacts are clearly understood. Failure to so increases the potential that the change initiative will fail or be a painful experience and cost the organization in terms of loss of productivity or increase in turnover rates.

      Support sustainment with clear measurements

      • Measurement is one of the most important components of monitoring and sustaining the new organizational structure as it provides insight into where the change is succeeding and where further support should be added.
      • There should be two different types of measurements:
      1. Standard Change Management Metrics
      2. Organizational Redesign Metrics
    • When gathering data around metrics, consider other forms of measurement (qualitative) that can provide insights on opportunities to enhance the success of the organizational redesign change.
      1. Every measurement should be rooted to a goal. Many of the goals related to organizational design will be founded in the driver of this change initiative
      2. Once the goals have been defined, create one or more measurements that determines if the goal was successful.
      3. Use specific key performance indicators (KPIs) that contain a metric that is being measured and the frequency of that measurement.

      Info-Tech Insight

      Obtaining qualitative feedback from employees, customers, and business partners can provide insight into where the new organizational structure is operating optimally versus where there are further adjustments that could be made to support the change.

      4.4 Consider sustainment metrics

      1 hour

      1. Establish metrics that bring the entire process together and that will ensure the new organizational design is a success.
      2. Go back to your driver(s) for the organizational redesign. Use these drivers to help inform a particular measurement that can be used to determine if the new organizational design will be successful. Each measurement should be related to the positive benefits of the organization, an individual, or the change itself.
      3. Once you have a list of measurements, use these to determine the specific KPI that can be qualified through a metric. Often you are looking for an increase or decrease of a particular measurement by a dollar or percentage within a set time frame.
      4. Use the example metrics in the workbook and update them to reflect your organization’s drivers.
      InputOutput
      • Driver(s) for the new organizational structure
      • List of changes to move from current to future state
      • Change communication message
      • Sustainment metrics
      MaterialsParticipants
      • Whiteboard/Flip Charts
      • CIO
      • IT Leadership
      • Business Leadership

      Record the results in the Organizational Design Workbook

      Related Info-Tech Research

      Build a Strategic IT Workforce Plan

      • Continue into the second phase of the organizational redesign process by defining the required workforce to deliver.
      • Leveraging trends, data, and feedback from your employees, define the competencies needed to deliver on the defined roles.

      Implement a New IT Organizational Structure

      • Organizational design implementations can be highly disruptive for IT staff and business partners.
      • Without a structured approach, IT leaders may experience high turnover, decreased productivity, and resistance to the change.

      Define the Role of Project Management in Agile and Product-Centric Delivery

      • There are many voices with different opinions on the role of project management. This causes confusion and unnecessary churn.
      • Project management and product management naturally align to different time horizons. Harmonizing their viewpoints can take significant work.

      Research Contributors and Experts

      The image contains a picture of Jardena London.

      Jardena London

      Transformation Catalyst, Rosetta Technology Group

      The image contains a picture of Jodie Goulden.

      Jodie Goulden

      Consultant | Founder, OrgDesign Works

      The image contains a picture of Shan Pretheshan.

      Shan Pretheshan

      Director, SUPA-IT Consulting

      The image contains a picture of Chris Briley.

      Chris Briley

      CIO, Manning & Napier

      The image contains a picture of Dean Meyer.

      Dean Meyer

      President N. Dean Meyer and Associates Inc.

      The image contains a picture of Jimmy Williams.

      Jimmy Williams

      CIO, Chocktaw Nation of Oklahoma

      Info-Tech Research Group

      Cole Cioran, Managing Partner

      Dana Daher, Research Director

      Hans Eckman, Principal Research Director

      Ugbad Farah, Research Director

      Ari Glaizel, Practice Lead

      Valence Howden, Principal Research Director

      Youssef Kamar, Senior Manager, Consulting

      Carlene McCubbin, Practice Lead

      Baird Miller, Executive Counsellor

      Josh Mori, Research Director

      Rajesh Parab, Research Director

      Gary Rietz, Executive Counsellor

      Bibliography

      “A Cheat Sheet for HR Professionals: The Organizational Development Process.” AIHR, 2021. Web.

      Acharya, Ashwin, Roni Lieber, Lissa Seem, and Tom Welchman. “How to identify the right ‘spans of control’ for your organization.” McKinsey, 21 December 2017. Web.

      Anand. N., and Jean-Louis Barsoux. “What everyone gets wrong about change management. Harvard Business Review, December 2017. Web.

      Atiken, Chris. “Operating model design-first principles.” From Here On, 24 August 2018. Web.

      “Avoid common digital transformation challenges: Address your IT Operating Model Now.” Sofigate, 5 May 2020. Web.

      Baumann, Oliver, and Brian Wu. “The many dimensions of research on designing flat firms.” Journal of Organizational Design, no. 3, vol. 4. 09 May 2022.Web.

      Bertha, Michael. “Cross the project to product chasm.” CIO, 1 May 2020. Web.

      Blenko, Marcia, and James Root. “Design Principles for a Robust Operating Model.” Bain & Company, 8 April 2015. Web.

      Blenko, Marcia, Leslie Mackrell, and Kevin Rosenberg. “Operating models: How non-profits get from strategy to results.” The Bridge Span Group, 15 August 2019. Web.

      Boulton, Clint. “PVH finds perfect fit in hybrid IT operating model amid pandemic.” CIO, 19 July 2021. Web.

      Boulton, Clint. “Why digital disruption leaves no room for bimodal IT.” CIO, 11 May 2017. Web.

      Bright, David, et al. “Chapter 10: Organizational Structure & Change.” Principles of Management, OpenStax, Rice University, 20 March 2019. Book.

      Campbell, Andrew. “Design Principles: How to manage them.” Ashridge Operating Models. 1 January 2022. Web.

      D., Maria. “3 Types of IT Outsourcing Models and How to Choose Between Them.” Cleveroad, 29 April 2022. Web.

      Devaney, Eric. “9 Types of Organizational Structure Every Company Should Consider.” HubSpot, 11 February 2022. Web.

      Devaney, Erik. “The six building blocks of organizational structure.” Hubspot, 3 June 2020. Web.

      Eisenman, M., S. Paruchuri, and P. Puranam. “The design of emergence in organizations.” Journal of Organization Design, vol. 9, 2020. Web.

      Forbes Business Development Council. “15 Clear Signs It’s Time to Restructure the Business.” Forbes, 10 February 2020. Web.

      Freed, Joseph. “Why Cognitive Load Could Be The Most Important Employee Experience Metric In The Next 10 Years.” Forbes, 30 June 2020. Web.

      Galibraith, Jay. “The Star Model.” JayGalbraith.com, n.d. Web.

      Girod, Stéphane, and Samina Karim. “Restructure or reconfigure?” Harvard Business Review, April 2017. Web.

      Goldman, Sharon. “The need for a new IT Operating Model: Why now?” CIO, 27 August 2019. Web.

      Halapeth, Milind. “New age IT Operating Model: Creating harmony between the old and the new.” Wirpo, n.d. Web.

      Harvey, Michelle. “Why a common operating model is efficient for business productivity.” CMC, 10 May 2020. Web.

      Helfand, Heidi. “Dynamic Reteaming.” O’Reilly Media, 7 July 2020. Book.

      JHeller, Martha. “How Microsoft CIO Jim DuBois changed the IT Operating Model.” CIO, 2 February 2016. Web.

      Heller, Martha. “How Stryker IT Shifted to a global operating model.” CIO, 19 May 2021. Web.

      Heller, Michelle. “Inside blue Shields of California’s IT operating model overhaul.” CIO, 24 February 2021. Web.

      Hessing, Ted. “Value Stream Mapping.” Six Sigma Study Guide, 11 April 2014. Web.

      Huber, George, P. “What is Organization Design.” Organizational Design Community, n.d. Web.

      Indeed Editorial Team. “5 Advantages and Disadvantages of the Matrix Organizational Structure.” Indeed, 23 November 2020. Web.

      Indeed Editorial Team. “How to plan an effective organization restructure.” Indeed, 10 June 2021. Web.

      “Insourcing vs Outsourcing vs Co-Sourcing.” YML Group, n.d. Web.

      “Investing in more strategic roles.” CAPS Research, 3 February 2022. Web.

      Jain, Gagan. “Product IT Operating Model: The next-gen model for a digital work.” DevOps, 22 July 2019. Web.

      Kane, Gerald, D. Plamer, and Anh Phillips. “Accelerating Digital Innovation Inside and Out.” Deloitte Insights, 4 June 2019. Web.

      Krush, Alesia. “IT companies with ‘flat’ structures: utopia or innovative approach?” Object Style, 18 October 2018. Web.

      Law, Michael. “Adaptive Design: Increasing Customer Value in Your Organisation.” Business Agility Institute, 5 October 2020. Web.

      LucidContent Team. “How to get buy-in for changes to your organizational structure.” Lucid Chart, n.d. Web.

      Matthews, Paul. “Do you know the difference between competence and capability?” The People Development Magazine, 25 September 2020. Web.

      Meyer, Dean N. “Analysis: Common symptoms of organizational structure problems.” NDMA, n.d. Web.

      Meyer, N. Dean. “Principle-based Organizational Structure.” NDMA Publishing, 2020. Web.

      Morales Pedraza, Jorge. Answer to posting, “What is the relationship between structure and strategy?” ResearchGate.net, 5 March 2014. Web.

      Nanjad, Len. “Five non-negotiables for effective organization design change.” MNP, 01 October 2021. Web.

      Neilson, Gary, Jaime Estupiñán, and Bhushan Sethi. “10 Principles of Organizational Design.” Strategy & Business, 23 March 2015. Web.

      Nicastro, Dom. “Understanding the Foundational Concepts of Organizational Design.” Reworked, 24 September 2020. Web.

      Obwegeser, Nikolaus, Tomoko Yokoi, Michael Wade, and Tom Voskes. “7 Key Principles to Govern Digital Initiatives.” MIT Sloan, 1 April 2020. Web.

      “Operating Models and Tools.” Business Technology Standard, 23 February 2021. Web.

      “Organizational Design Agility: Journey to a combined community.” ODF-BAI How Space, Organizational Design Forum, 2022. Web.

      “Organizational Design: Understanding and getting started.” Ingentis, 20 January 2021. Web.

      Padar, Katalin, et al. “Bringing project and change management roles into sync.” Journal of Change Management, 2017. Web.

      Partridge, Chris. “Evolve your Operating Model- It will drive everything.” CIO, 30 July 2021. Web.

      Pijnacker, Lieke. “HR Analytics: role clarity impacts performance.” Effectory, 25 September 2019. Web.

      Pressgrove, Jed. “Centralized vs. Federated: Breaking down IT Structures.” Government Technology, March 2020. Web.

      Sherman, Fraser. “Differences between Organizational Structure and Design.” Bizfluent, 20 September 2019. Web.

      Skelton, Matthew, and Manual Pais. “Team Cognitive Load.” IT Revolution, 19 January 2021. Web.

      Skelton, Matthew, and Manual Pais. Team Topologies. IT Revolution Press, 19 September 2019. Book

      Spencer, Janet, and Michael Watkins. “Why organizational change fails.” TLNT, 26 November 2019. Web.

      Storbakken, Mandy. “The Cloud Operating Model.” VMware, 27 January 2020. Web.

      "The Qualities of Leadership: Leading Change.” Cornelius & Associates, 2010. Web.

      “Understanding Organizational Structures.” SHRM, 31 August 2021. Web.

      "unfix Pattern: Base.” AgilityScales, n.d. Web.

      Walker, Alex. “Half-Life: Alyx helped change Valve’s Approach to Development.” Kotaku, 10 July 2020. Web.

      "Why Change Management.” Prosci, n.d. Web.

      Wittig, Cynthia. “Employees' Reactions to Organizational Change.” OD Practioner, vol. 44, no. 2, 2012. Web.

      Woods, Dan. “How Platforms are neutralizing Conway’s Law.” Forbes, 15 August 2017. Web.

      Worren, Nicolay, Jeroen van Bree, and William Zybach. “Organization Design Challenges. Results from a practitioner survey.” Journal of Organizational Design, vol. 8, 25 July 2019. Web.

      Appendix

      IT Culture Framework

      This framework leverages McLean & Company’s adaptation of Quinn and Rohrbaugh’s Competing Values Approach.

      The image contains a diagram of the IT Culture Framework. The framework is divided into four sections: Competitive, Innovative, Traditional, and Cooperative, each with their own list of descriptors.

      Manage an IT Budget

      • Buy Link or Shortcode: {j2store}70|cart{/j2store}
      • member rating overall impact: 8.0/10 Overall Impact
      • member rating average dollars saved: After each Info-Tech experience, we ask our members to quantify the real-time savings, monetary impact, and project improvements our research helped them achieve.
      • member rating average days saved: Read what our members are saying
      • Parent Category Name: Cost & Budget Management
      • Parent Category Link: /cost-and-budget-management
      • IT is viewed as a cost center without a clear understanding of the value it provides.
      • After completing the budget, the CIO is faced with changing expectations, disruptions, new risks, and new threats.
      • IT departments often lack a reliable budget management process to keep itself on track towards its budget goals.
      • Over budgeting risks credibility if projects are not all delivered, while under budgeting risks not being able to execute important projects.

      Our Advice

      Critical Insight

      • Managing your budget is not just about numbers; it’s also about people and processes. Better relationships and a proper process leads to better management of your budget. Understand how your relationships and current processes might be leveraged to manage your budget.
      • No one likes to be over budget, but being under budget isn’t necessarily good either. Coming in under budget may mean that you are not accomplishing the initiatives that you promised you would, reflecting poor job performance.

      Impact and Result

      • Implement a formal budget management process that documents your planned budget and actual expenditures, tracks variances, and responds to those variances to stay on track towards budget goals.
      • Manage the expectations of business stakeholders by communicating the links between IT spend and business value in a way that is easily understood by the business.
      • Control for under- or overspending by using Info Tech’s budget management tool and tactics.

      Manage an IT Budget Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to understand the increasing expectations for IT departments to better manage their budgets, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Document

      Create a streamlined documentation process that also considers the elements of people and technology.

      • Manage an IT Budget – Phase 1: Document
      • Manage Your IT Budget Tool

      2. Track

      Track your planned budget against actual expenditures to catch areas of over- and underspending in a timely manner.

      • Manage an IT Budget – Phase 2: Track

      3. Control

      Leverage control mechanisms to manage variances in your budget.

      • Manage an IT Budget – Phase 3: Control
      [infographic]

      Workshop: Manage an IT Budget

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Document Budget

      The Purpose

      The first step of managing your IT budget is to make sure there is a properly documented budget that everyone agrees upon.

      Key Benefits Achieved

      A properly documented budget facilitates management and communication of the budget.

      Activities

      1.1 Review budget for the year.

      1.2 Document each budget in the tool.

      1.3 Review CAPEX vs. OPEX.

      1.4 Customize accounts to match your organization.

      Outputs

      Budget broken out into monthly increments and by each account.

      Budget documented in tool.

      Tool customized to reflect organization's specific accounts and terminology.

      2 Optimize Documentation Process

      The Purpose

      A proper documentation process forms the backbone for effective budget management.

      Key Benefits Achieved

      A streamlined documentation process with accurate inputs that also considers the elements of people and technology.

      Activities

      2.1 Draw out process flow of current documentation.

      2.2 Identify bottlenecks.

      2.3 Discuss and develop roadmap to solving bottlenecks.

      Outputs

      Process flow of current documentation process with identified bottlenecks.

      Plan to mitigate bottlenecks.

      3 Track and Control for Over- and Underspending

      The Purpose

      Track your planned budget against actual expenditures to catch areas of over- and underspending in a timely manner. Then, leverage control mechanisms to manage variances in your budget.

      Key Benefits Achieved

      Tracking and controlling for variances will help the IT department stay on track towards its budget goals. It will also help with communicating IT’s value to the business.

      Activities

      3.1 Walk through the “Overview Bar.”

      3.2 Document actual expenses incurred in fiscal to date.

      3.3 Review the risk of over- and underspending.

      3.4 Use the reforecast column to control for over- and underspend.

      Outputs

      Assess the “Overview Bar.”

      Document actual expenditures and committed expenses up to the current date.

      Develop a strategy and roadmap for how you will mitigate any current under- or overspends.

      Reforecast expenditures for each account for each month for the remainder of the fiscal year.

      Project Management

      • Buy Link or Shortcode: {j2store}48|cart{/j2store}
      • Related Products: {j2store}48|crosssells{/j2store}
      • member rating overall impact: 9.7/10
      • member rating average dollars saved: $303,499
      • member rating average days saved: 42
      • Parent Category Name: Project Portfolio Management and Projects
      • Parent Category Link: /ppm-and-projects

      The challenge

      • Ill-defined or even lack of upfront project planning will increase the perception that your IT department cannot deliver value because most projects will go over time and budget.
      • The perception is those traditional ways of delivering projects via the PMBOK only increase overhead and do not have value. This is less due to the methodology and more to do with organizations trying to implement best-practices that far exceed their current capabilities.
      • Typical best-practices are too clinical in their approach and place unrealistic burdens on IT departments. They fail to address the daily difficulties faces by staff and are not sized to fit your organization.
      • Take a flexible approach and ensure that your management process is a cultural and capacity fit for your organization. Take what fits from these frameworks and embed them tailored into your company.

      Our advice

      Insight

      • The feather-touch is often the right touch. Ensure that you have a lightweight approach for most of your projects while applying more rigor to the more complex and high-risk developments.
      • Pick the right tools. Your new project management processes need the right tooling to be successful. Pick a tool that is flexible enough o accommodate projects of all sizes without imposing undue governance onto smaller projects.
      • Yes, take what fits within your company from frameworks, but there is no cherry-picking. Ensure your processes stay in context: If you do not inform for effective decision-making, all will be in vain. Develop your methods such that guide the way to big-picture decision taking and support effective portfolio management.

      Impact and results 

      • The right amount of upfront planning is a function of the type of projects you have and your company. The proper levels enable better scope statements, better requirements gathering, and increased business satisfaction.
      • An investment in a formal methodology is critical to projects of all sizes. An effective process results in more successful projects with excellent business value delivery.
      • When you have a repeatable and consistent approach to project planning and execution, you can better communicate between the IT project managers and decision-makers.
      • Better communication improves the visibility of the overall project activity within your company.

      The roadmap

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      Get started.

      Read our executive brief to understand why you should tailor project management practices to the type of projects you do and your company and review our methodology. We show you how we can support you.

      Lay the groundwork for project management success

      Assess your current capabilities to set the right level of governance.

      • Tailor Project Management Processes to Fit Your Projects – Phase 1: Lay the Groundwork for PM Success (ppt)
      • Project Management Triage Tool (xls)
      • COBIT BAI01 (Manage Programs and Projects) Alignment Workbook (xls)
      • Project Level Definition Matrix (xls)
      • Project Level Selection Tool (xls)
      • Project Level Assessment Tool (xls)
      • Project Management SOP Template (doc)

      Small project require a lightweight framework

      Increase small project's throughput.

      • Tailor Project Management Processes to Fit Your Projects – Phase 2: Build a Lightweight PM Process for Small Initiatives (ppt)
      • Level 1 Project Charter Template (doc)
      • Level 1 Project Status Report Template (doc)
      • Level 1 Project Closure Checklist Template (doc)

      Build the standard process medium and large-scale projects

      The standard process contains fully featured initiation and planning.

      • Tailor Project Management Processes to Fit Your Projects – Phase 3: Establish Initiation and Planning Protocols for Medium-to-Large Projects (ppt)
      • Project Stakeholder and Impact Assessment Tool (xls)
      • Level 2 Project Charter Template (doc)
      • Level 3 Project Charter Template (doc)
      • Kick-Off Meeting Agenda Template (doc)
      • Scope Statement Template (doc)
      • Project Staffing Plan(xls)
      • Communications Management Plan Template (doc)
      • Customer/Sponsor Project Status Meeting Template (doc)
      • Level 2 Project Status Report Template (doc)
      • Level 3 Project Status Report Template (doc)
      • Quality Management Workbook (xls)
      • Benefits Management Plan Template (xls)
      • Risk Management Workbook (xls)

      Build a standard process for the execution and closure of medium to large scale projects

      • Tailor Project Management Processes to Fit Your Projects – Phase 4: Develop Execution and Closing Procedures for Medium-to-Large Projects (ppt)
      • Project Team Meeting Agenda Template (doc)
      • Light Project Change Request Form Template (doc)
      • Detailed Project Change Request Form Template (doc)
      • Light Recommendation and Decision Tracking Log Template (xls)
      • Detailed Recommendation and Decision Tracking Log Template (xls)
      • Deliverable Acceptance Form Template (doc)
      • Handover to Operations Template (doc)
      • Post-Mortem Review Template (doc)
      • Final Sign-Off and Acceptance Form Template (doc)

      Implement your project management standard operating procedures (SOP)

      Develop roll-out and training plans, implement your new process and track metrics.

      • Tailor Project Management Processes to Fit Your Projects – Phase 5: Implement Your PM SOP (ppt)
      • Level 2 Project Management Plan Template (doc)
      • Project Management Process Costing Tool (xls)
      • Project Management Process Training Plan Template (doc)
      • Project Management Training Monitoring Tool (xls)
      • Project Management Process Implementation Timeline Tool (MS Project)
      • Project Management Process Implementation Timeline Tool (xls)

       

       

      Adopt Design Thinking in Your Organization

      • Buy Link or Shortcode: {j2store}327|cart{/j2store}
      • member rating overall impact: 9.6/10 Overall Impact
      • member rating average dollars saved: $23,245 Average $ Saved
      • member rating average days saved: 13 Average Days Saved
      • Parent Category Name: Innovation
      • Parent Category Link: /innovation
      • End users often have a disjointed experience while interacting with your organization in using its products and services.
      • You have been asked by your senior leadership to start a new or revive an existing design or innovation function within your organization. However, your organization has dismissed design thinking as the latest “management fad” and does not buy into the depth and rigor that design thinking brings.
      • The design or innovation function lives on the fringes of your organization due to its apathy towards design thinking or tumultuous internal politics.
      • You, as a CIO, want to improve the user satisfaction with the IT services your team provides to both internal and external users.

      Our Advice

      Critical Insight

      • A user’s perspective while interacting with the products and services is very different from the organization’s internal perspective while implementing and provisioning those. A design-based organization balances the two perspectives to drive user-satisfaction over end-to-end journeys.
      • Top management must have a design thinker – the guardian angel of the balance between exploration (i.e. discovering new business models) and exploitation (i.e. leveraging existing business models).
      • Your approach to adopt design thinking must consider your organization’s specific goals and culture. There’s no one-size-fits-all approach.

      Impact and Result

      • User satisfaction, with the end-to-end journeys orchestrated by your organization, will significantly increase.
      • Design-centric organizations enjoy disproportionate financial rewards.

      Adopt Design Thinking in Your Organization Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you should adopt design thinking in your organization, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. What is design thinking?

      The focus of this phase is on revealing what designers do during the activity of designing, and on building an understanding of the nature of design ability. We will formally examine the many definitions of design thinking from experts in this field. At the core of this phase are several case studies that illuminate the various aspects of design thinking.

      • Adopt Design Thinking in Your Organization – Phase 1: What Is Design Thinking?
      • Victor Scheinman's Experiment for Design

      2. How does an organization benefit from design thinking?

      This phase will illustrate the relevance of design in strategy formulation and in service-design. At the core of this phase are several case studies that illuminate these aspects of design thinking. We will also identify the trends impacting your organization and establish a baseline of user-experience with the journeys orchestrated by your organization.

      • Adopt Design Thinking in Your Organization – Phase 2: How Does an Organization Benefit From Design Thinking?
      • Trends Matrix (Sample)

      3. How do you build a design organization?

      The focus of this phase is to:

    • Measure the design-centricity of your organization and subsequently, identify the areas for improvement.
    • Define an approach for a design program that suites your organization’s specific goals and culture.
      • Adopt Design Thinking in Your Organization – Phase 3: How Do You Build a Design Organization?
      • Report on How Design-Centric Is Your Organization (Sample)
      • Approach for the Design Program (Sample)
      • Interview With David Dunne on Design Thinking
      • Interview With David Dunne on Design Thinking (mp3)
      [infographic]

      Workshop: Adopt Design Thinking in Your Organization

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 What Is Design Thinking?

      The Purpose

      The focus of this module is on revealing what designers do during the activity of designing, and on building an understanding of the nature of design ability. We will also review the report on the design-centricity of your organization and subsequently, earmark the areas for improvement.

      Key Benefits Achieved

      An intimate understanding of the design thinking

      An assessment of design-centricity of your organization and identification of areas for improvement

      Activities

      1.1 Discuss case studies on how designers think and work

      1.2 Define design thinking

      1.3 Review report from Info-Tech’s diagnostic: How design-centric is your organization?

      1.4 Earmark areas for improvement to raise the design-centricity of your organization

      Outputs

      Report from Info-Tech’s diagnostic: ‘How design-centric is your organization?’ with identified areas for improvement.

      2 How Does an Organization Benefit From Design Thinking?

      The Purpose

      In this module, we will discuss the relevance of design in strategy formulation and service design. At the core of this module are several case studies that illuminate these aspects of design thinking. We will also identify the trends impacting your organization. We will establish a baseline of user experience with the journeys orchestrated by your organization.

      Key Benefits Achieved

      An in-depth understanding of the relevance of design in strategy formulation and service design

      An understanding of the trends that impact your organization

      A taxonomy of critical customer journeys and a baseline of customers’ satisfaction with those

      Activities

      2.1 Discuss relevance of design in strategy through case studies

      2.2 Articulate trends that impact your organization

      2.3 Discuss service design through case studies

      2.4 Identify critical customer journeys and baseline customers’ satisfaction with those

      2.5 Run a simulation of design in practice

      Outputs

      Trends that impact your organization.

      Taxonomy of critical customer journeys and a baseline of customers’ satisfaction with those.

      3 How to Build a Design Organization

      The Purpose

      The focus of this module is to define an approach for a design program that suits your organization’s specific goals and culture.

      Key Benefits Achieved

      An approach for the design program in your organization. This includes aspects of the design program such as its objectives and measures, its model (one of the five archetypes or a hybrid one), and its governance.

      Activities

      3.1 Identify objectives and key measures for your design thinking program

      3.2 Structure your program after reviewing five main archetypes of a design program

      3.3 Balance between incremental and disruptive innovation

      3.4 Review best practices of a design organization

      Outputs

      An approach for your design thinking program: objectives and key measures; structure of the program, etc.

      Automate Testing to Get More Done

      • Buy Link or Shortcode: {j2store}285|cart{/j2store}
      • member rating overall impact: 10.0/10 Overall Impact
      • member rating average dollars saved: $29,139 Average $ Saved
      • member rating average days saved: 5 Average Days Saved
      • Parent Category Name: Testing, Deployment & QA
      • Parent Category Link: /testing-deployment-and-qa
      • Today’s rapidly changing software products and operational processes create mounting pressure on software delivery teams to release new features and changes quickly while meeting high and demanding quality standards.
      • Most organizations see automated testing as a solution to meet this demand alongside their continuous delivery pipeline. However, they often lack the critical foundations, skills, and practices that are imperative for success.
      • The technology is available to enable automated testing for many scenarios and systems, but industry noise and an expansive tooling marketplace create confusion for those interested in adopting this technology.

      Our Advice

      Critical Insight

      • Good automated testing improves development throughput. No matter how quickly you put changes into production, end users will not accept them if they do not meet quality standards. Escaped defects, refactoring, and technical debt can significantly hinder your team’s ability to deliver software on time and on budget. In fact, 65% of organizations saw a reduction of test cycle time and 62% saw reductions in test costs with automated testing (Sogeti, World Quality Report 2020–21).
      • Start automation with unit and functional tests. Automated testing has a sharp learning curve, due to either the technical skills to implement and operate it or the test cases you are asked to automate. Unit tests and functional tests are ideal starting points in your automation journey because of the available tools and knowledge in the industry, the contained nature of the tests you are asked to execute, and the repeated use of the artifacts in more complicated tests (such as performance and integration tests). After all, you want to make sure the application works before stressing it.
      • Automated testing is a cross-functional practice, not a silo. A core component of successful software delivery throughput is recognizing and addressing defects, bugs, and other system issues early and throughout the software development lifecycle (SDLC). This involves having all software delivery roles collaborate on and participate in automated test case design, configure and orchestrate testing tools with other delivery tools, and proactively prepare the necessary test data and environments for test types.

      Impact and Result

      • Bring the right people to the table. Automated testing involves significant people, process and technology changes across multiple software delivery roles. These roles will help guide how automated testing will compliment and enhance their responsibilities.
      • Build a foundation. Review your current circumstances to understand the challenges blocking automated testing. Establish a strong base of good practices to support the gradually adoption of automated testing across all test types.
      • Start with one application. Verify and validate the automated testing practices used in one application and their fit for other applications and systems. Develop a reference guide to assist new teams.

      Automate Testing to Get More Done Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you should automate testing, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

      2. Adopt good automated testing practices

      Develop and implement practices that mature your automated testing capabilities.

      • Automated Testing Quick Reference Template

      Infographic

      Workshop: Automate Testing to Get More Done

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Adopt Good Automated Testing Practices

      The Purpose

      Understand the goals of and your vision for your automated testing practice.

      Develop your automated testing foundational practices.

      Adopt good practices for each test type.

      Key Benefits Achieved

      Level set automated testing expectations and objectives.

      Learn the key practices needed to mature and streamline your automated testing across all test types.

      Activities

      1.1 Build a foundation.

      1.2 Automate your test types.

      Outputs

      Automated testing vision, expectations, and metrics

      Current state of your automated testing practice

      Ownership of the implementation and execution of automated testing foundations

      List of practices to introduce automation to for each test type

      Maintain Employee Engagement During the COVID-19 Pandemic

      • Buy Link or Shortcode: {j2store}548|cart{/j2store}
      • member rating overall impact: 10.0/10 Overall Impact
      • member rating average dollars saved: $12,399 Average $ Saved
      • member rating average days saved: 5 Average Days Saved
      • Parent Category Name: Engage
      • Parent Category Link: /engage
      • The uncertainty of the pandemic means that employee engagement is at higher risk.
      • Organizations need to think beyond targeting traditional audiences by considering engagement of onsite, remote, and laid-off employees.

      Our Advice

      Critical Insight

      • The changing way of work triggered by this pandemic means engagement efforts must be easy to implement and targeted for relevant audiences.

      Impact and Result

      • Identify key drivers to leverage during the pandemic to boost engagement as well as at-risk drivers to focus efforts on.
      • Select quick-win tactics to sustain and boost engagement for relevant target audiences.

      Maintain Employee Engagement During the COVID-19 Pandemic Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Determine the scope

      Evaluate the current state, stakeholder capacity, and target audience of engagement actions.

      • Maintain Employee Engagement During the COVID-19 Pandemic Storyboard
      • Pandemic Engagement Workbook

      2. Identify engagement drivers

      Review impact to engagement drivers in order to prioritize and select tactics for addressing each.

      • Tactics Catalog: Maintain Employee Engagement During the COVID-19 Pandemic
      • Employee Engagement During COVID-19: Manager Tactics

      3. Determine ownership and communicate engagement actions

      Designate owners of tactics, select measurement tools and cadence, and communicate engagement actions.

      • Crisis Communication Guide for HR
      • Crisis Communication Guide for Leaders
      • Leadership Crisis Communication Guide Template
      • HR Action and Communication Plan
      [infographic]

      Master the Public Cloud IaaS Acquisition Models

      • Buy Link or Shortcode: {j2store}228|cart{/j2store}
      • member rating overall impact: 10.0/10 Overall Impact
      • member rating average dollars saved: $3,820 Average $ Saved
      • member rating average days saved: 2 Average Days Saved
      • Parent Category Name: Vendor Management
      • Parent Category Link: /vendor-management

      Understanding the differences in IaaS platform agreements, purchasing options, associated value, and risks. What are your options for:

      • Upfront or monthly payments
      • Commitment discounts
      • Support options
      • Migration planning and support

      Our Advice

      Critical Insight

      IaaS platforms offer similar technical features, but they vary widely on their procurement model. By fully understanding the procurement differences and options, you will be able to purchase wisely, save money both long and short term, and mitigate investment risk.

      Most vendors have similar processes and options to buy. Finding a transparent explanation and summary of each platform in a side-by-side review is difficult.

      • Are vendor reps being straight forward?
      • What are the licensing requirements?
      • What discounts or incentives can I negotiate?
      • How much do I have to commit to and for how long?

      Impact and Result

      This project will provide several benefits for both IT and the business. It includes:

      • Best IaaS platform to support current and future procurement requirements.
      • Right-sized cloud commitment tailored to the organization’s budget.
      • Predictable and controllable spend model.
      • Flexible and reliable IT infrastructure that supports the lines of business.
      • Reduced financial and legal risk.

      Master the Public Cloud IaaS Acquisition Models Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to learn how the public cloud IaaS procurement models compare. Review Info-Tech’s methodology and understand the top three platforms, features, and benefits to support and inform the IaaS vendor choice.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Educate

      Learn the IaaS basics, terminologies, purchasing options, licensing requirements, hybrid options, support, and organization requirements through a checklist process.

      • Master the Public Cloud IaaS Acquisition Models – Phase 1: Educate
      • Public Cloud Procurement Checklist
      • Microsoft Public Cloud Licensing Guide

      2. Evaluate

      Review and understand the features, downsides, and differences between the big three players.

      • Master the Public Cloud IaaS Acquisition Models – Phase 2: Evaluate
      • Public Cloud Procurement Comparison Summary

      3. Execute

      Decide on a primary vendor that meets requirements, engage with a reseller, negotiate pricing incentives, migration costs, review, and execute the agreement.

      • Master the Public Cloud IaaS Acquisition Models – Phase 3: Execute
      • Public Cloud Acquisition Executive Summary Template

      Infographic

      Perform an Agile Skills Assessment

      • Buy Link or Shortcode: {j2store}153|cart{/j2store}
      • member rating overall impact: 10.0/10 Overall Impact
      • member rating average dollars saved: $32,166 Average $ Saved
      • member rating average days saved: 15 Average Days Saved
      • Parent Category Name: Development
      • Parent Category Link: /development
      • Your organization is trying to address the key delivery challenges you are facing. Early experiments with Agile are starting to bear fruit.
      • As part of maturing your Agile practice, you want to evaluate if you have the right skills and capabilities in place.

      Our Advice

      Critical Insight

      • Focusing on the non-technical skills can yield significant returns for your products, your team, and your organization. These skills are what should be considered as the real Agile skills.

      Impact and Result

      • Define the skills and values that are important to your organization to be successful at being Agile.
      • Put together a standard criterion for measurement of the attainment of given skills.
      • Define the roadmap and communication plan around your agile assessment.

      Perform an Agile Skills Assessment Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you should perform an agile skills assessment. review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Take stock of the Agile skills and values important to you

      Confirm the list of Agile skills that you wish to measure.

      • Perform an Agile Skills Assessment – Phase 1: Take Stock of the Agile Skills and Values Important to You
      • Agile Skills Assessment Tool
      • Agile Skills Assessment Tool Example

      2. Define an assessment method that works for you

      Define what it means to attain specific agile skills through a defined ascension path of proficiency levels, and standardized skill expectations.

      • Perform an Agile Skills Assessment – Phase 2: Define an Assessment Method That Works for You

      3. Plan to assess your team

      Determine the roll-out and communication plan that suits your organization.

      • Perform an Agile Skills Assessment – Phase 3: Plan to Assess Your Team
      • Agile Skills Assessment Communication and Roadmap Plan
      • Agile Skills Assessment Communication and Roadmap Plan Example
      [infographic]

      Workshop: Perform an Agile Skills Assessment

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Define Agile Skills and Maturity Levels

      The Purpose

      Learn about and define the Agile skills that are important to your organization.

      Define the different levels of attainment when it comes to your Agile skills.

      Define the standards on a per-role basis.

      Key Benefits Achieved

      Get a clear view of the Agile skills important into meet your Agile transformation goals in alignment with organizational objectives.

      Set a clear standard for what it means to meet your organizational standards for Agile skills.

      Activities

      1.1 Review and update the Agile skills relevant to your organization.

      1.2 Define your Agile proficiency levels to evaluate attainment of each skill.

      1.3 Define your Agile team roles.

      1.4 Define common experience levels for your Agile roles.

      1.5 Define the skill expectations for each Agile role.

      Outputs

      A list of Agile skills that are consistent with your Agile transformation

      A list of proficiency levels to be used during your Agile skills assessment

      A confirmed list of roles that you wish to measure on your Agile teams

      A list of experience levels common to Agile team roles (example: Junior, Intermediate, Senior)

      Define the skill expectations for each Agile role

      Take a Realistic Approach to Disaster Recovery Testing

      • Buy Link or Shortcode: {j2store}414|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: DR and Business Continuity
      • Parent Category Link: /business-continuity

      You have made significant investments in availability and disaster recovery – but your ability to recover hasn’t been tested in years. Testing will:

      • Improve your DR capabilities.
      • Identify required changes to planning documentation and procedures.
      • Validate DR capabilities for interested customers and auditors.

      Our Advice

      Critical Insight

      • If you treat testing as a pass/fail exercise, you aren’t meeting the end goal of improving organizational resilience.
      • Focus on identifying gaps and risks, and addressing them, before a real disaster hits.
      • Take a realistic, iterative approach to resilience testing that starts with small, low-risk tests and builds on lessons learned.

      Impact and Result

      • Identify testing scenarios and scope that can deliver value to your organization.
      • Create practical test plans with Info-Tech’s template.
      • Demonstrate value from testing to gain buy-in for additional tests.

      Take a Realistic Approach to Disaster Recovery Testing Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Take a Realistic Approach to Disaster Recovery Testing Storyboard – A guide to establishing a right-sized approach to DR testing that delivers durable value to your organization.

      Use this research to understand the different types of tests, prioritize and plan tests for your organization, review the results, and establish a cadence for testing.

      • Take a Realistic Approach to Disaster Recovery Testing Storyboard

      2. Disaster Recovery Test Plan Template – A template to document your organization's DR test plan.

      Use this template to document scope and goals, participants, key pre-test milestones, the test-day schedule, and your findings from the testing exercise.

      • Disaster Recovery Test Plan Template

      3. Disaster Recovery Testing Program Summary – A template to outline your organization's DR testing program.

      Identify the tests you will run over the next year and the expertise, governance, process, and funding required to support testing.

      • Disaster Recovery Testing Program Summary

      [infographic]

       

      Further reading

      Take a Realistic Approach to Disaster Recovery Testing

      Reduce costly downtime with a right-sized testing program that improves IT resilience.

      Analyst Perspective

      Reduce costly downtime with a right-sized testing program that improves IT resilience.

      Andrew Sharp

      Most businesses make significant investments in disaster recovery and technology resilience. Redundant sites and systems, monitoring, intrusion prevention, backups, training, documentation: it all costs time and money.

      But does this investment deliver expected value? Specifically, can you deliver service continuity in a way that meets business requirements?

      You can’t know the answer without regularly testing recovery processes and systems. And more than just validation, testing helps you deliver service continuity by finding and addressing gaps in your plans and training your staff on recovery procedures.

      Use the insights, tools, and templates in this research to create a streamlined and effective resilience testing program that helps validate recovery capabilities and enhance service reliability, availability, and continuity.

      Andrew Sharp

      Research Director, Infrastructure & Operations
      Info-Tech Research Group

      Executive Summary

      Your Challenge

      You have made significant investments in availability and disaster recovery (DR) – but your ability to recover hasn’t been tested in years. Testing will:

      • Improve your DR capabilities.
      • Identify required changes to planning documentation and procedures.
      • Validate DR capabilities for interested customers and auditors.

      Common Obstacles

      Despite the value testing can offer, actually executing on DR tests is difficult because:

      • Testing is often an IT-driven initiative, and it can be difficult to secure business buy-in to redirect resources away from other urgent projects or accept risks that come with testing.
      • Previous tests have been overly complex and challenging to coordinate and leave a hangover so bad that no one wants to do them again.

      Info-Tech's Approach

      Take a realistic approach to resilience testing by starting with small, low-risk tests, then iterating with the lessons you’ve learned:

      • Identify testing scenarios and scope that can deliver value to your organization.
      • Create practical test plans with Info-Tech’s template.
      • Get buy-in for regular DR testing from key stakeholders with a testing program summary.

      Info-Tech Insight

      If you treat testing as a pass/fail exercise, you aren’t meeting the end goal of improving organizational resilience. Focus on identifying gaps and risks so you can address them before a real disaster hits.

      Process and Outputs

      This research is accompanied by templates to help you achieve your goals faster.

      1 - Establish the business rationale for DR testing.
      2 - Review a range of options for testing.
      3 - Prioritize tests that are most valuable to your business.
      4 - Create a disaster recovery test plan.
      5 - Establish a Test Program to support a regular testing cycle.

      Outputs:

      DR Test Plan
      DR Testing Program Summary

      Example Orange Activity slide.
      Orange activity slides like the one on the left provide directions to help you make key decisions.

      Key Deliverable:

      Disaster Recovery Test Plan Template

      Build a plan for your first disaster recovery test.

      This document provides a complete example you can use to quickly build your own plan, including goals, milestones, participants, the test-day schedule, and findings from the after-action review.

      Why test?

      Testing helps you avoid costly downtime

      • In a disaster scenario, speed matters. Immediately after an outage, the impact on the organization is small, but impact increases rapidly the longer the outage continues.
      • A quick and reliable response and recovery can protect the organization from significant losses.
      • A DRP testing and maintenance program helps ensure you’re ready to recover when you need to, rather than figuring it out as you go.

      “Routine testing is vital to survive a disaster… that’s when muscle memory sets in. If you don’t test your DR plan it falls [in importance], and you never see how routine changes impact it.”

      – Jennifer Goshorn
      Chief Administrative Officer
      Gunderson Dettmer LLP

      Info-Tech members estimated even one day of system downtime could lead to significant revenue losses. Estimated loss of revenue over 24 hours. Core Infrastructure has the highest potential for lost revenue.

      Average estimated potential loss* in thousands of USD due to a 24-hour outage (N=41)

      *Data aggregated from 41 business impact analyses (BIAs) conducted with Info-Tech advisory assistance. BIAs evaluate potential revenue loss due to a full day of system downtime, at the worst possible time.

      Run tests to enhance disaster recovery plans

      Testing improves organizational resilience

      • Identify and address gaps in your plans before a real disaster strikes.
      • Cross-train staff on systems recovery.
      • Go beyond testing technology to test recovery processes.
      • Establish a culture that centers resilience in everyday decision-making.

      Testing keeps DR documentation ready for action

      • Update documentation ahead of tests to prepare for the testing exercise.
      • Update documentation after testing to incorporate any lessons learned.

      Testing validates that investments in resilience deliver value

      • Confirm your organization can meet defined recovery time objectives (RTOs) and recovery point objectives (RPOs).
      • Provide proof of testing for auditors, prospective customers, and insurance applications

      Overcome testing challenges

      Despite the value of effective recovery testing, most IT organizations struggle to test recovery plans

      Common challenges

      • Key resources don’t have time for testing exercises.
      • You don’t have the technology to support live recovery testing.
      • Tests are done ad hoc and lessons learned are lost.
      • A lack of business support for test exercises as the value isn’t understood.
      • Tests are always artificially simple because RTOs and RPOs must be met to satisfy customer or auditor inquiries

      Overcome challenges with a realistic approach:

      • Start small with tabletop and recovery tests for specific systems.
      • Include recovery tests in operational tasks (e.g. restore systems when you have a maintenance window).
      • Create testing plans for larger testing exercises.
      • Build on successful tests to streamline testing exercises in the future.
      • Don’t make testing a pass-fail exercise. Focus on identifying gaps and risks so you can address them before a real disaster hits.

      Go beyond traditional testing

      Different test techniques help validate recovery against different threats

      • There are many threats to service continuity, including ransomware, severe weather events, geopolitical conflict, legacy systems, staff turnover, and day-to-day outages caused by human error, software updates, hardware failures, or network outages.
      • At its core, disaster recovery planning is about recovery. A plan for service recovery will help you mitigate against many threats at once. The testing approaches on the right will help you validate different aspects of that recovery process.
      • This research will provide an overview of the approaches outlined on the right and help you prioritize tests that are most valuable to your organization.
      Different test techniques for disaster recover training: System Failover tests, tabletop exercises, ransomware recovery tests, etc.

      00 Identify a working group

      30 minutes

      Identify a group of participants who can fill the following roles and inform the discussions around testing in this research. A single person could fill multiple roles and some roles could be filled by multiple people. Many participants will be drawn from the larger DRP team.

      Roles and expectations for Disaster Recovery Planning. DRP sponsor, Testing coordinator, System testers, business liaisons, executive team.

      Input

      • Organizational context

      Output

      • A list of key participants for test planning and execution

      Participants

      • Typically, start by identifying the sponsor and coordinator and have them identify the other members of the working group.

      Start by updating your disaster recovery plan (DRP)

      Use Info-Tech’s Create a Right-Sized Disaster Recovery Plan research to identify recovery objectives based on business impact and outline recovery processes. Both are tremendously valuable inputs to your test plans.

      Overall Business Continuity Plan

      IT Disaster Recovery Plan

      A plan to restore IT services (e.g. applications and infrastructure) following a disruption. A DRP:

      • Identifies critical applications and dependencies.
      • Defines appropriate recovery objectives based on a business impact analysis (BIA).
      • Creates a step-by-step incident response plan.

      BCP for Each Business Unit

      A set of plans to resume business processes for each business unit. A business continuity plan (BCP) is also sometimes called a continuity of operations plan (COOP).

      BCPs are created and owned by each business unit, and creating a BCP requires deep involvement from the leadership of each business unit.

      Info-Tech’s Develop a Business Continuity Plan blueprint provides a methodology for creating business unit BCPs as part of an overall BCP for the organization.

      Crisis Management Plan

      A plan to manage a wide range of crises, from health and safety incidents to business disruptions to reputational damage.

      Info-Tech’s Implement Crisis Management Best Practices blueprint provides a framework for planning a response to any crisis, from health and safety incidents to reputational damage.

      01 Confirm: why test at all?

      15-30 minutes

      Identify the value recovery testing for your organization. Use language appropriate for a nontechnical audience. Start with the list below and add, modify, or delete bullet points to reflect your own organization.

       

      Drivers for testing – Examples:

       

      • Improve service continuity.
      • Identify and address gaps in recovery plans before a real disaster strikes.
      • Cross-train staff on systems recovery to minimize single points of failure.
      • Identify how we coordinate across teams during a major systems outage.
      • Exercise both recovery processes and technology.
      • Support a culture that centers system resilience in everyday decision-making.
      • Keep recovery documentation up-to-date and ready for action.
      • Confirm that our stated recovery objectives can be met.
      • Provide proof of testing for auditors, prospective customers, and insurance applications.
      • We require proof of testing to pass audits and renew cybersecurity insurance.

      Info-Tech Insight

      Time-strapped technical staff will sometimes push back on planning and testing, objecting that the team will “figure it out” in a disaster. But the question isn’t whether recovery is possible – it’s whether the recovery aligns with business needs. If your plan is to “MacGyver” a solution on the fly, you can’t know if it’s the right solution for your organization.

      Input

      • Business drivers and context for testing

      Output

      • Specific goals that are driving testing

      Participants

      • DR sponsor
      • Test coordinator

      Think about what and how you test

      Different layers of the stack to test: Network, Authentication, compute and storage, visualization platforms, database services, middleware, app servers, web servers.

      Find gaps and risks with tabletop testing

      Tabletop planning had the greatest impact on meeting recovery objectives (RTOs/RPOs).

      In a tabletop planning exercise, the team walks through a disaster scenario to outline the recovery workflow, and risks or gaps that could disrupt that workflow.

      Tabletops are particularly effective because:

      • It enables you to play out a wider range of scenarios than technology-based testing (e.g. full-scale, parallel) due to cost and complexity factors.
      • It is non-intrusive, so it can be executed more easily than other testing methodologies.
      • The exercise translates into recovery documentation: you create a workflow as you go.
      • A major site or service recovery scenario will review all aspects of the recovery process and create the backbone of your recovery plan.

      02 Run a tabletop exercise

      2 hours

      Tabletop testing is part of our core DRP methodology, Create a Right-Sized Disaster Recovery Plan. This exercise can be run using cue cards, sticky notes, or on a whiteboard; many of our facilitators find building the workflow directly in flowchart software to be very effective.

      Use our Recovery Workflow Template as a starting point.

      Some tips for running your first tabletop exercise:

      Do

      • Review the complete workflow from notification all the way to user acceptance testing.
      • Keep focused; stay on task and on time.
      • Revisit each step and record gaps and risks (and known solutions, but don’t dwell on this).
      • Revise and improve the plan with task owners.

      Don't

      • Get weighed down by tools.
      • Try to find solutions to every gap/risk as you go. Save in-depth research/discussion for later.
      • Document the details right away – stick to the high-level plan for the first exercise.
      1. Ahead of the exercise, decide on a scenario, identify participants, and book a meeting time.
        • For your first walkthrough of a DR scenario, we often recommend a scenario that considers a site failure requiring failover to a DR site.
        • For the first exercise, focus on technical aspects of recovery before bringing in members of the business. The technical team may need space to discuss the appropriate steps in the recovery process before you bring in business liaisons to discuss user acceptance testing (UAT).
        • A complete failover considers all systems, the viability of your second site, and can help identify parts of the process that require additional exercises.
      2. Review the scenario with participants. Then, discuss and document the recovery process, starting with initial notification of an event.
        • Record steps in the process on white cards or boxes.
        • On yellow and red cards, document gaps and risks in people process and technology requirements.
      3. Once you’ve walked through the process, return to the start.
        • Record the time required to complete each step. Consider identifying who is responsible for key steps. Identify any additional gaps and risks.
      4. Clean up and record the results of the workflow. Save a copy with your DRP documentation.

      Input

      • Expert knowledge on systems recovery

      Output

      • Recovery workflow, including gaps and risks

      Participants

      • Test coordinator
      • Technical SMEs

      Move from tabletop testing to functional exercises

      See how your plans fare in the real world

      In live exercises, some portion of your recovery plans are executed in a way that mimics a real recovery scenario. Some advantages of live testing:

      • See how standby systems behave. A tabletop exercise can miss small issues that can make or break the recovery process. For example, connectivity or integration issues on a new subnet might be difficult to predict prior to actually running services in that environment.
      • Hands-on practice: Familiarize the team with the steps, commands, and interfaces of your recovery toolset.
      • Manage the pressure of the DR scenario: Nothing’s quite like the real thing, but a live exercise may be the closest your team can get to a disaster situation without experiencing it firsthand.

      Examples of live exercises

      Boot and smoke test Turn on a standby system and confirm it boots up correctly.
      Restore and validate data Restore data or servers from backup. Confirm data integrity.
      Parallel testing Send familiar transactions to production and standby systems. Confirm both systems produce the same result.
      Failover systems Shut down the production system and use the standby system in production.

      Run local tests ahead of releases

      Think small

      Most unacceptable downtime is caused by localized issues, such as hardware or software failures, rather than widespread destructive events. Regular local testing can help validate the recovery plan for local issues and improve overall service continuity.

      Make local testing a standard step in maintenance work and new deployments to embed resilience considerations in day-to-day activities. Run the same tests in both your primary and your DR environment.

      Some examples of localized tests:

      • Review backup logs and check for errors.
      • Restore files or whole systems from backup.
      • Run application-based tests as part of release management, including unit, regression, and performance tests.
        • Ensure application tests are run for both the primary and DR environment.
        • For a deep-dive on application testing, see Info-Tech’s research Automate Testing to Get More Done.

      Info-Tech Insight

      Local tests will vary between different services, and local test design is usually best left to the system SMEs. At the same time, centralize reporting to understand where tests are being done.

      Investigate whether your IT Service Management or ticketing system can create recurring tasks or work orders to schedule, document, and track test exercises. Tasks can be pre-populated with checklists and documentation to support the test and provide a record of completed tests to support oversight and reporting.

      Have the business validate recovery

      If your business doesn’t think a system’s recovered, it’s not recovered.

      User acceptance testing (UAT) after system recovery is a key step in the recovery process. Like any step in the process, there’s value in testing it before it actually needs to be done. Assign responsibility for building UATs to the person who will be responsible for executing them.

      An acceptance test script might look something like the checklist below.

      • Does the application open?
      • Does the interface look right?
      • Do you see any unusual notifications or warnings?
      • Can you conduct a key transaction with dummy data?
      • Can you run key reports?

      “I cannot stress how important it is to assign ownership of responsibilities in a test; this is the only way to truly mitigate against issues in a test.”

      – Robert Nardella
      IT Service Management
      Certified z/OS Mainframe Professional

      Info-Tech Insight

      Build test scripts and test transactions ahead of time to minimize the amount of new work required during a recovery scenario.

      Beyond the Basics: Full Failover Testing

      • A failover test – a full failover of your production environment to a secondary environment – is what many IT and businesspeople think about when they think of disaster recovery testing.
      • A full test can validate previous local or tabletop tests, identify additional gaps and risks, and provide hands-on training experience with recovery processes and technologies.
      • Setting a date for failover testing can also inject some urgency into otherwise low-priority (but high importance) disaster recovery planning and documentation exercises, which need to be completed prior to the test.
      • Despite these benefits, full failover tests carry significant risk and require a great deal of effort and cost. Typically, only businesses that already have an active-active environment capable of supporting in-scope production systems are able to run a full environment failover.
      • This is especially true the first time you test. While in theory a DR plan should be ready to go at any time, there will be documents to update, gaps to address, and risks to mitigate before you go ahead with the test.

      Full Failover Testing

      What you get:

      • Provide hands-on experience with recovery processes and technology.
      • Confirm that site failover works in practice as you assumed in tabletop or local testing exercises.
      • Identify critical gaps you might have missed without a full failover test.

      What you need:

      • An active-active secondary site, with sufficient standby equipment, data, and licensed standby software to support production.
      • A completed tabletop exercise and documented recovery workflow.
      • A documented test plan, backout plan, and formal sign-off.
      • An off-hours downtime window.
      • Time from technical SMEs and business resources, both for creating the plan and executing the test.

      Beyond the Basics: Site Reliability Engineering

      • Site reliability engineering (SRE) is an application of skills and approaches from software engineering to improve system resilience.
      • SRE is focused on “availability, latency, performance, efficiency, change management, monitoring, emergency response, and capacity planning” across a set portfolio of services (Sloss, 2017).
      • In many organizations, SRE is implemented as a team that supports separate applications teams.
      • Applications must have defined and granular resilience requirements, translated into service objectives. The SRE team and applications teams will work together to meet these objectives.
      • Site reliability engineers (the folks that do SRE, and often also abbreviated as SREs) are expected to build solutions and processes to ensure services remain stable and performant, not just respond when they fail. For example, Google allows their SREs to spend just half their time on incident response, with the rest of their time focused on development and automation tasks.

      Site Reliability Testing

      What you get:

      • Improved reliability and reduced frequency and impact of downtime.
      • Increased use of automation to address problems before they cause an incident.
      • Granular resilience objectives.

      What you need:

      • Systems running on software-defined infrastructure.
      • Specialized skills in programming, infrastructure-as-code.
      • Business & product owners able to define and fund acceptable and appropriate resilience objectives.
      • Technical experts able to translate product requirements into technical design requirements.

      Beyond the Basics: Chaos Engineering

      • Chaos engineering, a term and approach first popularized by the team at Netflix, aims to improve the resilience of particularly large and distributed systems by simulating system failures and evaluating performance against a baseline.
      • Experiments simulate a variety of real-world events that could cause outages (e.g. network slowdowns or server failures). Experiments run continuously, and the recommendation is to run them in production where feasible while minimizing the impact on customers.
      • Tools to help you run chaos testing exist, including open-source toolkits like Chaos Monkey or Mangle and paid software as a service (SaaS) solutions like Gremlin.
      • Deciding whether the long-term benefits of tests that can degrade production are worth the potential risk of system slowdowns or outages is a business or product decision. Technical considerations aside, if the business owner of a particular system doesn’t see the value of continuous testing outweighing the introduced risk, this approach to testing isn’t going to happen.

      Chaos Engineering

      What you get:

      • Confidence that systems can weather volatile and unpredictable conditions in a production environment.
      • An embedded resilience culture.

      What you need:

      • High-maturity IT incident, monitoring and event practices.
      • Standby/resilient systems to minimize downtime impact.
      • Business buy-in for introducing risk into the production environment.
      • Specialized skills to identify, develop, and run tests that degrade production performance in a controlled way.
      • Budget and time to act on issues identified through testing.

      Beyond the Basics: Security Event Simulations

      • Ransomware is driving demands for proof of recovery testing from customers, executives, auditors, and insurance companies. Systems recovery is part of ransomware recovery, but recovering from a breach includes detection, analysis, containment, and eradication of the attack vector before systems recovery can begin.
      • Beyond technical recovery, internal legal and communications teams will have a role, as will your insurance provider, consultants specialized in ransomware recovery, or professional ransom negotiators.
      • A tabletop exercise focused on ransomware incident response is a key first step. You can find Info-Tech’s methodology for a ransomware tabletop in Phase 3 of Build Resilience Against Ransomware Attacks.
      • Live testing approaches can offer hands-on experience and further insight into how your systems are vulnerable to malware. A variety of open source and proprietary tools can simulate ransomware and help you identify problems, though it’s important to understand the limitations of different simulators (Allon, 2022).
      • A “red team” exercise simulates an adversarial attack against your processes and systems. A specialized penetration tester will often take on the role of the red team and provide a report of identified gaps and risks after the engagement.

      Security Event Simulation

      What you get:

      • Hands-on experience managing and recovering from a ransomware attack in a controlled environment.
      • A better understanding of gaps in your response process.

      What you need:

      • A completed ransomware tabletop exercise and mature security incident response processes.
      • For Ransomware Simulators: An air-gapped sandbox environment hosting a copy of your production systems and security tools, and time from your technical SMEs.
      • For Red Team Exercises: A trusted provider, scope for your testing plans, and time from your security incident response team.

      Prioritize tests by asking these three questions

      1. Will the scope of this test deliver sufficient value?

      • Yes, these are critical systems with low tolerance for downtime or data loss.
      • Yes, major changes or new systems require validation of DR capabilities.
      • Yes, there’s high probability of an outage, or recent experience of an outage.
      • •Yes, we have audit requirements or customer demands for testing.

      2. Are we ready for this test?

      • Yes, recovery plans and recovery objectives are documented.
      • Yes, key technical and business resources have time to commit to testing exercises.
      • Yes, technology is currently able to support proposed tests.

      3. Is it easy to do?

      • Yes, effort required to complete the test is low (i.e. minimal work, few participants).
      • Yes, the risks related to testing are low.
      • Yes, it won’t cost much.

      Info-Tech Insight

      More complex, challenging, risky, or costly tests, such as full failover tests, can deliver value. But do the high-value, low-effort stuff first!

      03 Brainstorm and prioritize test ideas

      30-60 minutes

      Even if you have an idea of what you need to test and how you want to run those tests, this brainstorming exercise can generate useful ideas for testing that might otherwise have been missed.

        1. Review the slides above to develop ideas on how and what you want to test. These slides may be enough to kickstart a brainstorming process. Don’t debate or discount ideas at this point. Write down these ideas in a space where all participants can see them (e.g. whiteboard or shared screen).

      The next steps will help you prioritize the list – if needed – to tests that are highest value and lowest effort.

      1. Discuss where you have the greatest need to test. Assign a score of 0 – 3 for each test, with a score of 3 being high-need and a score of zero being low-need. Consider whether:
        • These applications have a low tolerance for downtime.
        • There’s a high chance of an outage, or recent experience with an outage.
        • There’s a need to train or cross-train staff on recovery for the system(s) in question.
        • Major changes require a review or validation of DR capabilities.
        • Audit requirements or customer/executive demands can be met via testing.
      2. Discuss which tests will require the least effort to complete – where readiness is high and tests are easier to do. Assign a score between 0 and 3 for each test, with a score of 3 being least effort and a score of 0 being high effort. Consider whether:
        • Recovery plans and recovery objectives are documented for these systems.
        • Technical experts are available to work on testing exercises.
        • For active testing, standby/sandbox systems are available and capable of supporting proposed tests.
        • The effort required to complete the test is low (e.g. minimal new work, few participants).
        • The risks related to testing are low.
        • You will need to secure additional funding.
      3. Sum together the assigned scores for each test. Higher scores should be the highest priority, but of course use your judgement to validate the results and select one or two tests to execute in the coming year.

      “There are different levels of testing and it is very progressive. I do not recommend my clients to do anything, unless they do it in a progressive fashion. Don’t try to do a live failover test with your users, right out of the box.”

      – Steve Tower
      Principal Consultant
      Prompta Consulting Group

      Input

      • Organizational and technical context

      Output

      • Prioritize list of DR testing ideas

      Participants

      • DR sponsor
      • Test coordinator

      04 Build a test plan

      3-5 days

      Building a test plan helps the test run smoothly and can uncover issues with the underlying DRP as you dig into the details.

      The test coordinator will own the plan document but will rely on the sponsor to confirm scope and goals, technical SMEs to develop system recovery plans, and business liaisons to create UAT scripts.

      Download Info-Tech’s Disaster Recovery Test Plan Template. Use the structure of the template to build your own document, deleting example data as you go. Consider saving a separate copy of this document as an example and working from a second copy.

      Key sections of the document include:

      • Goals, scenario, and scope of the test.
      • Assumptions, constraints, risks, and mitigation strategies.
      • Test participants.
      • Key pre-test milestones, and test-day schedule.
      • After-action review.

      Download the Disaster Recovery Test Plan Template

      Input

      • Scope
      • High-level goals

      Output

      • Test plan, including goals, scope, key milestones, risks and mitigations, and test-day schedule

      Participants

      • Test coordinator develops the plan with support from:
        • Technical SMEs
        • Business liaisons
        • DR sponsor

      05 Run an after-action review

      30-60 minutes

      Take time after test exercises – especially large-scale tests with many participants – to consider what went well, what didn’t, and where you can improve future testing exercises. Track lessons learned and next steps at the bottom of your test plan.

      1. Start with a short (5-10 minute) debrief of the test and allow participants to ask questions. Confirm:
        • Did we meet the goals we set for the exercise, including RTOs and RPOs?
        • What was done well? What issues, gaps, and risks were identified?
      2. Work through variations of the following questions:
        • Was the test plan effective, and was the test well organized?
        • Was the documentation effective? Where did we follow the plan as documented, and where did we deviate from the plan?
        • Was our communication/collaboration during the test effective?
        • Have gaps and issues found during the test been reported to the testing coordinator? Could some of the issues uncovered apply more broadly to other IT services as well?
        • What could we test next, based on what was discovered?
        • Are there other tools or approaches that could be useful?

      Input

      • Insights and experience from a recent testing exercise

      Output

      • Identified gaps and risks, and action items to address them
      • Ideas to improve future test exercises

      Participants

      • Test coordinator develops the plan with support from:
        • Test coordinator
        • Test participants

      Follow a testing cycle

      All tests are expected to drive actions to improve resilience, as appropriate. Experience from previous tests will be applied to future testing exercises.

      The testing cycle: 1. Plan a test, 2. Run test, 3. Take action.

      Use your experience to simplify testing

      The fifth testing exercise should be easier than the first

      Outputs and lessons learned from testing should help you run future tests.

      • With past experience under their belt, participants should have a better understanding of their role, and of their peers’ roles, and the goal of the exercise.
      • Facilitators will be more comfortable facilitating the exercise, and everyone should be more confident in the steps required to recover their systems.
      • Gather feedback from participants through after-action reviews to identify what worked and what didn’t.
      • Documentation from previous tests can provide a template for future tests.
      • Gaps identified in previous tests can provide ideas for future tests.

      Experience, lessons learned, improved process, new test targets, repeat.

      Info-Tech Insight

      Testing should get easier over time. But if you’re easily passing every test, it’s a sign that you’re ready to run more challenging tests.

      06 Create a test program summary

      2-4 hours

      Regular testing allows you to build on prior tests and helps keep plans current despite changes to your environment.

      Keeping a regular testing schedule requires expertise, a process to coordinate your efforts, and a level of governance to provide oversight and ensure testing continues to deliver value. Create a call to action using Info-Tech’s Disaster Recovery Testing Program Summary Template.

      The result is a summary document that:

      • Identifies key takeaways and testing goals
      • Presents key elements of the testing program
      • Outlines the testing cycle
      • Lists expected milestones for the next year
      • Identifies participants
      • Recommends next steps

      “It is extremely important in the early stages of development to concentrate the focus on actual recoverability and data protection, enhancing these capabilities over time into a fully matured program that can truly test the recovery, and not simply focusing on the testing process itself.”

      – Joe Starzyk
      Senior Business Development Executive
      IBM Global Services

      Research Contributors and Experts

      • Bernard A. Jones, Business Continuity & Disaster Recovery Expert
      • Robert Nardella, IT Service Management, Certified z/OS Mainframe Professional
      • Larry Liss, Chief Technology Officer, Blank Rome LLP
      • Jennifer Goshorn, Chief Administrative and Chief Compliance Officer, Gunderson Dettmer LLP
      • Paul Kirvan, FBCI, CISA, Independent IT Consultant/Auditor, Paul Kirvan Associates
      • Steve Tower, Principal Consultant, Prompta Consulting Group
      • Joe Starzyk, Senior Business Development Executive, IBM Global Services
      • Thomas Bronack, Enterprise Resiliency and Corporate Certification Consultant, DCAG
      • Paul S. Randal, CEO & Owner, SQLskills.com
      • Tom Baumgartner, Disaster Recovery Analyst, Catholic Health

      Bibliography

      Alton, Yoni. “Ransomware simulators – reality or a bluff?” Palo Alto Blog, 2 May 2022. Accessed 31 Jan 2023.
      https://www.paloaltonetworks.com/blog/security-operations/ransomware-simulators-reality-or-a-bluff/

      Brathwaite, Shimon. “How to Test your Business Continuity and Disaster Recovery Plan,” Security Made Simple, 13 Nov 2022. Accessed 31 Jan 2023.
      https://www.securitymadesimple.org/cybersecurity-blog/how-to-test-your-business-continuity-and-disaster-recovery-plan

      The Business Continuity Institute. Good Practice Guidelines: 2018 Edition. The Business Continuity Institute, 2017.

      Emigh, Jacqueline. “Disaster Recovery Testing: Ensuring Your DR Plan Works,” Enterprise Storage Forum, 28 May 2019. Accessed 31 Jan 2023.
      Disaster Recovery Testing: Ensuring Your DR Plan Works | Enterprise Storage Forum

      Gardner, Dana. "Case Study: Strategic Approach to Disaster Recovery and Data Lifecycle Management Pays off for Australia's SAI Global." ZDNet. BriefingsDirect, 26 Apr 2012. Accessed 31 Jan 2023.
      http://www.zdnet.com/article/case-study-strategic-approach-to-disaster-recovery-and-data-lifecycle-management-pays-off-for-australias-sai-global/.

      IBM. “Section 11. Testing the Disaster Recovery Plan.” IBM, 2 Aug 2021. Accessed 31 Jan 2023. Section 11. Testing the disaster recovery plan - IBM Documentation Lutkevich, Ben and Alexander Gillis. “Chaos Engineering”. TechTarget, Jun 2021. Accessed 31 Jan 2023.
      https://www.techtarget.com/searchitoperations/definition/chaos-engineering

      Monperrus, Martin. “Principles of Antifragility.” Arxiv Forum, 7 June 2017. Accessed 31 Jan 2023.
      https://arxiv.org/ftp/arxiv/papers/1404/1404.3056.pdf

      “Principles of Chaos Engineering.” Principles of Chaos Engineering, 2019 March. Accessed 31 Jan 2023.
      https://principlesofchaos.org/

      Sloss, Benjamin Treynor. “Introduction.” Site Reliability Engineering. Ed. Betsy Beyer. O’Reilly Media, 2017. Accessed 31 Jan 2023.
      https://sre.google/sre-book/introduction/

      Build a Security Compliance Program

      • Buy Link or Shortcode: {j2store}257|cart{/j2store}
      • member rating overall impact: 9.6/10 Overall Impact
      • member rating average dollars saved: $23,879 Average $ Saved
      • member rating average days saved: 15 Average Days Saved
      • Parent Category Name: Governance, Risk & Compliance
      • Parent Category Link: /governance-risk-compliance
      • Most organizations spend between 25 and 40 percent of their security budget on compliance-related activities.
      • Despite this growing investment in compliance, only 28% of organizations believe that government regulations help them improve cybersecurity.
      • The cost of complying with cybersecurity and data protection requirements has risen to the point where 58% of companies see compliance costs as barriers to entering new markets.
      • However, recent reports suggest that while the costs of complying are higher, the costs of non-compliance are almost three times greater.

      Our Advice

      Critical Insight

      • Test once, attest many. Having a control framework allows you to satisfy multiple compliance requirements by testing a single control.
      • Choose your own conformance adventure. Conformance levels allow your organization to make informed business decisions on how compliance resources will be allocated.
      • Put the horse before the cart. Take charge of your audit costs by preparing test scripts and evidence repositories in advance.

      Impact and Result

      • Reduce complexity within the control environment by using a single framework to align multiple compliance regimes.
      • Provide senior management with a structured framework for making business decisions on allocating costs and efforts related to cybersecurity and data protection compliance obligations.
      • Reduces costs and efforts related to managing IT audits through planning and preparation.
      • This blueprint can help you comply with NIST, ISO, CMMC, SOC2, PCI, CIS, and other cybersecurity and data protection requirements.

      Build a Security Compliance Program Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you should manage your security compliance obligations, review Info-Tech’s methodology, and understand the ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      Infographic

      Workshop: Build a Security Compliance Program

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Establish the Program

      The Purpose

      Establish the security compliance management program.

      Key Benefits Achieved

      Reviewing and adopting an information security control framework.

      Understanding and establishing roles and responsibilities for security compliance management.

      Identifying and scoping operational environments for applicable compliance obligations.

      Activities

      1.1 Review the business context.

      1.2 Review the Info-Tech security control framework.

      1.3 Establish roles and responsibilities.

      1.4 Define operational environments.

      Outputs

      RACI matrix

      Environments list and definitions

      2 Identify Obligations

      The Purpose

      Identify security and data protection compliance obligations.

      Key Benefits Achieved

      Identifying the security compliance obligations that apply to your organization.

      Documenting obligations and obtaining direction from management on conformance levels.

      Mapping compliance obligation requirements into your control framework.

      Activities

      2.1 Identify relevant security and data protection compliance obligations.

      2.2 Develop conformance level recommendations.

      2.3 Map compliance obligations into control framework.

      2.4 Develop process for operationalizing identification activities.

      Outputs

      List of compliance obligations

      Completed Conformance Level Approval forms

      (Optional) Mapped compliance obligation

      (Optional) Identification process diagram

      3 Implement Compliance Strategy

      The Purpose

      Understand how to build a compliance strategy.

      Key Benefits Achieved

      Updating security policies and other control design documents to reflect required controls.

      Aligning your compliance obligations with your information security strategy.

      Activities

      3.1 Review state of information security policies.

      3.2 Recommend updates to policies to address control requirements.

      3.3 Review information security strategy.

      3.4 Identify alignment points between compliance obligations and information security strategy.

      3.5 Develop compliance exception process and forms.

      Outputs

      Recommendations and plan for updates to information security policies

      Compliance exception forms

      4 Track and Report

      The Purpose

      Track the status of your compliance program.

      Key Benefits Achieved

      Tracking the status of your compliance obligations.

      Managing exceptions to compliance requirements.

      Reporting on the compliance management program to senior stakeholders.

      Activities

      4.1 Define process and forms for self-attestation.

      4.2 Develop audit test scripts for selected controls.

      4.3 Review process and entity control types.

      4.4 Develop self-assessment process.

      4.5 Integrate compliance management with risk register.

      4.6 Develop metrics and reporting process.

      Outputs

      Self-attestation forms

      Completed test scripts for selected controls

      Self-assessment process

      Reporting process

      Recommended metrics

      Essentials of Vendor Management for Small Business

      • Buy Link or Shortcode: {j2store}229|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Vendor Management
      • Parent Category Link: /vendor-management
      • Each year, SMB IT organizations spend more money “outsourcing” tasks, activities, applications, functions, and other items.
      • Many SMBs lack the affordability of implementing a sophisticated vendor management initiative or office.
      • The increased spend and associated outsourcing leads to less control, and more risk for IT organizations. Managing this becomes a higher priority for IT, but many IT organizations are ill-equipped to do this proactively.

      Our Advice

      Critical Insight

      • Vendor management is not “plug and play” – each organization’s vendor management initiative (VMI) needs to fit its culture, environment, and goals. There are commonalities among vendor management initiatives, but the key is to adapt vendor management principles to fit your needs, not the other way around.
      • All vendors are not of equal importance to an organization. Internal resources are a scarce commodity and should be deployed so that they provide the best return on the organization’s investment. Classifying or segmenting your vendors allows you to focus your efforts on the most important vendors first, allowing your VMI to have the greatest impact possible.
      • Having a solid foundation is critical to the VMI’s ongoing success. Whether you will be creating a formal vendor management office or using vendor management techniques, tools, and templates “informally”, starting with the basics is essential. Make sure you understand why the VMI exists and what it hopes to achieve, what is in and out of scope for the VMI, what strengths the VMI can leverage and the obstacles it will have to address, and how it will work with other areas within your organization.

      Impact and Result

      • Build and implement a vendor management initiative tailored to your environment.
      • Create a solid foundation to sustain your vendor management initiative as it evolves and matures.
      • Leverage vendor management-specific tools and templates to manage vendors more proactively and improve communication.
      • Concentrate your vendor management resources on the right vendors.
      • Build a roadmap and project plan for your vendor management journey to ensure you reach your destination.
      • Build collaborative relationships with critical vendors.

      Essentials of Vendor Management for Small Business Research & Tools

      Start here – read the Executive Brief

      Read this Executive Brief to understand how changes in the vendor landscape and customer reliance on vendors have made a vendor management initiative indispensible.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Plan

      This phase helps you organize your VMI and document internal processes, relationships, roles, and responsibilities. The main outcomes from this phase are organizational documents, a baseline VMI maturity level, and a desired future state for the VMI.

      • Essentials of Vendor Management for Small Business – Phase 1: Plan
      • Phase 1 Small Business Tools and Templates Compendium

      2. Build

      This phase helps you configure and create the tools and templates that will help you run the VMI. The main outcomes from this phase are a clear understanding of which vendors are important to you, the tools to manage the vendor relationships, and an implementation plan.

      • Essentials of Vendor Management for Small Business – Phase 2: Build
      • Phase 2 Small Business Vendor Classification Tool
      • Phase 2 Small Business Risk Assessment Tool
      • Phase 2 Small Business Tools and Templates Compendium

      3. Run

      This phase helps you begin operating the VMI. The main outcomes from this phase are guidance and the steps required to implement your VMI.

      • Essentials of Vendor Management for Small Business – Phase 3: Run

      4. Review

      This phase helps the VMI identify what it should stop doing, start doing, and continue doing as it improves and matures. The main outcomes from this phase are ways to advance the VMI and maintain internal alignment.

      • Essentials of Vendor Management for Small Business – Phase 4: Review
      [infographic]

      Further reading

      Essentials of Vendor Management for Small Business

      Create and implement a vendor management framework to begin obtaining measurable results in 90 days.


      EXECUTIVE BRIEF

      Analyst Perspective

      Vendor Management Challenge

      Small businesses are often challenged by the growth and complexity of their vendor ecosystem, including the degree to which the vendors control them. Vendors are increasing, obtaining more and more budget dollars, while funding for staff or headcount is decreasing as a result of cloud-based applications and an increase in our reliance on Managed Service Providers. Initiating a vendor management initiative (VMI) vs. creating a fully staffed vendor management office will get you started on the path of proactively controlling your vendors instead of consistently operating in a reactionary mode. This blueprint is designed with that very thought: to assist small businesses in creating the essentials of a vendor management initiative.

      This is a picture of Steve Jeffery

      Steve Jeffery
      Principal Research Director, Vendor Management
      Info-Tech Research Group

      Executive Summary

      Your Challenge

      Each year, IT organizations "outsource" tasks, activities, functions, and other items. During 2021:

      • Spend on as-a-service providers increased 38% over 2020.*
      • Spend on managed service providers increased 16% over 2020.*
      • IT service providers increased their merger and acquisition numbers by 47% over 2020.*

      This leads to more spend, less control, and more risk for IT organizations. Managing this becomes a higher priority for IT, but many IT organizations are ill-equipped to do this proactively.

      Common Obstacles

      As new contracts are negotiated and existing contracts are renegotiated or renewed, there is a perception that the contracts will yield certain results, output, performance, solutions, or outcomes. The hope is that these will provide a measurable expected value to IT and the organization. Oftentimes, much of the expected value is never realized. Many organizations don't have a VMI to help:

      • Ensure at least the expected value is achieved.
      • Improve on the expected value through performance management.
      • Significantly increase the expected value through a proactive VMI.

      Info-Tech's Approach

      Vendor Management is a proactive, cross-functional lifecycle. It can be broken down into four phases:

      • Plan
      • Build
      • Run
      • Review

      The Info-Tech process addresses all four phases and provides a step-by-step approach to configure and operate your VMI. The content in this blueprint helps you quickly establish your VMI and sets a solid foundation for its growth and maturity.

      Info-Tech Insight

      Vendor management is not a one-size-fits-all initiative. It must be configured:

      • For your environment, culture, and goals.
      • To leverage the strengths of your organization and personnel.
      • To focus your energy and resources on your critical vendors.

      Executive Summary

      Your challenge

      Spend on managed service providers and as-a-service providers continues to increase. In addition, IT services vendors continue to be active in the mergers and acquisitions arena. This increases the need for a VMI to help with the changing IT vendor landscape.

      38%

      2021

      16%

      2021

      47%

      2021

      Spend on as-a-service providers

      Spend on managed services providers

      IT services merger & acquisition growth (transactions)

      Source: Information Services Group, Inc., 2022.

      Executive Summary

      Common obstacles

      When organizations execute, renew, or renegotiate a contract, there is an "expected value" associated with that contract. Without a robust VMI, most of the expected value will never be realized. With a robust VMI, the realized value significantly exceeds the expected value during the contract term.

      A contract's realized value with and without a vendor management initiative

      This is an image of a bar graph showing the difference in value between those with and without a VMI, with and for those with a VMI, with Vendor Collaboration and with Vendor Performance Management. The data for those with a VMI have substantially more value.

      Source: Based on findings from Geller & Company, 2003.

      Executive Summary

      Info-Tech's approach

      A sound, cyclical approach to vendor management will help you create a VMI that meets your needs and stays in alignment with your organization as they both change (i.e. mature and grow).

      This is an image of the 4 Step Vendor Management Process. The four steps are: 1. Plan; 2. Build; 3. Run; 4. Review.

      Info-Tech's methodology for creating and operating your vmi

      Phase 1 - Plan Phase 2 - Build Phase 3 - Run Phase 4 - Review
      Phase Steps

      1.1 Mission Statement and Goals

      1.2 Scope

      1.3 Strengths and Obstacles

      1.4 Roles and Responsibilities

      2.1 Classification Model

      2.2 Risk Assessment Tool

      2.3 Scorecards and Feedback

      2.4 Business Alignment Meeting Agenda

      2.5 Relationship Alignment Document

      2.6 Vendor Orientation

      2.7 3-Year Roadmap

      2.8 90-Day Plan

      2.9 Quick Wins2.10 Reports

      3.1 Classify Vendors

      3.2 Compile Scorecards

      3.3 Conduct Business Alignment Meetings

      3.4 Work the 90-Day Plan

      3.5 Manage the 3-Year Roadmap

      3.6 Develop/Improve Vendor Relationships

      4.1 Incorporate Leading Practices

      4.2 Leverage Lessons Learned

      4.3 Maintain Internal Alignment

      Phase Outcomes This phase helps you organize your VMI and document internal processes, relationships, roles, and responsibilities. The main outcomes from this phase are organizational documents, a baseline VMI maturity level, and a desired future state for the VMI. This phase helps you configure and create the tools and templates that will help you run the VMI. The main outcomes from this phase are a clear understanding of which vendors are important to you, the tools to manage the vendor relationships, and an implementation plan. This phase helps you begin operating the VMI. The main outcomes from this phase are guidance and the steps required to implement your VMI. This phase helps the VMI identify what it should stop doing, start doing, and continue doing as it improves and matures. The main outcomes from this phase are ways to advance the VMI and maintain internal alignment.

      Insight Summary

      Insight 1

      Vendor management is not "plug and play" – each organization's vendor management initiative (VMI) needs to fit its culture, environment, and goals. While there are commonalities and leading practices associated with vendor management, your initiative won't look exactly like another organization's. The key is to adapt vendor management principles to fit your needs.

      Insight 2

      All vendors are not of equal importance to your organization. Internal resources are a scarce commodity and should be deployed so that they provide the best return on the organization's investment. Classifying or segmenting your vendors allows you to focus your efforts on the most important vendors first, allowing your VMI to have the greatest impact possible.

      Insight 3

      Having a solid foundation is critical to the VMI's ongoing success. Whether you will be creating a formal vendor management office or using vendor management techniques, tools, and templates "informally", starting with the basics is essential. Make sure you understand why the VMI exists and what it hopes to achieve, what is in and out of scope for the VMI, what strengths the VMI can leverage and the obstacles it will have to address, and how it will work with other areas within your organization.

      Blueprint benefits

      IT benefits

      • Identify and manage risk proactively.
      • Reduce costs and maximize value.
      • Increase visibility with your critical vendors.
      • Improve vendor performance.
      • Create a collaborative environment with key vendors.
      • Segment vendors to allocate resources more effectively and more efficiently.

      Business benefits

      • Improve vendor accountability.
      • Increase collaboration between departments.
      • Improve working relationships with your vendors.
      • Create a feedback loop to address vendor/customer issues before they get out of hand or are more costly to resolve.
      • Increase access to meaningful data and information regarding important vendors.

      Phase 1 - Plan

      Phase 1

      Phase 2 Phase 3 Phase 4

      1.1 Mission Statement and Goals

      1.2 Scope

      1.3 Strengths and Obstacles

      1.4 Roles and Responsibilities

      2.1 Classification Model

      2.2 Risk Assessment Tool

      2.3 Scorecards and Feedback

      2.4 Business Alignment Meeting Agenda

      2.5 Relationship Alignment Document

      2.6 Vendor Orientation

      2.7 3-Year Roadmap

      2.8 90-Day Plan

      2.9 Quick Wins

      2.10 Reports

      3.1 Classify Vendors

      3.2 Compile Scorecards

      3.3 Conduct Business Alignment Meetings

      3.4 Work the 90-Day Plan

      3.5 Manage the 3-Year Roadmap

      3.6 Develop/Improve Vendor Relationships

      4.1 Incorporate Leading Practices

      4.2 Leverage Lessons Learned

      4.3 Maintain Internal Alignment

      This phase will walk you through the following activity:

      • Organizing your VMI and document internal processes, relationships, roles, and responsibilities. The main outcomes from this phase are organizational documents, and a desired future state for the VMI.

      This phase involves the following participants:

      • VMI team
      • Applicable stakeholders and executives
      • Procurement/Sourcing
      • IT
      • Others as needed

      Vendor Management Initiative Basics for the Small/Medium Businesses

      Phase 1 – Plan

      Get Organized

      Phase 1 – Plan focuses on getting organized. Foundational elements (Mission Statement, Goals, Scope, Strengths and Obstacles, Roles and Responsibilities, and Process Mapping) will help you define your VMI. These and the other elements of this Phase will follow you throughout the process of starting up your VMI and running it.

      Spending time up front to ensure that everyone is on the same page will help avoid headaches down the road. The tendency is to skimp (or even skip) on these steps to get to "the good stuff." To a certain extent, the process provided here is like building a house. You wouldn't start building your dream home without having a solid blueprint. The same is true with vendor management. Leveraging vendor management tools and techniques without the proper foundation may provide some benefit in the short term, but in the long term it will ultimately be a house of cards waiting to collapse.

      Step 1.1 – Mission statement and goals

      Identify why the VMI exists and what it will achieve

      Whether you are starting your vendor management journey or are already down the path, it is important to know why the vendor management initiative exists and what it hopes to achieve. The easiest way to document this is with a written declaration in the form of a Mission Statement and Goals. Although this is the easiest way to proceed, it is far from easy.

      The Mission Statement should identify at a high level the nature of the services provided by the VMI, who it will serve, and some of the expected outcomes or achievements. The Mission Statement should be no longer than one or two sentences.

      The complement to the Mission Statement is the list of goals for the VMI. Your goals should not be a reassertion of your Mission Statement in bullet format. At this stage it may not be possible to make them SMART (Specific, Measurable, Achievable/Attainable, Relevant, Time-Bound/Time-Based), but consider making them as SMART as possible. Without some of the SMART parameters attached, your goals are more like dreams and wishes. At a minimum, you should be able to determine the level of success achieved for each of the VMI goals.

      Although the VMI's Mission Statement will stay static over time (other than for significant changes to the VMI or organization as a whole), the goals should be reevaluated periodically using a SMART filter, and adjusted as needed.

      1.1.1 – Mission statement and goals

      20 – 40 Minutes

      1. Meet with the participants and use a brainstorming activity to list, on a whiteboard or flip chart, the reasons why the VMI will exist.
      2. Review external mission statements for inspiration.
      3. Review internal mission statements from other areas to ensure consistency.
      4. Draft and document your Mission Statement in the Phase 1 Tools and Templates Compendium – Tab 1.1 Mission Statement and Goals.
      5. Continue brainstorming and identify the high-level goals for the VMI.
      6. Review the list of goals and make them as SMART (Specific, Measurable, Achievable/Attainable, Relevant, Time-Bound/Time-Based) as possible.
      7. Document your goals in the Phase 1 Tools and Templates Compendium– Tab 1.1 Mission Statement and Goals.
      8. Obtain signoff on the Mission Statement and goals from stakeholders and executives as required.

      Input

      • Brainstorming results
      • Mission statements from other internal and external sources

      Output

      • Completed Mission Statement and Goals

      Materials

      • Whiteboard/Flip Charts
      • Phase 1 Tools and Templates Compendium – Tab 1.1 Mission Statement and Goals

      Participants

      • VMI team
      • Applicable stakeholders and executives (as needed)

      Download the Info-Tech Phase 1 Tools and Templates Compendium

      Step 1.2 – Scope

      Determine what is in scope and out of scope for the VMI

      Regardless of where your VMI resides or how it operates, it will be working with other areas within your organization. Some of the activities performed by the VMI will be new and not currently handled by other groups or individuals internally; at the same time, some of the activities performed by the VMI may be currently handled by other groups or individuals internally. In addition, executives, stakeholders, and other internal personnel may have expectations or make assumptions about the VMI. As a result, there can be a lot of confusion about what the VMI does and doesn't do, and the answers cannot always be found in the VMI's Mission Statement and Goals.

      One component of helping others understand the VMI landscape is formalizing the VMI Scope. The Scope will define boundaries for the VMI. The intent is not to fence itself off and keep others out but provide guidance on where the VMI's territory begins and ends. Ultimately, this will help clarify the VMI's roles and responsibilities, improve workflow, and reduce errant assumptions.

      When drafting your VMI scoping document, make sure you look at both sides of the equation (similar to what you would do when following best practices for a statement of work). Identify what is in scope and what is out of scope. Be specific when describing the individual components of the VMI Scope, and make sure executives and stakeholders are onboard with the final version.

      1.2.1 – Scope

      20 - 40 Minutes

      1. Meet with the participants and use a brainstorming activity to list, on a whiteboard or flip chart, the activities and functions in scope and out of scope for the VMI.
        1. Be specific to avoid ambiguity and improve clarity.
        2. Go back and forth between in scope and out of scope as needed; it is not necessary to list all the in-scope items and then turn your attention to the out-of-scope items.
      2. Review the lists to make sure there is enough specificity. An item may be in scope or out of scope, but not both.
      3. Use the Phase 1 Tools and Templates Compendium – Tab 1.2 Scope to document the results.
      4. Obtain signoff on the Scope from stakeholders and executives as required.

      Input

      • Brainstorming results
      • Mission Statement and Goals

      Output

      • Completed list of items in and out of scope for the VMI

      Materials

      • Whiteboard/Flip Charts
      • Phase 1 Tools and Templates Compendium – Tab 1.2 Scope

      Participants

      • VMI team
      • Applicable stakeholders and executives (as needed)

      Download the Info-Tech Phase 1 Tools and Templates Compendium

      Step 1.3 – Strengths and obstacles

      Pinpoint the VMI's strengths and obstacles

      A SWOT analysis (strengths, weaknesses, opportunities, and threats) is a valuable tool, but it is overkill for your VMI at this point. However, using a modified and simplified form of this tool (strengths and obstacles) will yield significant results and benefit the VMI as it grows and matures.

      Your output will be two lists: the strengths associated with the VMI and the obstacles the VMI is facing. For example, strengths could include items such as smart people working within the VMI and executive support. Obstacles could include items such as limited headcount and training required for VMI staff.

      The goals are 1) to harness the strengths to help the VMI be successful and 2) to understand the impact of the obstacles and plan accordingly. The output can also be used to enlighten executives and stakeholders about the challenges associated with their directives or requests (e.g. human bandwidth may not be sufficient to accomplish some of the vendor management activities and there is a moratorium on hiring until the next budget year).

      For each strength identified, determine how you will or can leverage it when things are going well or when the VMI is in a bind. For each obstacle, list the potential impact on the VMI (e.g. scope, growth rate, and number of vendors that can actively be part of the VMI).

      As you do your brainstorming, be as specific as possible and validate your lists with stakeholders and executives as needed.

      1.3.1 – Strengths and obstacles

      20 - 40 Minutes

      Meet with the participants and use a brainstorming activity to list, on a whiteboard or flip chart, the VMI's strengths and obstacles.

      Be specific to avoid ambiguity and improve clarity.

      Go back and forth between strengths and obstacles as needed; it is not necessary to list all the strengths first and then all the obstacles.

      It is possible for an item to be a strength and an obstacle; when this happens, add details to distinguish the situations.

      Review the lists to make sure there is enough specificity.

      Determine how you will leverage each strength and how you will manage each obstacle.

      Use the Phase 1 Tools and Templates Compendium – Tab 1.3 Strengths and Obstacles to document the results.

      Obtain signoff on the strengths and obstacles from stakeholders and executives as required.

      Input

      • Brainstorming
      • Mission Statement and Goals
      • Scope

      Output

      • Completed list of items impacting the VMI's ability to be successful: strengths the VMI can leverage and obstacles the VMI must manage

      Materials

      • Whiteboard/Flip Charts
      • Phase 1 Tools and Templates Compendium – Tab 1.3 Strengths and Obstacles

      Participants

      • VMI team
      • Applicable stakeholders and executives (as needed)

      Download the Info-Tech Phase 1 Tools and Templates Compendium

      Step 1.4 – Roles and responsibilities

      Obtain consensus on who is responsible for what

      One crucial success factor for VMIs is gaining and maintaining internal alignment. There are many moving parts to an organization, and a VMI must be clear on the various roles and responsibilities related to the relevant processes. Some of this information can be found in the VMI's Scope referenced in Step 1.2, but additional information is required to avoid stepping on each other's toes; many of the processes require internal departments to work together. (For example, obtaining requirements for a request for proposal takes more than one person or department). While it is not necessary to get too granular, it is imperative that you have a clear understanding of how the VMI activities will fit within the larger vendor management lifecycle (which is comprised of many sub processes) and who will be doing what.

      As we have learned through our workshops and guided implementations, a traditional RACI* or RASCI* Chart does not work well for this purpose. These charts are not intuitive, and they lack the specificity required to be effective. For vendor management purposes, a higher-level view and a slightly different approach provide much better results.

      This step will lead your through the creation of an OIC* Chart to determine vendor management lifecycle roles and responsibilities. Afterward, you'll be able to say, "Oh, I see clearly who is involved in each part of the process and what their role is."

      *RACI – Responsible, Accountable, Consulted, Informed

      *RASCI – Responsible, Accountable, Support, Consulted, Informed

      *OIC – Owner, Informed, Contributor

      This is an image of a table, where the row headings are: Role 1-5, and the Column Headings are: Step 1-5.

      Step 1.4 – Roles and responsibilities (cont'd)

      Obtain consensus on who is responsible for what

      To start, define the vendor management lifecycle steps or process applicable to your VMI. Next, determine who participates in the vendor management lifecycle. There is no need to get too granular – think along the lines of departments, subdepartments, divisions, agencies, or however you categorize internal operational units. Avoid naming individuals other than by title; this typically happens when a person oversees a large group (e.g. the CIO [chief information officer] or the CPO [chief procurement officer]). Be thorough, but don't let the chart get out of hand. For each role and step of the lifecycle, ask whether the entry is necessary; does it add value to the clarity of understanding the responsibilities associated with the vendor management lifecycle? Consider two examples, one for roles and one for lifecycle steps. 1) Is IT sufficient or do you need IT Operations and IT Development? 2) Is "negotiate contract documents" sufficient or do you need negotiate the contract and negotiate the renewal? The answer will depend on your culture and environment but be wary of creating a spreadsheet that requires an 85-inch monitor to view it.

      After defining the roles (departments, divisions, agencies) and the vendor management lifecycle steps or process, assign one of three letters to each box in your chart:

      • O – Owner – who owns the process; they may also contribute to it.
      • I – Informed – who is informed about the progress or results of the process.
      • C – Contributor – who contributes or works on the process; it can be tangible or intangible contributions.

      This activity can be started by the VMI or done as a group with representatives from each of the named roles. If the VMI starts the activity, the resulting chart should be validated by the each of the named roles.

      1.4.1 – Roles and responsibilities

      1 – 6 hours

      1. Meet with the participants and configure the OIC Chart in the Phase 1 Tools and Templates Compendium – Tab 1.4 OIC Chart.
        1. Review the steps or activities across the top of the chart and modify as needed.
        2. Review the roles listed along the left side of the chart and modify as needed.
      2. For each activity or step across the top of the chart, assign each role a letter – O for owner of that activity or step, I for informed, or C for contributor. Use only one letter per cell.
      3. Work your way across the chart. Every cell should have an entry or be left blank if it is not applicable.
      4. Review the results and validate that every activity or step has an O assigned to it; there must be an owner for every activity or step.
      5. Obtain signoff on the OIC Chart from stakeholders and executives as required.

      Input

      • A list of activities or steps to complete a project starting with requirements gathering and ending with ongoing risk management.
      • A list of internal areas (departments, divisions, agencies, etc.) and stakeholders that contribute to completing a project.

      Output

      • Completed OCI chart indicating roles and responsibilities for the VMI and other internal areas.

      Materials

      • Phase 1 Tools and Templates Compendium – Tab 1.4 OIC Chart

      Participants

      • VMI team
      • Procurement/Sourcing
      • IT
      • Representatives from other areas as needed
      • Applicable stakeholders and executives (as needed)

      Download the Info-Tech Phase 1 Tools and Templates Compendium

      Phase 2 - Build

      Create and configure tools, templates, and processes

      Phase 1

      Phase 2Phase 3Phase 4

      1.1 Mission Statement and Goals

      1.2 Scope

      1.3 Strengths and Obstacles

      1.4 Roles and Responsibilities

      2.1 Classification Model

      2.2 Risk Assessment Tool

      2.3 Scorecards and Feedback

      2.4 Business Alignment Meeting Agenda

      2.5 Relationship Alignment Document

      2.6 Vendor Orientation

      2.7 3-Year Roadmap

      2.8 90-Day Plan

      2.9 Quick Wins

      2.10 Reports

      3.1 Classify Vendors

      3.2 Compile Scorecards

      3.3 Conduct Business Alignment Meetings

      3.4 Work the 90-Day Plan

      3.5 Manage the 3-Year Roadmap

      3.6 Develop/Improve Vendor Relationships

      4.1 Incorporate Leading Practices

      4.2 Leverage Lessons Learned

      4.3 Maintain Internal Alignment

      This phase will walk you through the following activities:

      • Configuring and creating the tools and templates that will help you run the VMI. The main outcomes from this phase are a clear understanding of which vendors are important to you, the tools to manage the vendor relationships, and an implementation plan.

      This phase involves the following participants:

      • VMI team
      • Applicable stakeholders and executives
      • Human Resources
      • Legal
      • Others as needed

      Vendor Management Initiative Basics for the Small/Medium Businesses

      Phase 2 – Build

      Create and configure tools, templates, and processes

      Phase 2 – Build focuses on creating and configuring the tools and templates that will help you run your VMI. Vendor management is not a plug and play environment, and unless noted otherwise, the tools and templates included with this blueprint require your input and thought. The tools and templates must work in concert with your culture, values, and goals. That will require teamwork, insights, contemplation, and deliberation.

      During this Phase you'll leverage the various templates and tools included with this blueprint and adapt them for your specific needs and use. In some instances, you'll be starting with mostly a blank slate; while in others, only a small modification may be required to make it fit your circumstances. However, it is possible that a document or spreadsheet may need heavy customization to fit your situation. As you create your VMI, use the included materials for inspiration and guidance purposes rather than as absolute dictates.

      Step 2.1 – Classification model

      Configure the COST vendor classification tool

      One of the functions of a VMI is to allocate the appropriate level of vendor management resources to each vendor since not all vendors are of equal importance to your organization. While some people may be able intuitively to sort their vendors into vendor management categories, a more objective, consistent, and reliable model works best. Info-Tech's COST model helps you assign your vendors to the appropriate vendor management category so that you can focus your vendor management resources where they will do the most good.

      COST is an acronym for Commodity, Operational, Strategic, and Tactical. Your vendors will occupy one of these vendor management categories, and each category helps you determine the nature of the resources allocated to that vendor, the characteristics of the relationship desired by the VMI, and the governance level used.

      The easiest way to think of the COST model is as a 2 x 2 matrix or graph. The model should be configured for your environment so that the criteria used for determining a vendor's classification align with what is important to you and your organization. However, at this point in your VMI's maturation, a simple approach works best. The Classification Model included with this blueprint requires minimal configuration to get your started, and that is discussed on the activity slide associated with this Step 2.1.

      This is an image of the COST Vendor Classification Tool.

      Step 2.1 – Classification model (cont'd)

      Configure the COST vendor classification tool

      Common characteristics by vendor management category

      Operational

      Strategic
      • Low to moderate risk and criticality; moderate to high spend and switching costs
      • Product or service used by more than one area
      • Price is a key negotiation point
      • Product or service is valued by the organization
      • Quality or the perception of quality is a differentiator (i.e. brand awareness)
      • Moderate to high risk and criticality; moderate to high spend and switching costs
      • Few competitors and differentiated products and services
      • Product or service significantly advances the organization's vision, mission, and success
      • Well-established in their core industry

      Commodity

      Tactical
      • Low risk and criticality; low spend and switching costs
      • Product or service is readily available from many sources
      • Market has many competitors and options
      • Relationship is transactional
      • Price is the main differentiator
      • Moderate to high risk and criticality; low to moderate spend and switching costs
      • Vendor offerings align with or support one or more strategic objectives
      • Often IT vendors "outside" of IT (i.e. controlled and paid for by other areas)
      • Often niche or new vendors

      Source: Compiled in part from Guth, Stephen. "Vendor Relationship Management Getting What You Paid for (And More)." 2015.

      2.1.1 – Classification model

      15 – 30 Minutes

      1. Meet with the participants to configure the spend ranges in Phase 2 Vendor Classification Tool – Tab 1. Configuration for your environment.
      2. Collect your vendors and their annual spend to sort by largest to lowest.
      3. Update cells F14-J14 in the Classification Model based on your actual data.
        1. Cell F14 – Set the boundary at a point between the spend for your 10th and 11th ranked vendors. For example, if the 10th vendor by spend is $1,009, 850 and the 11th vendor by spend is $980,763, the range for F14 would be $1,000,00+.
        2. Cell G14 – Set the bottom of the range at a point between the spend for your 30th and 31st ranked vendors; the top of the range will be $1 less than the bottom of the range specified in F14.
        3. Cell H14 – Set the bottom of the range slightly below the spend for your 50th ranked vendor; the top of the range will be $1 less than the bottom of the range specified in G14.
        4. Cells I14 and J14 – Divide the remaining range in half and split it between the two cells; for J14 the range will be $0 to $1 less than the bottom range in I14.
      4. Ignore the other variables at this time.

      Input

      • Phase 1 List of Vendors by Annual Spend

      Output

      • Configured Vendor Classification Tool

      Materials

      • Phase 2 Vendor Classification Tool – Tab 1. Configuration

      Participants

      • VMI team

      Download the Info-Tech Phase 2 Vendor Classification Tool

      Step 2.2 – Risk assessment tool

      Identify risks to measure, monitor, and report on

      One of the typical drivers of a VMI is risk management. Organizations want to get a better handle on the various risks their vendors pose. Vendor risks originate from many areas: financial, performance, security, legal, and others. However, security risk is the high-profile risk, and the one organizations often focus on almost exclusively, which leaves the organization vulnerable in other areas.

      Risk management is a program, not a project; there is no completion date. A proactive approach works best and requires continual monitoring, identification, and assessment. Reacting to risks after they occur can be costly and have other detrimental effects on the organization. Any risk that adversely affects IT will adversely affect the entire organization.

      While the VMI won't necessarily be quantifying or calculating the risk directly, it generally is the aggregator of risk information across the risk categories, which it then includes in its reporting function (see Steps 2.12 and 3.8).

      At a minimum, your risk management strategy should involve:

      • Identifying the risks you want to measure and monitor.
      • Identifying your risk appetite (the amount of risk you are willing to live with).
      • Measuring, monitoring, and reporting on the applicable risks.
      • Developing and deploying a risk management plan to minimize potential risk impact.

      Vendor risk is a fact of life, but you do have options for how to handle it. Be proactive and thoughtful in your approach, and focus your resources on what is important.

      2.2.1 – Risk assessment tool

      30 - 90 Minutes

      1. Meet with the participants to configure the risk indicators in Phase 2 Vendor Risk Assessment Tool – Tab 1. Set parameters for your environment.
      2. Review the risk categories and determine which ones you will be measuring and monitoring.
      3. Review the risk indicators under each risk category and determine whether the indicator is acceptable as written, is acceptable with modifications, should be replaced, or should be deleted.
      4. Make the necessary changes to the risk indicators; these changes will cascade to each of the vendor tabs. Limit the number of risk indicators to no more than seven per risk category.
      5. Gain input and approval as needed from sponsors, stakeholders, and executives as required.

      Input

      • Scope
      • OIC Chart
      • Process Maps
      • Brainstorming

      Output

      • Configured Vendor Risk Assessment Tool

      Materials

      • Phase 2 Vendor Risk Assessment Tool – Tab 1. Set Parameters

      Participants

      • VMI team

      Download the Info-Tech Phase 2 Vendor Classification Tool

      Step 2.3 – Scorecards and feedback

      Design a two-way feedback loop with your vendors

      A vendor management scorecard is a great tool for measuring, monitoring, and improving relationship alignment. In addition, it is perfect for improving communication between you and the vendor.

      Conceptually, a scorecard is similar to a school report card. At the end of a learning cycle, you receive feedback on how well you do in each of your classes. For vendor management, the scorecard is also used to provide periodic feedback, but there are some nuances and additional benefits and objectives when compared to a report card.

      Although scorecards can be used in a variety of ways, the focus here will be on vendor management scorecards – contract management, project management, and other types of scorecards will not be included in the materials covered in this Step 2.3 or in Step 3.4.

      This image contains a table with the score for objectives A-D. The scores are: A4, B3, C5, D4.

      Step 2.3 – Scorecards and feedback (cont'd)

      Design a two-way feedback loop with your vendors

      Anatomy

      The Info-Tech scorecard includes five areas:

      • Measurement categories. Measurement categories help organize the scorecard. Limit the number of measurement categories to three to five; this allows the parties to stay focused on what's important. Too many measurement categories make it difficult for the vendor to understand the expectations.
      • Criteria. The criteria describe what is being measured. Create criteria with sufficient detail to allow the reviewers to fully understand what is being measured and to evaluate it. Criteria can be objective or subjective. Use three to five criteria per measurement category.
      • Measurement category weights. Not all your measurement categories may be of equal importance to you; this area allows you to give greater weight to a measurement category when compiling the overall score.
      • Rating. Reviewers will be asked to assign a score to each criteria using a 1 to 5 scale.
      • Comments. A good scorecard will include a place for reviewers to provide additional information regarding the rating, or other items that are relevant to the scorecard.

      An overall score is calculated based on the rating for each criteria and the measurement category weights.

      Step 2.3 – Scorecards and feedback (cont'd)

      Design a two-way feedback loop with your vendors

      Goals and objectives

      Scorecards can be used for a variety of reasons. Some of the common ones are:

      • Improving vendor performance.
      • Conveying expectations to the vendor.
      • Identifying and recognizing top vendors.
      • Increasing alignment between the parties.
      • Improving communication with the vendor.
      • Comparing vendors across the same criteria.
      • Measuring items not included in contract metrics.
      • Identifying vendors for "strategic alliance" consideration.
      • Helping the organization achieve specific goals and objectives.

      Identifying and resolving issues before they impact performance or the relationship.

      Identifying your scorecard drivers first will help you craft a suitable scorecard.

      Step 2.3 – Scorecards and feedback (cont'd)

      Design a two-way feedback loop with your vendors

      Info-Tech recommends starting with simple scorecards to allow you and the vendors to acclimate to the new process and information. As you build your scorecards, keep in mind that internal personnel will be scoring the vendors and the vendors will be reviewing the scorecard. Make your scorecard easy for your personnel to fill out, and containing meaningful content to drive the vendor in the right direction. You can always make the scorecard more complex in the future.

      Our recommendation of five categories is provided below. Choose three to five of the categories that help you accomplish your scorecard goals and objectives:

      1. Timeliness – Responses, resolutions, fixes, submissions, completions, milestones, deliverables, invoices, etc.
      2. Cost – Total cost of ownership, value, price stability, price increases/decreases, pricing models, etc.
      3. Quality – Accuracy, completeness, mean time to failure, bugs, number of failures, etc.
      4. Personnel – Skilled, experienced, knowledgeable, certified, friendly, trustworthy, flexible, accommodating, etc.
      5. Risk – Adequate contractual protections, security breaches, lawsuits, finances, audit findings, etc.

      Some criteria may be applicable in more than one category. The categories above should cover at least 80% of the items that are important to your organization. The general criteria listed for each category is not an exhaustive list, but most things break down into time, money, quality, people, and risk issues.

      Step 2.3 – Scorecards and feedback (cont'd)

      Design a two-way feedback loop with your vendors

      Additional Considerations

      • Even a good rating system can be confusing. Make sure you provide some examples or a way for reviewers to discern the differences between a 1, 2, 3, 4, and 5. Don't assume your "rating key" will be intuitive.
      • When assigning weights, don't go lower than 10% for any measurement category. If the weight is too low, it won't be relevant enough to have an impact on the total score. If it doesn't "move the needle", don't include it.
      • Final sign-off on the scorecard template should occur outside the VMI. The heavy lifting can be done by the VMI to create it, but the scorecard is for the benefit of the organization overall, and those impacted by the vendors specifically. You may end up playing arbiter or referee, but the scorecard is not the exclusive property of the VMI. Try to reach consensus on your final template whenever possible.
      • You should notice improved ratings and total scores over time for your vendors. One explanation for this is the Pygmalion Effect: "The Pygmalion [E]ffect describes situations where someone's high expectations improves our behavior and therefore our performance in a given area. It suggests that we do better when more is expected of us."* Convey your expectations and let the vendors' competitive juices take over.
      • While creating your scorecard and materials to explain the process to internal personnel, identify those pieces that will help you explain it to your vendors during vendor orientation (see Steps 2.6 and 3.4). Leveraging pre-existing materials is a great shortcut.

      *Source: The Decision Lab, n.d.

      Step 2.3 – Scorecards and feedback (cont'd)

      Design a two-way feedback loop with your vendors

      Vendor Feedback

      After you've built your scorecard, turn your attention to the second half of the equation – feedback from the vendor. A communication loop cannot be successful without dialogue flowing both ways. While this can happen with just a scorecard, a mechanism specifically geared toward the vendor providing you with feedback improves communication, alignment, and satisfaction.

      You may be tempted to create a formal scorecard for the vendor to use; avoid that temptation until later in your maturity or development of the VMI. You'll be implementing a lot of new processes, deploying new tools and templates, and getting people to work together in new ways. Work on those things first.

      For now, implement an informal process for obtaining information from the vendor. Start by identifying information that you will find useful – information that will allow you to improve overall, to reduce waste or time, to improve processes, to identify gaps in skills. Incorporate these items into your business alignment meetings (see Steps 2.4 and 3.5). Create three to five good questions to ask the vendor and include these in the business alignment meeting agenda. The goal is to get meaningful feedback, and that starts with asking good questions.

      Keep it simple at first. When the time is right, you can build a more formal feedback form or scorecard. Don't be in a rush; as long as the informal method works, keep using it.

      2.3.1 – Scorecards and feedback

      30 – 60 Minutes

      1. Meet with the participants and brainstorm ideas for your scorecard measurement categories:
        1. What makes a vendor valuable to your organization?
        2. What differentiates a "good" vendor from a "bad" vendor?
        3. What items would you like to measure and provide feedback on to the vendor to improve performance, the relationship, risk, and other areas?
      2. Select three, but no more than five, of the following measure categories: timeliness, cost, quality, personnel, and risk.
      3. Within each measurement category, list two or three criteria that you want to measure and track for your vendors. Choose items that are as universal as possible rather than being applicable to one vendor or one vendor type.
      4. Assign a weight to each measurement category, ensuring that the total weight is 100% for all measurement categories.
      5. Document your results as you go in Phase 2 Tools and Templates Compendium – Tab 2.3 Scorecard.

      Input

      • Brainstorming

      Output

      • Configured Scorecard template

      Materials

      • Phase 2 Tools and Templates Compendium – Tab 2.3 Scorecard

      Participants

      • VMI team
      • Applicable stakeholders and executives (as needed)

      Download the Info-Tech Phase 2 Tools and Templates Compendium

      2.3.2 – Scorecards and feedback

      15 to 30 Minutes

      1. Meet with the participants and brainstorm ideas for feedback to seek from your vendors during your business alignment meetings. During the brainstorming, identify questions to ask the vendor about your organization that will:
        1. Help you improve the relationship.
        2. Help you improve your processes or performance.
        3. Help you improve ongoing communication.
        4. Help you evaluate your personnel.
      2. Identify the top five questions you want to include in your business alignment meeting agenda. (Note: you may need to refine the actual questions from the brainstorming activity before they are ready to include in your business alignment meeting agenda.)
      3. Document both your brainstorming activity and your final results in Phase 2 Tools and Templates Compendium – Tab 2.3 Feedback. The brainstorming questions can be used in the future as your VMI matures and your feedback transforms from informal to formal. The results will be used in Steps 2.4 and 3.5.

      Input

      • Brainstorming

      Output

      • Feedback questions to include with the business alignment meeting agenda

      Materials

      • Phase 2 Tools and Templates Compendium – Tab 2.3 Feedback

      Participants

      • VMI team
      • Applicable stakeholders and executives (as needed)

      Download the Info-Tech Phase 2 Tools and Templates Compendium

      Step 2.4 – Business alignment meeting agenda

      Craft an agenda that meets the needs of the VMI

      A business alignment meeting (BAM) is a multi-faceted tool to ensure the customer and the vendor stay focused on what is important to the customer at a high level. BAMs are not traditional operational meetings where the parties get into the details of the contracts, deal with installation problems, address project management issues, or discuss specific cost overruns. The focus of the BAM is the scorecard (see Step 2.3), but other topics are discussed, and other purposes are served. For example:

      • You can use the BAM to develop the relationship with the vendor's leadership team so that if escalation is ever needed, your organization is more than just a name on a spreadsheet or customer list.
      • You can learn about innovations the vendor is working on (without the meeting turning into a sales call).
      • You can address high-level performance trends and request corrective action as needed.
      • You can clarify your expectations.
      • You can educate the vendor about your industry, culture, and organization.
      • You can learn more about the vendor.

      As you build your BAM Agenda, someone in your organization may say, "Oh, that's just a quarterly business review (QBR) or top-to-top meeting." In most instances, an existing QBRs or top-to-top meeting is not the same as a BAM. Using the term QBR or top-to-top meeting instead of BAM can lead to confusion internally. The VMI may say to the business unit, procurement, or another department, "We're going to start running some QBRs for our strategic vendors." The typical response is, "There's no need; we already run QBRs/top-to-top meetings with our important vendors." This may be accompanied by an invitation to join their meeting, where you may be an afterthought, have no influence, and get five minutes at the end to talk about your agenda items. Keep your BAM separate so that it meets your needs.

      Step 2.4 – Business alignment meeting agenda (cont'd)

      Craft an agenda that meets the needs of the VMI

      As previously noted, using the term BAM more accurately depicts the nature of the VMI meeting and prevents confusion internally with other meetings already occurring. In addition, hosting the BAM yourself rather than piggybacking onto another meeting ensures that the VMI's needs are met. The VMI will set and control the BAM agenda and determine the invite list for internal personnel and vendor personnel. As you may have figured out by now, having the right customer and vendor personnel attend will be essential.

      BAMs are conducted at the vendor level, not the contract level. As a result, the frequency of the BAMs will depend on the vendor's classification category (see Steps 2.1 and 3.1). General frequency guidelines are provided below, but they can be modified to meet your goals:

      • Commodity vendors – Not applicable
      • Operational vendors – Biannually or annually
      • Strategic vendors – Quarterly
      • Tactical vendors – Quarterly or biannually

      BAMs can help you achieve some additional benefits not previously mentioned:

      • Foster a collaborative relationship with the vendor.
      • Avoid erroneous assumptions by the parties.
      • Capture and provide a record of the relationship (and other items) over time.

      Step 2.4 – Business alignment meeting agenda (cont'd)

      Craft an agenda that meets the needs of the VMI

      As with any meeting, building the proper agenda will be one of the keys to an effective and efficient meeting. A high-level BAM agenda with sample topics is set out below:

      BAM Agenda

      • Opening remarks
        • Welcome and introductions
        • Review of previous minutes
      • Active discussion
        • Review of open issues
        • Scorecard and feedback
        • Current status of projects to ensure situational awareness by the vendor
        • Roadmap/strategy/future projects
        • Accomplishments
      • Closing remarks
        • Reinforce positives (good behavior, results, and performance, value added, and expectations exceeded)
        • Recap
      • Adjourn

      2.4.1 – Business alignment meeting agenda

      20 – 45 Minutes

      1. Meet with the participants and review the sample agenda in Phase 2 Tools and Templates Compendium – Tab 2.4 BAM Agenda.
      2. Using the sample agenda as inspiration and brainstorming activities as needed, create a BAM agenda tailored to your needs.
        1. Select the items from the sample agenda applicable to your situation.
        2. Add any items required based on your brainstorming.
        3. Add the feedback questions identified during Activity 2.3.2 and documented in Phase 2 Tools and Templates Compendium – Tab 2.3 Feedback.
      3. Gain input and approval from sponsors, stakeholders, and executives as required or appropriate.
      4. Document the final BAM agenda in Phase 2 Tools and Templates Compendium –Tab 2.4 BAM Agenda.

      Input

      • Brainstorming
      • Phase 2 Tools and Templates Compendium – Tab 2.3 Feedback

      Output

      • Configured BAM agenda

      Materials

      • Phase 2 Tools and Templates Compendium – Tab2 .4 BAM Agenda

      Participants

      • VMI team
      • Applicable stakeholders and executives (as needed)

      Download the Info-Tech Phase 2 Tools and Templates Compendium

      Step 2.5 – Relationship alignment document

      Draft a document to convey important VMI information to your vendors

      Throughout this blueprint, alignment is mentioned directly (e.g. business alignment meetings [Steps 2.4 and 3.3]) or indirectly implied. Ensuring you and your vendors are on the same page, have clear and transparent communication, and understand each other's expectations is critical to fostering strong relationships. One component of gaining and maintaining alignment with your vendors is the Relationship Alignment Document (RAD). Depending upon the Scope of your VMI and what your organization already has in place, your RAD will fill in the gaps on various topics.

      Early in the VMI's maturation, the easiest approach is to develop a short document (1 one page) or a pamphlet (i.e. the classic trifold) describing the rules of engagement when doing business with your organization. The RAD can convey expectations, policies, guidelines, and other items. The scope of the document will depend on:

      1. What you believe is important for the vendors to understand.
      2. Any other similar information already provided to the vendors.

      The first step to drafting a RAD is to identify what information vendors need to know to stay on your good side. You may want vendors to know about your gift policy (e.g. employees may not accept vendor gifts above a nominal value, such as a pen or mousepad). Next, compare your list of what vendors need to know and determine if the content is covered in other vendor-facing documents such as a vendor code of conduct or your website's vendor portal. Lastly, create your RAD to bridge the gap between what you want and what is already in place. In some instances, you may want to include items from other documents to reemphasize them with the vendor community.

      Info-Tech Insight

      The RAD can be used with all vendors regardless of classification category. It can be sent directly to the vendors or given to them during vendor orientation (see Step 3.3)

      2.5.1 – Relationship alignment document

      1 to 4 Hours

      1. Meet with the participants and review the RAD sample and checklist in Phase 2 Tools and Templates Compendium – Tab 2.5 Relationship Alignment Doc.
      2. Determine:
        1. Whether you will create one RAD for all vendors or one RAD for strategic vendors and another RAD for tactical and operational vendors; whether you will create a RAD for commodity vendors.
        2. The concepts you want to include in your RAD(s).
        3. The format for your RAD(s) – traditional, pamphlet, or other.
        4. Whether signoff or acknowledgement will be required by the vendors.
      3. Draft your RAD(s) and work with other internal areas, such as Marketing to create a consistent brand for the RADS, and Legal to ensure consistent use and preservation of trademarks or other intellectual property rights and other legal issues.
      4. Review other vendor-facing documents (e.g. supplier code of conduct, onsite safety and security protocols) for consistencies between them and the RAD(s).
      5. Obtain signoff on the RAD(s) from stakeholders, sponsors, executives, Legal, Marketing, and others as needed.

      Input

      • Brainstorming
      • Vendor-facing documents, policies, and procedures

      Output

      • Completed Relationship Alignment Document(s)

      Materials

      • Phase 2 Tools and Templates Compendium – Tab 2.5 Relationship Alignment Doc

      Participants

      • VMI team
      • Marketing, as needed
      • Legal, as needed

      Download the Info-Tech Phase 2 Tools and Templates Compendium

      Step 2.6 – Vendor orientation

      Create a VMI awareness process to build bridges with your vendors

      Your organization is unique. It may have many similarities with other organizations, but your culture, risk tolerance, mission, vision, and goals, finances, employees, and "customers" (those that depend on you) make it different. The same is true of your VMI. It may have similar principles, objectives, and processes to other organizations' VMIs, but yours is still unique. As a result, your vendors may not fully understand your organization and what vendor management means to you.

      Vendor orientation is another means to helping you gain and maintain alignment with your important vendors, educate them on what is important to you, and provide closure when/if the relationship with the vendor ends. Vendor orientation is comprised of three components, each with a different function:

      • Orientation
      • Reorientation
      • Debrief

      Vendor orientation focuses on the vendor management pieces of the puzzle (e.g. the scorecard process) rather than the operational pieces (e.g. setting up a new vendor in the system to ensure invoices are processed smoothly).

      Step 2.6 – Vendor orientation (cont'd)

      Create a VMI awareness process to build bridges with your vendors

      Reorientation

      • Reorientation is either identical or similar to orientation, depending upon the circumstances. Reorientation occurs for several reasons, and each reason will impact the nature and detail of the reorientation content. Reorientation occurs whenever:
      • There is a significant change in the vendor's products or services.
      • The vendor has been through a merger, acquisition, or divestiture.
      • A significant contract renewal/renegotiation has recently occurred.
      • Sufficient time has passed from orientation; commonly 2 to 3 years.
      • The vendor has been placed in a "performance improvement plan" or "relationship improvement plan" protocol.
      • Significant turnover has occurred within your organization (executives, key stakeholders, and/or VMI personnel).
      • Substantial turnover has occurred at the vendor at the executive or account management level.
      • The vendor has changed vendor classification categories after the most current classification.
      • As the name implies, the goal is to refamiliarize the vendor with your current VMI situation, governances, protocols, and expectations. The drivers for reorientation will help you determine the reorientation's scope, scale, and frequency.

      Step 2.6 – Vendor orientation (cont'd)

      Create a VMI awareness process to build bridges with your vendors

      Debrief

      To continue the analogy from orientation, debrief is like an exit interview for an employee when their employment is terminated. In this case, debrief occurs when the vendor is no longer an active vendor with your organization - all contracts have terminated or expired, and no new business with the vendor is anticipated within the next three months.

      Similar to orientation and reorientation, debrief activities will be based on the vendor's classification category within the COST model. Strategic vendors don't go away very often; usually, they transition to operational or tactical vendors first. However, if a strategic vendor is no longer providing products or services to you, dig a little deeper into their experiences and allocate extra time for the debrief meeting.

      The debrief should provide you with feedback on the vendor's experience with your organization and their participation in your VMI. Additionally, it can provide closure for both parties since the relationship is ending. Be careful that the debrief does not turn into a finger-pointing meeting or therapy session for the vendor. It should be professional and productive; if it is going off the rails, terminate the meeting before more damage can occur.

      End the debrief on a high note if possible. Thank the vendor, highlight its key contributions, and single out any personnel who went above and beyond. You never know when you will be doing business with this vendor again – don't burn bridges!

      Step 2.6 – Vendor orientation (cont'd)

      Create a VMI awareness process to build bridges with your vendors

      As you create your vendor orientation materials, focus on the message you want to convey.

      • For orientation and reorientation:
        • What is important to you that vendors need to know?
        • What will help the vendors understand more about your organization and your VMI?
        • What and how are you different from other organizations overall, and in your "industry"?
        • What will help them understand your expectations?
        • What will help them be more successful?
        • What will help you build the relationship?
      • For debrief:
        • What information or feedback do you want to obtain?
        • What information or feedback to you want to give?

      The level of detail you provide strategic vendors during orientation and reorientation may be different from the information you provide tactical and operational vendors. Commodity vendors are not typically involved in the vendor orientation process. The orientation meetings can be conducted on a one-to-one basis for strategic vendors and a one-to-many basis for operational and tactical vendors; reorientation and debrief are best conducted on a one-to-one basis. Lastly, face-to-face or video meetings work best for vendor orientation; voice-only meetings, recorded videos, or distributing only written materials seldom hit their mark or achieve the desired results.

      Step 2.7 – Three-year roadmap

      Plot your path at a high level

      1. The VMI exists in many planes concurrently:
      2. It operates both tactically and strategically.

      It focuses on different timelines or horizons (e.g., the past, the present, and the future). Creating a three-year roadmap facilitates the VMI's ability to function effectively across these multiple landscapes.

      The VMI roadmap will be influenced by many factors. The work product from Phase 1 – Plan, input from executives, stakeholders, and internal clients, and the direction of the organization are great sources of information as you begin to build your roadmap.

      To start, identify what you would like to accomplish in year 1. This is arguably the easiest year to complete: budgets are set (or you have a good idea what the budget will look like), personnel decisions have been made, resources have been allocated, and other issues impacting the VMI are known with a higher degree of certainty than any other year. This does not mean things won't change during the first year of the VMI, but expectations are usually lower, and the short event horizon makes things more predictable during the year-1 ramp-up period.

      Years 2 and 3 are more tenuous, but the process is the same: identify what you would like to accomplish or roll out in each year. Typically, the VMI maintains the year-1 plan into subsequent years and adds to the scope or maturity. For example, you may start year 1 with BAMs and scorecards for three of your strategic vendors; during year 2, you may increase that to five vendors; and during year 3, you may increase that to nine vendors. Or, you may not conduct any market research during year 1, waiting to add it to your roadmap in year 2 or 3 as you mature.

      Breaking things down by year helps you identify what is important and the timing associated with your priorities. A conservative approach is recommended. It is easy to overcommit, but the results can be disastrous and painful.

      2.7.1 – Three-year roadmap

      45 – 90 Minutes

      1. Meet with the participants and decide how to coordinate year 1 of your three-year roadmap with your existing fiscal year or reporting year. Year 1 may be shorter or longer than a calendar year.
      2. Review the VMI activities listed in Phase 2 Tools and Templates Compendium – Tab 2.7 Three-year roadmap. Use brainstorming and your prior work product from Phase 1 and Phase 2 to identify additional items for the roadmap and add them at the bottom of the spreadsheet.
      3. Starting with the first activity, determine when that activity will begin and put an X in the corresponding column; if the activity is not applicable, leave it blank or insert N/A.
      4. Go back to the top of the list and add information as needed.
        1. For any year-1 or year-2 activities, add an X in the corresponding columns if the activity will be expanded/continued in subsequent periods (e.g., if a Year 2 activity will continue in year 3, put an X in year 3 as well).
        2. Use the comments column to provide clarifying remarks or additional insights related to your plans or "X's". For example, "Scorecards begin in year 1 with three vendors and will roll out to five vendors in year 2 and nine vendors in year 3."
      5. Obtain signoff from stakeholders, sponsors, and executives as needed.

      Input

      • Phase 1 work product
      • Steps 2.1 – 2.6 work product
      • Brainstorming

      Output

      • High level three-year roadmap for the VMI

      Materials

      • Phase 2 Tools and Templates Compendium – Tab 2.7 Three-Year Roadmap

      Participants

      • VMI team
      • Applicable stakeholders and executives (as needed)

      Download the Info-Tech Phase 2 Tools and Templates Compendium

      Step 2.8 – 90-day plan

      Pave your short-term path with a series of detailed quarterly plans

      Now that you have prepared a three-year roadmap, it's time to take the most significant elements from the first year and create action plans for each three-month period. Your first 90-day plan may be longer or shorter if you want to sync to your fiscal or calendar quarters. Aligning with your fiscal year can make it easier for tracking and reporting purposes; however, the more critical item is to make sure you have a rolling series of four 90-day plans to keep you focused on the important activities and tasks throughout the year.

      The 90-day plan is a simple project plan that will help you measure, monitor, and report your progress. Use the Info-Tech tool to help you track:

      Activities.

      • Tasks comprising each activity.
      • Who will be performing the tasks.
      • An estimate of the time required per person per task.
      • An estimate of the total time to achieve the activity.
      • A due date for the activity.
      • A priority of the activity.

      The first 90-day plan will have the greatest level of detail and should be as thorough as possible; the remaining three 90-day plans will each have less detail for now. As you approach the middle of the first 90-day plan, start adding details to the next 90-day plan; toward the end of the first quarter add a high-level 90-day plan to the end of the chain. Continue repeating this cycle each quarter and consult the three-year roadmap and the leadership team, as necessary.

      2.8.1 – 90-day plan

      45 – 90 Minutes

      1. Meet with the participants and decide how to coordinate the first "90-day" plan with your existing fiscal year or reporting cycles. Your first plan may be shorter or longer than 90 days.
      2. Looking at the year-1 section of the three-year roadmap, identify the activities that will be started during the next 90 days.
      3. Using the Phase 2 Tools and Templates Compendium – Tab 2.8 90-Day Plan, enter the following information into the spreadsheet for each activity to be accomplished during the next 90 days:
        1. Activity description.
        2. Tasks required to complete the activity (be specific and descriptive).
        3. The people who will be performing each task.
        4. The estimated number of hours required to complete each task.
        5. The start date and due date for each task or the activity.
      4. Validate the tasks are a complete list for each activity and the people performing the tasks have adequate time to complete the tasks by the due date(s).
      5. Assign a priority to each Activity.

      Input

      • Three-Year Roadmap
      • Phase 1 work product
      • Steps 2.1 – 2.7 work product
      • Brainstorming

      Output

      • Detailed plan for the VMI for the next quarter or "90" days

      Materials

      • Phase 2 Tools and Templates Compendium – Tab 2.8 90-Day Plan

      Participants

      • VMI team
      • Applicable stakeholders and executives (as needed)

      Download the Info-Tech Phase 2 Tools and Templates Compendium

      Step 2.9 – Quick wins

      Identify potential short-term successes to gain momentum and show value immediately

      As the final step in the timeline trilogy, you are ready to identify some quick wins for the VMI. Using the first 90-day plan and a brainstorming activity, create a list of things you can do in 15 to 30 days that add value to your initiative and build momentum.

      As you evaluate your list of potential candidates, look for things that:

      • Are achievable within the stated timeline.
      • Don't require a lot of effort.
      • Involve stopping a certain process, activity, or task; this is sometimes known as a "stop doing stupid stuff" approach.
      • Will reduce or eliminate inefficiencies; this is sometimes known as the war on waste.
      • Have a moderate to high impact or bolster the VMI's reputation.

      As you look for quick wins, you may find that everything you identify does not meet the criteria. That's okay; don't force the issue. Return your focus to the 90-day plan and three-year roadmap and update those documents if the brainstorming activity associated with Step 2.9 identified anything new.

      2.9.1 – Quick wins

      15 - 30 Minutes

      1. Meet with the participants and review the three-year roadmap and 90-day plan. Determine if any item on either document can be completed:
        1. Quickly (30 days or less).
        2. With minimal effort.
        3. To provide or show moderate to high levels of value or provide the VMI with momentum.
      2. Brainstorm to identify any other items that meet the criteria in step 1 above.
      3. Compile a comprehensive list of these items and select up to five to pursue.
      4. Document the list in the Phase 2 Tools and Templates Compendium – Tab 2.9 Quick Wins.
      5. Manage the quick wins list and share the results with the VMI team and applicable stakeholders and executives.

      Input

      • Three-Year Roadmap
      • 90-Day Plan
      • Brainstorming

      Output

      • A list of activities that require low levels of effort to achieve moderate to high levels of value in a short period

      Materials

      • Phase 2 Tools and Templates Compendium – Tab 2.9 Quick Wins

      Participants

      • VMI team

      Download the Info-Tech Phase 2 Tools and Templates Compendium

      Step 2.10 – Reports

      Construct your reports to resonate with your audience

      Issuing reports is a critical piece of the VMI since the VMI is a conduit of information for the organization. It may be aggregating risk data from internal areas, conducting vendor research, compiling performance data, reviewing market intelligence, or obtaining relevant statistics, feedback, comments, facts, and figures from other sources. Holding onto this information minimizes the impact a VMI can have on the organization; however, the VMI's internal clients, stakeholders, and executives can drown in raw data and ignore it completely if it is not transformed into meaningful, easily-digested information.

      Before building a report, think about your intended audience:

      • What information are they looking for? What will help them understand the big picture?
      • What level of detail is appropriate, keeping in mind the audience may not be like-minded?
      • What items are universal to all the readers and what items are of interest to one or two readers?
      • How easy or hard will it be to collect the data? Who will be providing it, and how time consuming will it be?
      • How accurate, valid, and timely will the data be?
      • How frequently will each report need to be issued?

      Step 2.10 – Reports (cont'd)

      Construct your reports to resonate with your audience

      Use the following guidelines to create reports that will resonate with your audience:

      • Value information over data, but sometimes data does have a place in your report.
      • Use pictures, graphics, and other representations more than words, but words are often necessary in small, concise doses.
      • Segregate your report by user; for example, general information up top, CIO information below that on the right, CFO information to the left of CIO information, etc.
      • Send a draft report to the internal audience and seek feedback, keeping in mind you won't be able to cater to or please everyone.

      2.10.1 – Reports

      15 – 45 Minutes

      1. Meet with the participants and review the applicable work product from Phase 1 and Phase 2; identify qualitative and quantitative items the VMI measures, monitors, tracks, or aggregates.
      2. Determine which items will be reported and to whom (by category):
        1. Internally to personnel within the VMI.
        2. Internally to personnel outside the VMI.
        3. Externally to vendors.
      3. Within each category above, determine your intended audiences/recipients. For example, you may have a different list of recipients for a risk report than you do a scorecard summary report. This will help you identify the number of reports required.
      4. Create a draft structure for each report based on the audience and the information being conveyed. Determine the frequency of each report and person responsible for creating for each report.
      5. Document your final choices in Phase 2 Tools and Templates Compendium – Tab 2.10 Reports.

      Input

      • Brainstorming
      • Phase 1 work product
      • Steps 2.1 – 2.11 work product

      Output

      • A list of reports used by the VMI
      • For each report
        • The conceptual content
        • A list of who will receive or have access
        • A creation/distribution frequency

      Materials

      • Phase 2 Tools and Templates Compendium – Tab 2.10 Reports

      Participants

      • VMI team
      • Applicable stakeholders and executives (as needed)

      Download the Info-Tech Phase 2 Tools and Templates Compendium

      Phase 3 - Run

      Implement your processes and leverage your tools and templates

      Phase 1

      Phase 2Phase 3Phase 4

      1.1 Mission Statement and Goals

      1.2 Scope

      1.3 Strengths and Obstacles

      1.4 Roles and Responsibilities

      2.1 Classification Model

      2.2 Risk Assessment Tool

      2.3 Scorecards and Feedback

      2.4 Business Alignment Meeting Agenda

      2.5 Relationship Alignment Document

      2.6 Vendor Orientation

      2.7 3-Year Roadmap

      2.8 90-Day Plan

      2.9 Quick Wins

      2.10 Reports

      3.1 Classify Vendors

      3.2 Compile Scorecards

      3.3 Conduct Business Alignment Meetings

      3.4 Work the 90-Day Plan

      3.5 Manage the 3-Year Roadmap

      3.6 Develop/Improve Vendor Relationships

      4.1 Incorporate Leading Practices

      4.2 Leverage Lessons Learned

      4.3 Maintain Internal Alignment

      This phase will walk you through the following activity:

      • Beginning to operate the VMI. The main outcomes from this phase are guidance and the steps required to initiate your VMI.

      This phase involves the following participants:

      • VMI team
      • Applicable stakeholders and executives
      • Others as needed

      Vendor Management Initiative Basics for the Small/Medium Businesses

      Phase 3 – Run

      Implement your processes and leverage your tools and templates

      All the hard work invested in Phase 1 – Plan and Phase 2 – Build begins to pay off in Phase 3 – Run. It's time to stand up your VMI and ensure that the proper level of resources is devoted to your vendors and the VMI itself. There's more hard work ahead, but the foundational elements are in place. This doesn't mean there won't be adjustments and modifications along the way, but you are ready to use the tools and templates in the real world; you are ready to begin reaping the fruits of your labor.

      Phase 3 – Run guides you through the process of collecting data, monitoring trends, issuing reports, and conducting effective meetings to:

      • Manage risk better.
      • Improve vendor performance.
      • Improve vendor relationships.
      • Identify areas where the parties can improve.
      • Improve communication between the parties.
      • Increase the value proposition with your vendors.

      Step 3.1 – Classify vendors

      Begin classifying your top 25 vendors by spend

      Step 3.1 sets the table for many of the subsequent steps in Phase 3 – Run. The results of your classification process will determine which vendors go through the scorecarding process (Step 3.2); which vendors participate in BAMs (Step 3.3), and which vendors you will devote relationship-building resources to (Step 3.6).

      As you begin classifying your vendors, Info-Tech recommends using an iterative approach initially to validate the results from the classification model you configured in Step 2.1.

      1. Identify your top 25 vendors by spend.
      2. Run your top 10 vendors by spend through the classification model and review the results.
        1. If the results are what you expected and do not contain any significant surprises, go to 3. on the next page.
        2. If the results are not what you expected or do contain significant surprises, look at the configuration page of the tool (Tab 1) and adjust the weights or the spend categories slightly. Be cautious in your evaluation of the results before modifying the configuration page - some legitimate results are unexpected, or are surprises based on bias. If you modify the weighting, review the new results and repeat your evaluation. If you modify the spend categories, review the answers on the vendor tabs to ensure that the answers are still accurate; review the new results and repeat your evaluation.

      Step 3.1 – Classify vendors (cont'd)

      Review your results and adjust the classification tool as needed

      1. Run your top 11-through-25 vendors by spend through the classification model and review the results. Identify any unexpected results. Determine if further configuration makes sense and repeat the process outlined in 2.b., previous page, as necessary. If no further modifications are required, continue to 4., below.
      2. Share the preliminary results with the leadership team, executives, and stakeholders to obtain their approval or adjustments to the results.
        1. They may have questions and want to understand the process before approving the results.
        2. They may request that you move a vendor from one quadrant to another based on your organization's roadmap, the vendor's roadmap, or other information not available to you.
      3. Identify the vendors that will be part of the VMI at this stage – how many and which ones. Based on this number and the VMI's scope (Step 1.2), make sure you have the resources necessary to accommodate the number of vendors participating in the VMI. Proceed cautiously and gradually increase the number of vendors participating in the VMI.

      Step 3.1 – Classify vendors (cont'd)

      Finalize the results and update VMI tools and templates

      1. Update the vendor inventory tool (Step 1.7) to indicate the current classification status for the top 25 vendors by spend. Once your vendors have been classified, you can sort the vendor inventory tool by classification status to see all the vendors in that category at once.
      2. Review your three-year roadmap (Step 2.9) and 90-day plans (Step 2.6) to determine if any modifications are needed to the activities and timelines.

      Additional classification considerations:

      • You should only have a few vendors that fit in the strategic category. As a rough guideline, no more than 5% to 10% of your IT vendors should end up in the strategic category. If you have many vendors, even 5% may be too many. the classification model is an objective start to the classification process, but common sense must prevail over the "math" at the end of the day.
      • At this point, there is no need to go beyond the top 25 by spend. Most VMIs starting out can't handle more than three to five strategic vendors initially. Allow the VMI to run a pilot program with a small sample size, work out any bugs, make adjustments, and then ramp up the VMI's rollout in waves. Vendors can be added quarterly, biannually, or annually, depending upon the desired goals and available resources.

      Step 3.1 – Classify vendors (cont'd)

      Align your vendor strategy to your classification results

      As your VMI matures, additional vendors will be part of the VMI. Review the table below and incorporate the applicable strategies into your deployment of vendor management principles over time. Stay true to your mission, goals, and scope, and remember that not all your vendors are of equal importance.

      Operational

      Strategic
      • Focus on spend containment
      • Concentrate on lowering total cost of ownership
      • Invest moderately in cultivating the relationship
      • Conduct BAMs biannually or annually
      • Compile scorecards quarterly or biannually
      • Identify areas for performance and cost improvement
      • Focus on value, collaboration, and alignment
      • Review market intelligence for the vendor's industry
      • Invest significantly in cultivating the relationship
      • Initiate executive-to-executive relationships
      • Conduct BAMs quarterly
      • Compile scorecards quarterly
      • Understand how the vendors view your organization

      Commodity

      Tactical
      • Investigate vendor rationalization and consolidation
      • Negotiate for the best-possible price
      • Leverage competition during negotiations
      • Streamline the purchasing and payment process
      • Allocate minimal VMI resources
      • Assign the lowest priority for vendor management metrics
      • Conduct risk assessments biannually or annually
      • Cultivate a collaborative relationship based on future growth plans or potential with the vendor
      • Conduct BAMs quarterly or biannually
      • Compile scorecards quarterly
      • Identify areas of performance improvement
      • Leverage innovation and creative problem solving

      Step 3.1 – Classify vendors (cont'd)

      Be careful when using the word "partner" with your strategic and other vendors

      For decades, vendors have used the term "partner" to refer to the relationship they have with their clients and customers. This is often an emotional ploy used by the vendors to get the upper hand. To fully understand the terms "partner" and "partnership", let's evaluate them through two more objective, less cynical lenses.

      If you were to talk to your in-house or outside legal counsel, you may be told that partners share in profits and losses, and they have a fiduciary obligation to each other. Unless there is a joint venture between the parties, you are unlikely to have a partnership with a vendor from this perspective.

      What about a "business" partnership — one that doesn't involve sharing profits and losses? What would that look like? Here are some indicators of a business partnership (or preferably a strategic alliance):

      • Trust and transparent communication exist.
      • You have input into the vendor's roadmap for products and services.
      • The vendor is aligned with your desired outcomes and helps you achieve success.
      • You and the vendor are accountable for actions and inactions, with both parties being at risk.
      • There is parity in the peer-to-peer relationships between the organizations (e.g. C-Level to C-Level).
      • The vendor provides transparency in pricing models and proactively suggests ways for you to reduce costs.
      • You and the vendor work together to make each party better, providing constructive feedback on a regular basis.
      • The vendor provides innovative suggestions for you to improve your processes, performance, the bottom line, etc.
      • Negotiations are not one-sided; they are meaningful and productive, resulting in an equitable distribution of money and risk.

      Step 3.1 – Classify vendors (cont'd)

      Understand the implications and how to leverage the words "partner" and "partnership"

      By now you might be thinking, "What's all the fuss? Why does it matter?" At Info-Tech, we've seen firsthand how referring to the vendor as a partner can have the following impact:

      • Confidences are disclosed unnecessarily.
      • Negotiation opportunities and leverage are lost.
      • Vendors no longer have to earn the customer's business.
      • Vendor accountability is missing due to shared responsibilities.
      • Competent skilled vendor resources are assigned to other accounts.
      • Value erodes over time since contracts are renewed without being competitively sourced.
      • One-sided relationships are established, and false assurances are provided at the highest levels within the customer organization.

      Proceed with caution when using partner or partnership with your vendors. Understand how your organization benefits from using these terms and mitigate the negatives outlined above by raising awareness internally to ensure people understand the psychology behind the terms. Finally, use the term to your advantage when warranted by referring to the vendor as a partner when you want or need something that the vendor is reluctant to provide. Bottom line: be strategic in how you refer to vendors and know the risks.

      Step 3.2 – Compile scorecards

      Begin scoring your top vendors

      The scorecard process typically is owned and operated by the VMI, but the actual rating of the criteria within the measurement categories is conducted by those with day-to-day interactions with the vendors, those using or impacted by the services and products provided by the vendors, and those with the skills to research other information on the scorecard (e.g. risk). Chances are one person will not be able to complete an entire scorecard by themselves. As a result, the scorecard process is a team sport comprised of sub-teams where necessary.

      The VMI will compile the scores, calculate the final results, and aggregate all the comments into one scorecard. There are two common ways to approach this task:

      1. Send out the scorecard template to those who will be scoring the vendor and ask them to return it when completed, providing them with a due date a few days before you need it; you'll need time to compile, calculate, and aggregate.
      2. Invite those who will be scoring the vendor to a meeting and let the contributors use that time to score the vendors; make VMI team members available to answer questions and facilitate the process.

      Step 3.2 – Compile scorecards (cont'd)

      Gather input from stakeholders and others impacted by the vendors

      Since multiple people will be involved in the scorecarding process or have information to contribute, the VMI will have to work with the reviewers to ensure he right mix of data is provided. For example:

      • If you are tracking lawsuits filed by or against the vendor, one person from Legal may be able to provide that, but they may not be able to evaluate any other criteria on the scorecard.
      • If you are tracking salesperson competencies, multiple people from multiple areas may have valuable insights.
      • If you are tracking deliverable timeliness, several project managers may want to contribute across several projects.

      Where one person is contributing exclusively to limited criteria, make it easy for them to identify the criteria they are to evaluate. When multiple people from the same functional area will provide insights, they can contribute individually (and the VMI will average their responses) or they can respond collectively after reaching consensus as a group.

      After the VMI has compiled, calculated, and aggregated, share the results with executives, impacted stakeholders, and others who will be attending the BAM for that vendor. Depending upon the comments provided by internal personnel, you may need to create a sanitized version of the scorecard for the vendor.

      Make sure your process timeline has a buffer built in. You'll be sending the final scorecard to the vendor three to five days before the BAM, and you'll need some time to assemble the results. The scorecarding process can be perceived as a low-priority activity for people outside of the VMI, and other "priorities" will arise for them. Without a timeline buffer, the VMI may find itself behind schedule and unprepared, due to things beyond its control.

      Step 3.3 – Conduct business alignment meetings

      Determine which vendors will participate and how long the meetings will last

      At their core, BAMs aren't that different from any other meeting. The basics of running a meeting still apply, but there are a few nuances that apply to BAMs. Set out below are leading practices for conducing your BAMs; adapt them to meet your needs and suit your environment.

      Who

      Initially, BAMs are conducted with the strategic vendors in your pilot program. Over time you'll add vendors until all your strategic vendors are meeting with you quarterly. After that, roll out the BAMs to those tactical and operational vendors located close to the strategic quadrant in the classification model (Steps 2.1 and 3.1) and as VMI resources allow. It may take several years before you are holding regular BAMs with all your strategic, tactical, and operational vendors.

      Duration

      Keep the length of your meetings reasonable. The first few with a vendor may need to be 60 to 90 minutes long. After that, you should be able to trim them to 45 minutes to 60 minutes. The BAM does not have to fill the entire time. When you are done, you are done.

      Step 3.3 – Conduct business alignment meetings (cont'd)

      Identify who will be invited and send out invitations

      Invitations

      Set up a recurring meeting whenever possible. Changes will be inevitable but keeping the timeline regular works to your advantage. Also, the vendors included in your initial BAMs won't change for twelve months. For the first BAM with a vendor, provide adequate notice; four weeks is usually sufficient, but calendars will fill up quickly for the main attendees from the vendor. Treat the meeting as significant and make sure your invitation reflects this. A simple meeting request will often be rejected, treated as optional, or ignored completely by the vendor's leadership team (and maybe yours as well!).

      Invitees

      Internal invitees should include those with a vested interest in the vendor's performance and the relationship. Other functional areas may be invited based on need or interest. Be careful the attendee list doesn't get too big. Based on this, internal BAM attendees often include representatives from IT, Sourcing/Procurement, and the applicable business units. At times, Finance and Legal are included.

      From the vendor's side, strive to have decision makers and key leaders attend. The salesperson/account manager is often included for continuity, but a director or vice president of sales will have more insights and influence. The project manager is not needed at this meeting due to the nature of the meeting and its agenda; however, a director or vice president from the product or service delivery area is a good choice. Bottom line: get as high into the vendor's organization as possible whenever possible; look at the types of contracts you have with that vendor to provide guidance on the type of people to invite.

      Step 3.3 – Conduct business alignment meetings (cont'd)

      Prepare for the Meetings and Maintain Control

      Preparation

      Send the scorecard and agenda to the vendor five days prior to the BAM. The vendor should provide you with any information you require for the meeting five days prior, as well.

      Decide who will run the meeting. Some customers like to lead, and others let the vendor present. How you craft the agenda and your preferences will dictate who runs the show.

      Make sure the vendor knows what materials they should bring to the meeting or have access to. This will relate to the agenda and any specific requests listed under the discussion points. You don't want the vendor to be caught off guard and unable to discuss a matter of importance to you.

      Running the BAM

      Regardless of which party leads, make sure you manage the agenda to stay on topic. This is your meeting – not the vendor's, not IT's, not Procurement's or Sourcing's. Don't let anyone hijack it.

      Make sure someone is taking notes. If you are running this virtually, consider recording the meeting. Check with your legal department first for any concerns, notices, or prohibitions that may impact your recording the session.

      Remember, this is not a sales call, and it is not a social activity. Innovation discussions are allowed and encouraged, but that can quickly devolve into a sales presentation. People can be friendly toward one another, but the relationship building should not overwhelm the other purposes.

      Step 3.3 – Conduct business alignment meetings (cont'd)

      Follow these additional guidelines to maximize your meetings

      More leading practices

      • Remind everyone that the conversation may include items covered by various confidentiality provisions or agreements.
      • Publish the meeting minutes on a timely basis (within 48 hours).
      • Focus on the bigger picture by looking at trends over time; get into the details only when warranted.
      • Meet internally immediately beforehand to prepare – don't go in cold. Review the agenda and the roles and responsibilities for the attendees.
      • Physical meetings are better than virtual meetings, but travel constraints, budgets, and pandemics may not allow for physical meetings.

      Final thoughts

      • When performance or the relationship is suffering, be constructive in your feedback and conversations rather than trying to assign blame; lead with the carrot rather than the stick.
      • Look for collaborative solutions whenever possible and avoid referencing the contract if possible. Communicate your willingness to help resolve outstanding issues.
      • Use inclusive language and avoid language that puts the vendor on the defensive.
      • Make sure that your meetings are not focused exclusively on the negative, but don't paint a rosy picture where one doesn't exist.
      • A vendor that is doing well should be commended. This is an important part of relationship building.

      Step 3.4 – Work the 90-day plan

      Monitor your progress and share your results

      Having a 90-day plan is a good start, but assuming the tasks on the plan will be accomplished magically or without any oversight can lead to failure. While it won't take a lot of time to work the plan, following a few basic guidelines will help ensure the 90-day plan gets results and wasn't created in vain.

      1. Measure and track your progress against the initial/current 90-day plan at least weekly; with a short timeline, any delay can have a huge impact.
      2. If adjustments are needed to any elements of the plan, understand the cause and the impact of those adjustments before making them.
      3. Make adjustments ONLY when warranted. The temptation will be to push activities and tasks further out on the timeline (or to the next 90-day plan!) when there is any sort of hiccup along the way, especially when personnel outside the VMI are involved. Hold true to the timeline whenever possible; once you start slipping, it often becomes a habit.
      4. Report on progress every week and hold people accountable for their assignments and contributions.
      5. Take the 90-day plan seriously and treat it as you would any significant project. This is part of the VMI's branding and image.

      Step 3.5 – Manage the three-year roadmap

      Keep an eye on the future since it will feed the present

      The three-year roadmap is a great planning tool, but it is not 100% reliable. There are inherent flaws and challenges. Essentially, the roadmap is a set of three "crystal balls" attempting to tell you what the future holds. The vision for year 1 may be clear, but for each subsequent year, the crystal ball becomes foggier. In addition, the timeline is constantly changing; before you know it, tomorrow becomes today and year 2 becomes year 1.

      To help navigate through the roadmap and maximize its potential, follow these principles:

      • Manage each year of the roadmap differently.
        • Review the year-1 map each quarter to update your 90-day plans (See steps 2.10 and 3.4).
        • Review the year-2 map every six months to determine if any changes are necessary. As you cycle through this, your vantage point of year 2 will be 6 months or 12 months away from the beginning of year 2, and time moves quickly.
        • Review the year-3 map annually, and determine what needs to be added, changed, or deleted. Each time you review year 3, it will be a "new" year 3 that needs to be built.
      • Analyze the impact on the proposed modifications from two perspectives: 1) What is the impact if a requested modification is made? 2) What is the impact if a requested modification is not made?
      • Validate all modifications with leadership and stakeholders before updating the three-year roadmap to ensure internal alignment.

      Step 3.6 – Develop/improve vendor relationships

      Drive better performance through better relationships

      One of the key components of a VMI is relationship management. Good relationships with your vendors provide many benefits for both parties, but they don't happen by accident. Do not assume the relationship will be good or is good merely because your organization is buying products and services from a vendor.

      In many respects, the VMI should mirror a vendor's sales organization by establishing relationships at multiple levels within the vendor organizations, not just with the salesperson or account manager. Building and maintaining relationships is hard work, but the return on investment makes it worthwhile.

      Business relationships are comprised of many components, not all of which must be present to have a great relationship. However, there are some essential components. Whether you are trying to develop, improve, or maintain a relationship with a vendor, make sure you are conscious of the following:

      • Focusing your energies on strategic vendors first and then tactical and operational vendors.
      • Being transparent and honest in your communications.
      • Continuously building trust by being responsive and honoring commitments (timely).
      • Creating a collaborative environment and build upon common ground.
      • Thanking the vendor when appropriate.
      • Resolving disputes early, avoiding the "blame game", and being objective when there are disagreements.

      Phase 4 - Review

      Keep your VMI up to date and running smoothly

      Phase 1

      Phase 2Phase 3Phase 4

      1.1 Mission Statement and Goals

      1.2 Scope

      1.3 Strengths and Obstacles

      1.4 Roles and Responsibilities

      2.1 Classification Model

      2.2 Risk Assessment Tool

      2.3 Scorecards and Feedback

      2.4 Business Alignment Meeting Agenda

      2.5 Relationship Alignment Document

      2.6 Vendor Orientation

      2.7 3-Year Roadmap

      2.8 90-Day Plan

      2.9 Quick Wins

      2.10 Reports

      3.1 Classify Vendors

      3.2 Compile Scorecards

      3.3 Conduct Business Alignment Meetings

      3.4 Work the 90-Day Plan

      3.5 Manage the 3-Year Roadmap

      3.6 Develop/Improve Vendor Relationships

      4.1 Incorporate Leading Practices

      4.2 Leverage Lessons Learned

      4.3 Maintain Internal Alignment

      This phase will walk you through the following activity:

      • Helping the VMI identify what it should stop doing, start doing, and continue doing as it improves and matures. The main outcomes from this phase are ways to advance the VMI and maintain internal alignment.

      This phase involves the following participants:

      • VMI team
      • Applicable stakeholders and executives
      • Others as needed

      Vendor Management Initiative Basics for the Small/Medium Businesses

      Phase 4 – Review

      Keep your VMI up to date and running smoothly

      As the adage says, "The only thing constant in life is change." This is particularly true for your VMI. It will continue to mature, people inside and outside of the VMI will change, resources will expand or contract from year to year, your vendor base will change. As a result, your VMI needs the equivalent of a physical every year. In place of bloodwork, x-rays, and the other paces your physician may put you through, you'll assess compliance with your policies and procedures, incorporate leading practices, leverage lessons learned, maintain internal alignment, and update governances.

      Be thorough in your actions during this Phase to get the most out of it. It requires more than the equivalent of gauging a person's health by taking their temperature, measuring their blood pressure, and determining their body mass index. Keeping your VMI up-to-date and running smoothly takes hard work.

      Some of the items presented in this Phase require an annual review; others may require quarterly review or timely review (i.e. when things are top of mind and current). For example, collecting lessons learned should happen on a timely basis rather than annually, and classifying your vendors should occur annually rather than every time a new vendor enters the fold.

      Ultimately, the goal is to improve over time and stay aligned with other areas internally. This won't happen by accident. Being proactive in the review of your VMI further reinforces the nature of the VMI itself – proactive vendor management, not reactive!

      Step 4.1 – Incorporate leading practices

      Identify and evaluate what external VMIs are doing

      The VMI's world is constantly shifting and evolving. Some changes will take place slowly, while others will occur quickly. Think about how quickly the cloud environment has changed over the past five years versus the 15 years before that; or think about issues that have popped up and instantly altered the landscape (we're looking at you COVID and ransomware). As a result, the VMI needs to keep pace, and one of the best ways to do that is to incorporate leading practices.

      At a high level, a leading practice is a way of doing something that is better at producing a particular outcome or result or performing a task or activity than other ways of proceeding. The leading practice can be based on methodologies, tools, processes, procedures, and other items. Leading practices change periodically due to innovation, new ways of thinking, research, and other factors. Consequently, a leading practice is to identify and evaluate leading practices each year.

      Step 4.1 – Incorporate leading practices (cont'd)

      Update your VMI based on your research

      • A simple approach for incorporating leading practices into your regular review process is set out below:
      • Research:
        • What other VMIs in your industry are doing.
        • What other VMIs outside your industry are doing.
        • Vendor management in general.
      • Based on your results, list specific leading practices others are doing that would improve your VMI (be specific – e.g. other VMIs are incorporating risk into their classification process).
      • Evaluate your list to determine which of these potential changes fit or could be modified to fit your culture and environment.
      • Recommend the proposed changes to leadership (with a short business case or explanation/justification, as needed) and gain approval.

      Remember: Leading practices or best practices may not be what is best for you. In some instances, you will have to modify them to fit in your culture and environment; in other instances, you will elect not to implement them at all (in any form).

      Step 4.2 – Leverage lessons learned

      Tap into the collective wisdom and experience of your team members

      There are many ways to keep your VMI running smoothly, and creating a lessons learned library is a great complement to the other ways covered in this Phase 4 - Review. By tapping into the collective wisdom of the team and creating a safe feedback loop, the VMI gains the following benefits:

      • Documented institutional wisdom and knowledge normally found only in the team members' brains.
      • The ability for one team member to gain insights and avoid mistakes without having to duplicate the events leading to the insights or mistakes.
      • Improved methodologies, tools, processes, procedures, skills, and relationships.

      Many of the processes raised in this Phase can be performed annually, but a lessons learned library works best when the information is deposited in a timely manner. How you choose to set up your lessons learned process will depend on the tools you select and your culture. You may want to have regular input meetings to share the lessons as they are being deposited, or you may require team members to deposit lessons learned on a regular basis (within a week after they happen, monthly, or quarterly). Waiting too long can lead to vague or lost memories and specifics; timeliness of the deposits is a crucial element.

      Step 4.2 – Leverage lessons learned (cont'd)

      Create a library to share valuable information across the team

      Lessons learned are not confined to identifying mistakes or dissecting bad outcomes. You want to reinforce good outcomes, as well. When an opportunity for a lessons-learned deposit arises, identify the following basic elements:

      • A brief description of the situation and outcome.
      • What went well (if anything) and why did it go well?
      • What didn't go well (if anything) and why didn't it go well?
      • What would/could you do differently next time?
      • A synopsis of the lesson(s) learned.

      Info-Tech Insights

      The lessons learned library needs to be maintained. Irrelevant material needs to be culled periodically, and older or duplicate material may need to be archived.

      the lessons learned process should be blameless. The goal is to share insightful information, not to reward or punish people based on outcomes or results.

      Step 4.3 – Maintain internal alignment

      Review the plans of other internal areas to stay in sync

      Maintaining internal alignment is essential for the ongoing success of the VMI. Over time, it is easy to lose sight of the fact that the VMI does not operate in a vacuum; it is an integral component of a larger organization whose parts must work well together to function optimally. Focusing annually on the VMI's alignment within the enterprise helps reduce any breakdowns that could derail the organization.

      To ensure internal alignment:

      • Review the key components of the applicable materials from Phase 1 - Plan and Phase 2 - Build with the appropriate members of the leadership team (e.g. executives, sponsors, and stakeholders). Not every item from those Phases and Steps needs to be reviewed but err on the side of caution for the first set of alignment discussions, and be prepared to review each item. You can gauge the audience's interest on each topic and move quickly when necessary or dive deeper when needed. Identify potential changes required to maintain alignment.
      • Review the strategic plans (e.g. 1-, 3-, and 5- year plans) for various portions of the organization if you have access to them or gather insights if you don't have access.
        • If the VMI is under the IT umbrella, review the strategic plans for IT and its departments.
        • Review the strategic plans for the areas the VMI works with (e.g. Procurement, Business Units).
        • The organization itself.
      • Create and vet a list of modifications to the VMI and obtain approval.
      • Develop a plan for making the necessary changes.

      Summary of Accomplishment

      Problem solved

      Vendor management is a broad, often overwhelming, comprehensive spectrum that encompasses many disciplines. By now, you should have a great idea of what vendor management can or will look like in your organization. Focus on the basics first: Why does the VMI exist and what does it hope to achieve? What is it's scope? What are the strengths you can leverage, and what obstacles must you manage? How will the VMI work with others? From there, the spectrum of vendor management will begin to clarify and narrow.

      Leverage the tools and templates from this blueprint and adapt them to your needs. They will help you concentrate your energies in the right areas and on the right vendors to maximize the return on your organization's investment in the VMI of time, money, personnel, and other resources. You may have to lead by example internally and with your vendors at first, but they will eventually join you on your path if you stay true to your course.

      At the heart of a good VMI is the relationship component. Don't overlook its value in helping you achieve your vendor management goals. The VMI does not operate in a vacuum, and relationships (internal and external) will be critical.

      Lastly, seek continual improvement from the VMI and from your vendors. Both parties should be held accountable, and both parties should work together to get better. Be proactive in your efforts, and you, the VMI, and the organization will be rewarded.

      If you would like additional support, have our analysts guide you through other phases as part of an Info-Tech Workshop

      Contact your account representative for more information

      workshops@infotech.com
      1-888-670-8889

      Related Info-Tech Research

      Prepare for Negotiations More Effectively
      Don't leave negotiation preparations and outcomes to chance. Learn how to prepare for negotiations more effectively and improve your results.

      Understand Common IT Contract Provisions to Negotiate More Effectively
      Info-Tech's guidance and insights will help you navigate the complex process of contract review and identify the key details necessary to maximize the protections for your organization.

      Capture and Market the ROI of Your VMO
      Calculating the impact or value of a vendor management office (VMO) can be difficult without the right framework and tools. Let Info-Tech's tools and templates help you account for the contributions made by your VMO.

      Bibliography

      Slide 5 – ISG Index 4Q 2021, Information Services Group, Inc., 2022.

      Slide 6 – ISG Index 4Q 2021, Information Services Group, Inc., 2022.

      Slide 7 – Geller & Company. "World-Class Procurement — Increasing Profitability and Quality." Spend Matters. 2003. Web. Accessed 4 Mar. 2019.

      Slide 26 – Guth, Stephen. The Vendor Management Office: Unleashing the Power of Strategic Sourcing. Lulu.com, 2007. Print. Protiviti. Enterprise Risk Management. Web. 16 Feb. 2017.

      Slide 34 – "Why Do We Perform Better When Someone Has High Expectations of Us?" The Decision Lab. Accessed January 31, 2022.

      Slide 56 - Top 10 Tips for Creating Compelling Reports," October 11, 2019, Design Eclectic. Accessed March 29, 2022.

      Slide 56 – "Six Tips for Making a Quality Report Appealing and Easy To Skim," Agency for Health Research and Quality. Accessed March 29, 2022.

      Slide 56 –Tucker, Davis. Marketing Reporting: Tips to Create Compelling Reports, March 28, 2020, 60 Second Marketer. Accessed March 29, 2022.

      Security Priorities 2022

      • Buy Link or Shortcode: {j2store}244|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Security Strategy & Budgeting
      • Parent Category Link: /security-strategy-and-budgeting
      • Ransomware activities and the cost of breaches are on the rise.
      • Cybersecurity talent is hard to find, and an increasing number of cybersecurity professionals are considering leaving their jobs.
      • Moving to the digital world increases the risk of a breach.

      Our Advice

      Critical Insight

      • The pandemic has fundamentally changed the technology landscape. Security programs must understand how their threat surface is now different and adapt their controls to meet the challenge.
      • The upside to the upheaval in 2021 is new opportunities to modernize your security program.

      Impact and Result

      • Use the report to ensure your plan in 2022 addresses what’s important in cybersecurity.
      • Understand the current situation in the cybersecurity space.

      Security Priorities 2022 Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Security Priorities 2022 – A report that describes priorities and recommendations for CISOs in 2022.

      Use this report to understand the current situation in the cybersecurity space and inform your plan for 2022. This report includes sections on protecting against and responding to ransomware, acquiring and retaining talent, securing a remote workforce, securing digital transformation, and adopting zero trust.

      • Security Priorities for 2022 Report

      Infographic

      Further reading

      Security Priorities 2022

      The pandemic has changed how we work

      disruptions to the way we work caused by the pandemic are here to stay.

      The pandemic has introduced a lot of changes to our lives over the past two years, and this is also true for various aspects of how we work. In particular, a large workforce moved online overnight, which shifted the work environment rapidly.

      People changed how they communicate, how they access company information, and how they connect to the company network. These changes make cybersecurity a more important focus than ever.

      Although changes like the shift to remote work occurred in response to the pandemic, they are largely expected to remain, regardless of the progression of the pandemic itself. This report will look into important security trends and the priorities that stemmed from these trends.

      30% more professionals expect transformative permanent change compared to one year ago.

      47% of professionals expect a lot of permanent change; this remains the same as last year. (Source: Info-Tech Tech Trends 2022 Survey; N=475)

      The cost of a security breach is rising steeply

      The shift to remote work exposes organizations to more costly cyber incidents than ever before.

      $4.24 million

      Average cost of a data breach in 2021
      The cost of a data breach rose by nearly 10% in the past year, the highest rate in over seven years.

      $1.07 million

      More costly when remote work involved in the breach

      The average cost of breaches where remote work is involved is $1.07 million higher than breaches where remote work is not involved.

      The ubiquitous remote work that we saw in 2021 and continue to see in 2022 can lead to more costly security events. (Source: IBM, 2021)

      Remote work is here to stay, and the cost of a breach is higher when remote work is involved.

      The cost comes not only directly from payments but also indirectly from reputational loss. (Source: IBM, 2021)

      Security teams can participate in the solution

      The numbers are clear: in 2022, when we face a threat environment like WE’VE never EXPERIENCED before, good security is worth the investment

      $1.76 million

      Saved when zero trust is deployed facing a breach

      Zero trust controls are realistic and effective controls.

      Organizations that implement zero trust dramatically reduce the cost of an adverse security event.

      35%

      More costly if it takes more than 200 days to identify and contain a breach

      With increased BYOD and remote work, detection and response is more challenging than ever before – but it is also highly effective.

      Organizations that detect and respond to incidents quickly will significantly reduce the impact. (Source: IBM, 2021)

      Breaches are 34% less costly when mature zero trust is implemented.

      A fully staffed and well-prepared security team could save the cost through quick responses. (Source: IBM, 2021)

      Top security priorities and constraints in 2022

      Survey results

      As part of its research process for the 2022 Security Priorities Report, Info-Tech Research Group surveyed security and IT leaders (N=97) to ask their top security priorities as well as their main obstacles to security success in 2022:

      Top Priorities
      A list of the top three priorities identified in the survey with their respective percentages, 'Acquiring and retaining talent, 30%', 'Protecting against and responding to ransomware, 23%', and 'Securing a remote workforce, 23%'.

      Survey respondents were asked to force-rank their security priorities.

      Among the priorities chosen most frequently as #1 were talent management, addressing ransomware threats, and securing hybrid/remote work.

      Top Obstacles
      A list of the top three obstacles identified in the survey with their respective percentages, 'Staffing constraints, 31%', 'Demand of ever-changing business environment, 23%', and 'Budget constraints, 15%'.

      Talent management is both the #1 priority and the top obstacle facing security leaders in 2022.

      Unsurprisingly, the ever-changing environment in a world emerging from a pandemic and budget constraints are also top obstacles.

      We know the priorities…

      But what are security leaders actually working on?

      This report details what we see the world demanding of security leaders in the coming year.

      Setting aside the demands – what are security leaders actually working on?

      A list of 'Top security topics among Info-Tech members' with accompanying bars, 'Security Strategy', 'Security Policies', 'Security Operations', 'Security Governance', and 'Security Incident Response'.

      Many organizations are still mastering the foundations of a mature cybersecurity program.

      This is a good idea!

      Most breaches are still due to gaps in foundational security, not lack of advanced controls.

      We know the priorities…

      But what are security leaders actually working on?

      A list of industries with accompanying bars representing their demand for security. The only industry with a significant positive percentage is 'Government'. Security projects included in annual plan relative to industry.

      One industry plainly stands out from the rest. Government organizations are proportionally much more active in security than other industries, and for good reason: they are common targets.

      Manufacturing and professional services are proportionally less interested in security. This is concerning, given the recent targeting of supply chain and personal data holders by ransomware gangs.

      5 Security Priorities for 2022 Logo for Info-Tech. Logo for ITRG.

      People

      1. Acquiring and Retaining Talent
        Create a good working environment for existing and potential employees. Invest time and effort into talent issues to avoid being understaffed.
      2. Securing a Remote Workforce
        Create a secure environment for users and help your people build safe habits while working remotely.

      Process

      1. Securing Digital Transformation
        Build in security from the start and check in frequently to create agile and secure user experiences.

      Technology

      1. Adopting Zero Trust
        Manage access of sensitive information based on the principle of least privilege.
      2. Protecting Against and Responding to Ransomware
        Put in your best effort to build defenses but also prepare for a breach and know how to recover.

      Main Influencing Factors

      COVID-19 Pandemic
      The pandemic has changed the way we interact with technology. Organizations are universally adapting their business and technology processes to fit the post-pandemic paradigm.
      Rampant Cybercrime Activity
      By nearly every conceivable metric, cybercrime is way up in the past two years. Cybercriminals smell blood and pose a more salient threat than before. Higher standards of cybersecurity capability are required to respond to this higher level of threat.
      Remote Work and Workforce Reallocation
      Talented IT staff across the globe enabled an extraordinarily fast shift to remote and distance work. We must now reckon with the security and human resourcing implications of this huge shift.

      Acquire and Retain Talent

      Priority 01

      Security talent was in short supply before the pandemic, and it's even worse now.

      Executive summary

      Background

      Cybersecurity talent has been in short supply for years, but this shortage has inflected upward since the pandemic.

      The Great Resignation contributed to the existing talent gap. The pandemic has changed how people work as well as how and where they choose work. More and more senior workers are retiring early or opting for remote working opportunities.

      The cost to acquire cybersecurity talent is huge, and the challenge doesn’t end there. Retaining top talent can be equally difficult.

      Current situation

      • A 2021 survey by ESG shows that 76% of security professional agree it’s difficult to recruit talent, and 57% said their organization is affected by this talent shortage.
      • (ISC)2 reports there are 2.72 million unfilled job openings and an increasing workforce gap (2021).

      2.72 million unfilled cybersecurity openings (Source: (ISC)2, 2021)

      IT leaders must do more to attract and retain talent in 2022

      • Over 70% of IT professionals are considering quitting their jobs (TalentLMS, 2021). Meanwhile, 51% of surveyed cybersecurity professionals report extreme burnout during the last 12 months and many of them have considered quitting because of it (VMWare, 2021).
      • Working remotely makes it easier for people to look elsewhere, lowering the barrier to leaving.
      • This is a big problem for security leaders, as cybersecurity talent is in very short supply. The cost of acquiring and retaining quality cybersecurity staff in 2022 is significant, and many organizations are unwilling or unable to pay the premium.
      • Top talent will demand flexible working conditions – even though remote work comes with security risk.
      • Most smart, talented new hires in 2022 are demanding to work remotely most of the time.
      Top reasons for resignations in 2021
      Burnout 30%
      Other remote opportunities 20%
      Lack of growth opportunities 20%
      Poor culture 20%
      Acquisition concerns 10%
      (Source: Survey of West Coast US cybersecurity professionals; TechBeacon, 2021)

      Talent will be 2022’s #1 strength and #1 weakness

      Staffing obstacles in 2022:

      “Attracting and retaining talent is always challenging. We don’t pay as well and my org wants staff in the office at least half of the time. Most young, smart, talented new hires want to work remotely 100 percent of the time.“

      “Trying to grow internal resources into security roles.”

      “Remote work expectations by employees and refusal by business to accommodate.”

      “Biggest obstacle: payscales that are out of touch with cybersecurity market.”

      “Request additional staff. Obtaining funding for additional position is most significant obstacle.”

      (Info-Tech Tech Security Priorities Survey 2022)
      Top obstacles in 2022:

      As you can see, respondents to our security priorities survey have strong feelings on the challenges of staffing a cybersecurity team.

      The growth of remote work means local talent can now be hired by anybody, vastly increasing your competition as an employer.

      Hiring local will get tougher – but so will hiring abroad. People who don’t want to relocate for a new job now have plenty of alternatives. Without a compelling remote work option, you will find non-local prospects unwilling to move for a new job.

      Lastly, many organizations are still reeling at the cost of experienced cybersecurity talent. Focused internal training and development will be the answer for many organizations.

      Recommended Actions

      Provide career development opportunities

      Many security professionals are dissatisfied with their unclear career development paths. To improve retention, organizations should provide their staff with opportunities and clear paths for career and skills advancement.

      Be open-minded when hiring

      To broaden the candidate pool, organizations should be open-minded when considering who to hire.

      • Enable remote work.
      • Do not fixate on certificates and years of experience; rather, be open to developing those who have the right interest and ability.
      • Consider using freelance workers.
      Facilitate work-life balance

      Many security professionals say they experience burnout. Promoting work-life balance in your organization can help retain critical skills.

      Create inclusive environment

      Hire a diverse team and create an inclusive environment where they can thrive.

      Talent acquisition and retention plan

      Use this template to explain the priorities you need your stakeholders to know about.

      Provide a brief value statement for the initiative.

      Address a top priority and a top obstacle with a plan to attract and retain top organizational and cybersecurity talent.

      Initiative Description:

      • Provide secure remote work capabilities for staff.
      • Work with HR to refine a hiring plan that addresses geographical and compensation gaps with cybersecurity and general staff.
      • Survey staff engagement to identify points of friction and remediate where needed.
      • Define a career path and growth plan for staff.
      Description must include what IT will undertake to complete the initiative.

      Primary Business Benefits:

      Arrow pointing down.
      Reduction in costs due to turnover and talent loss

      Other Expected Business Benefits:

      Arrow pointing up.
      Productivity due to good morale/ engagement
      Arrow pointing up.
      Improved corporate culture
      Align initiative benefits back to business benefits or benefits for the stakeholder groups that it impacts.

      Risks:

      • Big organizational and cultural changes
      • Increased attack surface of remote/hybrid workforce

      Related Info-Tech Research:

      Secure a Remote Workforce

      Priority 02

      Trends suggest remote work is here to stay. Addressing the risk of insecure endpoints can no longer be deferred.

      Executive summary

      Remote work poses unique challenges to cybersecurity teams. The personal home environment may introduce unauthorized people and unknown network vulnerabilities, and the organization loses nearly all power and influence over the daily cyber hygiene of its users.

      In addition, the software used for enabling remote work itself can be a target of cybersecurity criminals.

      Current situation

      • 70% of workers in technical services work from home.
      • Employees of larger firms and highly paid individuals are more likely to be working outside the office.
      • 80% of security and business leaders find that remote work has increased the risk of a breach.
      • (Source: StatCan, 2021)

      70% of tech workers work from home (Source: Statcan, 2021)

      Remote work demands new security solutions

      The security perimeter is finally gone

      The data is outside the datacenter.
      The users are outside the office.
      The endpoints are … anywhere and everywhere.

      Organizations that did not implement digital transformation changes following COVID-19 experience higher costs following a breach, likely because it is taking nearly two months longer, on average, to detect and contain a breach when more than 50% of staff are working remotely (IBM, 2021).

      In 2022 the cumulative risk of so many remote connections means we need to rethink how we secure the remote/hybrid workforce.

      Security
      • Distributed denial of service
      • DNS hijacking
      • Weak VPN protocols
      Identity
      • One-time verification allowing lateral movement
      Colorful tiles representing the surrounding security solutions. Network
      • Risk perimeter stops at corporate network edge
      • Split tunneling
      Authentication
      • Weak authentication
      • Weak password
      Access
      • Man-in-the-middle attack
      • Cross-site scripting
      • Session hijacking

      Recommended Actions

      Mature your identity management

      Compromised identity is the main vector to breaches in recent years. Stale accounts, contractor accounts, misalignment between HR and IT – the lack of foundational practices leads to headline-making breaches every week.
      Tighten up identity control to keep your organization out of the newspaper.

      Get a handle on your endpoints

      Work-from-home (WFH) often means unknown endpoints on unknown networks full of other unknown devices…and others in the home potentially using the workstation for non-work purposes. Gaining visibility into your endpoints can help to keep detection and resolution times short.

      Educate users

      Educate everyone on security best practices when working remotely:

      • Apply secure settings (not just defaults) to the home network.
      • Use strong passwords.
      • Identify suspicious email.
      Ease of use

      Many workers complain that the corporate technology solution makes it difficult to get their work done.

      Employees will take productivity over security if we force them to choose, so IT needs to listen to end users’ needs and provide a solution that is nimble and secure.

      Roadmap to securing remote/hybrid workforce

      Use this template to explain the priorities you need your stakeholders to know about.

      Provide a brief value statement for the initiative.

      The corporate network now extends to the internet – ensure your security plan has you covered.

      Initiative Description:

      • Reassess enterprise security strategy to include the WFH attack surface (especially endpoint visibility).
      • Ensure authentication requirements for remote workers are sufficient (e.g. MFA, strong passwords, hardware tokens for high-risk users/connections).
      • Assess the value of zero trust networking to minimize the blast radius in the case of a breach.
      • Perform penetration testing annually.
      Description must include what IT will undertake to complete the initiative.

      Primary Business Benefits:

      Arrow pointing down.


      Reduced cost of security incidents/reputational damage

      Other Expected Business Benefits:

      Arrow pointing up.
      Improved ability to attract and retain talent
      Arrow pointing up.
      Increased business adaptability
      Align initiative benefits back to business benefits or benefits for the stakeholder groups that it impacts.

      Risks:

      • Potential disruption to traditional working patterns
      • Cost of investing in WFH versus risk of BYOD

      Related Info-Tech Research:

      Secure Digital Transformation

      Priority 03

      Digital transformation could be a competitive advantage…or the cause of your next data breach.

      Executive summary

      Background

      Digital transformation is occurring at an ever-increasing rate these days. As Microsoft CEO Satya Nadella said early in the pandemic, “We’ve seen two years’ worth of digital transformation in two months.”

      We have heard similar stories from Info-Tech members who deployed rollouts that were scheduled to take months over a weekend instead.

      Microsoft’s own shift to rapidly expand its Teams product is a prime example of how quickly the digital landscape has changed. The global adaption to a digital world has largely been a success story, but rapid change comes with risk, and there is a parallel story of rampant cyberattacks like we have never seen before.

      Insight

      There is an adage that “slow is smooth, and smooth is fast” – the implication being that fast is sloppy. In 2022 we’ll see a pattern of organizations working to catch up their cybersecurity with the transformations we all made in 2020.

      $1.78 trillion expected in digital transformation investments (Source: World Economic Forum, 2021)

      An ounce of security prevention versus a pound of cure

      The journey of digital transformation is a risky one.

      Digital transformations often rely heavily on third-party cloud service providers, which increases exposure of corporate data.

      Further, adoption of new technology creates a new threat surface that must be assessed, mitigations implemented, and visibility established to measure performance.

      However, digital transformations are often run on slim budgets and without expert guidance.

      Survey respondents report as much: rushed deployments, increased cloud migration, and shadow IT are the top vulnerabilities reported by security leaders and executives.

      In a 2020 Ponemon survey, 82% of IT security and C-level executives reported experiencing at least one data breach directly resulting from a digital transformation they had undergone.

      Scope creep is inevitable on any large project like a digital transformation. A small security shortcut early in the project can have dire consequences when it grows to affect personal data and critical systems down the road.

      Recommended Actions

      Engage the business early and often

      Despite the risks, organizations engage in digital transformations because they also have huge business value.

      Security leaders should not be seeking to slow or stop digital transformations; rather, we should be engaging with the business early to get ahead of risks and enable successful transformation.

      Establish a vendor security program

      Data is moving out of datacenters and onto third-party environments. Without security requirements built into agreements, and clear visibility into vendor security capabilities, that data is a major source of risk.

      A robust vendor security program will create assurance early in the process and help to reinforce the responsibility of securing data with other parts of the organization.

      Build/revisit your security strategy

      The threat surface has changed since before your transformation. This is the right time to revisit or rebuild your security strategy to ensure that your control set is present throughout the new environment – and also a great opportunity to show how your current security investments are helping secure your new digital lines of business!

      Educate your key players

      Only 16% of security leaders and executives report alignment between security and business processes during digital transformation.

      If security is too low a priority, then key players in your transformation efforts are likely unaware of how security risks impact their own success. It will be incumbent upon the CISO to start that conversation.

      Securing digital transformation

      Use this template to explain the priorities you need your stakeholders to know about.

      Provide a brief value statement for the initiative.

      Ensure your investment in digital transformation is appropriately secured.

      Initiative Description:

      • Engage security with digital transformation and relevant governance structures (steering committees) to ensure security considerations are built into digital transformation planning.
      • Incorporate security stage gates in project management procedures.
      • Establish a vendor security assessment program.
      Description must include what IT will undertake to complete the initiative.

      Primary Business Benefits:

      Arrow pointing up.


      Increased likelihood of digital transformation success

      Other Expected Business Benefits:

      Arrow pointing up.
      Ability to make informed decisions for the field rep strategy
      Arrow pointing down.
      Reduced long-term cost of digital transformation
      Align initiative benefits back to business benefits or benefits for the stakeholder groups that it impacts.

      Risks:

      • Potential increased up front cost (reduced long-term cost)
      • Potential slowed implementation with security stage gates in project management

      Related Info-Tech Research:

      Adopt Zero Trust

      Priority 04

      Governments are recognizing the importance of zero trust strategies. So should your organization.

      Why now for zero trust?

      John Kindervag modernized the concept of zero trust back in 2010, and in the intervening years there has been enormous interest in cybersecurity circles, yet in 2022 only 30% of organizations report even beginning to roll out zero trust capabilities (Statista, 2022).

      Why such little action on a revolutionary and compelling model?

      Zero trust is not a technology; it is a principle. Zero trust adoption takes concerted planning, effort, and expense, for which the business value has been unclear throughout most of the last 10 years. However, several recent developments are changing that:

      • Securing technology has become very hard! The size, complexity, and attack surface of IT environments has grown significantly – especially since the pandemic.
      • Cyberattacks have become rampant as the cost to deploy harmful ransomware has become lower and the impact has become higher.
      • The shift away from on-premises datacenters and offices created an opening for zero trust investment, and zero trust technology is more mature than ever before.

      The time has come for zero trust adoption to begin in earnest.

      97% will maintain or increase zero trust budget (Source: Statista, 2022)

      Traditional perimeter security is not working

      Zero trust directly addresses the most prevalent attack vectors today

      A hybrid workforce using traditional VPN creates an environment where we are exposed to all the risks in the wild (unknown devices at any location on any network), but at a stripped-down security level that still provides the trust afforded to on-premises workers using known devices.

      What’s more, threats such as ransomware are known to exploit identity and remote access vulnerabilities before moving laterally within a network – vectors that are addressed directly by zero trust identity and networking. Ninety-three percent of surveyed zero trust adopters state that the benefits have matched or exceeded their expectations (iSMG, 2022).

      Top reasons for building a zero trust program in 2022

      (Source: iSMG, 2022)

      44%

      Enforce least privilege access to critical resources

      44%

      Reduce attacker ability to move laterally

      41%

      Reduce enterprise attack surface

      The business case for zero trust is clearer than ever

      Prior obstacles to Zero Trust are disappearing

      A major obstacle to zero trust adoption has been the sheer cost, along with the lack of business case for that investment. Two factors are changing that paradigm in 2022:

      The May 2021 US White House Executive Order for federal agencies to adopt zero trust architecture finally placed zero trust on the radar of many CEOs and board members, creating the business interest and willingness to consider investing in zero trust.

      In addition, the cost of adopting zero trust is quickly being surpassed by the cost of not adopting zero trust, as cyberattacks become rampant and successful zero trust deployments create a case study to support investment.

      Bar chart titled 'Cost to remediate a Ransomware attack' with bars representing the years '2021' and '2020'. 2021's cost sits around $1.8M while 2020's was only $750K The cost to remediate a ransomware attack more than doubled from 2020 to 2021. Widespread adoption of zero trust capabilities could keep that number from doubling again in 2022. (Source: Sophos, 2021)

      The cost of a data breach is on average $1.76 million less for organizations with mature zero trust deployments.

      That is, the cost of a data breach is 35% reduced compared to organizations without zero trust controls. (Source: IBM, 2021)

      Recommended Actions

      Start small

      Don’t put all your eggs in one basket by deploying zero trust in a wide swath. Rather, start as small as possible to allow for growing pains without creating business friction (or sinking your project altogether).

      Build a sensible roadmap

      Zero trust principles can be applied in a myriad of ways, so where should you start? Between identities, devices, networking, and data, decide on a use case to do pilot testing and then refine your approach.

      Beware too-good-to-be-true products

      Zero trust is a powerful buzzword, and vendors know it.

      Be skeptical and do your due diligence to ensure your new security partners in zero trust are delivering what you need.

      Zero trust roadmap

      Use this template to explain the priorities you need your stakeholders to know about.

      Provide a brief value statement for the initiative.

      Develop a practical roadmap that shows the business value of security investment.

      Initiative Description:

      • Define desired business and security outcomes from zero trust adoption.
      • Assess zero trust readiness.
      • Build roadmaps for zero trust:
        1. Identity
        2. Networking
        3. Devices
        4. Data
      Description must include what IT will undertake to complete the initiative.

      Primary Business Benefits:

      Arrow pointing up.


      Increased security posture and business agility

      Other Expected Business Benefits:

      Arrow pointing down.
      Reduced impact of security events
      Arrow pointing down.
      Reduced cost of managing complex control set
      Arrow pointing up.
      More secure business transformation (i.e. cloud/digital)
      Align initiative benefits back to business benefits or benefits for the stakeholder groups that it impacts.

      Risks:

      • Learning curve of implementation (start small and slow)
      • Transition from current control set to zero trust model

      Related Info-Tech Research:

      Protect Against and Respond to Ransomware

      Priority 05

      Ransomware is still the #1 threat to the safety of your data.

      Executive summary

      Background

      • Ransomware attacks have transformed in 2021 and show no sign of slowing in 2022. There is a new major security breach every week, despite organizations spending over $150 billion in a year on cybersecurity (Nasdaq, 2021).
      • Ransomware as a service (RaaS) is commonplace, and attackers are doubling down by holding encrypted data ransom and also demanding payment under threat to disclose exfiltrated data – and they are making good on their threats.
      • The global cost of ransomware is expected to rise to $265 billion by 2031 (Cybersecurity Ventures, 2021).
      • We expect to see an increase in ransomware incidents in 2022, both in severity and volume – multiple attacks and double extortion are now the norm.
      • High staff turnover increases risk because new employees are unfamiliar with security protocols.

      150% increase ransomware attacks in 2020 (Source: ENISA)

      This is a new golden age of ransomware

      What is the same in 2022

      Unbridled ransomware attacks make it seem like attackers must be using complex new techniques, but prevalent ransomware attack vectors are actually well understood.

      Nearly all modern variants are breaching victim systems in one of three ways:

      • Email phishing
      • Software vulnerabilities
      • RDP/Remote access compromise
      What is new in 2022
      The sophistication of victim targeting

      Victims often find themselves asking, “How did the attackers know to phish the most security-oblivious person in my staff?” Bad actors have refined their social engineering and phishing to exploit high-risk individuals, meaning your chain is only as strong as the weakest link.

      Ability of malware to evade detection

      Modern ransomware is getting better at bypassing anti-malware technology, for example, through creative techniques such as those seen in the MedusaLocker variant and in Ghost Control attacks.

      Effective anti-malware is still a must-have control, but a single layer of defense is no longer enough. Any organization that hopes to avoid paying a ransom must prepare to detect, respond, and recover from an attack.

      Many leaders still don’t know what a ransomware recovery would look like

      Do you know what it would take to recover from a ransomware incident?

      …and does your executive leadership know what it would take to recover?

      The organizations that are most likely to pay a ransom are unprepared for the reality of recovering their systems.

      If you have not done a tabletop or live exercise to simulate a true recovery effort, you may be exposed to more risk than you realize.

      Are your defenses sufficiently hardened against ransomware?

      Organizations with effective security prevention are often breached by ransomware – but they are prepared to contain, detect, and eradicate the infection.

      Ask yourself whether you have identified potential points of entry for ransomware. Assume that your security controls will fail.

      How well are your security controls layered, and how difficult would it be for an attacker to move east/west within your systems?

      Recommended Actions

      Be prepared for a breach

      There is no guarantee that an organization will not fall victim to ransomware, so instead of putting all their effort into prevention, organizations should also put effort into planning to respond to a breach.

      Security awareness training/phishing detection

      Phishing continues to be the main point of entry for ransomware. Investing in phishing awareness and detection among your end users may be the most impactful countermeasure you can implement.

      Zero trust adoption

      Always verify at every step of interaction, even when access is requested by internal users. Manage access of sensitive information based on the principle of least privilege access.

      Encrypt and back up your data

      Encrypt your data so that even if there is a breach, the attackers don’t have a copy of your data. Also, keep regular backups of data at a separate location so that you still have data to work with after a breach occurs.

      You never want to pay a ransom. Being prepared to deal with an incident is your best chance to avoid paying!

      Prevent and respond to ransomware

      Use this template to explain the priorities you need your stakeholders to know about.

      Provide a brief value statement for the initiative.

      Determine your current readiness, response plan, and projects to close gaps.

      Initiative Description:

      • Execute a systematic assessment of your current security and ransomware recovery capabilities.
      • Perform tabletop activities and live recoveries to test data recovery capabilities.
      • Train staff to detect suspicious communications and protect their identities.
      Description must include what IT will undertake to complete the initiative.

      Primary Business Benefits:

      Arrow pointing up.


      Improved productivity and brand protection

      Other Expected Business Benefits:

      Arrow pointing down.
      Reduced downtime and disruption
      Arrow pointing down.
      Reduced cost due to incidents (ransom payments, remediation)
      Align initiative benefits back to business benefits or benefits for the stakeholder groups that it impacts.

      Risks:

      • Friction with existing staff

      Related Info-Tech Research:

      Deepfakes: Dark-horse threat for 2022

      Deepfake video

      How long has it been since you’ve gone a full workday without having a videoconference with someone?

      We have become inherently trustful that the face we see on the screen is real, but the technology required to falsify that video is widely available and runs on commercially available hardware, ushering in a genuinely post-truth online era.

      Criminals can use deepfakes to enhance social engineering, to spread misinformation, and to commit fraud and blackmail.

      Deepfake audio

      Many financial institutions have recently deployed voiceprint authentication. TD describes its VoicePrint as “voice recognition technology that allows us to use your voiceprint – as unique to you as your fingerprint – to validate your identity” over the phone.

      However, hackers have been defeating voice recognition for years already. There is ripe potential for voice fakes to fool both modern voice recognition technology and the accounts payable staff.

      Bibliography

      “2021 Ransomware Statistics, Data, & Trends.” PurpleSec, 2021. Web.

      Bayern, Macy. “Why 60% of IT security pros want to quit their jobs right now.” TechRepublic, 10 Oct. 2018. Web.

      Bresnahan, Ethan. “How Digital Transformation Impacts IT And Cyber Risk Programs.” CyberSaint Security, 25 Feb. 2021. Web.

      Clancy, Molly. “The True Cost of Ransomware.” Backblaze, 9 Sept. 2021.Web.

      “Cost of a Data Breach Report 2021.” IBM, 2021. Web.

      Cybersecurity Ventures. “Global Ransomware Damage Costs To Exceed $265 Billion By 2031.” Newswires, 4 June 2021. Web.

      “Digital Transformation & Cyber Risk: What You Need to Know to Stay Safe.” Ponemon Institute, June 2020. Web.

      “Global Incident Response Threat Report: Manipulating Reality.” VMware, 2021.

      Granger, Diana. “Karmen Ransomware Variant Introduced by Russian Hacker.” Recorded Future, 18 April 2017. Web.

      “Is adopting a zero trust model a priority for your organization?” Statista, 2022. Web.

      “(ISC)2 Cybersecurity Workforce Study, 2021: A Resilient Cybersecurity Profession Charts the Path Forward.” (ISC)2, 2021. Web.

      Kobialka, Dan. “What Are the Top Zero Trust Strategies for 2022?” MSSP Alert, 10 Feb. 2022. Web.

      Kost, Edward. “What is Ransomware as a Service (RaaS)? The Dangerous Threat to World Security.” UpGuard, 1 Nov. 2021. Web.

      Lella, Ifigeneia, et al., editors. “ENISA Threat Landscape 2021.” ENISA, Oct. 2021. Web.

      Mello, John P., Jr. “700K more cybersecurity workers, but still a talent shortage.” TechBeacon, 7 Dec. 2021. Web.

      Naraine, Ryan. “Is the ‘Great Resignation’ Impacting Cybersecurity?” SecurityWeek, 11 Jan. 2022. Web.

      Oltsik, Jon. “ESG Research Report: The Life and Times of Cybersecurity Professionals 2021 Volume V.” Enterprise Security Group, 28 July 2021. Web.

      Osborne, Charlie. “Ransomware as a service: Negotiators are now in high demand.” ZDNet, 8 July 2021. Web.

      Osborne, Charlie. “Ransomware in 2022: We’re all screwed.” ZDNet, 22 Dec. 2021. Web.

      “Retaining Tech Employees in the Era of The Great Resignation.” TalentLMS, 19 Oct. 2021. Web.

      Rubin, Andrew. “Ransomware Is the Greatest Business Threat in 2022.” Nasdaq, 7 Dec. 2021. Web.

      Samartsev, Dmitry, and Daniel Dobrygowski. “5 ways Digital Transformation Officers can make cybersecurity a top priority.“ World Economic Forum, 15 Sept. 2021. Web.

      Seymour, John, and Azeem Aqil. “Your Voice is My Passport.” Presented at black hat USA 2018.

      Solomon, Howard. “Ransomware attacks will be more targeted in 2022: Trend Micro.” IT World Canada, 6 Jan. 2022. Web.

      “The State of Ransomware 2021.” Sophos, April 2021. Web.

      Tarun, Renee. “How The Great Resignation Could Benefit Cybersecurity.” Forbes Technology Council, Forbes, 21 Dec. 2021. Web.

      “TD VoicePrint.” TD Bank, n.d. Web.

      “Working from home during the COVID-19 pandemic, April 202 to June 2021.” Statistics Canada, 4 Aug. 2021. Web.

      “Zero Trust Strategies for 2022.” iSMG, Palo Alto Networks, and Optiv, 28 Jan. 2022. Web.

      IT Talent Trends 2022

      • Buy Link or Shortcode: {j2store}541|cart{/j2store}
      • member rating overall impact: 8.0/10 Overall Impact
      • member rating average dollars saved: After each Info-Tech experience, we ask our members to quantify the real-time savings, monetary impact, and project improvements our research helped them achieve.
      • member rating average days saved: Read what our members are saying
      • Parent Category Name: People & Leadership
      • Parent Category Link: /people-and-leadership

      Business and IT leaders aiming to build and keep successful teams in 2022 must:

      • Optimize IT in the face of a competitive labor market.
      • Build or maintain a culture of diversity, equity, and inclusion.
      • Manage the monumental shift to the new normal of remote work.
      • Weather the Great Resignation and come out on top.
      • Correctly assess development areas for their teams.
      • Justify investing in IT talent.

      Our Advice

      Critical Insight

      • If 2021 was about beginning to act on employee needs, 2022 will be about strategically examining each trend to ensure that the organization's promises to take action are more than lip service.
      • Employees have always been able to see through disingenuous attempts to engage them, but in 2022 the stakes are higher due to increased talent mobility.

      Impact and Result

      This report includes:

      • A concise, executive-ready trend report.
      • Data and insights from IT organizations from around the world.
      • Steps to take for each of the trends depending on your current maturity level.
      • Examples and case studies.
      • Links to in-depth Info-Tech research and tools.

      IT Talent Trends 2022 Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. IT Talent Trends Report for 2022 – A report to help you incorporate new ways of working into your business to build and keep the best team.

      Discover Info-Tech’s 2022 talent trends for IT leaders, which will provide insight into taking a strategic approach to navigate the post-pandemic IT talent landscape.

      • IT Talent Trends Report for 2022

      Infographic

      Further reading

      IT Talent Trends 2022

      The last two years have been a great experiment … but it’s not over yet.

      Incorporate new ways of working into your business to build and keep the best team.

      Over the past two years, organizations have ventured into unprecedented ways of working and supporting their employees, as they tried to maintain productivity through the pandemic. This experiment has made lasting changes to both business models and employee expectations, and these effects will continue to be seen long after we return to a “new normal.”

      While the pandemic forced us to work differently for the past two years, looking forward, successful organizations will incorporate new ways of working into their business models – beyond simply having a remote work policy.

      How we work, source roles, and develop talent continue to evolve as we navigate a different world with employees being more vocal in their desires, and leaders continue to play a key role.

      The IT talent market will never be the same, and organizations must reevaluate their employee experience from the bottom up to successfully weather the shift to the new normal.

      IT Talent Trends 2022

      Strategic Recruiting Finds Good Talent

      Finding talent in a strained talent market requires a marketing approach. Posting a job description isn’t enough.

      The (Not So) Great Resignation

      IT is faring better than other functions; however, specific industries need to pay attention.

      Grow Your DEI Practices Into Meaningful Actions

      Good intentions are not enough.

      Remote Work Is Here – Can Your Culture Adapt?

      The Great Experiment is over. Are leaders equipped to capitalize on its promises?

      Management Skills Drive Success in a Remote World

      Despite the need for remote team management training, it is still not happening.

      The pandemic has clarified employees’ needs and amplified their voices

      If 2021 was about beginning to act on employee needs, 2022 will be about strategically examining each trend to ensure that the actions taken by the organization are more than lip service.

      Employees have always been able to see through disingenuous attempts to engage them, but in 2022 the stakes are higher due to increased talent mobility.

      Trends that were just starting to come into focus last year have established themselves as critical determinants of the employee experience in 2022.

      2021

      DEI: A Top Talent ObjectiveRemote Work Is Here to StayUncertainty Unlocks PerformanceA Shift in Skills PrioritiesA Greater Emphasis on Wellbeing
      Arrow pointing down.Joiner pointing down.Joiner pointing down.

      2022

      Strategic Recruiting Finds Good Talent

      Finding talent in a strained talent market requires a marketing approach. Posting a job description isn’t enough.

      The (Not So) Great Resignation

      IT is faring better than other functions; however, specific industries need to pay attention.

      Grow Your DEI Practices Into Meaningful Actions

      Good intentions are not enough.

      Remote Work Is Here – Can Your Culture Adapt?

      The Great Experiment is over. Are leaders equipped to capitalize on its promises?

      Management Skills Drive Success in a Remote World

      Despite the need for remote team management training, it is still not happening.

      What employees are looking for is changing

      Superficial elements of traditional office culture were stripped away by the quick shift to a remote environment, giving employees the opportunity to reevaluate what truly matters to them in a job.

      The biggest change from 2019 (pre-pandemic) to today is increases in the importance of culture, flexible/remote work, and work-life balance.

      Organizations that fail to keep up with this shift in priorities will see the greatest difficulty in hiring and retaining staff.

      As an employee, which of the following would be important to you when considering a potential employer?

      2019 2021
      Flexible Work Pie graph representing response percentages from employees regarding importance of these factors. Flexible Work: 2019, Very 46%, Somewhat 49%, Not at All 5%.
      n=275
      Arrow pointing right. Pie graph representing response percentages from employees regarding importance of these factors. Flexible Work: 2021, Very 76%, Somewhat 21%, Not at All 2%.
      n=206
      Work-Life Balance Pie graph representing response percentages from employees regarding importance of these factors. Work-Life Balance: 2019, Very 67%, Somewhat 30%, Not at All 3%.
      n=277
      Arrow pointing right. Pie graph representing response percentages from employees regarding importance of these factors. Work-Life Balance: 2021, Very 80%, Somewhat 18%, Not at All 1%.
      n=206
      Culture Pie graph representing response percentages from employees regarding importance of these factors. Culture: 2019, Very 68%, Somewhat 31%, Not at All 1%.
      n=277
      Arrow pointing right. Pie graph representing response percentages from employees regarding importance of these factors. Culture: 2021, Very 81%, Somewhat 19%, Not at All 0%.
      n=206
      Source: Info-Tech Talent Trends Survey data collected in 2019 and 2021 Purple Very Important
      Blue Somewhat Important
      Green Not at All Important

      IT’s top talent priorities in 2022

      IT’s top Talent priorities reflect a post-pandemic focus on optimizing talent to fulfill strategic objectives: Top challenges for IT departments, by average rank, with 1 being the top priority.

      Important

      In the 2022 IT Talent Trends Survey, IT departments’ top priorities continue to be learning and innovation in support of organizational objectives. —› Enabling leaning and development within IT
      —› Enabling departmental innovation
      5.01
      5.54
      With employees being clearer and more vocal about their needs than ever before, employee experience has risen to the forefront of IT’s concern as a key enabler of strategic objectives. —› Providing a great employee experience for IT 5.66
      Supporting departmental change 6.01
      With organizations finally on the way to financial stability post pandemic, recruiting is a major focus. —› Recruiting (e.g. quickly filling vacant roles in IT with quality external talent) 6.18
      However, IT’s key efforts are threatened by critical omissions: Fostering a positive employee relations climate in the department 6.32
      Despite a focus on learning and development, leadership skills are not yet a top focus. —› Developing the organization's IT leaders 6.33
      Rapidly moving internal IT employees to staff strategic priorities 6.96
      Facilitating data-driven people decisions within IT 7.12
      Controlling departmental labor costs and maximizing the value of the labor spend 7.13
      Despite the need to provide a great employee experience, the focus on diversity, equity, and inclusion is low. —› Fostering an environment of diversity, equity, and inclusion in the department 7.31
      Despite prioritizing recruiting, IT departments see candidate experience as a last priority, either not focusing on it or relegating it to HR. —› Providing a great candidate experience for IT candidates 8.43
      (n=227)

      IT Talent Trends 2022

      Look beneath the surface of the trends to navigate them successfully

      Above Ground
      Focusing on what you see 'Above the line" won't solve the problem.

      Talent isn't a checklist.

      Strategic Recruiting Finds Good Talent

      Finding talent in a strained talent market requires a marketing approach. Posting a job description isn't enough.
      • The number of job openings increased to 11.4 million on the last business day of October, up from 10.6 million in September (US Bureau of Labor Statistics, Dec. 2021)

      The (Not So) Great Resignation

      IT is faring better than other functions; however, specific industries need to pay attention.
      • In September, in the US, 4.4 million people left their jobs. That number dropped to 4.2 million in October. (US Labor Stats, Dec. 2021)
      • 30% of workers will likely switch jobs if they have to return to the office full time. (McKinsey, Dec. 2021)

      Grow Your DEI Practices Into Meaningful Actions

      Good intentions are not enough.
      • 95% of organizations are focusing on DEI. (2022 HR Trends Report)
      • 48% of IT departments have delivered training on DEI over the past year.

      Remote Work is Here. Can Your Culture Adapt?

      The Great Experiment is over. Are you equipped to capitalize on its promises?
      • 85% of organizations saw the same or higher productivity during the pandemic.
      • 91% of organizations are continuing remote work.

      Management Skills Drive Success in a Remote World

      Despite the need for remote team management training, it is still not happening.
      • 72% of IT departments report high effectiveness at managing remote staff.
      • Learning and development is IT's top priority.
      Cross-section of the Earth and various plants with their root systems, highlighting the world above ground and below.
      Beneath the Surface
      For each trend, a strategic approach to get "under the line" will help form your response.

      Talent needs a holistic approach, as under the line everything is connected. If you are experiencing challenges in one area, analyzing data (e.g. engagement, exit surveys, effectiveness of DEI program and leader training) can help drive overall experience.

      • 100% of job seekers cite culture as somewhat to very important.
      • Only 40% of employers advertise culture in job postings.
      • 70% of IT departments state voluntary turnover is less than 10%
      • Top reasons for resignation are salary, development, and opportunity for innovative work.
      • Resignation rates were higher in fields that had experienced extreme stress due to the pandemic (HBR, Dec. 2021)
      • Senior leadership is overestimating their own commitment to DEI.
      • Most IT departments are not driving their own DEI initiatives.
      • Without effectively measuring DEI practices, organizations will see 1.6x more turnover. (2022 HR Trends Report)
      • Senior leadership is not open to remote work in 23% of organizations.
      • Without leadership support, employees will not buy into remote work initiatives.
      • A remote work policy will not bring organizational benefits without employee buy-in.
      • 75% of senior managers believe remote team management is highly effective, but only 60% of frontline staff agree.
      • Training focuses on technical skills, to the exclusion of soft skills, including management and leadership.
      Solutions
      Recommendations depending on your department's maturity level.
      Attention is required for candidate experience underpinned by a realistic employee value proposition. Gather and review existing data (e.g. early retirements, demographics) to understand your turnover rate. Use employee engagement tools to gauge employee sentiment among impacted groups and build out an engagement strategy to meet those needs. Conduct a cultural assessment to reveal hidden biases that may stand in the way of remote work efficacy. Provide management training on performance management and development coaching.

      Logo for Info-Tech.Logo for ITRG.

      This report is based on organizations just like yours

      Survey timeline = October 2021
      Total respondents = 245 IT professionals

      Geospatial map of survey responses shaded in accordance with the percentages listed below.
      01 United States 45% 08 Middle East 2%
      02 Canada 23% 09 Other (Asia) 2%
      03 Africa 8% 10 Germany 1%
      04 Great Britain 6% 11 India 1%
      05 Latin America, South America or Caribbean 4% 12 Netherlands 1%
      06 Other (Europe) 4% 13 New Zealand 1%
      07 Australia 2% (N-245)

      A bar chart titled 'Please estimate your organization's revenue in US$ (Use operating budget if you are a public-sector organization)' measuring survey responses. '$0 - less than 1M, 7%', '$1M - less than 5M, 4%', '$5M - less than 10M, 4%', '$10M - less than 25M, 6%', '$25M - less than 50M, 5%', '$50M - less than 100M, 13%', '$100M - less than 500M, 24%', '$500M - less than 1B, 9%', '1B - less than 5B, 22%', '$5B+, 8%'. (n=191)

      This report is based on organizations just like yours

      Industry

      Bar chart measuring percentage of survey respondents by industry. The largest percentages are from 'Government', 'Manufacturing', 'Media, information, Telecom & Technology', and 'Financial Services (including banking & insurance)'.

      Info-Tech IT Maturity Model

      Stacked bar chart measuring percentage of survey respondents by IT maturity level. Innovator is 7.11%, Business Partner is 16.44%, Trusted Operator is 24.89%, Firefighter is 39.11%, and Unstable is 12.44%.
      (n=225)

      Innovator – Transforms the Business
      Reliable Technology Innovation

      Business Partner – Expands the Business
      Effective Execution Projects, Strategic Use of Analytics and Customer Technology

      Trusted Operator – Optimizes Business
      Effective Fulfillment of Work Orders, Functional Business Applications, and Reliable Data Quality

      Firefighter – Supports the Business
      Reliable Infrastructure and IT Service Desk

      Unstable – Struggles to Support
      Inability to Provide Reliable Business Services

      This report is based on people just like you

      Which of the following ethnicities (ethnicity refers to a group with a shared or common identity, culture, and/or language) do you identify with? Select all that apply. What gender do you identify most with?
      A pie chart measuring percentage of survey respondents by ethnicity. Answers are 'White (e.g. European, North America), 59%', 'Asian (e.g. Japan, India, Philippines, Uzbekistan), 12%', 'Black (e.g. Africa, Caribbean, North America), 12%', 'Latin/Hispanic (e.g. Cuba, Guatemala, Spain, Brazil), 7%', 'Middle Eastern (e.g. Lebanon, Libya, Iran), 4%', 'Indigenous (e.g. First Nations, Inuit, Metis, Maori), 3%', 'Indo-Caribbean (e.g. Trinidad & Tobago, Guyana, St. Vincent), 3%'.
      (N=245)
      A pie chart measuring percentage of survey respondents by gender. Answers are 'Male, 67%', 'Female, 24%', 'Prefer not to answer, 5%', 'No Specification, 4%', 'Intersex, 0%'.
      (n=228)

      This report is based on people just like you

      What is your sub-department of IT? Which title best describes your position?
      Bar chart measuring percentage of survey respondents by sub-department. The top three answers are 'Senior Leadership', 'Infrastructure and Operations', and 'Application Development'.
      (n=227)
      Bar chart measuring percentage of survey respondents by title. The top four answers are 'Director-level, 29%', 'Manager, 22%', 'C-Level Officer, 18%', and 'VP-level, 11%.'
      (N=245)

      IT Talent Trends 2022

      Each trend is introduced with key questions you can ask yourself to see how your department fares in that area.

      The report is based on statistics from a survey of 245 of your peers.

      It includes recommendations of next steps and a key metric to track your success.

      It lists Info-Tech resources that you, as a member, can leverage to begin your journey to improve talent management in your department.

      Strategic Recruiting Finds Good Talent

      Finding talent in a strained talent market requires a marketing approach. Posting a job description isn’t enough.

      The (Not So) Great Resignation

      IT is faring better than other functions; however, specific industries need to pay attention.

      Grow Your DEI Practices Into Meaningful Actions

      Good intentions are not enough.

      Remote Work Is Here – Can Your Culture Adapt?

      The Great Experiment is over. Are leaders equipped to capitalize on its promises?

      Management Skills Drive Success in a Remote World

      Despite the need for remote team management training, it is still not happening.

      The report is based on data gathered from Info-Tech Research Group’s 2022 IT Talent Trends Survey. The data was gathered in September and October of 2021.

      Strategic Recruiting Finds Good Talent

      Trend 1 | The Battle to Find and Keep Talent

      As the economy has stabilized, more jobs have become available, creating a job seeker’s market. This is a clear sign of confidence in the economy, however fragile, as new waves of the pandemic continue.

      Info-Tech Point of View

      Recruiting tactics are an outcome of a well-defined candidate experience and employee value proposition.

      Introduction

      Cross-section of a plant and its roots, above and below ground. During our interviews, members that focused on sharing their culture with a strong employee value proposition were more likely to be successful in hiring their first-choice candidates.
      Questions to ask yourself
      • Do you have a well-articulated employee value proposition?
      • Are you using your job postings to market your company culture?
      • Have you explored multiple channels for posting jobs to increase your talent pool of candidates?

      47% of respondents are hiring external talent to fill existing gaps, with 40% using external training programs to upgrade current employees. (Info-Tech IT Talent Trends 2022 Survey)

      In October, the available jobs (in the USA) unexpectedly rose to 11 million, higher than the 10.4 million experts predicted. (CNN Business, 2021)

      Where has all the talent gone?

      IT faces multiple challenges when recruiting for specialized talent

      Talent scarcity is focused in areas with specialized skill sets such as security and architecture that are dynamic and evolving faster than other skill sets.

      “It depends on what field you work in,” said ADP chief economist Nela Richardson. “There were labor shortages in those fields pre-pandemic and two years forward, there is even more demand for people with those skills” (CNBC, 19 Nov. 2021).

      37% of IT departments are outsourcing roles to fill internal skill shortages. (Info-Tech Talent Trends 2022 Survey)

      Roles Difficult to Fill

      Horizontal bar chart measuring percentage of survey responses about which roles are most difficult to fill. In order from most difficult to least they are 'Security (n=177)', 'Enterprise Architecture (n=172)', 'Senior Leadership (n=169)', 'Data & Business Intelligence (n=171)', 'Applications Development (n=177)', 'Infrastructure & Operations (n=181)', 'Business Relationship Management (n=149)', 'Project Management (n=175)', 'Vendor Management (n=133)', 'Service Desk (n=184)'.(Info-Tech Talent Trends 2022 Survey)

      Case Study: Using culture to drive your talent pool

      This case study is happening in real time. Please check back to learn more as Goddard continues to recruit for the position.

      Recruiting at NASA

      Goddard Space Center is the largest of NASA’s space centers with approximately 11,000 employees. It is currently recruiting for a senior technical role for commercial launches. The position requires consulting and working with external partners and vendors.

      NASA is a highly desirable employer due to its strong culture of inclusivity, belonging, teamwork, learning, and growth. Its culture is anchored by a compelling vision, “For the betterment of Humankind,” and amplified by a strong leadership team that actively lives their mission and vision daily.

      Firsthand lists NASA as #1 on the 50 most prestigious internships for 2022.

      Rural location and no flexible work options add to the complexity of recruiting

      The position is in a rural area of Eastern Shore Virginia with a population of approximately 60,000 people, which translates to a small pool of candidates. Any hire from outside the area will be expected to relocate as the senior technician must be onsite to support launches twice a month. Financial relocation support is not offered and the position is a two-year assignment with the option of extension that could eventually become permanent.

      Photo of Steve Thornton, Acting Division Chief, Solutions Division, Goddard Space Flight Center, NASA.

      “Looking for a Talent Unicorn; a qualified, experienced candidate with both leadership skills and deep technical expertise that can grow and learn with emerging technologies.”

      Steve Thornton
      Acting Division Chief, Solutions Division,
      Goddard Space Flight Center, NASA

      Case Study: Using culture to drive your talent pool

      A good brand overcomes challenges

      Culture takes the lead in NASA's job postings, which attract a high number of candidates. Postings begin with a link to a short video on working at NASA, its history, and how it lives its vision. The video highlights NASA's diversity of perspectives, career development, and learning opportunities.

      NASA's company brand and employer brand are tightly intertwined, providing a consistent view of the organization.

      The employer vision is presented in the best place to reach NASA's ideal candidate: usajobs.gov, the official website of the United States Government and the “go-to” for government job listings. NASA also extends its postings to other generic job sites as well as LinkedIn and professional associations.

      Photo of Robert Leahy, Chief Information Officer, Goddard Space Flight Center, NASA.

      Interview with Robert Leahy
      Chief Information Officer
      Goddard Space Flight Center, NASA

      “Making sure we have the tools and mechanisms are two hiring challenges we are going to face in the future as how we work evolves and our work environment changes. What will we need to consider with our job announcements and the criteria for selecting employees?”

      Liteshia Dennis,
      Office Chief, Headquarter IT Office, Goddard Space Flight Center, NASA

      The ability to attract and secure candidates requires a strategy

      Despite prioritizing recruiting, IT departments see candidate experience as THE last Priority, either not focusing on it or relegating it to HR

      Candidate experience is listed as one of the bottom IT challenges, but without a positive experience, securing the talent you want will be difficult.

      Candidate experience starts with articulating your unique culture, benefits, and opportunities for development and innovative work as well as outlining flexible working options within an employer brand. Defining an employee value proposition is key to marketing your roles to potential employees.

      81% of respondents' rate culture as very important when considering a potential employer. (Info-Tech IT Talent Trends 2022 Survey)

      Tactics Used in Job Postings to Position the Organization Favorably as a Potential Employer

      Horizontal bar chart measuring percentage of survey responses about tactics used in job postings. The top tactics are 'Culture, 40%', 'Benefits, 40%', 'Opportunity for Innovative Work, 30%', and 'Professional Development, 30%'.(Info-Tech IT Talent Trends 2022 Survey)

      Case Study: Increasing talent pool at Info-Tech Research Group

      Strong sales leads to growth in operation capacity

      Info-Tech Research Group is an IT research & advisory firm helping IT leaders make strategic, timely, and well-informed decisions. Our actionable tools and analyst guidance ensure IT organizations achieve measurable results.

      The business has grown rapidly over the last couple of years, creating a need to recruit additional talent who were highly skilled in technical applications and approaches.

      In response, approval was given to expand headcount within Research for fiscal year 2022 and to establish a plan for continual expansion as revenue continues to grow.

      Looking for deep technical expertise with a passion for helping our members

      Hiring for our research department requires talent who are typically subject matter experts within their own respective IT domains and interested in and capable of developing research and advising clients through calls and workshops.

      This combination of skills, experience, and interest can be challenging to find, especially in an IT labor market that is more competitive than ever.

      Photo of Tracy-Lynn Reid, Practice Lead.

      Interview with Practice Lead Tracy-Lynn Reid

      Focus on Candidate Experience increases successful hire rate

      The senior leadership team established a project to focus on recruiting for net-new and open roles. A dedicated resource was assigned and used guidance from our research to enhance our hiring process to reduce time to hire and expand our candidate pool. Senior leaders stayed actively involved to provide feedback.

      The hiring process was improved by including panel interviews with interview protocols and a rubric to evaluate all candidates equitably.

      The initial screening conversation now includes a discussion on benefits, including remote and flexible work offerings, learning and development budget, support for post-secondary education, and our Buy-a-Book program.

      As a result, about 70% of the approved net-new headcount was hired within 12 weeks, with recruitment ongoing.

      Improve Service Desk Ticket Queue Management

      • Buy Link or Shortcode: {j2store}492|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Service Desk
      • Parent Category Link: /service-desk
      • Service desk tickets pile up in the queue, get lost or buried, jump between queues without progress, leading to slow response and resolution times, a seemingly insurmountable backlog and breached SLAs.
      • There are no defined rules or processes for how tickets should be assigned and routed and technicians don’t know how to prioritize their assigned work, meaning tickets take too long to get to the right place and aren’t always resolved in the correct or most efficient order.
      • Nobody has authority or accountability for queue management, meaning everyone has eyes only on their own tickets while others fall through the cracks.

      Our Advice

      Critical Insight

      If everybody is managing the queue, then nobody is. Without clear ownership and accountability over each and every queue, then it becomes too easy for everyone to assume someone else is handling or monitoring a ticket when in fact nobody is. Assign a Queue Manager to each queue and ensure someone is responsible for monitoring ticket movement across all the queues.

      Impact and Result

      • Clearly define your queue structure, organize the queues by content, then assign resources to relevant queues depending on their role and expertise.
      • Define and document queue management processes, from initial triage to how to prioritize work on assigned tickets. Once processes have been defined, identify opportunities to build in automation to improve efficiency.
      • Ensure everyone who handles tickets is clear on their responsibilities and establish clear ownership and accountability for queue management.

      Improve Service Desk Ticket Queue Management Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Ticket Queue Management Deck – A guide to service desk ticket queue management best practices and advice

      This storyboard reviews the top ten pieces of advice for improving ticket queue management at the service desk.

      • Improve Service Desk Ticket Queue Management Storyboard

      2. Service Desk Queue Structure Template – A template to help you map out and optimize your service desk ticket queues

      This template includes several examples of service desk queue structures, followed by space to build your own model of your optimal service desk queue structure and document who is assigned to each queue and responsible for managing each queue.

      • Service Desk Queue Structure Template
      [infographic]

      Further reading

      Improve Service Desk Ticket Queue Management

      Strong queue management is the foundation to good customer service

      Analyst Perspective

      Secure your foundation before you start renovating.

      Service Desk and IT leaders who are struggling with low efficiency, high backlogs, missed SLAs, and poor service desk metrics often think they need to hire more resources or get a new ITSM tool with better automation and AI capabilities. However, more often than not, the root cause of their challenges goes back to the fundamentals.

      Strong ticket queue management processes are critical to the success of all other service desk processes. You can’t resolve incidents and fulfill service requests in time to meet SLAs without first getting the ticket to the right place efficiently and then managing all tickets in the queue effectively. It sounds simple, but we see a lot of struggles around queue management, from new tickets sitting too long before being assigned, to in-progress tickets getting buried in favor of easier or higher-priority tickets, to tickets jumping from queue to queue without progress, to a seemingly insurmountable backlog.

      Once you have taken the time to clearly structure your queues, assign resources, and define your processes for routing tickets to and from queues and resolving tickets in the queue, you will start to see response and resolution time decrease along with the ticket backlog. However, accountability for queue management is often overlooked and is really key to success.
      This is an image of Dr. Natalie Sansone, Senior Research Analyst at Info-Tech Research Group

      Natalie Sansone, PhD
      Senior Research Analyst, Infrastructure & Operations
      Info-Tech Research Group

      Executive Summary

      Your Challenge

      • Tickets come into the service desk via multiple channels (email, phone, chat, portal) and aren’t consolidated into a single queue, making it difficult to know what to prioritize.
      • New tickets sit in the queue for too long before being assigned while assigned tickets sit for too long without progress or in the wrong queue, leading to slow response and resolution times.
      • Tickets quickly pile up in the queues, get lost or buried, or jump between queues without finding the right home, leading to a seemingly insurmountable backlog and breached SLAs.

      Common Obstacles

      • All tickets pile into the same queue, making it difficult to view, manage, or know who’s working on what.
      • There are no defined rules or processes for how tickets should be assigned and routed, meaning they often take too long to get to the right place.
      • Technicians have no guidelines as to how to prioritize their work, and no easy way to organize their tickets or queue to know what to work on next.
      • Nobody has authority or accountability for queue management, meaning everyone has eyes only on their own tickets while others fall through the cracks.

      Info-Tech’s Approach

      • Clearly define your queue structure, organize the queues by content, then assign resources to relevant queues depending on their role and expertise.
      • Define and document queue management processes, from initial triage to how to prioritize work on assigned tickets. Ensure everyone who handles tickets is clear on their responsibilities.
      • Establish clear ownership and accountability for queue management.
      • Once processes have been defined, identify opportunities to build in automation to improve efficiency.

      Info-Tech Insight

      If everybody is managing the queue, then nobody is. Without clear ownership and accountability over each and every queue it becomes too easy for everyone to assume someone else is handling or monitoring a ticket when in fact nobody is. Assign a Queue Manager to each queue and ensure someone is responsible for monitoring ticket movement across all the queues.

      Timeliness is essential to customer satisfaction

      And timeliness can’t be achieved without good queue management practices.

      As soon as that ticket comes in, the clock starts ticking…

      A host of different factors influence service desk response time and resolution time, including process optimization and documentation, workflow automation, clearly defined prioritization and escalation rules, and a comprehensive and easily accessible knowledgebase.

      However, the root cause of poor response and resolution time often comes down to the basics like ticket queue management. Without clearly defined processes and ownership for assigning and actioning tickets from the queue in the most effective order and manner, customer satisfaction will suffer.

      For every 12-hour delay in response time*, CSAT drops by 9.6%.

      *to email and web support tickets
      Source: Freshdesk, 2021

      A Freshworks analysis of 107 million service desk interactions found the relationship between CSAT and response time is stronger than resolution time - when customers receive prompt responses and regular updates, they place less value on actual resolution time.

      A queue is simply a line of people (or tickets) waiting to be helped

      When customers reach out to the service desk for help, their messages are converted into tickets that are stored in a queue, waiting to be actioned appropriately.

      Ticket Queue

      Email/web
      Ideally, the majority of tickets come into the ticket queue through email or a self-service portal, allowing for appropriate categorization, prioritization, and assignment.

      Phone
      For IT teams with a high volume of support requests coming in through the phone, reducing wait time in queue may be a priority.

      Chat
      Live chat is growing in popularity as an intake method and may require routing and distribution rules to prevent long or multiple queues.

      Queue Management

      Queue management is a set of processes and tools to direct and monitor tickets or manage ticket flow. It involves the following activities:

      • Review incoming tickets
      • Categorize and prioritize tickets
      • Route or assign appropriately
      • View or update ticket status
      • Monitor resource workload
      • Ensure tickets are being actioned in time
      • Proactively identify SLA breaches

      Ineffective queue management can bury you in backlog

      Ticket backlog with poor queue management

      Without a clear and efficient process or accountability for moving incoming tickets to the right place, tickets will be worked on randomly, older tickets will get buried, the backlog will grow, and SLAs will be missed.

      Ticket backlog with good queue management

      With effective queue management and ownership, tickets are quickly assigned to the right resource, worked on within the appropriate SLO/SLA, and actively monitored, leading to a more manageable backlog and good response and resolution times.

      A growing backlog will quickly lead to dissatisfied end users and staff

      Failing to efficiently move tickets from the queue or monitor tickets in the queue can quickly lead to tickets being buried and support staff feeling buried in tickets.

      Common challenges with queue management include:

      • Tickets come in through multiple channels and aren’t consolidated into a single queue
      • New tickets sit unassigned for too long, resulting in long response times
      • Tickets move around between multiple queues with no clear ownership
      • Assigned tickets sit too long in a queue without progress and breach SLA
      • No accountability for queue ownership and monitoring
      • Technicians cherry pick the easiest tickets from the queue
      • Technicians have no easy way to organize their queue to know what to work on next

      This leads to:

      • Long response times
      • Long resolution times
      • Poor workload distribution and efficiency
      • High backlog
      • Disengaged, frustrated staff
      • Dissatisfied end users

      Info-Tech Insight

      A growing backlog will quickly lead to frustrated and dissatisfied customers, causing them to avoid the service desk and seek alternate methods to get what they need, whether going directly to their favorite technician or their peers (otherwise known as shadow IT).

      Dig yourself out with strong queue management

      Strong queue management is the foundation to good customer service.

      Build a mature ticket queue management process that allows your team to properly prioritize, assign, and work on tickets to maximize response and resolution times.

      A mature queue management process will:

      • Reduce response time to address tickets.
      • Effectively prioritize tickets and ensure everyone knows what to work on next.
      • Ensure tickets get assigned and routed to the right queue and/or resource efficiently.
      • Reduce overall resolution time to resolve tickets.
      • Enable greater accountability for queue management and monitoring of tickets.
      • Improve customer and employee satisfaction.

      As queue management maturity increases:
      Response time decreases
      Resolution time decreases
      Backlog decreases
      End-user satisfaction increases

      Ten Tips to Effectively Manage Your Queue

      The remaining slides in this deck will review these ten pieces of advice for designing and managing your ticket queues effectively and efficiently.

      1. Define your optimal queue structure
      2. Design and assign resources to relevant queues
      3. Define and document queue management processes
      4. Clearly define queue management responsibilities for every team member
      5. Establish clear ownership & accountability over all queues
      6. Always keep ticket status and documentation up to date
      7. Shift left to reduce queue volume
      8. Build-in automation to improve efficiency
      9. Configure your ITSM tool to support and optimize queue management processes
      10. Don’t lose visibility of the backlog

      #1: Define your optimal queue structure

      There is no one right way to do queue management; choose the approach that will result in the highest value for your customers and IT staff.

      Sample queue structures

      This is an image of a sample Queue structure, where Incoming Tickets from all channels pass through auto or manual Queue assignment, to a numbered queue position.

      *Queues may be defined by skillset, role, ticket category, priority, or a hybrid.

      Triage and Assign

      • All incoming tickets are assigned to an appropriate queue based on predefined criteria.
      • Queue assignment may be done through automated workflows based on specific fields within the ticket, or manually by a
      • Queue Manager, dedicated coordinator, or Tier 1 staff.
      • Queues may be defined based on:
        • Skillset/team (e.g. Infrastructure, Security, Apps, etc.)
        • Ticket category (e.g. Network, Office365, Hardware, etc.)
        • Priority (e.g. P1, P2, P3, P4, P5)
      • Resources may be assigned to multiple queues.

      Define your optimal queue structure (cont.)

      Tiered generalist model

      • All incidents and service requests are routed to Tier 1 first, who prioritize and, if appropriate, conduct initial triage, troubleshooting, and resolution on a wide range of issues.
      • More complex or high-priority tickets are escalated to resources at Tier 2 and/or Tier 3, who are specialists working on projects in addition to support tickets.
      This is an image of the Tiered Generalist Model

      Unassigned queue

      • Very small teams may work from an unassigned queue if there are processes in place to monitor tickets and workload balance.
      • Typically, these teams work by resolving the oldest tickets first regardless of complexity (also known as First In, First Out or FIFO). However, this doesn’t allow for much flexibility in terms of priority of the request or customer.
      This is an image of an unassigned queue model

      #2: Design and assign resources to relevant queues

      Once you’ve defined your overall structure, define the content of each queue.

      This image depicts a sample queue organization structure. The bin titles are: Workgroup; Customer Group; Problem Type; and Hybrid

      Info-Tech Insight

      Start small; don’t create a queue for every possible ticket type. Remember that someone needs to be accountable for each of these queues, so only build what you can monitor.

      #3 Define and document queue management processes

      A clear, comprehensive, easily digestible SOP or workflow outlining the steps for handling new tickets and working tickets from the queue will help agents deliver a consistent experience.

      PROCESS INCLUDES:

      DEFINE THE FOLLOWING:

      TRIAGING INCOMING TICKETS

      • Ensure a ticket is created for every issue coming from every channel (e.g. phone, email, chat, walk-in, portal).
      • Assign a priority to each ticket.
      • Categorize ticket and add any necessary documentation
      • Update ticket status.
      • Delete spam, merge duplicate tickets, clean up inbox.
      • Assign tickets to appropriate queue or resource, escalate when necessary.
      • How should tickets be prioritized?
      • How should tickets from each channel be prioritized and routed? (e.g. are phone calls resolved right away? Are chats responded to immediately?)
      • Criteria that determine where a ticket should be sent or assigned (i.e. ticket category, priority, customer type).
      • How should VIP tickets be handled?
      • When should tickets be automatically escalated?
      • Which tickets require hierarchical escalation (i.e. to management)?

      WORKING ON ASSIGNED TICKETS

      • Continually update ticket status and documentation.
      • Assess which tickets should be worked on or completed ahead of others.
      • Troubleshoot, resolve, or escalate tickets.
      • In what order should tickets be worked on (e.g. by priority, by age, by effort, by time to breach)?
      • How long should a ticket be worked on without progress before it should be escalated to a different tier or queue?
      • Exceptions to the rule (e.g. in which circumstances should a lower priority ticket be worked on over a higher priority ticket).

      Process recommendations

      As you define queue management processes, keep the following advice in mind:

      Rotate triage role

      The triage role is critical but difficult. Consider rotating your Tier 1 resources through this role, or your service desk team if you’re a very small group.

      Limit and prioritize channels

      You decide which channels to enable and prioritize, not your users. Phone and chat are very interrupt-driven and should be reserved for high-priority issues if used. Your users may not understand that but can learn over time with training and reinforcement.

      Prioritize first

      Priority matrixes are necessary for consistency but there are always circumstances that require judgment calls. Think about risk and expected outcome rather than simply type of issue alone. And if the impact is bigger than the initial classification, change it.

      Define VIP treatment

      In some organizations, the same issue can be more critical if it happens to a certain user role (e.g. client facing, c-suite). Identify and flag VIP users and clearly define how their tickets should be prioritized.

      Consider time zone

      If users are in different time zones, take their current business hours into account when choosing which ticket to work on.

      Info-Tech Insight

      Think of your service desk as an emergency room. Patients come in with different symptoms, and the triage nurse must quickly assess these symptoms to decide who the patient should see and how soon. Some urgent cases will need to see the doctor immediately, while others can wait in another queue (the waiting room) for a while before being dealt with. Some cases who come in through a priority channel (e.g. ambulance) may jump the queue. Checklists and criteria can help with this decision making, but some degree of judgement is also required and that comes with experience. The triage role is sometimes seen as a junior-level role, but it actually requires expertise to be done well.

      For more detailed process guidance, see Standardize the Service Desk

      Info-Tech’s blueprint Standardize the Service Desk will help you standardize and document core service desk processes and functions, including:

      • Service desk structure, roles, and responsibilities
      • Metrics and reporting
      • Ticket handling and ticket quality
      • Incident and critical incident management
      • Ticket categorization
      • Prioritization and escalation
      • Service request fulfillment
      • Self-service considerations
      • Building a knowledgebase
      this image contains three screenshots from Info-Tech's Standardize the Service Desk Blueprint

      #4 Clearly define queue management responsibilities for every team member

      This may be one of the most critical yet overlooked keys to queue management success. Define the following:

      Who will have overall accountability?

      Someone must be responsible for monitoring all incoming and open tickets as well as assigned tickets in every queue to ensure they are routed and fulfilled appropriately. This person must have authority to view and coordinate all queues and Queue Managers.

      Who will manage each queue?

      Someone must be responsible for managing each queue, including assigning resources, balancing workload, and ensuring SLOs are met for the tickets within their queue. For example, the Apps Manager may be the Queue Manager for all tickets assigned to the Apps team queue.

      Who is responsible for assigning tickets?

      Will you have a triage team who monitors and assigns all incoming tickets? What are their specific responsibilities (e.g. prioritize, categorize, attempt troubleshooting, assign or escalate)? If not, who is responsible for assigning new tickets and how is this done? Will the triage role be a rotating role, and if so, what will the schedule be?

      What are everyone’s responsibilities?

      Everyone who is assigned tickets should understand the ticket handling process and their specific responsibilities when it comes to queue management.

      #5 Establish clear ownership & accountability over all queues

      If everyone is accountable, then no one is accountable. Ownership for each queue and all queues must be clearly designated.

      You may have multiple queue manager roles: one for each queue, and one who has visibility over all the queues. Typically, these roles make up only part of an individual’s job. Clearly define the responsibilities of the Queue Manager role; sample responsibilities are on the right.

      Info-Tech Insight

      Lack of authority over queues – especially those outside Tier 1 of the service desk – is one of the biggest pitfalls we see causing aging tickets and missed SLAs. Every queue needs clear ownership and accountability with everyone committed to meeting the same SLOs.

      The Queue Manager or Coordinator is accountable for ensuring tickets are routed to the correct resources service level objectives or agreements are met.

      Specific responsibilities may include:

      • Monitors queues daily
      • Ensures new tickets are assigned to appropriate resources for resolution
      • Verifies tickets have been routed and assigned correctly and reroutes if necessary
      • Reallocates tickets if assigned resource is suddenly unavailable or away
      • Ensures ticket handling process is met, ticket status is up to date and correct, and ticket documentation is complete
      • Escalates tickets that are aging or about to breach
      • Ensures service level objectives or agreements are met
      • Facilitates resource allocation based on workload
      • Coordinates tickets that require collaboration across workgroups to ensure resolution is achieved within SLA
      • Associates child and parent tickets
      • Prepares reports on ticket status and volume by queues
      • Regularly reviews reports to identify and act on issues and make improvements or changes where needed
      • Identifies opportunities for improvement

      #6 Always keep ticket status and documentation up to date

      Anyone should be able to quickly understand the status and progress on a ticket without needing to ask the technician working on it. This means both the ticket status and documentation must be continually and accurately updated.

      Ticket Documentation
      Ticket descriptions and documentation must be kept accurate and up to date. This ensures that if the ticket is escalated or assigned to a new person, or the Queue Manager or Service Desk Manager needs to know what progress has been made on a ticket, that person doesn’t need to waste time with back-and-forth communication with the technician or end user.

      Ticket Status
      The ticket status field should change as the ticket moves toward resolution, and must be updated every time the status changes. This ensures that anyone looking at the ticket queue can quickly learn and communicate the status of a ticket, tickets don’t get lost or neglected, metrics are accurate (such as time to resolve), and SLAs are not impacted if a ticket is on hold.

      Common ticket statuses include:

      • New/open
      • Assigned
      • In progress
      • Declined
      • Canceled
      • Pending/on hold
      • Resolved
      • Closed
      • Reopened

      For more guidance on ticket handling and documentation, download Info-Tech’s blueprint: Standardize the Service Desk.

      • For ticket handling and documentation, see Step 1.4
      • For ticket status fields, see Step 2.2.

      #7 Shift left to reduce queue volume

      Enable processes such as knowledge management, self-service, and problem management to prevent tickets from even coming into the queue.

      Shift left means enabling fulfilment of repeatable tasks and requests via faster, lower-cost delivery channels, self-help tools, and automation.

      This image contains a graph, where the Y axis is labeled Cost, and the X axis is labeled Time to Resolve.  On the graph are depicted service desk levels 0, 1, 2, and 3.

      Shift to Level 1

      • Identify tickets that are often escalated beyond Tier 1 but could be resolved by Level 1 if they were given the tools, training, resources, or access they need to do so.
      • Provide tools to succeed at resolving those defined tasks (e.g. knowledge article, documentation, remote tools).
      • Embed knowledge management in resolution workflows.

      Shift to End User

      • Build a centralized, easily accessible self-service portal where users can search for solutions to resolve their issues without having to submit a ticket.
      • Communicate and train users on how to use the portal regularly update and improve it.

      Automate & Eliminate

      • Identify processes or tasks that could be automated to eliminate work.
      • Invest in problem management and event management to fix the root problem of recurring issues and prevent a problem from occurring in the first place, thereby preventing future tickets.

      #8 Build in automation to improve efficiency

      Manually routing every ticket can be time-consuming and prone to errors. Once you’ve established the process, automate wherever possible.

      Automation rules can be used to ensure tickets are assigned to the right person or queue, to alert necessary parties when a ticket is about to breach or has breached SLA, or to remind technicians when a ticket has sat in a queue or at a particular status for too long.

      This can improve efficiency, reduce error, and bring greater visibility to both high-priority tickets and aging tickets in the backlog.

      However, your processes, queues, and responsibilities must be clearly defined before you can build in automation.

      For more guidance on implementing automation and AI within your service desk, see these blueprints:

      https://tymansgrpup.com/research/ss/accelerate-your-automation-processes https://tymansgrpup.com/research/ss/improve-it-operations-with-ai-and-ml

      For examples of rules, triggers, and fields you can automate to improve the efficiency of your queue management processes, see the next slide.

      Sample automation rules

      Criteria or triggers you can automate actions based on:

      • Ticket type
      • Specific field in a ticket web form
      • Ticket form that was used (e.g. specific service request form from the portal)
      • Ticket category
      • Ticket priority
      • Keyword in an email subject line
      • Keywords or string in a chat
      • Requester name or email
      • Requester location
      • Requester/ticket language
      • Requester VIP status
      • Channel ticket was received through
      • SLAs or time-based automations
      • Agent skill
      • Agent status or capacity

      Fields or actions those triggers can automate

      • Priority
      • Category
      • Ticket routing
      • Assigned agent
      • Assigned queue
      • SLA/due date
      • Notifications/communication

      Sample Automation Rules

      • When ticket is about to breach, send alert to Queue Manager and Service Desk Manager.
      • When ticket comes from VIP user, set urgency to high.
      • When ticket status has been set to “open” for ten hours, send an alert to Queue Manager.
      • When ticket status has been set to “on hold” for five days, send a reminder to assignee.
      • When ticket is categorized as “Software-ERP,” send to ERP queue.
      • When ticket is prioritized as P1/critical, send alert to emergency response team.
      • When ticket is prioritized as P1 and hasn’t been updated for one hour, send an alert to Incident Manager.
      • When an in-progress ticket is reassigned to a new queue, alert Queue Manager.
      • When ticket has not been resolved within seven days, flag as aging ticket.

      #9 Configure your ITSM tool to support and optimize queue management processes

      Configure your tool to support your needs; don’t adjust your processes to match the tool.

      • Most ITSM tools have default queues out of the box and the option to create as many custom queues, filters, and views as you need. Custom queues should allow you to name the queue, decide which tickets will be sent to the queue, and what columns or information are displayed in the queue.
      • Before you configure your queues and dashboards, sit down with your team to decide what you need and what will best enable each agent to manage their workload.
      • Decide which queues each role should have access to – most should only need to see their own queue and their team’s queue.
      • Configure which queues or views new tickets will be sent to.
      • Configure automation rules defined earlier (e.g. automate sending certain tickets to specific queues or sending notifications to specific parties when certain conditions are met).
      • Configure dashboards and reports on queue volume and ticket status data relevant to each team to help them manage their workload, increase visibility, and identify issues or actions.

      Info-Tech Insight

      It can be overwhelming to support agents when their view is a long and never-ending queue. Set the default dashboard view to show only those tickets assigned to the viewer to make it appear more manageable and easier to organize.

      Configure queues to maximize productivity

      Info-Tech Insight

      The queue should quickly give your team all the information they need to prioritize their work, including ticket status, priority, category, due date, and updated timestamps. Configuration is important - if it’s confusing, clunky, or difficult to filter or sort, it will impact response and resolution times and can lead to missed tickets. Give your team input into configuration and use visuals such as color coding to help agents prioritize their work – for example, VIP tickets may be clearly flagged, critical or high priority tickets may be highlighted, tickets about to breach may be red.

      this image contains a sample queue organization which demonstrates how to maximize productivity

      #10 Don’t lose visibility of the backlog

      Be careful not to focus so much on assigning new tickets that you forget to update aging tickets, leading to an overwhelming backlog and dissatisfied users.

      Track metrics that give visibility into how quickly tickets are being resolved and how many aging tickets you have. Metrics may include:

      • Ticket resolution time by priority, by workgroup
      • Ticket volume by status (i.e. open, in progress, on hold, resolved)
      • Ticket volume by age
      • Ticket volume by queue and assignee

      Regularly review reports on these metrics with the team.

      Make it an agenda item to review aging tickets, on hold tickets, and tickets about to breach or past breach with the team.

      Take action on aging tickets to ensure progress is being made.

      Set rules to close tickets after a certain number of attempts to reach unresponsive users (and change ticket status appropriately).

      Schedule times for your team to tackle aged tickets or tickets in the backlog.

      Info-Tech Insight

      It can be easy for high priority work to constantly push down low priority work, leaving the lower priority tickets to constantly be ignored and users to be frustrated. If you’re struggling with aging tickets, backlog, and tickets breaching SLA, experiment with your team and queue structure to figure out the best resource distribution to handle your workload. This could mean rotating people through the triage role to allow them time to work through the backlog, reducing the number of people doing triage during slower volume periods, or giving technicians dedicated time to work through tickets. For help with forecasting demand and optimizing resources, see Staff the Service Desk to Meet Demand.

      Activity 1.1: Define ticket queues

      1 hour

      Map out your optimal ticket queue structure using the Service Desk Queue Structure Template. Follow the instructions in the template to complete it as a team.

      The template includes several examples of service desk queue structures followed by space to build your own model of an optimal service desk queue structure and to document who is assigned to each queue and responsible for managing each queue.

      Note:

      The template is not meant to map out your entire service desk structure (e.g. tiers, escalation paths) or ticket resolution process, but simply the ticket queues and how a ticket moves between queues. For help documenting more detailed process workflows or service desk structure, see the blueprint Standardize the Service Desk.

      this image contains screenshot from Info-Tech's blueprint: Service Desk Queue structure Template

      Input

      • Current queue structure and roles

      Output

      • Defined service desk ticket queues and assigned responsibilities

      Materials

      • Org chart
      • ITSM tool for reference, if needed

      Participants

      • Service Desk Manager
      • IT Director
      • Queue Managers

      Document in the Service Desk Queue Structure Template.

      Related Info-Tech Research

      Standardize the Service Desk

      This project will help you build and improve essential service desk processes including incident management, request fulfillment, and knowledge management to create a sustainable service desk.

      Optimize the Service Desk With a Shift-Left Strategy

      This project will help you build a strategy to shift service support left to optimize your service desk operations and increase end-user satisfaction.

      Improve Service Desk Ticket Intake

      This project will help you streamline your ticket intake process and identify improvements to your intake channels.

      Staff the Service Desk to Meet Demand

      This project will help you determine your optimal service desk structure and staffing levels based on your unique environment, workload, and trends.

      Works Cited

      “What your Customers Really Want.” Freshdesk, 31 May 2021. Accessed May 2022.

      Domino – Maintain, Commit to, or Vacate?

      • Buy Link or Shortcode: {j2store}113|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Strategy and Organizational Design
      • Parent Category Link: /strategy-and-organizational-design

      If you have a Domino/Notes footprint that is embedded within your business units and business processes and is taxing your support organization, you may have met resistance from the business and been asked to help the organization migrate away from the Lotus Notes platform. The Lotus Notes platform was long used by technology and businesses and a multipurpose solution that, over the years, became embedded within core business applications and processes.

      Our Advice

      Critical Insight

      For organizations that are struggling to understand their options for the Domino platform, the depth of business process usage is typically the biggest operational obstacle. Migrating off the Domino platform is a difficult option for most organizations due to business process and application complexity. In addition, migrating clients have to resolve the challenges with more than one replaceable solution.

      Impact and Result

      The most common tactic is for the organization to better understand their Domino migration options and adopt an application rationalization strategy for the Domino applications entrenched within the business. Options include retiring, replatforming, migrating, or staying with your Domino platform.

      Domino – Maintain, Commit to, or Vacate? Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Domino – Maintain, Commit to, or Vacate? – A brief deck that outlines key migration options for HCL Domino platforms.

      This blueprint will help you assess the fit, purpose, and price of Domino options; develop strategies for overcoming potential challenges; and determine the future of Domino for your organization.

      • Domino – Maintain, Commit to, or Vacate? Storyboard

      2. Application Rationalization Tool – A tool to understand your business-developed applications, their importance to business process, and the potential underlying financial impact.

      Use this tool to input the outcomes of your various application assessments.

      • Application Rationalization Tool
      [infographic]

      Further reading

      Domino – Maintain, Commit to, or Vacate?

      Lotus Domino still lives, and you have options for migrating away from or remaining with the platform.

      Executive Summary

      Info-Tech Insight

      “HCL announced that they have somewhere in the region of 15,000 Domino customers worldwide, and also claimed that that number is growing. They also said that 42% of their customers are already on v11 of Domino, and that in the year or so since that version was released, it’s been downloaded 78,000 times. All of which suggests that the Domino platform is, in fact, alive and well.”
      – Nigel Cheshire in Team Studio

      Your Challenge

      You have a Domino/Notes footprint embedded within your business units and business processes. This is taxing your support organization; you are meeting resistance from the business, and you are now asked to help the organization migrate away from the Lotus Notes platform. The Lotus Notes platform was long used by technology and businesses as a multipurpose solution that, over the years, became embedded within core business applications and processes.

      Common Obstacles

      For organizations that are struggling to understand their options for the Domino platform, the depth of business process usage is typically the biggest operational obstacle. Migrating off the Domino platform is a difficult option for most organizations due to business process and application complexity. In addition, migrating clients have to resolve the challenges with more than one replaceable solution.

      Info-Tech Approach

      The most common tactic is for the organization to better understand their Domino migration options and adopt an application rationalization strategy for the Domino applications entrenched within the business. Options include retiring, replatforming, migrating, or staying with your Domino platform.

      Review

      Is “Lotus” Domino still alive?

      Problem statement

      The number of member engagements with customers regarding the Domino platform has, as you might imagine, dwindled in the past couple of years. While many members have exited the platform, there are still many members and organizations that have entered a long exit program, but with how embedded Domino is in business processes, the migration has slowed and been met with resistance. Some organizations had replatformed the applications but found that the replacement target state was inadequate and introduced friction because the new solution was not a low-code/business-user-driven environment. This resulted in returning the Domino platform to production and working through a strategy to maintain the environment.

      This research is designed for:

      • IT strategic direction decision-makers
      • IT managers responsible for an existing Domino platform
      • Organizations evaluating migration options for mission-critical applications running on Domino

      This research will help you:

      1. Evaluate migration options.
      2. Assess the fit and purpose.
      3. Consider strategies for overcoming potential challenges.
      4. Determine the future of this platform for your organization.

      The “everything may work” scenario

      Adopt and expand

      Believe it or not, Domino and Notes are still options to consider when determining a migration strategy. With HCL still committed to the platform, there are options organizations should seek to better understand rather than assuming SharePoint will solve all. In our research, we consider:

      Importance to current business processes

      • Importance of use
      • Complexity in migrations
      • Choosing a new platform

      Available tools to facilitate

      • Talent/access to skills
      • Economies of scale/lower cost at scale
      • Access to technology

      Info-Tech Insight

      With multiple options to consider, take the time to clearly understand the application rationalization process within your decision making.

      • Archive/retire
      • Application migration
      • Application replatform
      • Stay right where you are

      Eliminate your bias – consider the advantages

      “There is a lot of bias toward Domino; decisions are being made by individuals who know very little about Domino and more importantly, they do not know how it impacts business environment.”

      – Rob Salerno, Founder & CTO, Rivet Technology Partners

      Domino advantages include:

      Modern Cloud & Application

      • No-code/low-code technology

      Business-Managed Application

      • Business written and supported
      • Embrace the business support model
      • Enterprise class application

      Leverage the Application Taxonomy & Build

      • A rapid application development platform
      • Develop skill with HCL training

      HCL Domino is a supported and developed platform

      Why consider HCL?

      • Consider scheduling a Roadmap Session with HCL. This is an opportunity to leverage any value in the mission and brand of your organization to gain insights or support from HCL.
      • Existing Domino customers are not the only entities seeking certainty with the platform. Software solution providers that support enterprise IT infrastructure ecosystems (backup, for example) will also be seeking clarity for the future of the platform. HCL will be managing these relationships through the channel/partner management programs, but our observations indicate that Domino integrations are scarce.
      • HCL Domino should be well positioned feature-wise to support low-code/NoSQL demands for enterprises and citizen developers.

      Visualize Your Application Roadmap

      1. Focus on the application portfolio and crafting a roadmap for rationalization.
        • The process is intended to help you determine each application’s functional and technical adequacy for the business process that it supports.
      2. Document your findings on respective application capability heatmaps.
        • This drives your organization to a determination of application dispositions and provides a tool to output various dispositions for you as a roadmap.
      3. Sort the application portfolio into a disposition status (keep, replatform, retire, consolidate, etc.)
        • This information will be an input into any cloud migration or modernization as well as consolidation of the infrastructure, licenses, and support for them.

      Our external support perspective

      by Darin Stahl

      Member Feedback

      • Some members who have remaining Domino applications in production – while the retire, replatform, consolidate, or stay strategy is playing out – have concerns about the challenges with ongoing support and resources required for the platform. In those cases, some have engaged external services providers to augment staff or take over as managed services.
      • While there could be existing support resources (in house or on retainer), the member might consider approaching an external provider who could help backstop the single resource or even provide some help with the exit strategies. At this point, the conversation would be helpful in any case. One of our members engaged an external provider in a Statement of Work for IBM Domino Administration focused on one-time events, Tier 1/Tier 2 support, and custom ad hoc requests.
      • The augmentation with the managed services enabled the member to shift key internal resources to a focus on executing the exit strategies (replatform, retire, consolidate), since the business knowledge was key to that success.
      • The member also very aggressively governed the Domino environment support needs to truly technical issues/maintenance of known and supported functionality rather than coding new features (and increasing risk and cost in a migration down the road) – in short, freezing new features and functionality unless required for legal compliance or health and safety.
      • There obviously are other providers, but at this point Info-Tech no longer maintains a market view or scan of those related to Domino due to low member demand.

      Domino database assessments

      Consider the database.

      • Domino database assessments should be informed through the lens of a multi-value database, like jBase, or an object system.
      • The assessment of the databases, often led by relational database subject matter experts grounded in normalized databases, can be a struggle since Notes databases must be denormalized.
      Key/Value Column

      Use case: Heavily accessed, rarely updated, large amounts of data
      Data Model: Values are stored in a hash table of keys.
      Fast access to small data values, but querying is slow
      Processor friendly
      Based on amazon's Dynamo paper
      Example: Project Voldemort used by LinkedIn

      this is a Key/Value example

      Use case: High availability, multiple data centers
      Data Model: Storage blocks of data are contained in columns
      Handles size well
      Based on Google's BigTable
      Example: Hadoop/Hbase used by Facebook and Yahoo

      This is a Column Example
      Document Graph

      Use case: Rapid development, Web and programmer friendly
      Data Model: Stores documents made up of tagged elements. Uses Key/Value collections
      Better query abilities than Key/Value databases.
      Inspired by Lotus Notes.
      Example: CouchDB used by BBC

      This is a Document Example

      Use case: Best at dealing with complexity and relationships/networks
      Data model: Nodes and relationships.
      Data is processed quickly
      Inspired by Euler and graph theory
      Can easily evolve schemas
      Example: Neo4j

      This is a Graph Example

      Understand your options

      Archive/Retire

      Store the application data in a long-term repository with the means to locate and read it for regulatory and compliance purposes.

      Migrate

      Migrate to a new version of the application, facilitating the process of moving software applications from one computing environment to another.

      Replatform

      Replatforming is an option for transitioning an existing Domino application to a new modern platform (i.e. cloud) to leverage the benefits of a modern deployment model.

      Stay

      Review the current Domino platform roadmap and understand HCL’s support model. Keep the application within the Domino platform.

      Archive/retire

      Retire the application, storing the application data in a long-term repository.

      Abstract

      The most common approach is to build the required functionality in whatever new application/solution is selected, then archive the old data in PDFs and documents.

      Typically this involves archiving the data and leveraging Microsoft SharePoint and the new collaborative solutions, likely in conjunction with other software-as-a-service (SaaS) solutions.

      Advantages

      • Reduce support cost.
      • Consolidate applications.
      • Reduce risk.
      • Reduce compliance and security concerns.
      • Improve business processes.

      Considerations

      • Application transformation
      • eDiscovery costs
      • Legal implications
      • Compliance implications
      • Business process dependencies

      Info-Tech Insights

      Be aware of the costs associated with archiving. The more you archive, the more it will cost you.

      Application migration

      Migrate to a new version of the application

      Abstract

      An application migration is the managed process of migrating or moving applications (software) from one infrastructure environment to another.

      This can include migrating applications from one data center to another data center, from a data center to a cloud provider, or from a company’s on-premises system to a cloud provider’s infrastructure.

      Advantages

      • Reduce hardware costs.
      • Leverage cloud technologies.
      • Improve scalability.
      • Improve disaster recovery.
      • Improve application security.

      Considerations

      • Data extraction, starting from the document databases in NSF format and including security settings about users and groups granted to read and write single documents, which is a powerful feature of Lotus Domino documents.
      • File extraction, starting from the document databases in NSF format, which can contain attachments and RTF documents and embedded files.
      • Design of the final relational database structure; this activity should be carried out without taking into account the original structure of the data in Domino files or the data conversion and loading, from the extracted format to the final model.
      • Design and development of the target-state custom applications based on the new data model and the new selected development platform.

      Application replatform

      Transition an existing Domino application to a new modern platform

      Abstract

      This type of arrangement is typically part of an application migration or transformation. In this model, client can “replatform” the application into an off-premises hosted provider platform. This would yield many benefits of cloud but in a different scaling capacity as experienced with commodity workloads (e.g. Windows, Linux) and the associated application.

      Two challenges are particularly significant when migrating or replatforming Domino applications:

      • The application functionality/value must be reproduced/replaced with not one but many applications, either through custom coding or a commercial-off-the-shelf/SaaS solution.
      • Notes “databases” are not relational databases and will not migrate simply to an SQL database while retaining the same business value. Notes databases are essentially NoSQL repositories and are difficult to normalize.

      Advantages

      • Leverage cloud technologies.
      • Improve scalability.
      • Align to a SharePoint platform.
      • Improve disaster recovery.
      • Improve application security.

      Considerations

      • Application replatform resource effort
      • Network bandwidth
      • New platform terms and conditions
      • Secure connectivity and communication
      • New platform security and compliance
      • Degree of complexity

      Info-Tech Insights

      There is a difference between a migration and a replatform application strategy. Determine which solution aligns to the application requirements.

      Stay with HCL

      Stay with HCL, understanding its future commitment to the platform.

      Abstract

      Following the announced acquisition of IBM Domino and up until around December 2019, HCL had published no future roadmap for the platform. The public-facing information/website at the time stated that HCL acquired “the product family and key lab services to deliver professional services.” Again, there was no mention or emphasis on upcoming new features for the platform. The product offering on their website at the time stated that HCL would leverage its services expertise to advise clients and push applications into four buckets:

      1. Replatform
      2. Retire
      3. Move to cloud
      4. Modernize

      That public-facing messaging changed with release 11.0, which had references to IBM rebranded to HCL for the Notes and Domino product – along with fixes already inflight. More information can be found on HCL’s FAQ page.

      Advantages

      • Known environment
      • Domino is a supported platform
      • Domino is a developed platform
      • No-code/low-code optimization
      • Business developed applications
      • Rapid application framework

      This is the HCL Domino Logo

      Understand your tools

      Many tools are available to help evaluate or migrate your Domino Platform. Here are a few common tools for you to consider.

      Notes Archiving & Notes to SharePoint

      Summary of Vendor

      “SWING Software delivers content transformation and archiving software to over 1,000 organizations worldwide. Our solutions uniquely combine key collaborative platforms and standard document formats, making document production, publishing, and archiving processes more efficient.”*

      Tools

      Lotus Notes Data Migration and Archiving: Preserve historical data outside of Notes and Domino

      Lotus Note Migration: Replacing Lotus Notes. Boost your migration by detaching historical data from Lotus Notes and Domino.

      Headquarters

      Croatia

      Best fit

      • Application archive and retire
      • Migration to SharePoint

      This is an image of the SwingSoftware Logo

      * swingsoftware.com

      Domino Migration to SharePoint

      Summary of Vendor

      “Providing leading solutions, resources, and expertise to help your organization transform its collaborative environment.”*

      Tools

      Notes Domino Migration Solutions: Rivit’s industry-leading solutions and hardened migration practice will help you eliminate Notes Domino once and for all.

      Rivive Me: Migrate Notes Domino applications to an enterprise web application

      Headquarters

      Canada

      Best fit

      • Application Archive & Retire
      • Migration to SharePoint

      This is an image of the RiVit Logo

      * rivit.ca

      Lotus Notes to M365

      Summary of Vendor

      “More than 300 organizations across 40+ countries trust skybow to build no-code/no-compromise business applications & processes, and skybow’s community of customers, partners, and experts grows every day.”*

      Tools

      SkyBow Studio: The low-code platform fully integrated into Microsoft 365

      Headquarters:

      Switzerland

      Best fit

      • Application Archive & Retire
      • Migration to SharePoint

      This is an image of the SkyBow Logo

      * skybow.com | About skybow

      Notes to SharePoint Migration

      Summary of Vendor

      “CIMtrek is a global software company headquartered in the UK. Our mission is to develop user-friendly, cost-effective technology solutions and services to help companies modernize their HCL Domino/Notes® application landscape and support their legacy COBOL applications.”*

      Tools

      CIMtrek SharePoint Migrator: Reduce the time and cost of migrating your IBM® Lotus Notes® applications to Office 365, SharePoint online, and SharePoint on premises.

      Headquarters

      United Kingdom

      Best fit

      • Application replatform
      • Migration to SharePoint

      This is an image of the CIMtrek Logo

      * cimtrek.com | About CIMtrek

      Domino replatform/Rapid application selection framework

      Summary of Vendor

      “4WS.Platform is a rapid application development tool used to quickly create multi-channel applications including web and mobile applications.”*

      Tools

      4WS.Platform is available in two editions: Community and Enterprise.
      The Platform Enterprise Edition, allows access with an optional support pack.

      4WS.Platform’s technical support provides support services to the users through support contracts and agreements.

      The platform is a subscription support services for companies using the product which will allow customers to benefit from the knowledge of 4WS.Platform’s technical experts.

      Headquarters

      Italy

      Best fit

      • Application replatform

      This is an image of the 4WS PLATFORM Logo

      * 4wsplatform.org

      Activity

      Understand your Domino options

      Application Rationalization Exercise

      Info-Tech Insight

      Application rationalization is the perfect exercise to fully understand your business-developed applications, their importance to business process, and the potential underlying financial impact.

      This activity involves the following participants:

      • IT strategic direction decision-makers.
      • IT managers responsible for an existing Domino platform
      • Organizations evaluating platforms for mission-critical applications.

      Outcomes of this step:

      • Completed Application Rationalization Tool

      Application rationalization exercise

      Use this Application Rationalization Tool to input the outcomes of your various application assessments

      In the Application Entry tab:

      • Input your application inventory or subset of apps you intend to rationalize, along with some basic information for your apps.

      In the Business Value & TCO Comparison tab, determine rationalization priorities.

      • Input your business value scores and total cost of ownership (TCO) of applications.
      • Review the results of this analysis to determine which apps should require additional analysis and which dispositions should be prioritized.

      In the Disposition Selection tab:

      • Add to or adapt our list of dispositions as appropriate.

      In the Rationalization Inputs tab:

      • Add or adapt the disposition criteria of your application rationalization framework as appropriate.
      • Input the results of your various assessments for each application.

      In the Disposition Settings tab:

      • Add or adapt settings that generate recommended dispositions based on your rationalization inputs.

      In the Disposition Recommendations tab:

      • Review and compare the rationalization results and confirm if dispositions are appropriate for your strategy.

      In the Timeline Considerations tab:

      • Enter the estimated timeline for when you execute your dispositions.

      In the Portfolio Roadmap tab:

      • Review and present your roadmap and rationalization results.

      Follow the instructions to generate recommended dispositions and populate an application portfolio roadmap.

      This image depicts a scatter plot graph where the X axis is labeled Business Value, and the Y Axis is labeled Cost. On the graph, the following datapoints are displayed: SF; HRIS; ERP; ALM; B; A; C; ODP; SAS

      Info-Tech Insight

      Watch out for misleading scores that result from poorly designed criteria weightings.

      Related Info-Tech Research

      Build an Application Rationalization Framework

      Manage your application portfolio to minimize risk and maximize value.

      Embrace Business-Managed Applications

      Empower the business to implement their own applications with a trusted business-IT relationship.

      Satisfy Digital End Users With Low- and No-Code

      Extend IT, automation, and digital capabilities to the business with the right tools, good governance, and trusted organizational relationships.

      Maximize the Benefits from Enterprise Applications with a Center of Excellence

      Optimize your organization’s enterprise application capabilities with a refined and scalable methodology.

      Drive Successful Sourcing Outcomes With a Robust RFP Process

      Leverage your vendor sourcing process to get better results.

      Research Authors

      Darin Stahl, Principal Research Advisor, Info-Tech Research Group

      Darin Stahl, Principal Research Advisor,
      Info-Tech Research Group

      Darin is a Principal Research Advisor within the Infrastructure practice, leveraging 38+ years of experience. His areas of focus include IT operations management, service desk, infrastructure outsourcing, managed services, cloud infrastructure, DRP/BCP, printer management, managed print services, application performance monitoring, managed FTP, and non-commodity servers (zSeries, mainframe, IBM i, AIX, Power PC).

      Troy Cheeseman, Practice Lead, Info-Tech Research Group

      Troy Cheeseman, Practice Lead,
      Info-Tech Research Group

      Troy has over 24 years of experience and has championed large enterprise-wide technology transformation programs, remote/home office collaboration and remote work strategies, BCP, IT DRP, IT operations and expense management programs, international right placement initiatives, and large technology transformation initiatives (M&A). Additionally, he has deep experience working with IT solution providers and technology (cloud) startups.

      Research Contributors

      Rob Salerno, Founder & CTO, Rivit Technology Partners

      Rob Salerno, Founder & CTO, Rivit Technology Partners

      Rob is the Founder and Chief Technology Strategist for Rivit Technology Partners. Rivit is a system integrator that delivers unique IT solutions. Rivit is known for its REVIVE migration strategy which helps companies leave legacy platforms (such as Domino) or move between versions of software. Rivit is the developer of the DCOM Application Archiving solution.

      Bibliography

      Cheshire, Nigel. “Domino v12 Launch Keeps HCL Product Strategy On Track.” Team Studio, 19 July 2021. Web.

      “Is LowCode/NoCode the best platform for you?” Rivit Technology Partners, 15 July 2021. Web.

      McCracken, Harry. “Lotus: Farewell to a Once-Great Tech Brand.” TIME, 20 Nov. 2012. Web.

      Sharwood, Simon. “Lotus Notes refuses to die, again, as HCL debuts Domino 12.” The Register, 8 June 2021. Web.

      Woodie, Alex. “Domino 12 Comes to IBM i.” IT Jungle, 16 Aug. 2021. Web.

      Develop a COVID-19 Pandemic Response Plan

      • Buy Link or Shortcode: {j2store}420|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: DR and Business Continuity
      • Parent Category Link: /business-continuity
      • IT departments are being asked to rapidly ramp up work-from-home capabilities and other business process workarounds.
      • Crisis managers are experiencing a pandemic more severe than what they’ve managed in the past.
      • Organizations are scrambling to determine how they can keep their businesses running through this pandemic.

      Our Advice

      Critical Insight

      • Obstacles to working from home go beyond internet speed and needing a laptop. Business input is critical to uncover unexpected obstacles.
      • IT needs to address a range of issues from security risk to increased service desk demand from users who don’t normally work from home.
      • Resist the temptation to bypass IT processes – your future-self will thank you for tracking all those assets about to go out the door.

      Impact and Result

      • Start with crisis management fundamentals – identify crisis management roles and exercise appropriate crisis communication.
      • Prioritize business processes and work-from-home requirements. Not everyone can be set up on day one.
      • Don’t over-complicate your work-from-home deployment plan. A simple spreadsheet (see the Work-from-Home Requirements Tool) to track requirements can be very effective.

      Develop a COVID-19 Pandemic Response Plan Research & Tools

      Start here

      Stay up to date on COVID-19 and the resources available to you.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      • Develop a COVID-19 Pandemic Response Plan Storyboard

      1. Manage the pandemic crisis

      Identify key roles and immediate steps to manage this crisis.

      • Pandemic Response Plan Example

      2. Create IT’s plan to support the pandemic response plan

      Plan the deployment of a work-from-home initiative.

      • Work-From-Home Requirements Tool
      [infographic]

      Optimize the IT Operations Center

      • Buy Link or Shortcode: {j2store}449|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Operations Management
      • Parent Category Link: /i-and-o-process-management
      • Your team’s time is burned up by incident response.
      • Manual repetitive work uses up expensive resources.
      • You don’t have the visibility to ensure the availability the business demands.

      Our Advice

      Critical Insight

      • Sell the project to the business.
      • Leverage the Operations Center to improve IT Operations.

      Impact and Result

      • Clarify lines of accountability and metrics for success.
      • Implement targeted initiatives and track key metrics for continual improvement.

      Optimize the IT Operations Center Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you should Optimize the IT Operations Center, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Lightning Phase: Pluck Low-Hanging Fruit for Quick Wins

      Get quick wins to demonstrate early value for investments in IT Operations.

      • Optimize the IT Operations Center – Lightning Phase: Pluck Low-Hanging Fruit for Quick Wins

      2. Get buy-in

      Get buy-in from business stakeholders by speaking their language.

      • Optimize the IT Operations Center – Phase 1: Get Buy-In
      • IT Operations Center Prerequisites Assessment Tool
      • IT Operations Center Stakeholder Buy-In Presentation
      • IT Operations Center Continual Improvement Tracker

      3. Define accountability and metrics

      Formalize process and task accountability and develop targeted metrics.

      • Optimize the IT Operations Center – Phase 2: Define Accountability and Metrics
      • IT Operations Center RACI Charts Template

      4. Assess gaps and prioritize initiatives

      Identify pain points and determine the top solutions.

      • Optimize the IT Operations Center – Phase 3: Assess Gaps and Prioritize Initiatives
      • IT Operations Center Gap and Initiative Tracker
      • IT Operations Center Initiative Prioritization Tool

      5. Launch initiatives and track metrics

      Lay the foundation for implementation and continual improvement.

      • Optimize the IT Operations Center – Phase 4: Launch Initiatives and Track Metrics
      [infographic]

      Workshop: Optimize the IT Operations Center

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Check Foundation

      The Purpose

      Ensure base maturity in IT Operations processes.

      Key Benefits Achieved

      Verify that foundation is in place to proceed with Operations Center project.

      Activities

      1.1 Evaluate base maturity.

      Outputs

      IT Operations Center Prerequisites Assessment Tool

      2 Define Accountabilities

      The Purpose

      Define accountabilities for Operations processes and tasks.

      Key Benefits Achieved

      Documented accountabilities.

      Activities

      2.1 Pluck low-hanging fruit for quick wins.

      2.2 Complete process RACI.

      2.3 Complete task RACI.

      Outputs

      Project plan

      Process RACI

      Task RACI

      3 Map the Challenge

      The Purpose

      Define metrics and identify accountabilities and gaps.

      Key Benefits Achieved

      List of initiatives to address pain points.

      Activities

      3.1 Define metrics.

      3.2 Define accountabilities.

      3.3 Identify gaps.

      Outputs

      IT Operations Center Gap and Initiative Tracker

      4 Build Action Plan

      The Purpose

      Develop an action plan to boost KPIs.

      Key Benefits Achieved

      Action plan and success criteria.

      Activities

      4.1 Prioritize initiatives.

      Outputs

      IT Operations Center Initiative Prioritization Tool

      5 Map Out Implementation

      The Purpose

      Build an implementation plan for continual improvement.

      Key Benefits Achieved

      Continual improvement against identified metrics and KPIs.

      Activities

      5.1 Build implementation plan.

      Outputs

      IT Operations Center Continual Improvement Tracker

      Further reading

      Optimize the IT Operations Center

      Stop burning budget on non-value-adding activities.

      ANALYST PERSPECTIVE

      The Network Operations Center is not in Kansas anymore.

      "The old-school Network Operations Center of the telecom world was heavily peopled and reactionary. Now, the IT Operations Center is about more than network monitoring. An effective Operations Center provides visibility across the entire stack, generates actionable alerts, resolves a host of different incidents, and drives continual improvement in the delivery of high-quality services.
      IT’s traditional siloed approach cannot provide the value the business demands. The modern Operations Center breaks down these silos for the end-to-end view required for a service-focused approach."

      Derek Shank,
      Research Analyst, Infrastructure & Operations
      Info-Tech Research Group

      Our understanding of the problem

      This Research Is Designed For:

      • IT Operations Managers
      • IT Infrastructure Managers
      • CIOs

      This Research Will Help You:

      • Improve reliability of services.
      • Reduce the cost of incident response.
      • Reduce the cost of manual repetitive work (MRW).

      This Research Will Also Assist

      • Business Analysts
      • Project Managers
      • Business Relationship Managers

      This Research Will Help Them

      • Develop appropriate non-functional requirements.
      • Integrate non-functional requirements into solution design and project implementation.

      Executive Summary

      Situation

      • Your team’s time is burned up by incident response.
      • MRW burns up expensive resources.
      • You don’t have the visibility to ensure the availability the business demands.

      Complication

      • The increasing complexity of technology has resulted in siloed teams of specialists.
      • The business views IT Operations as a cost center and doesn’t want to provide resources to support improvement initiatives.

      Resolution

      • Pluck low-hanging fruit for quick wins.
      • Obtain buy-in from business stakeholders by speaking their language.
      • Clarify lines of accountability and metrics for success.
      • Implement targeted initiatives and track key metrics for continual improvement.

      Info-Tech Insight

      1. Sell the project to the business. Your first job is a sales job because executive sponsorship is key to project success.
      2. Worship the holy trinity of metrics: impact of downtime, cost of incident response, and time spent on manual repetitive work (MRW).
      3. Invest in order to profit. Improving the Operations Center takes time and money. Expect short-term pain to realize long-term gain.

      The role of the Network Operations Center has changed

      • The old approach was technology siloed and the Network Operations Center (NOC) only cared about the network.
      • The modern Operations Center is about ensuring high availability of end-user services, and requires cross-functional expertise and visibility across all the layers of the technology stack.
      A pie chart is depicted. The data displayed on the chart, in decreasing order of size, include: Applications; Servers; LAN; WAN; Security; Storage. Source: Metzler, n.d.

      Most organizations lack adequate visibility

      • The rise of hybrid cloud has made environments more complex, not less.
      • The increasing complexity makes monitoring and incident response more difficult than ever.
      • Only 31% of organizations use advanced monitoring beyond what is offered by cloud providers.
      • 69% perform no monitoring, basic monitoring, or rely entirely on the cloud provider’s monitoring tools.
      A Pie chart is depicted. Two data are represented on the chart. The first, representing 69% of the chart, is: Using no monitoring, basic monitoring, or relying only on the cloud vendor's monitoring. the second, representing 31% of the chart, is Using advanced monitoring beyond what cloud vendors provide. Source: InterOp ITX, 2018

      Siloed service level agreements cannot ensure availability

      You can meet high service level agreements (SLAs) for functional silos, but still miss the mark for service availability. The business just wants things to work!

      this image contains Info-Tech's SLA-compliance rating chart, which displays the categories: Available, behaving as expected; Slow/degraded; and Unavailable, for each of: Webserver; Database; Storage; Network; Application; and, Business Service

      The cost of downtime is massive

      Increasing reliance on IT makes downtime hurt more than ever.
      98% of enterprises lose $100,000+.
      81% of enterprises lose $300,000+ per hour of downtime.

      This is a bar graph, showing the cost per hour of downtime, against the percentage of enterprises.

      Source: ITIC, 2016

      IT is asked to do more with less

      Most IT budgets are staying flat or shrinking.

      57% of IT departments expect their budget to stay flat or to shrink from 2018 to 2019.

      This image contains a pie chart with two data, one is labeled: Increase; representing 43% of the chart. The other datum is labeled: Shrink or stay flat, and represents 57% of the chart.

      Unify and streamline IT Operations

      A well-run Operations Center ensures high availability at reasonable cost. Improving your Operations Center results in:

      • Higher availability
      • Increased reliability
      • Improved project capacity
      • Higher business satisfaction

      Measure success with the holy trinity of metrics

      Focus on reducing downtime, cost of incident response, and MRW.

      This image contains a Funnel Chart showing the inputs: Downtime; Cost of Incident Response; MRW; and the output: Reduce for continual improvement

      Start from the top and employ a targeted approach

      Analyze data to get buy-in from stakeholders, and use our tools and templates to follow the process for continual improvement in IT Operations.

      This image depicts a cycle, which includes: Data analysis; Executive Sponsorship; Success Criteria; Gap Assessment; Initiatives; Tracking & Measurement

      Info-Tech offers various levels of support to best suit your needs

      DIY Toolkit

      "Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful.”

      Guided Implementation

      “Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track."

      Workshop

      "We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place."

      Consulting

      "Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project."

      Diagnostics and consistent frameworks used throughout all four options

      Optimize the IT Operations Center – project overview

      Launch the Project

      Identify Enterprise Services

      Identify Line of Business Services

      Complete Service Definitions

      Best-Practice Toolkit

      🗲 Pluck Low-Hanging Fruit for Quick Wins

      1.1 Ensure Base Maturity Is in Place

      1.2 Make the Case

      2.1 Define Accountabilities

      2.2 Define Metrics

      3.1 Assess Gaps

      3.2 Plan Initiatives

      4.1 Lay Foundation

      4.2 Launch and Measure

      Guided Implementations

      Discuss current state.

      Review stakeholder presentation.

      Review RACIs.

      Review metrics.

      Discuss gaps.

      Discuss initiatives.

      Review plan and metric schedule.

      Onsite Workshop Module 1:

      Clear understanding of project objectives and support obtained from the business.

      Module 2:

      Enterprise services defined and categorized.

      Module 3:

      LOB services defined based on user perspective.

      Module 4:

      Service record designed according to how IT wishes to communicate to the business.

      Phase 1 Results:

      Stakeholder presentation

      Phase 2 Results:
      • RACIs
      • Metrics
      Phase 3 Results:
      • Gaps list
      • Prioritized list of initiatives
      Phase 4 Results:
      • Implementation plan
      • Continual improvement tracker

      Workshop overview

      Contact your account representative or email Workshops@InfoTech.com for more information.

      Pre-Workshop Workshop Day 1 Workshop Day 2 Workshop Day 3 Workshop Day 4
      Activities

      Check Foundation

      Define Accountabilities

      Map the Challenge

      Build Action Plan

      Map Out Implementation

      1.1 Ensure base maturity.

      🗲 Pluck low-hanging fruit for quick wins.

      2.1 Complete process RACI.

      2.2 Complete task RACI.

      3.1 Define metrics.

      3.2 Define accountabilities.

      3.2 Identify gaps.

      4.1 Prioritize initiatives.

      5.1 Build implementation plan.

      Deliverables
      1. IT Operations Center Prerequisites Assessment Tool
      1. IT Operations Center RACI Charts Template
      1. IT Operations Center Gap and Initiative Tracker
      1. IT Operations Center Initiative Prioritization Tool
      1. IT Operations Center Continual Improvement Tracker

      PHASE 🗲

      Pluck Low-Hanging Fruit for Quick Wins

      Optimize the IT Operations Center

      Conduct a ticket-trend analysis

      Generate reports on tickets from your IT service management (ITSM) tool. Look for areas that consume the most resources, such as:

      • Recurring tickets.
      • Tickets that have taken a long time to resolve.
      • Tickets that could have been resolved at a lower tier.
      • Tickets that were unnecessarily or improperly escalated.

      Identify issues

      Analyze the tickets:

      • Look for recurring tickets that may indicate underlying problems.
      • Ask tier 2 and 3 technicians to flag tickets that could have been resolved at a lower tier.
      • Identify painful and/or time consuming service requests.
      • Flag any manual repetitive work.

      Write the issues on a whiteboard.

      Oil & Gas IT reduces manual repetitive maintenance work

      CASE STUDY
      Industry Oil & Gas
      Source Interview

      Challenge

      The company used a webserver to collect data from field stations for analytics. The server’s version did not clear its cache – it filled up its own memory and would not overwrite, so it would just lock up and have to be rebooted manually.

      Solution

      The team found out that the volumes and units of data would cause the memory to fill at a certain time of the month. They wrote a script to reboot the machine and set up a planned outage during the appropriate weekend each month.

      Results

      The team never had to do manual reboots again – though they did have to tweak their reboot script not to rely on their calendar, after a shift in production broke the pattern between memory consumption and the calendar.

      Rank the issues

      🗲.1.1 10 minutes

      1. Assign each participant five sticky dots to use for voting.
      2. Have each participant place any number of dots beside the issue(s) of their choice.
      3. Count the dots and rank the top three most important issues.

      INPUT

      • List of issues

      OUTPUT

      • Top three issues

      Materials

      • Whiteboard
      • Markers
      • Sticky dots

      Participants

      • Operations Manager
      • Infrastructure Manager
      • I&O team members

      Brainstorm solutions

      🗲.1.2 10 minutes

      1. Write the three issues at the top of a whiteboard, each at the head of its own column.
      2. Focusing on one issue at a time, brainstorm potential solutions for each issue. Have one person write all the proposed solutions on the board beneath the issue.

      Info-Tech Best Practice

      Do not censor or evaluate the proposed solutions at this time. During brainstorming, focus on coming up with as many potential solutions as possible, no matter how infeasible or outlandish.

      INPUT

      • Top three issues

      OUTPUT

      • Potential solutions

      Materials

      • Whiteboard
      • Markers

      Participants

      • Operations Manager
      • Infrastructure Manager
      • I&O team members

      Evaluate and rank potential solutions

      🗲.1.3 30 minutes

      1. Score the solutions from 1-5 on each of the two dimensions:
      • Attainability
      • Probable efficacy
    • Identify the top scoring solution for each issue. In the event of a tie, vote to determine the winner.
    • Info-Tech Insight

      Quick wins are the best of both worlds. To get a quick win, pick a solution that is both readily attainable and likely to have high impact.

      INPUT

      • Potential solutions

      OUTPUT

      • Ranked list of solutions

      Materials

      • Whiteboard
      • Markers

      Participants

      • Operations Manager
      • Infrastructure Manager
      • I&O team members

      Develop metrics to measure the effectiveness of solutions

      You should now have a top potential solution for each pain point.

      For each pain point and proposed solution, identify the metric that would indicate whether the solution had been effective or not. For example:

      • Pain point: Too many unnecessary escalations for SharePoint issues.
      • Solution: Train tier 1 staff to resolve SharePoint tickets.
      • Metric: % of SharePoint tickets resolved at tier 1.

      Design solutions

      • Some solutions explain themselves. E.g., hire an extra service desk person.
      • Others require more planning and design, as they involve a bespoke solution. E.g., improve asset management process or automate onboarding of new users.
      • For the solutions that require planning, take the time to design each solution fully before rushing to implement it.

      Build solutions

      • Build any of the solutions that require building. For example, any scripting for automations requires the writing of those scripts, and any automated ticket routing requires configuration of your ITSM tool.
      • Part of the build phase for many solutions should also involve designing the tests of those solutions.

      Test solutions – refine and iterate

      • Think about the expected outcome and results of the solutions that require testing.
      • Test each solution under production-like circumstances to see if the results and behavior are as expected.
      • Refine and iterate upon the solutions as necessary, and test again.

      Implement solutions and measure results

      • Before implementing each solution, take a baseline measurement of the metric that will measure success.
      • Implement the solutions using your change management process.
      • After implementation, measure the success of the solution using the appropriate metric.
      • Document the results and judge whether the solution has been effective.

      Use the top result as a case study to obtain buy-in

      Your most effective solution will make a great case study.

      Write up the results and input the case study into the IT Operations Center Stakeholder Buy-In Presentation.

      This image contains a screenshot of info-tech's default format for presenting case studies.

      If you want additional support, have our analysts guide you through this phase as part of an Info-Tech workshop

      Book a workshop with our Info-Tech analysts

      this is a picture of an Info-Tech Analyst
      • To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team.
      • Info-Tech analysts will join you and your team onsite at your location or welcome you to Info-Tech’s historic Toronto office to participate in an innovative onsite workshop.
      • Contact your account manager (www.infotech.com/account), or email Workshops@InfoTech.com for more information.
      The following are sample activities that will be conducted by Info-Tech analysts with your team:
      🗲.1.2 This image contains a screenshot from section 🗲.1.2 of this blueprint.

      Identify issues

      Look for areas that aren’t working optimally.

      🗲.1.3 this image contains a screenshot from section 🗲.1.3 of this blueprint.

      Evaluate and rank potential solutions

      Sort the wheat from the chaff and plan for quick wins.

      PHASE 1

      Get Buy-In

      Optimize the IT Operations Center

      Step 1.1: Ensure Base Maturity Is in Place

      This step will walk you through the following activities:

      • Assess maturity of base IT Operations processes.

      Outcomes of this step

      • Completed IT Operations Center Prerequisites Assessment Tool

      Base processes underpin the Operations Center

      • Before you optimize your Operations Center, you should have foundational ITSM processes in place: service desk, and incident, problem, and change management.
      • Attempting to optimize Operations before it rests on a solid foundation can only lead to frustration.

      IT Operations Center

      • Service Desk
      • Incident Management
      • Problem Management
      • Change Management

      Info-Tech Insight

      ITIL isn’t dead. New technology such as cloud solutions and advanced monitoring tools have transformed how ITSM processes are implemented, but have not obviated them.

      Assess maturity of prerequisite processes

      1.1.1 IT Operations Center Prerequisites Assessment Tool

      • Don’t try to prematurely optimize your Operations Center.
      • Before undertaking this project, you should already have a base level of maturity in the four foundational IT Operations processes.
      • Complete the IT Operations Center Prerequisites Assessment Tool to assess your current level in service desk, incident management, problem management, and change management.
      this image contains a screenshot from Info-Tech's IT Operations Center Prerequisite Assessment

      Make targeted improvements on prerequisite processes if necessary

      If there are deficiencies in any of your foundational processes, take the time to remedy those first before proceeding with Optimize the IT Operations Center. See Info-Tech’s other blueprints:

      Standardize the Service Desk

      Strengthen your service desk to build a strong ITSM foundation.

      Incident and Problem Management

      Don’t let persistent problems govern your department.

      Optimize Change Management

      Turn and face the change with a right-sized change management process.

      Step 1.2: Make the Case

      This step will walk you through the following activities:

      • Estimate the impact of downtime for top five applications.
      • Estimate the cost of incident response.
      • Estimate the cost of MRW.
      • Set success metrics and estimate the ROI of the Operations Center project.
      • IT Operations Center Stakeholder Buy-In Presentation

      Obtaining buy-in is critical

      Buy-in from top-level stakeholders is critical to the success of the project.

      Before jumping into your initiatives, take the time to make the case and bring the business on board.

      Factors that “prevent us from improving the NOC”

      This image contains a graph of factors that prevent us from improving the NOC. In decreasing order, they include: Lack of strategic guidance from our vendors; The unwillingness of our management to accept new risk; Lack of adequate software tools; Our internal processes; Lack of management vision; Lack of funding; and Lack of personnel resources. There is a red circle drawn around the last three entries, with the words: Getting Buy-in Removes the Top Three Roadblocks to Improvement!. Source: Metzier, n.d

      List your top five applications

      List your top five applications for business criticality.

      Don’t agonize over decisions at this point.

      Generally, the top applications will be customer facing, end-user facing for the most critical business units, or critical for health and safety.

      Estimate impact of downtime

      • Come up with a rough, back-of-the-napkin estimate of the hourly cost of downtime for each application.
      • Complete page two of the IT Operations Center Stakeholder Buy-In Presentation.
      • Estimate loss of revenue per hour, loss of productivity per hour, and IT cost per incident resolution hour.
      • Pull a report on incident hours/outages in the past year from your ITSM tool. Multiply the total cost per incident hour by the incident hours per year to determine the current cost per year of service disruptions for each service.
      • Add up the cost for each of the top five services.
      • Now you can show the business a hard value number that quantifies your availability issues.

      Estimate salary cost of non-value-adding work

      Complete page three of the IT Operations Center Stakeholder Buy-In Presentation.

      • Estimate annual wage cost of incident response: multiply incident response hours per year (take from your ITSM tool) by the average hourly wage of incident responders.
      • Estimate annual cost of MRW: multiply MRW hours per year (take from ITSM tool or from time-keeping tool, or use best guess based on talking to staff members) by the average hourly wage of IT staff performing MRW.
      • Add the two numbers together to calculate the non-value-adding IT salary cost per year.
      • Express the previous number as a percentage of total IT salary. Everything that is not incident response or MRW is value-adding work.

      Now you have the holy trinity of metrics: set some targets

      The holy trinity of metrics:

      • Cost of downtime
      • % of salary on incident response
      • % of salary on MRW

      You want to reduce the above numbers. Set some back-of-the-napkin targets for percentage reductions for each of these areas. These are high-level metrics that business stakeholders will care about.

      Take your best guess at targets. Higher maturity organizations will have less potential for reduction from a percentage point of view (eventually you hit diminishing returns), while organizations just beginning to optimize their Operations Center have the potential for huge gains.

      Calculate the potential gains of targets

      Complete page five of the IT Operations Center Stakeholder Buy-In Presentation.

      • Multiply the targeted/estimated % reductions of the costs by your current costs to determine the potential savings/benefits.
      • Do a back-of-the napkin estimate of the cost of the Operations Center improvement project. Use reasonable numbers for cost of personnel time and cost of tools, and be sure to include ongoing personnel time costs – your time isn’t free and continual improvement takes work and effort.
      • Calculate the ROI.

      Fill out the case study

      • Complete page six of the IT Operations Center Stakeholder Buy-In Presentation. If you completed the lightning phase, use the results of your own quick win project(s) as an example of feasibility.
      • If you did not complete the lightning phase, delete this slide, or use an example of what other organizations have achieved to demonstrate feasibility.
      This image contains a screenshot of info-tech's default format for presenting case studies.

      Present to stakeholders

      • Deliver the presentation to key stakeholders.
      • Focus on the high-level story that the current state is costing real dollars and wages, and that these losses can be minimized through process improvements.
      • Be up front that many of the numbers are based on estimates, but be prepared to defend the reasonableness of the estimates.

      Gain buy-in and identify project sponsor

      • If the business is on board with the project, determine one person to be the executive sponsor for the project. This person should have a strong desire to see the project succeed, and should have some skin in the game.

      Formalize communication with the project sponsor

      • Establish how you will communicate with the sponsor throughout the project (e.g. weekly or monthly e-mail updates, bi-weekly meetings).
      • Set up a regular/recurring cadence and stick to it, so it can be put on auto-pilot. Be clear about who is responsible for initiating communication and sticking to the reporting schedule.

      Info-Tech Insight

      Tailor communication to the sponsor. The project sponsor is not the project manager. The sponsor’s role is to drive the project forward by allocating appropriate resources and demonstrating highly visible support to the broader organization. The sponsor should be kept in the loop, but not bothered with minutiae.

      Note the starting numbers for the holy trinity

      Use the IT Operations Center Continual Improvement Tracker:

      • Enter your starting numbers for the holy trinity of metrics.
      • After planning and implementing initiatives, this tracker will be used to update against the holy trinity to assess the success of the project on an ongoing basis and to drive continual improvement.

      PHASE 2

      Define Accountability and Metrics

      Optimize the IT Operations Center

      Step 2.1: Define Accountabilities

      This step will walk you through the following activities:

      • Formalize RACI for key processes.
      • Formalize RACI for key tasks.

      Outcomes of this step

      • Completed RACIs

      List key Operations Center processes

      Compile a list of processes that are key for the Operations Center.

      These processes should include the four foundational processes:

      • Service Desk
      • Incident Management
      • Problem Management
      • Change Management

      You may also want to include processes such as the following:

      • Event Management
      • Configuration Management

      Avoid listing processes you have yet to develop – stick with those already playing a role in your current state.

      Formalize RACI for key processes

      Use the IT Operations Center RACI Charts Template. Complete a RACI for each of the key processes involved in the IT Operations Center.

      RACI:

      • Responsible (does the work on a day-to-day basis)
      • Accountable (reviews, signs off, and is held accountable for outcomes)
      • Consulted (input is sought to feed into decision making)
      • Informed (is given notification of outcomes)

      As a best practice, no more than one person should be responsible or accountable for any given process. The same person can be both responsible and accountable for a given process, or it could be two different people.

      Avoid making someone accountable for a process if they do not have full visibility into the process for appropriate oversight, or do not have time to give the process sufficient attention.

      Formalize RACI for IT tasks

      Now think about the actual tasks or work that goes on in IT. Which roles and individuals are accountable for which tasks or pieces of work?

      In this case, more than one role/person can be listed as responsible or accountable in the RACI because we’re talking about types or categories of work. No conflict will occur because these individuals will be responsible or accountable for different pieces of work or individual tasks of the same type. (e.g. all service desk staff are responsible for answering phones and inputting tickets into the ITSM tool, but no more than one staff member is responsible for the input of any given ticket from a specific phone call).

      Step 2.2: Define Metrics

      This step will walk you through the following activities:

      • Cascade operational metrics from the holy trinity.
      • Evaluate metrics and identify key performance indicators (KPIs).
      • Cascade performance assessment (PA) metrics to support KPIs.
      • Build feedback loop for PA metrics.

      Outcomes of this step

      • KPIs
      • PA metrics

      Metrics must span across silos for shared accountability

      To adequately support the business goals of the organization, IT metrics should span across functional silos.

      Metrics that span across silos foster shared accountability across the IT organization.

      Metrics supported by all groups

      three grain silos are depicted. below, are the words IT Groups, with arrows pointing from the words to each of the three silos.

      Cascade operational metrics from the holy trinity

      Focus on the holy trinity of metrics.

      From these, cascade down to operational metrics that contribute to the holy trinity. It is possible that an operational metric may support more than one trinity metric. For example:

      a flow chart is depicted. two input circles point toward a central circle, and two output circles point away. the input circles include: Cost of Downtime; Cost of Incident Response. The central circle reads: Mean time to restore service. the output circles include the words: Tier 1 Resolution Rate; %% of Known Errors Captured in ITSM Tool.

      Evaluate metrics and identify KPIs

        • Evaluate your operational metrics and determine which ones are likely to have the largest impact on the holy trinity of metrics.
        • Identify the ten metrics likely to have the most impact: these will be your KPIs moving forward.
        • Enter these KPIs into the IT Operations Center Continual Improvement Tracker.
        this image depicts a cycle around the term KPI. The cycle includes: Objective; Measurement; optimization; strategy; performance; evaluation

      Beware how changing variables/context can affect metrics

      • Changes in context can affect metrics drastically. It’s important to keep the overall context in mind to avoid being led astray by certain numbers taken in isolation.
      • For example, a huge hiring spree might exhaust the stock of end-user devices, requiring time to procure hardware before the onboarding tickets can be completely fulfilled. You may have improved your onboarding process through automation, but see a large increase in average time to onboard a new user. Keep an eye out for such anomalies or fluctuations, and avoid putting too much stock in any single operational KPI.
      • Remember, operational KPIs are just a heuristic tool to support the holy trinity of metrics.

      Determine accountability for KPIs

      • For each operational KPI, assign one person to be accountable for that KPI.
      • Be sure the person in charge has the necessary authority and oversight over the processes and personnel that most affect that KPI – otherwise it makes little sense to hold the individual accountable.
      • Consulting your process RACIs is a good place to start.
      • Record the accountable person for each KPI in the IT Operations Center Continual Improvement Tracker.

      Info-Tech Best Practice

      Match accountability with authority. The person accountable for each KPI should be the one who has the closet and most direct control over the work and processes that most heavily impact that KPI.

      Cascade PA metrics to support KPIs

      KPIs are ultimately driven by how IT does its work, and how individuals work is driven by how their performance is assessed and evaluated.

      For the top KPIs, be sure there are individual PA metrics in place that support the KPI, and if not, develop the appropriate PA metrics.

      For example:

      • KPI: Mean time to resolve incidents
      • PA metric: % of escalations that followed SOP (e.g. not holding onto a ticket longer than supposed to)
      • KPI: Number of knowledge base articles written
      • PA metric: Number of knowledge base articles written/contributed to

      Communicate key changes in PA metrics

      Any changes from the previous step will take time and effort to implement and make stick.

      Changing people’s way of working is extremely difficult.

      Build a communication and implementation plan about rolling out these changes, emphasize the benefits for everyone involved, and get buy-in from the affected staff members.

      Build feedback loops for PA metrics

      Now that PA metrics support your Operations Center’s KPIs, you should create frequent feedback loops to drive and boost those PA metrics.

      Once per year or once per quarter is not frequent enough. Managers should meet with their direct reports at least monthly and review their reports’ performance against PA metrics.

      Use a “set it and forget it” implementation, such as a recurring task or meeting in your calendar.

      If you want additional support, have our analysts guide you through this phase as part of an Info-Tech workshop

      Book a workshop with our Info-Tech analysts

      this is a picture of an Info-Tech Analyst

      • To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team.
      • Info-Tech analysts will join you and your team onsite at your location or welcome you to Info-Tech’s historic Toronto office to participate in an innovative onsite workshop.
      • Contact your account manager (www.infotech.com/account), or email Workshops@InfoTech.com for more information.
      The following are sample activities that will be conducted by Info-Tech analysts with your team:
      2.2.1 This image contains a screenshot from section 2.2.1 of this blueprint.

      Cascade operational metrics from the holy trinity

      Rank goals based on business impact and stakeholder pecking order.

      2.2.2 this image contains a screenshot from section 2.2.2 of this blueprint.

      Determine accountability for KPIs

      Craft a concise and compelling elevator pitch that will drive the project forward.

      PHASE 3

      Assess Gaps and Prioritize Initiatives

      Optimize the IT Operations Center

      Step 3.1: Assess Gaps

      This step will walk you through the following activities:

      • Assess visibility provided by monitoring.
      • Assess process workflows and identify areas for automation.
      • Assess requests and identify potential for automation.
      • Assess Operations Center staff capabilities.
      • Conduct a root cause analysis on the gaps/pain points.

      Outcomes of this step

      • List of gaps
      • List of root causes

      Measure current state of KPIs and identify lagging ones

      Take a baseline measurement of each operational KPI.

      If historical data is available, compare the present state measurement to data points collected over the last year or so.

      Review the measured KPIs.

      Identify any KPIs that seem lagging or low, or that may be particularly important to influence.

      Record lagging KPIs in the IT Operations Center Gap and Initiative Tracker tool.

      Assess visibility provided by monitoring

      List the top five most critical business services supported by IT.
      Assess the current state of your monitoring tools.

      For each business service, rate the level of visibility your monitoring tools allow from the following options:

      1. We have no visibility into the service, or lack visibility into crucial elements.
      2. We have basic visibility (up/down) into all the IT components that support the service.
      3. We have basic visibility (up/down) into the end service itself, in addition to all the IT components that make it up.
      4. We have some advanced visibility into some aspects of the service and/or its IT components.
      5. We have a full, end-to-end view of performance across all the layers of the stack, as well as the end business service itself.

      Identify where more visibility may be necessary

      For most organizations it isn’t practical to have complete visibility into everything. For the areas in which visibility is lacking into key services, think about whether more visibility is actually required or not. Consider some of the following questions:

      • How great is the impact of this service being unavailable?
      • Would greater visibility into the service significantly reduce the mean time to restore the service in the event of incidents?

      Record any deficiencies in the IT Operations CenterGap and Initiative Tracker tool.

      Assess alerting

      Assess alerting for your most critical services.

      Consider whether any of the following problems occur:

      • Often receive no alert(s) in the event of critical outages of key services (we find out about critical outages from the service desk).
      • We are regularly overwhelmed with too many alerts to investigate properly.
      • Our alerts are rarely actionable.
      • We often receive many false alerts.

      Identify areas for potential improvement in the managing of alerts. Record any deficiencies in the IT Operations Center Gap and Initiative Tracker tool.

      Assess process workflows and identify areas for automation

      Review your process flows for base processes such as Service Desk, Incident Management, Problem Management, and Change Management.

      Identify areas in the workflows where there may be defects, inefficiencies, or potential for improvement or automation.

      Record any deficiencies in the IT Operations Center Gap and Initiative Tracker tool.

      See the blueprint Prepare for Cognitive Service Management for process workflows and areas to look for automation possibilities.

      Prepare for Cognitive Service Management

      Make ready for AI-assisted IT operations.

      Assess requests and identify potential for automation

      • Assess the most common work orders or requests handled by the Operations Center group (i.e. this does not include requests fulfilled by the help desk).
      • Which work orders are the most painful? That is, what common work orders involve the greatest effort or the most manual work to fulfill?
      • Fulfillment of common, recurring work orders is MRW, and should be reduced or removed if possible.
      • Consider automation of certain work orders, or self-service delivery.
      • Record any deficiencies in the IT Operations Center Gap and Initiative Tracker tool.

      Assess Operations Center staff capabilities

      • Assess the skills and expertise of your team members.
      • Consider some of the following:
        • Are there team members who could perform their job more effectively by picking up certain skills or proficiencies?
        • Are there team members who have the potential to shift into more valuable or useful roles, given the appropriate training?
        • Are there individual team members whose knowledge is crucial for operations, and whose function cannot be taken up by others?

      Record any deficiencies in the IT Operations Center Gap and Initiative Tracker tool.

      Info-Tech Insight

      Train to avoid pain. All too often organizations expose themselves to significant key person risk by relying on the specialized skills and knowledge of one team member. Use cross training to remedy such single points of failure before the risk materializes.

      Brainstorm pain points

      Brainstorm any pain points not discussed in the previous areas.

      Pain points can be specific operational issues that have not yet been considered. For example:

      • Tom is overwhelmed with tickets.
      • Our MSP often breaches SLA.
      • We don’t have a training budget.

      Record any deficiencies in the IT Operations CenterGap and Initiative Tracker tool.

      Conduct a root cause analysis on the gaps/pain points

      • Pain points can often be symptoms of other deficiencies, or somewhat removed from the actual problem.
      • Using the 5 Whys, conduct a root cause analysis on the pain points for which the causes are not obvious.
      • For each pain point, ask “why” for a sequence of five times, attempting to proceed to the root cause of the issue. This root cause is the true gap that needs to be remedied to resolve the pain point.
      • For example:
        • The Wi-Fi network often goes down in the afternoon.
          • Why?: Its bandwidth gets overloaded.
          • Why?: Many people are streaming video.
          • Why?: There’s a live broadcast of a football game at that time.
        • Possible solutions:
          • Block access to the streaming services.
          • Project the game on a screen in a large conference room and encourage everyone to watch it there.

      Step 3.2: Plan Initiatives

      This step will walk you through the following activities:

      • Brainstorm initiatives to boost KPIs and address gaps.
      • Prioritize potential initiatives.
      • Decide which initiatives to include on the roadmap.

      Outcomes of this step

      • Targeted improvement roadmap

      Brainstorm initiatives to boost KPIs and address gaps

      Prioritize potential initiatives

      3.2.1 IT Operations Center Initiative Prioritization Tool

      • Use the IT Operations Center Initiative Prioritization Tool.
      • Enter the initiatives into the tool.
      • For each initiative, input the following ranking criteria:
        • The metric/KPI’s estimated degree of impact on the holy trinity.
        • The gap or pain point’s estimated degree of impact on the metric/KPI.
        • The initiative’s estimated degree of positive impact on the gap or pain point
        • The initiative’s attainability.
      • Estimate the resourcing capacity required for each initiative.
      • For accurate capacity assessment, input as “force include” all current in-flight projects handled by the Operations Center group (including those unrelated to the Operations Center project).

      Decide which initiatives to include on the roadmap

      • Not all initiatives will be worth pursuing – and especially not all at once.
      • Consider the results displayed on the final tab of the IT Operations CenterInitiative Prioritization Tool.
      • Based on the prioritization and taking capacity into account, decide which initiatives to include on your roadmap.
      • Sometimes, for operational or logistical reasons, it may make sense to schedule an initiative at a time other than its priority might dictate. Make such exceptions on a case-by-case basis.

      Assign an owner to each initiative, and provide resourcing

      • For each initiative, assign one person to be the owner of that initiative.
      • Be sure that person has the authority and the bandwidth necessary to drive the initiative forward.
      • Secure additional resourcing for any initiatives you want to include on your roadmap that are lacking capacity.

      Info-Tech Insight

      You must invest resources in order to reduce the time spent on non-value-adding work.

      "The SRE model of working – and all of the benefits that come with it – depends on teams having ample capacity for engineering work. If toil eats up that capacity, the SRE model can’t be launched or sustained. An SRE perpetually buried under toil isn’t an SRE, they are just a traditional long-suffering SysAdmin with a new title."– David N. Blank-Edelman

      If you want additional support, have our analysts guide you through this phase as part of an Info-Tech workshop

      Book a workshop with our Info-Tech analysts

      this is a picture of an Info-Tech Analyst

      • To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team.
      • Info-Tech analysts will join you and your team onsite at your location or welcome you to Info-Tech’s historic Toronto office to participate in an innovative onsite workshop.
      • Contact your account manager (www.infotech.com/account), or email Workshops@InfoTech.com for more information.
      The following are sample activities that will be conducted by Info-Tech analysts with your team:
      3.1.1 This image contains a screenshot from section 3.1.1 of this blueprint.

      Conduct a root cause analysis on the gaps/pain points

      Find out the cause, so you can come up with solutions.

      3.2.1 this image contains a screenshot from section 3.2.1 of this blueprint.

      Prioritize potential initiatives

      Don’t try to boil the ocean. Target what’s manageable and what will have the most impact.

      PHASE 4

      Launch Initiatives and Track Metrics

      Optimize the IT Operations Center

      Step 4.1: Lay Foundation

      This step will walk you through the following activities:

      • Build initiative communication plan.
      • Develop a testing plan for each technical initiative.

      Outcomes of this step

      • Communication plan
      • Testing plan(s)

      Expect resistance to change

      • It’s not as simple as rolling out what you’ve designed.
      • Anything that affects people’s way of working will inevitably be met with suspicion and pushback.
      • Be prepared to fight the battle.
      • "The hardest part is culture. You must get people to see the value of automation. Their first response is ‘We've been doing it this way for 10 years, why do we need to do it another way?’ It's hard to get someone out of their comfort zone to learn something new, especially when they've been at an organization for 20 years. You need to give them incentives."– Cyrus Kalatbari, Senior IT Architect, Infrastructure/Cloud

      Communicate changes in advance, along with their benefits!

      • Communicate changes well in advance of the date(s) of implementation.
      • Emphasize the benefits of the changes – not just for the organization, but for employees and staff members.
      • Advance communication of changes helps make them more palatable, and builds trust in employees by making them feel informed of what’s going on.

      Involve IT staff in design and implementation of changes

      • As you communicate the coming changes, take the opportunity to involve any affected staff members who have not yet participated in the project.
      • Solicit their feedback and get them to help design and implement the initiatives that involve significant changes to their roles.

      Develop a testing plan for each technical initiative

      • Some initiatives, such as appointing a new change manager or hiring a new staff member, do not make sense to test.
      • On the other hand, technical initiatives such as automation scripts, new monitoring tools or dashboards, and changed alert thresholds should be tested thoroughly before implementation.
      • For each technical initiative, think about the expected results and performance if it were to run in production, and build a test plan to ensure it behaves as expected and there are no corner cases.

      Test technology initiatives and iterate if necessary

      • Test each technical initiative under a variety of circumstances, with as close an environment to production as possible.
      • Try to develop corner cases or unusual or unexpected situations, and see if any of these will break the functionality or produce unintended or unexpected results.
      • Document the results of the testing, and iterate on the initiative and test again if necessary.

      "The most important things – and the things that people miss – are prerequisites and expected results. People jump out and build scripts, then the scripts go into the ditch, and they end up debugging in production." – Darin Stahl, Research Director, Infrastructure & Operations

      Step 4.2: Launch and Measure

      This step will walk you through the following activities:

      • Launch initiatives and track adoption and effectiveness.
      • Investigate initiatives that appear ineffective.
      • Measure success with the holy trinity.

      Outcomes of this step

      • Continual improvement roadmap

      Establish a review cycle for each metric

      Info-Tech Best Practice

      Don’t measure what doesn’t matter. If a metric is not going to be reviewed or reported on for informational or decision-making purposes, it should not be tracked.

      Launch initiatives and track adoption and effectiveness

      • Launch the initiatives.
      • Some initiatives will need to proceed through your change management process in order to roll out, but others will not.
      • Track the adoption of initiatives that require it.
        • Some initiatives will require tracking of adoption, whereas others will not.
        • For example, hiring a new service desk staff member does not require tracking of adoption, but implementing a new process for ticket handling does.
        • The implementation plan should include a way to measure the adoption of such initiatives, and regularly review the numbers to see if the implementation has been successful.
      • For all initiatives, measure their effectiveness by continuing to track the KPI/metric that the initiative is intended to influence.

      Assess metrics according to review cycle for continual improvement

      • Assess metrics according to the review cycle.
      • Note whether metrics are improving in the right direction or not.
      • Correlate changes in the metrics with measures of the adoption of the initiatives – see whether initiatives that have been adopted are moving the needle on the KPIs they are intended to.

      Investigate initiatives that appear ineffective

      • If the adoption of an initiative has succeeded, but the expected impact of that initiative on the KPI has not taken place, investigate further and conduct a root causes analysis to determine why this is the case.
      • Sometimes, anomalies or fluctuations will occur that cause the KPI not to move in accordance with the success of the initiative. In this case, it’s just a fluke and the initiative can still be successful in influencing the KPI over the long term.
      • Other times, the initiative may prove mostly or entirely ineffective, either due to misdesign of the initiative itself, a change of circumstances, or other compounding factors or complexities. If the initiative proves ineffective, consider iterating modifications of the initiative and continuing to measure the effect on KPIs – or perhaps killing the initiative altogether.
      • Remember that experimentation is not a bad thing – it’s okay that not every initiative will always prove worthwhile.

      Measure success with the holy trinity

      • Report to business stakeholders on the effect on the holy trinity of metrics at least annually.
      • Calculate the ROI of the project after two years and compare the results to the targeted ROI you initially presented in the IT Operations Center Stakeholder Buy-In Presentation.
      This image contains a Funnel Chart showing the inputs: Downtime; Cost of Incident Response; MRW; and the output: Reduce for continual improvement

      Iterate on the Operations Center process for continual improvement

      This image depicts a cycle, which includes: Data analysis; Executive Sponsorship; Success Criteria; Gap Assessment; Initiatives; Tracking & Measurement

      If you want additional support, have our analysts guide you through this phase as part of an Info-Tech workshop

      Book a workshop with our Info-Tech analysts

      this is a picture of an Info-Tech Analyst

      • To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team.
      • Info-Tech analysts will join you and your team onsite at your location or welcome you to Info-Tech’s historic Toronto office to participate in an innovative onsite workshop.
      • Contact your account manager (www.infotech.com/account), or email Workshops@InfoTech.com for more information.
      The following are sample activities that will be conducted by Info-Tech analysts with your team:
      4.1.1This image contains a screenshot from section 3.1.1 of this blueprint.

      Communicate changes in advance, along with their benefits!

      Rank goals based on business impact and stakeholder pecking order.

      4.1.2 this image contains a screenshot from section 3.2.1 of this blueprint.

      Develop a testing plan for each technical initiative

      Craft a concise and compelling elevator pitch that will drive the project forward.

      Research contributors and experts
      This is a picture of Cyrus Kalatbari, IT infrastructure/cloud architect

      Cyrus Kalatbari, IT Infrastructure/Cloud Architect

      Cyrus’ in-depth knowledge cutting across I&O and service delivery has enhanced the IT operations of multiple enterprise-class clients.

      This is a picture of Derek Cullen, Chief Technology Officer

      Derek Cullen, Chief Technology Officer

      Derek is a proven leader in managing enterprise-scale development, deployment, and integration of applications, platforms, and systems, with a sharp focus on organizational transformation and corporate change.

      This is a picture of Phil Webb, Senior Manager

      Phil Webb, Senior Manager – Unified Messaging and Mobility

      Phil specializes in service delivery for cloud-based and hybrid technology solutions, spanning requirements gathering, solution design, new technology introduction, development, integration, deployment, production support, change/release delivery, maintenance, and continuous improvement.

      This is a picture of Richie Mendoza, IT Services Delivery Consultant

      Richie Mendoza, IT Services Delivery Consultant

      Ritchie’s accomplishments include pioneering a cloud capacity management process and presenting to the Operations team and to higher management, while providing a high level of technical leadership in all phases of capacity management activities.

      This is a picture of Rob Thompson, Solutions Architect

      Rob Thomson, Solutions Architect

      Rob is an IT leader with a track record of creating and executing digital transformation initiatives to achieve the desired outcomes by integrating people, process, and technology into an efficient and effective operating model.

      Related Info-Tech research

      Create a Configuration Management Roadmap

      Right-size your CMDB to improve IT operations.

      Harness Configuration Management Superpowers

      Build a CMDB around the IT services that are most important to the organization.

      Develop an IT Infrastructure Services Playbook

      Automation, SDI, and DevOps – build a cheat sheet to manage a changing Infrastructure & Operations environment.

      Develop an Availability and Capacity Management Plan

      Manage capacity to increase uptime and reduce costs.

      Establish a Program to Enable Effective Performance Monitoring

      Maximize the benefits of infrastructure monitoring investments by diagnosing and assessing transaction performance, from network to server to end-user interface.

      Bibliography

      Baker, Dan, and Hal Baylor. “How Benchmarking & Streamlining NOC Operations Can Lower Costs & Boost Effectiveness.” Top Operator, Mar. 2017. Web.

      Blank-Edelman, David. Seeking SRE: Conversations About Running Production Systems at Scale. O'Reilly, 2018. Web.

      CA Technologies. “IT Transformation to Next-Generation Operations Centers: Assure Business Service Reliability by Optimizing IT Operations.” CA Technologies, 2014. Web.

      Ditmore, Jim. “Improving Availability: Where to Start.” Recipes for IT, n.d. Web.

      Ennis, Shawn. “A Phased Approach for Building a Next-Generation Network Operations Center.” Monolith Software, 2009. Web.

      Faraclas, Matt. “Why Does Infrastructure Operations Still Suck?” Ideni, 25 Feb. 2016. Web.

      InterOp ITX. “2018 State of the Cloud.” InterOp ITX, Feb. 2018. Web.

      ITIC. “Cost of Hourly Downtime Soars: 81% of Enterprises Say it Exceeds $300K On Average.” ITIC, 2 Aug. 2016. Web.

      Joe the IT Guy. “Availability Management Is Harder Than it Looks.” Joe the IT Guy, 10 Feb. 2016. Web.

      ---. “Do Quick Wins Exist for Availability Management?” Joe the IT Guy, 15 May 2014. Web.

      Lawless, Steve. “11 Top Tips for Availability Management.” Purple Griffon, 4 Jan. 2019. Web.

      Metzler, Jim. “The Next Generation Network Operations Center: How the Focus on Application Delivery is Redefining the NOC.” Ashton, Metzler & Associates, n.d. Web.

      Nilekar, Shirish. “Beyond Redundancy: Improving IT Availability.” Network Computing, 28 Aug. 2015. Web.

      Slocum, Mac. “Site Reliability Engineering (SRE): A Simple Overview.” O’Reilly, 16 Aug. 2018. Web.

      Spiceworks. “The 2019 State of IT.” Spiceworks, 2019. Web

      Asset Management

      • Buy Link or Shortcode: {j2store}1|cart{/j2store}
      • Related Products: {j2store}1|crosssells{/j2store}
      • Up-Sell: {j2store}1|upsells{/j2store}
      • Download01-Title: Asset Management Executive Brief
      • Download-01: Visit Link
      • member rating overall impact: 9.1/10
      • member rating average dollars saved: $16,518
      • member rating average days saved: 19
      • Parent Category Name: Infra and Operations
      • Parent Category Link: /infra-and-operations
      Asset management has a clear impact on the financials of your company. Clear insights are essential to keep your spending at the right level.

      Asset Management

      Cut Cost Through Effective IT Category Planning

      • Buy Link or Shortcode: {j2store}213|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Vendor Management
      • Parent Category Link: /vendor-management
      • IT departments typically approach sourcing a new vendor or negotiating a contract renewal as an ad hoc event.
      • There is a lack of understanding on how category planning governance can save money.
      • IT vendor “go to market” or sourcing activities are typically not planned and are a reaction to internal client demands or vendor contract expiration.

      Our Advice

      Critical Insight

      • Lack of knowledge of the benefits and features of category management, including the perception that the sourcing process takes too long, are two of the most common challenges that prevent IT from category planning.
      • Other challenges include the traditional view of contract renegotiation and vendor acquisition as a transactional event vs. an ongoing strategic process.
      • Finally, allocating resources and time to collect the data, vendor information, and marketing analysis prevents us from creating category plans.

      Impact and Result

      • An IT category plan establishes a consistent and proactive methodology or process to sourcing activities such as request for information (RFI), request for proposals, (RFPs), and direct negotiations with a specific vendor or“targeted negotiations” such as renewals.
      • The goal of an IT category plan is to leverage a strategic approach to vendor selection while identify cost optimizing opportunities that are aligned with IT strategy and budget objectives.

      Cut Cost Through Effective IT Category Planning Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you should create an IT category plan to reduce your IT cost, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Create an IT category plan

      Use our three-step approach of Organize, Design, and Execute an IT Category Plan to get the most out of your IT budget while proactively planning your vendor negotiations.

      • IT Category Plan
      • IT Category Plan Metrics
      • IT Category Plan Review Presentation
      [infographic]

      Looking at Risk in a New Light: The Six Pillars of Vendor Risk Management

      • Buy Link or Shortcode: {j2store}209|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Vendor Management
      • Parent Category Link: /vendor-management

      • Moreso than at any other time, our world is changing. As a result, organizations – and their vendors – need to be able to adapt their plans to accommodate risk on an unprecedented level.
      • It is increasingly likely that one of an organization's vendors, or their n-party support vendors, will cause an incident. Organizations must protect themselves by creating better mechanisms to hold their n-party vendors accountable and validate that they comply.

      Our Advice

      Critical Insight

      • Identifying and managing a vendor’s potential risk impact on your organization requires multiple people in the organization across several functions. Those people all need coaching on the potential changes in the market and how these changes may affect your organization.
      • Organizational leadership is often taken unaware by changes, and their plans lack the flexibility to adjust to significant regulatory upheavals.

      Impact and Result

      • Vendor management practices educate organizations on the different potential risks from vendors in your market and suggest creative and alternative ways to avoid and help manage them.
      • Prioritize and classify your vendors with quantifiable, standardized rankings.
      • Prioritize focus on your high-risk vendors.
      • Standardize your processes for identifying and monitoring vendor risks with our Comprehensive Risk Impact Tool to manage potential impacts.

      Looking at Risk in a New Light: The Six Pillars of Vendor Risk Management Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Looking at Risk in a New Light: The Six Pillars of Vendor Risk Management – Use the research to better understand the negative impacts of vendor actions to your organization

      Use this research to identify and quantify the potential risk impacts caused by vendors. Utilize Info-Tech's approach to look at the impact from various perspectives to better prepare for issues that may arise.

      • Looking at Risk in a New Light: The Six Pillars of Vendor Risk Management Storyboard

      2. Comprehensive Risk Impact Tool – Use this tool to help identify and quantify the impacts of negative vendor actions.

      By playing the “what if” game and asking probing questions to draw out – or eliminate – possible negative outcomes, everyone involved adds their insight into parts of the organization to gather a comprehensive picture of potential impacts.

      • Comprehensive Risk Impact Tool
      [infographic]

      Further reading

      Looking at Risk in a New Light: The Six Pillars of Vendor Risk Management

      Approach vendor risk impact assessments from all perspectives.

      Analyst Perspective

      Organizations must comprehensively understand the impacts vendors may cause through different potential actions.

      Frank Sewell

      The risks from the vendor market have become more prevalent as the technologies and organizational strategies shift to a global direction. With this shift in risk comes a necessary perspective change to align with the greater likelihood of an incident occurring from vendors' (or one of their downstream support vendor's) negative actions.

      Organizational leadership must become more aware of the increasing risks that engaging vendors impose. To do so, they need to make informed decisions, which can only be provided by engaging expert resources in their organizations to compile a comprehensive look at potential risk impacts.

      Frank Sewell

      Research Director, Vendor Management
      Info-Tech Research Group

      Executive Summary

      Your Challenge

      More so than at any other time, our world is changing. As a result organizations – and their vendors – need to be able to adapt their plans to accommodate risk on an unprecedented level.

      It is increasingly likely that one of your vendors, or their n-party support vendors, will cause an incident. Organizations must protect themselves by creating better mechanisms to hold their n-party vendors accountable and validate that they comply.

      Common Obstacles

      Identifying and managing a vendor’s potential risk impact on your organization requires multiple people in the organization across several functions. Those people all need coaching on the potential changes in the market and how these changes may affect your organization.

      Organizational leadership is often taken unaware by changes, and their plans lack the flexibility to adjust to significant regulatory upheavals.

      Info-Tech's Approach

      Vendor management practices educate organizations on the different potential risks from vendors in your market and suggest creative and alternative ways to avoid and help manage them.

      Prioritize and classify your vendors with quantifiable, standardized rankings.

      Prioritize focus on your high-risk vendors.

      Standardize your processes for identifying and monitoring vendor risks with our Comprehensive Risk Impact Tool to manage potential impacts.

      Info-Tech Insight

      Organizations must evolve their risk assessments to be more adaptive to respond to changes in the global market. Ongoing monitoring and continual assessment of vendors’ risks is crucial to avoiding negative impacts.

      Info-Tech’s multi-blueprint series on vendor risk assessment

      There are many individual components of vendor risk beyond cybersecurity.`

      6 components of vendor risk beyond cybersecurity.  Financial, Reputational, Operational, Strategic, Security, Regulatory & Compliance.

      This series will focus on the individual components of vendor risk and how vendor management practices can facilitate organizations’ understanding of those risks.

      Out of Scope:
      This series will not tackle risk governance, determining overall risk tolerance and appetite, or quantifying inherent risk.

      The world is constantly changing

      The IT market is constantly reacting to global influences. By anticipating changes, leaders can set expectations and work with their vendors to accommodate them.

      When the unexpected happens, being able to adapt quickly to new priorities ensures continued long-term business success.

      Below are some things no one expected to happen in the last few years:

      62%

      of IT professionals are more concerned about being a victim of ransomware than they were a year ago.

      Info-Tech Tech Trends Survey 2022

      82%

      of Microsoft non-essential employees shifted to working from home in 2020, joining the 18% already remote.

      Info-Tech Tech Trends Survey 2022

      89%

      of organizations invested in web conferencing technology to facilitate collaboration.

      Info-Tech Tech Trends Survey 2022

      Looking at Risk in a New Light:

      the 6 Pillars of Vendor Risk Management

      Vendor Risk

      • Financial

      • Strategic

      • Operational

      • Security

      • Reputational

      • Regulatory

      • Organizations must review their risk appetite and tolerance levels, considering their complete landscape.
      • Changing regulations, acquisitions, and events that affect global supply chains are current realities, not unlikely scenarios.
      • Prepare your vendor risk management for success using due diligence and scenario- based “What If” discussions to bring all the relevant parties to the table and educate your whole organization on risk factors.
      Assessing Financial Risk Impacts

      Strategic risks on a global scale

      Odds are at least one of these is currently affecting your strategic plans

      • Vendor Acquisitions
      • Global Pandemic
      • Global Shortages
      • Gas Prices
      • Poor Vendor Performance
      • Travel Bans
      • War
      • Natural Disasters
      • Supply Chain Disruptions
      • Security Incidents

      Make sure you have the right people at the table to identify and plan to manage impacts.

      Assess internal and external operational risk impacts

      Two sides of the same coin

      Internal

      • Poorly vetted supplemental staff
      • Bad system configurations
      • Lack of relevant skills
      • Poor vendor performance
      • Failure to follow established processes
      • Weak contractual accountability
      • Unsupportable or end-of-life system components

      External

      • Cyberattacks
      • Supply Chain Issues
      • Geo-Political Disruptions
      • Vendor Acquisitions
      • N-Party Non-Compliance
      • Vendor Fraud

      Operational risk is the risk of losses caused by flawed or failed processes, policies, systems, or events that disrupt business operations.

      Identify and manage security risk impacts on your organization

      Due diligence will enable successful outcomes

      • Poor vendor performance
      • Vendor acquisition
      • Supply chain disruptions and shortages
      • N-party risk
      • Third-party risk

      What your vendor associations say about you

      Reputations that affect your brand: Bad customer reviews, breach of data, poor security posture, negative news articles, public lawsuits, poor performance.

      Regulatory compliance

      Consider implementing vendor management initiatives and practices in your organization to help gain compliance with your expanding vendor landscape.

      Your organizational risks may be monitored but are your n-party vendors?

      6 components of vendor risk beyond cybersecurity.  Financial, Reputational, Operational, Strategic, Security, Regulatory & Compliance.

      Review your expectations with your vendors and hold them accountable

      Regulatory entities are looking beyond your organization’s internal compliance these days. Instead, they are more and more diving into your third-party and downstream relationships, particularly as awareness of downstream breaches increases globally.

      • Are you assessing your vendors regularly?
      • Are you validating those assessments?
      • Do your vendors have a map of their downstream support vendors?
      • Do they have the mechanisms to hold those downstream vendors accountable to your standards?

      Identify and manage risks

      Regulatory

      Regulatory agencies are putting more enforcement around ESG practices across the globe. As a result, organizations will need to monitor the changing regulations and validate that their vendors and n-party support vendors are adhering to these regulations or face penalties for non-compliance.

      Security-Data protection

      Data protection remains an issue. Organizations should ensure that the data their vendors obtain remains protected throughout the vendor’s lifecycle, including post-termination. Otherwise, they could be monitoring for a data breach in perpetuity.

      Mergers and acquisitions

      More prominent vendors continuously buy smaller companies to control the market in the IT industry. Organizations should put protections in their contracts to ensure that an IT vendor’s acquisition does not put them in a relationship with someone that could cause them an issue.

      Identify and manage risks

      Poor vendor performance

      Consider the impact of a vendor that fails to perform midway through the implementation. Organizations need to be able to manage the impact of replacing that vendor and cutting their losses rather than continuing to throw good money away after bad performance.

      Supply chain disruptions and global shortages

      Geopolitical disruptions and natural disasters have caused unprecedented interruptions to business. Incorporate forecasting of product and ongoing business continuity planning into your strategic plans to adapt as events unfold.

      Poorly configured systems

      Failing to ensure that your vendor-supported systems are properly configured and that your vendors are meeting your IT change control and configuration standards is more commonplace than expected. Proper oversight and management of your support vendors is crucial to ensure they are meeting expectations in this regard.

      What to look for

      Identify potential risk impacts

      • Is there a record of complaints against the vendor from their employees or customers?
      • Is the vendor financially sound, with the resources to support your needs?
      • Has the vendor been cited for regulatory compliance issues in the past?
      • Does the vendor have a comprehensive list of their n-party vendor partners?
        • Are they willing to accept appropriate contractual protections regarding them?
      • Does the vendor self-audit, or do they use a vetted third-party audit firm to issue a SOC report annually?
      • Does the vendor operate in regions known for instability?
      • Is the vendor willing to make concessions on contractual protections, or are they only offering one-sided agreements with as-is warranties?

      Prepare your vendor risk management for success

      Due diligence will enable successful outcomes.

      1. Obtain top-level buy-in; it is critical to success.
      2. Build enterprise risk management (ERM) through incremental improvement.
      3. Focus initial efforts on the “big wins” to prove the process works.
      4. Use existing resources.
      5. Build on any risk management activities that already exist in the organization.
      6. Socialize ERM throughout the organization to gain additional buy-in.
      7. Normalize the process long term with ongoing updates and continuing education for the organization.
      8. (Adapted from COSO)

      How to assess third-party risk

      1. Review organizational risks

        Understand the organizations risks to prepare for the “What If” game exercise.
      2. Identify and understand potential risks

        Play the “What If” game with the right people at the table.
      3. Create a risk profile packet for leadership

        Pull all the information together in a presentation document.
      4. Validate the risks

        Work with leadership to ensure that the proposed risks are in line with their thoughts.
      5. Plan to manage the risks

        Lower the overall risk potential by putting mitigations in place.
      6. Communicate the plan

        It is important not only to have a plan but also to socialize it in the organization for awareness.
      7. Enact the plan

        Once the plan is finalized and socialized, put it in place with continued monitoring for success.

      Adapted from Harvard Law School Forum on Corporate Governance

      Insight summary

      Risk impacts often come from unexpected places and have significant consequences.

      Knowing who your vendors are using for their support and supply chain could be crucial in eliminating the risk of non-compliance for your organization.

      Having a plan to identify and validate the regulatory compliance of your vendors is a must for any organization to avoid penalties.

      Insight 1

      Organizations’ strategic plans need to be adaptable to avoid vendors’ negative actions causing an expedited shift in priorities.

      For example, Philips’ recall of ventilators impacted its products and the availability of its competitors’ products as demand overwhelmed the market.

      Insight 2

      Organizations often fail to understand how n-party vendors could place them in non-compliance.

      Even if you know your complete third-party vendor landscape, you may not be aware of the downstream vendors in play. Ensure that you get visibility into this space as well, and hold your direct vendors accountable for the actions of their vendors.

      Insight 3

      Organizations need to know where their data lives and ensure it is protected.

      Make sure you know which vendors are accessing/storing your data, where they are keeping it, and that you can get it back and have the vendors destroy it when the relationship is over. Without adequate protections throughout the lifecycle of the vendor, you could be monitoring for breaches in perpetuity.

      Insight summary

      Assessing financial impacts is an ongoing, educative, and collaborative multidisciplinary process that vendor management initiatives are uniquely designed to coordinate and manage for organizations.

      Operational risk impacts often come from unexpected places and have unforeseen impacts. Knowing where your vendors place in critical business processes and those vendors' business continuity plans concerning your organization should be a priority for those managing the vendors.

      Insight 4

      Organizations need to learn how to assess the likelihood of potential risks in the rapidly changing online environments and recognize how their partnerships and subcontractors’ actions can affect their brand.

      For example, do you understand how a simple news article raises your profile for short-term and long-term adverse events?

      Insight 5

      Organizations fail to plan for vendor acquisitions appropriately.

      Vendors routinely get acquired in the IT space. Does your organization have appropriate safeguards from inadvertently entering a negative relationship? Do you have plans for replacing critical vendors purchased in such a manner?

      Insight 6

      Vendors are becoming more and more crucial to organizations’ overall operations, and most organizations have a poor understanding of the potential impacts they represent.

      Is your vendor solvent? Do they have enough staff to accommodate your needs? Has their long-term planning been affected by changes in the market? Are they unique in their space?

      Identifying vendor risk

      Who should be included in the discussion?

      • While it is true that executive-level leadership defines the strategy for an organization, it is vital for those making decisions to make informed decisions.
      • Getting input from operational experts at your organization will enhance your business's long-term potential for success.
      • Involving those who directly manage vendors and understand the market will aid operational experts in determining the forward path for relationships with your current vendors and identifying emerging potential strategic partners.
      • Make sure security, risk, and compliance are all at the table. These departments all look at risk from different angles for the business and give valuable insight collectively.
      • Organizations have a wealth of experience in their marketing departments that can help identify real-world scenarios of negative actions.

      See the blueprint Build an IT Risk Management Program

      Review your risk management plans for new risks on a regular basis.

      Keep in mind Risk =
      Likelihood x Impact

      (R=L*I).

      Impact (I) tends to remain the same, while Likelihood (L) is becoming closer to 100% as threat actors become more prevalent.

      Managing vendor risk impacts

      How could your vendors impact your organization?

      • Review vendors’ downstream connections to understand thoroughly who you are in business with
      • Institute continuous vendor lifecycle management
      • Develop IT risk governance and change control
      • Introduce continual risk assessment to monitor the relevant vendor markets
      • Monitor and schedule contract renewals and new service/module negotiations
      • Perform business alignment meetings to reassess relationships
      • Ensure strategic alignment in contracts
      • Review vendors’ business continuity plans and disaster recovery testing
      • Re-evaluate corporate policies frequently
      • Monitor your company’s and associated vendors’ online presence
      • Be adaptable and allow for innovations that arise from the current needs
        • Capture lessons learned from prior incidents to improve over time, and adjust your plans accordingly

      Organizations must review their risk appetite and tolerance levels, considering their complete landscape.

      Changing regulations, acquisitions, new security issues, and events that affect global supply chains are current realities, not unlikely scenarios.

      Ongoing Improvement

      Incorporating lessons learned.

      • Over time, despite everyone’s best observations and plans, incidents will catch us off guard.
      • When that happens, follow your incident response plans and act accordingly.
      • An essential step is to document what worked and what did not – collectively known as the “lessons learned.”
      • Use the lessons learned document to devise, incorporate, and enact a better risk management process.

      Sometimes disasters occur despite our best plans to manage them.

      When this happens, it is important to document the lessons learned and improve our plans going forward.

      The "what if" game

      1-3 hours

      Vendor management professionals are in an excellent position to help senior leadership identify and pull together resources across the organization to determine potential risks. By playing the "what if" game and asking probing questions to draw out – or eliminate – possible adverse outcomes, everyone involved adds their insight into parts of the organization to gather a comprehensive picture of potential impacts.

      1. Break into smaller groups (if too small, continue as a single group).
      2. Use the Comprehensive Risk Impact Tool to prompt discussion on potential risks. Keep this discussion flowing organically to explore all potentials but manage the overall process to keep the discussion pertinent and on track.
      3. Collect the outputs and ask the subject matter experts (SMEs) for management options for each one in order to present a comprehensive risk strategy. You will use this to educate senior leadership so that they can make an informed decision to accept or reject the solution.

      Download the Comprehensive Risk Impact Tool

      Input

      • List of identified potential risk scenarios scored by impact
      • List of potential mitigations of the scenarios to reduce the risk

      Output

      • Comprehensive risk profile on the specific vendor solution

      Materials

      • Whiteboard/flip charts
      • Comprehensive Risk Impact Tool to help drive discussion

      Participants

      • Vendor Management – Coordinator
      • Organizational Leadership
      • Operations Experts (SMEs)
      • Business Process Experts
      • Legal/Compliance/Risk Manager

      High risk example from tool

      High risk example from Tool.  Shows sample questions to ask to identify impacts, their associated score, weight, and comments or notes.

      Note: Even though a few items are “scored” they have not been added to the overall weight, signaling that the company has noted but does not necessarily hold them against the vendor.

      How to mitigate:

      • Contractually insist that the vendor have a third-party security audit performed annually with the stipulation that they will not denigrate below your acceptable standards.
      • At renewal negotiate better contractual terms and protections for your organization.

      Low risk example from tool

      Low risk example from Tool.  Shows sample questions to ask to identify impacts, their associated score, weight, and comments or notes.

      Summary

      Seek to understand all potential risk impacts to better prepare your organization for success.

      • Organizations need to understand and map out their entire vendor landscape.
      • Understand where all your data lives and how you can control it throughout the vendor lifecycle.
      • Organizations need to be realistic about the likelihood of potential risks in the changing global world.
      • Those organizations that consistently follow their established risk-assessment and due-diligence processes are better positioned to avoid penalties.
      • Understand how your vendors prioritize your organization in their business continuity processes.
      • Bring the right people to the table to outline potential risks in the market and your organization.
      • Socialize the third-party vendor risk management process throughout the organization to heighten awareness and enable employees to help protect the organization.
      • Organizations need to learn how to assess the likelihood of potential risks in the changing global markets and recognize how their partnerships and subcontracts affect their brand.
      • Incorporate lessons learned from prior incidents into your risk management process to build better plans for future issues.

      Organizations must evolve their risk assessments to be more meaningful to respond to global changes in the market.

      Organizations should increase the resources dedicated to monitoring the market as regulatory agencies continue to hold them more and more accountable.

      Bibliography

      Olaganathan, Rajee. “Impact of COVID-19 on airline industry and strategic plan for its recovery with special reference to data analytics technology.” Global Journal of Engineering and Technology Advances, vol 7, no 1, 2021, pp. 033-046.

      Tonello, Matteo. “Strategic Risk Management: A Primer for Directors.” Harvard Law School Forum on Corporate Governance, 23 Aug. 2012.

      Frigo, Mark L., and Richard J. Anderson. “Embracing Enterprise Risk Management: Practical Approaches for Getting Started.” COSO, 2011.

      Weak Cybersecurity is taking a toll on Small Businesses (tripwire.com)

      SecureLink 2022 White Paper SL_Page_EA+PAM (rocketcdn.me)

      Shared Assessments Member Poll March 2021 "Guide: Evolving Work Environments Impact of Covid-19 on Profile and Management of Third Parties“

      “Cybersecurity only the tip of the iceberg for third-party risk management”. Help Net Security, April 21, 2021. Accessed: 2022-07-29.

      “Third-Party Risk Management (TPRM) Managed Services”. Deloitte, 2022. Accessed: 2022-07-29.

      “The Future of TPRM: Third Party Risk Management Predictions for 2022”. OneTrust, December 20th2021. Accessed 2022-07-29.

      “Third Party Vendor definition”. Law Insider, Accessed 2022-07-29.

      “Third Party Risk”. AWAKE Security, Accessed 2022-07-29.

      Glidden, Donna. "Don't Underestimate the Need to Protect Your Brand in Publicity Clauses", Info-Tech Research Group, June 2022.

      Greenaway, Jordan. "Managing Reputation Risk: A start-to-finish guide", Transmission Private, July 2022. Accessed June 2022.

      Jagiello, Robert D, and Thomas T Hills. “Bad News Has Wings: Dread Risk Mediates Social Amplification in Risk Communication. ”Risk analysis : an official publication of the Society for Risk Analysis vol. 38,10 (2018): 2193-2207.doi:10.1111/risa.13117

      Kenton, Will. "Brand Recognition", Investopedia, August 2021. Accessed June 2022. Lischer, Brian. "How Much Does it Cost to Rebrand Your Company?", Ignyte, October 2017. Accessed June 2022.

      "Powerful Examples of How to Respond to Negative Reviews", Review Trackers, February 2022. Accessed June 2022.

      "The CEO Reputation Premium: Gaining Advantage in the Engagement Era", Weber Shadwick, March 2015. Accessed on June 2022.

      "Valuation of Trademarks: Everything You Need to Know",UpCounsel, 2022. Accessed June 2022.

      Related Info-Tech Research

      Identify and Manage Financial Risk Impacts on Your Organization

      • Vendor management practices educate organizations on potential financial impacts that vendors may incur and suggest systems to help manage them.
      • Standardize your processes for identifying and monitoring vendor risks to manage financial impacts with our Financial Risk Impact Tool.

      Identify and Manage Reputational Risk Impacts on Your Organization

      • Vendor management practices educate organizations on potential risks to vendors in your market and suggest creative and alternative ways to avoid and help manage them.
      • Standardize your processes for identifying and monitoring vendor risks to manage potential impacts on your reputation and brand with our Reputational Risk Impact Tool.

      Identify and Manage Strategic Risk Impacts on Your Organization

      • Vendor management practices educate organizations on potential risks to vendors in your market and suggest creative and alternative ways to avoid and help manage them.
      • Standardize your processes for identifying and monitoring vendor risks to manage potential impacts on your strategic plan with our Strategic Risk Impact Tool.

      Regulatory guidance and industry standards

      First 30 Days Pandemic Response Plan

      • Buy Link or Shortcode: {j2store}418|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: DR and Business Continuity
      • Parent Category Link: /business-continuity
      • Given the speed and scope of the spread of the pandemic, governments are responding with changes almost daily as to what organizations and people can and can’t do. This volatility and uncertainty challenges organizations to respond, particularly in the absence of a business continuity or crisis management plan.

      Our Advice

      Critical Insight

      • Assess the risk to and viability of your organization in order to create appropriate action and communication plans quickly.

      Impact and Result

      • HR departments must be directly involved in developing the organization’s pandemic response plan. Use Info-Tech's Risk and Viability Matrix and uncover the crucial next steps to take during the first 30 days of the COVID-19 pandemic.

      First 30 Days Pandemic Response Plan Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Create a response plan for the first 30 days of a pandemic

      Manage organizational risk and viability during the first 30 days of a crisis.

      • First 30 Days Pandemic Response Plan Storyboard
      • Crisis Matrix Communications Template: Business As Usual
      • Crisis Matrix Communications Template: Organization Closing
      • Crisis Matrix Communications Template: Manage Risk and Leverage Resilience
      • Crisis Matrix Communications Template: Reduce Labor and Mitigate Risk
      [infographic]

      Define the Role of Project Management in Agile and Product-Centric Delivery

      • Buy Link or Shortcode: {j2store}352|cart{/j2store}
      • member rating overall impact: 9.0/10 Overall Impact
      • member rating average dollars saved: $3,000 Average $ Saved
      • member rating average days saved: 2 Average Days Saved
      • Parent Category Name: Development
      • Parent Category Link: /development
      • There are many voices with different opinions on the role of project management. This causes confusion and unnecessary churn.
      • Project management and product management naturally align to different time horizons. Harmonizing their viewpoints can take significant work.
      • Different parts of the organization have diverse views on how to govern and fund pieces of work, which leads to confusion when it comes to the role of project management.

      Our Advice

      Critical Insight

      There is no one-size-fits-all approach to product delivery. For many organizations product delivery requires detailed project management practices, while for others it requires much less. Taking an outcome-first approach when planning your product transformation is critical to make the right decision on the balance between project and product management.

      Impact and Result

      • Get alignment on the definition of projects and products.
      • Understand the differences between delivering projects and delivering products.
      • Line up your project management activities with the needs of Agile and product-centric projects.
      • Understand how funding can change when moving away from project-centric delivery.

      Define the Role of Project Management in Agile and Product-Centric Delivery Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Define the Role of Project Management in Agile and Product-Centric Delivery – A guide that walks you through how to define the role of project management in product-centric and Agile delivery environments.

      The activities in this research will guide you through clarifying how you want to talk about projects and products, aligning project management and agility, specifying the different activities for project management, and identifying key differences with funding of products instead of projects.

      • Define the Role of Project Management in Agile and Product-Centric Delivery Storyboard
      [infographic]

      Further reading

      Define the Role of Project Management in Agile and Product-Centric Delivery

      Projects and products are not mutually exclusive.

      Table of Contents

      3 Analyst Perspective

      4 Executive Summary

      7 Step 1.1: Clarify How You Want to Talk About Projects and Products

      13 Step 1.2: Align Project Management and Agility

      16 Step 1.3: Specify the Different Activities for Project Management

      20 Step 1.4: Identify Key Differences in Funding of Products Instead of Projects

      25 Where Do I Go Next?

      26 Bibliography

      Analyst Perspective

      Project management still has an important role to play!

      When moving to more product-centric delivery practices, many assume that projects are no longer necessary. That isn’t necessarily the case!

      Product delivery can mean different things to different organizations, and in many cases it can involve the need to maintain both projects and project delivery.

      Projects are a necessary vehicle in many organizations to drive value delivery, and the activities performed by project managers still need to be done by someone. It is the form and who is involved that will change the most.

      Photo of Ari Glaizel, Practice Lead, Applications Delivery and Management, Info-Tech Research Group.

      Ari Glaizel
      Practice Lead, Applications Delivery and Management
      Info-Tech Research Group

      Executive Summary

      Your Challenge
      • Organizations are under pressure to align the value they provide with the organization’s goals and overall company vision.
      • In response, they are moving to more product-centric delivery practices.
      • Previously, project managers focused on the delivery of objectives through a project, but changes in delivery practices result in de-emphasizing this. What should project managers should be doing?
      Common Obstacles
      • There are many voices with different opinions on the role of project management. This causes confusion and unnecessary churn.
      • Project management and product management naturally align to different time horizons. Harmonizing their viewpoints can take significant work.
      • Different parts of the organization have very specific views on how to govern and fund pieces of work, which leads to confusion about the role of project management.
      Info-Tech’s Approach
      • Get alignment on the definition of projects and products.
      • Understand the differences between delivering projects and products.
      • Line up your project management activities with the needs of Agile and product-centric projects.
      • Understand how funding can change when moving away from project-centric delivery.

      Info-Tech Insight

      There is no one-size-fits-all approach to product delivery. For many organizations product delivery requires detailed project management practices, while for others it requires much less. Taking an outcome-first approach when planning your product transformation is critical to make the right decision on the balance between project and product management.

      Your evolution of delivery practice is not a binary switch

      1. PROJECTS WITH WATERFALL The project manager is accountable for delivery of the project, and the project manager owns resources and scope.
      2. PROJECTS WITH AGILE DELIVERY A transitional state where the product owner is accountable for feature delivery and the project manager accountable for the overall project.
      3. PRODUCTS WITH AGILE PROJECT AND OPERATIONAL DELIVERY The product owner is accountable for the delivery of the project and products, and the project manager plays a role of facilitator and enabler.
      4. PRODUCTS WITH AGILE DELIVERY Delivery of products can happen without necessarily having projects. However, projects could be instantiated to cover major initiatives.

      Info-Tech Insight

      • Organizations do not need to go to full product and Agile delivery to improve delivery practices! Every organization needs to make its own determination on how far it needs to go. You can do it in one step or take each step and evaluate how well you are delivering against your goals and objectives.
      • Many organizations will go to Products With Agile Project and Operational Delivery, and some will go to Products With Agile Delivery.

      Activities to undertake as you transition to product-centric delivery

      1. PROJECTS WITH WATERFALL
        • Clarify how you want to talk about projects and products. The center of the conversation will start to change.
      2. PROJECTS WITH AGILE DELIVERY
        • Align project management and agility. They are not mutually exclusive (but not necessarily always aligned).
      3. PRODUCTS WITH AGILE PROJECT AND OPERATIONAL DELIVERY
        • Specify the different activities for project management. As you mature your product practices, project management becomes a facilitator and collaborator.
      4. PRODUCTS WITH AGILE DELIVERY
        • Identify key differences in funding. Delivering products instead of projects requires a change in the focus of your funding.

      Step 1.1

      Clarify How You Want to Talk About Projects and Products

      Activities
      • 1.1.1 Define “product” and “project” in your context
      • 1.1.2 Brainstorm potential changes in the role of projects as you become Agile and product-centric

      This step involves the following participants:

      • Product owners
      • Product managers
      • Development team leads
      • Portfolio managers
      • Business analysts

      Outcomes of this step

      • An understanding of how the role can change through the evolution from project to more product-centric practices

      Definition of terms

      Project

      “A temporary endeavor undertaken to create a unique product, service, or result. The temporary nature of projects indicates a beginning and an end to the project work or a phase of the project work. Projects can stand alone or be part of a program or portfolio.” (PMBOK, PMI)
      Stock image of an open head with a city for a brain.

      Product

      “A tangible solution, tool, or service (physical or digital) that enables the long-term and evolving delivery of value to customers and stakeholders based on business and user requirements.” (Deliver on Your Digital Product Vision, Info-Tech Research Group)

      Info-Tech InsightLet these definitions be a guide, not necessarily to be taken verbatim. You need to define these terms in your context based on your particular needs and objectives. The only caveat is to be consistent with your usage of these terms in your organization.

      1.1.1 Define “product” and “project” in your context

      30-60 minutes

      Output: Your enterprise/organizational definition of products and projects

      Participants: Executives, Product/project managers, Applications teams

      1. Discuss what “product” and “project” mean in your organization.
      2. Create common, enterprise-wide definitions for “product” and “project.”
      3. Screenshot of the previous slide's definitions of 'Project' and 'Product'.

      Agile and product management does not mean projects go away

      Diagram laying out the roadmap for 'Continuous delivery of value'. Beginning with 'Projects With Agile Delivery' in which Projects with features and services end in a Product Release that is disconnected from the continuum. Then the 'Products With Agile Project and Operational Delivery' and 'Products With Agile Delivery' which are connected by a 'Product Roadmap' and 'Product Backlog' have Product Releases that connect to the continuum.

      Projects Within Products

      Regardless of whether you recognize yourself as a “product-based” or “project-based” shop, the same basic principles should apply.

      You go through a period or periods of project-like development to build or implement a version of an application or product.

      You also have parallel services along with your project development that encompass the more product-based view. These may range from basic support and maintenance to full-fledged strategy teams or services like sales and marketing.

      Info-Tech Note

      As your product transformation continues, projects can become optional and needed only as part of your organization’s overall delivery processes

      Identify the differences between a project-centric and a product-centric organization

      Project Product
      Fund projects — Funding –› Fund teams
      Line-of-business sponsor — Prioritization –› Product owner
      Project owner — Accountability –› Product owner
      Makes specific changes to a product —Product management –› Improves product maturity and support of the product
      Assignment of people to work — Work allocation –› Assignment of work to product teams
      Project manager manages — Capacity management –› Team manages

      Info-Tech Insight

      Product delivery requires significant shifts in the way you complete development and implementation work and deliver value to your users. Make the changes that support improving end-user value and enterprise alignment.

      1.1.2 Brainstorm potential changes in the role of projects as you become Agile and product-centric

      5-10 minutes

      Output: Increased appreciation of the relationship between project and product delivery

      Participants: Executives, Product/project managers, Applications teams

      • Discuss as a group:
        • What stands out in the evolution from project to product?
        • What concerns do you have with the change?
        • What will remain the same?
        • Which changes feel the most impactful?
        • Screenshot of the slide's 'Continuous delivery of value' diagram.

      Step 1.2

      Align Project Management and Agility

      Activities
      • 1.2.1 Explore gaps in Agile/product-centric delivery of projects

      This step involves the following participants:

      • Executives
      • Product/Project managers
      • Applications teams

      Outcomes of this step

      • A clearer view of how agility can be introduced into projects.

      Challenges with the project management role in Agile and product-centric organizations

      Many project managers feel left out in the cold. That should not be the case!

      In product-centric, Agile teams, many roles that a project manager previously performed are now taken care of to different degrees by the product owner, delivery team, and process manager.

      The overall change alters the role of project management from one that orchestrates all activities to one that supports, monitors, and escalates.

      Product Owner
      • Defines the “what” and heavily involved in the “when” and the “why”
      • Accountable for delivery of value
      Delivery team members
      • Define the “how”
      • Accountable for building and delivering high-quality deliverables
      • Can include roles like user experience, interaction design, business analysis, architecture
      Process Manager
      • Facilitates the other teams to ensure valuable delivery
      • Can potentially, in a Scrum environment, play the scrum master role, which involves leading scrums, retrospectives, and sprint reviews and working to resolve team issues and impediments
      • Evolves into more of a facilitator and communicator role

      1.2.1 Explore gaps in Agile/ product-centric delivery of projects

      5-10 minutes

      Output: An assessment of what is in the way to effectively deliver on Agile and product-focused projects

      Participants: Executives, Product/project managers, Applications teams

      • Discuss as a group:
        • What project management activities do you see in Agile/product roles?
        • What gaps do you see?
        • How can project management help Agile/product teams be successful?

      Step 1.3

      Specify the Different Activities for Project Management

      Activities
      • 1.3.1 Articulate the changes in a project manager’s role

      This step involves the following participants:

      • Executives
      • Product/Project managers
      • Applications teams

      Outcomes of this step

      • An understanding of the role of project management in an Agile and product context

      Kicking off the project

      Product-centric delivery still requires key activities to successfully deliver value. Where project managers get their information from does change.

      Stock photo of many hands grabbing a 2D rocketship.
      Project Charter

      Project managers should still define a charter and capture the vision and scope. The vision and high-level scope is primarily defined by the product owner.

      Key Stakeholders and Communication

      Clearly defining stakeholders and communication needs is still important. However, they are defined based on significant input and cues by the product owner.

      Standardizing on Tools and Processes

      To ensure consistency across projects, project managers will want to align tools to how the team manages their backlog and workflow. This will smooth communication about status with stakeholders.

      Info-Tech Insight

      1. Product management plays a similar role to the one that was traditionally filled by the project sponsor except for a personal accountability to the product beyond the life of the project.
      2. When fully transitioned to product-centric delivery, these activities could be replaced by a product canvas. See Deliver on Your Digital Product Vision for more information.

      During the project: Three key activities

      The role of project management evolves from a position of ownership to a position of communication, collaboration, and coordination.

      1. Support
        • Communicate Agile/product team needs to leadership
        • Liaise and co-ordinate for non-Agile/product-focused parts of the organization
        • Coach members of the team
      2. Monitoring
        • Regular status updates to PMO still required
        • Metrics aligned with Agile/product practices
        • Leverage similar tooling and approaches to what is done locally on Agile/product teams (if possible)
      3. Escalation
        • Still a key escalation point for roadblocks that go outside the product teams
        • Collaborate closely with Agile/product team leadership and scrum masters (if applicable)
      Cross-section of a head, split into three levels with icons representing the three steps detailed on the left, 'Support', 'Monitoring', and 'Escalation'.

      1.3.1: Articulate the changes in a project manager’s role

      5-10 minutes

      Output: Current understanding of the role of project management in Agile/product delivery

      Participants: Executives, Product/project managers, Applications teams

      Why is this important?

      Project managers still have a role to play in Agile projects and products. Agreeing to what they should be doing is critical to successfully moving to a product-centric approach to delivery.

      • Review how Info-Tech views the role of project management at project initiation and during the project.
      • Review the state of your Agile and product transformation, paying special attention to who performs which roles.
      • Discuss as a group:
        • What are the current activities of project managers in your organization?
        • Based on how you see delivery practices evolving, what do you see as the new role of project managers when it comes to Agile-centric and product-centric delivery.

      Step 1.4

      Identify Key Differences in Funding of Products Instead of Projects

      Activities
      • 1.4.1 Discuss traditional versus product-centric funding methods

      This step involves the following participants:

      • Executives
      • Product owners
      • Product managers
      • Project managers
      • Delivery managers

      Outcomes of this step

      • Identified differences in funding of products instead of projects

      Planning and budgeting for products and families

      Reward for delivering outcomes, not features

      Autonomy

      Icon of a diamond.

      Fund what delivers value

      Fund long-lived delivery of value through products (not projects).

      Give autonomy to the team to decide exactly what to build.

      Flexibility

      Icon of a dollar sign.

      Allocate iteratively

      Allocate to a pool based on higher-level business case.

      Provide funds in smaller amounts to different product teams and initiatives based on need.

      Arrow cycling right in a clockwise motion.



      Arrow cycling left in a clockwise motion.

      Accountability

      Icon of a target.

      Measure and adjust

      Product teams define metrics that contribute to given outcomes.

      Track progress and allocate more (or less) funds as appropriate.

      Stock image of two suited hands exchanging coins.

      Info-Tech Insight

      Changes to funding require changes to product and Agile practices to ensure product ownership and accountability.

      (Adapted from Bain & Company)

      Budgeting approaches must evolve as you mature your product operating environment

      TRADITIONAL PROJECTS WITH WATERFALL DELIVERY TRADITIONAL PROJECTS WITH AGILE DELIVERY PRODUCTS WITH AGILE PROJECT DELIVERY PRODUCTS WITH AGILE DELIVERY

      WHEN IS THE BUDGET TRACKED?

      Budget tracked by major phases Budget tracked by sprint and project Budget tracked by sprint and project Budget tracked by sprint and release

      HOW ARE CHANGES HANDLED?

      All change is by exception Scope change is routine; budget change is by exception Scope change is routine; budget change is by exception Budget change is expected on roadmap cadence

      WHEN ARE BENEFITS REALIZED?

      Benefits realization post project completion Benefits realization ongoing throughout the life of the project Benefits realization ongoing throughout the life of the product Benefits realization ongoing throughout life of the product

      WHO DRIVES?

      Project Manager
      • Project team delivery role
      • Refines project scope, advocates for changes in the budget
      • Advocates for additional funding in the forecast
      Product Owner
      • Project team delivery role
      • Refines project scope, advocates for changes in the budget
      • Advocates for additional funding in the forecast
      Product Manager
      • Product portfolio team role
      • Forecasting new initiatives during delivery to continue to drive value throughout the life of the product
      Product Manager
      • Product family team role
      • Forecasting new initiatives during delivery to continue to drive value throughout the life of the product
      ˆ ˆ
      Hybrid Operating Environments

      Info-Tech Insight

      As you evolve your approach to product delivery, you will be decoupling the expected benefits, forecast, and budget. Managing them independently will improve your ability adapt to change and drive the right outcomes!

      1.4.1 Discuss traditional versus product-centric funding methods

      30 minutes

      Output: Understanding of funding principles and challenges

      Participants: Executives, Product owners, Product managers, Project managers, Delivery managers

      1. Discuss how projects are currently funded.
      2. Review how the Agile/product funding models differ from how you currently operate.
      3. What changes do you need to consider to support a product delivery model?
      4. For each change, identify the key stakeholders and list at least one action to take.

      Case Study

      Global Digital Financial Services Company

      This financial services company looked to drive better results by adopting more product-centric practices.

      • Its projects exhibited:
        • High complexity/strong dependencies between components
        • High implementation effort
        • High clarification/reconciliation (more than two departments involved)
        • Multiple methodologies (Agile/Waterfall/Hybrid)
      • The team recognized they could not get rid of projects entirely, but getting to a level where there was a coordinated delivery between projects and products being implemented is important.
      Results
      • Moving several initiatives to more product-centric practices allowed for:
        • Delivery within current assigned capacity
        • Limited need for coordination across departments
        • Lower complexity
        • A unified Agile approach to delivery
      • Through balancing the needs of projects and products, there were three key insights about the project management’s role:
        • The role of project management changes depending on the context of the work. There is no one-size-fits-all definition.
        • Project management played a much bigger role when work spanned multiple products and business units.
        • Project management was used as a key coordinator when delivery became complicated and multilayered.
      Example of a company where practices fall equally into 'Project' and 'Product' categories, with some being shared by both.
      Example of a product-centric company where practices fall mainly into the 'Product category', leaving only one in 'Project'.

      Where Do I Go Next?

      Deliver on Your Digital Product Vision

      • Build a product vision your organization can take from strategy through execution.

      Build a Better Product Owner

      • Strengthen the product owner role in your organization by focusing on core capabilities and proper alignment.

      Implement Agile Practices That Work

      • Improve collaboration and transparency with the business to minimize project failure.

      Implement DevOps Practices That Work

      • Streamline business value delivery through the strategic adoption of DevOps practices.

      Prepare an Actionable Roadmap for Your PMO

      • Turn planning into action with a realistic PMO timeline.

      Deliver Digital Products at Scale

      • Deliver value at the scale of your organization through defining enterprise product families.

      Extend Agile Practices Beyond IT

      • Further the benefits of Agile by extending a scaled Agile framework to the business.

      Spread Best Practices With an Agile Center of Excellence

      • Facilitate ongoing alignment between Agile teams and the business with a set of targeted service offerings.

      Tailor IT Project Management Processes to Fit Your Projects

      • Spend less time managing processes and more time delivering results.

      Bibliography

      Cobb, Chuck. “Are there Project Managers in Agile?” High Impact Project Management, n.d. Web.

      Cohn, Mike. “What Is a Product?” Mountain Goat Software, 6 Sept. 2016. Web.

      Cobb, Chuck. “Agile Project Manager Job Description.” High Impact Project Management, n.d. Web.

      “How do you define a product?” Scrum.org, 4 April 2017. Web.

      Johnson, Darren, et al. “How to Plan and Budget for Agile at Scale.” Bain & Company, 8 Oct. 2019. Web.

      “Product Definition.” SlideShare, uploaded by Mark Curphey, 25 Feb. 2007. Web.

      Project Management Institute. A Guide to the Project Management Body of Knowledge (PMBOK Guide). 7th ed., Project Management Institute, 2021.

      Schuurman, Robbin. “Scrum Master vs Project Manager – An Overview of the Differences.” Scrum.org, 11 Feb 2020. Web.

      Schuurman, Robbin. “Product Owner vs Project Manager.” Scrum.org, 12 March 2020. Web.

      Vlaanderen, Kevin. “Towards Agile Product and Portfolio Management.” Academia.edu, 2010. Web.

      “What is a Developer in Scrum?” Scrum.org, n.d. Web.

      “What is a Scrum Master?” Scrum.org, n.d. Web.

      “What is a Product Owner?” Scrum.org, n.d. Web.

      Develop the Right Message to Engage Buyers

      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Marketing Solutions
      • Parent Category Link: /marketing-solutions

      Sixty percent of marketers find it hard to produce high-quality content consistently. SaaS marketers have an even more difficult job due to the technical nature of content production. Without an easy content development strategy, marketers have an insurmountable task of continually creating interesting content for an audience they don’t understand.

      Globally, B2B SaaS marketers without the ability to consistently produce and activate quality content will experience:

      • High website bounce rates and low time on site
      • Low page views
      • A low percentage of return visitors
      • Low conversions
      • Low open and click-through rates on email campaigns

      Our Advice

      Critical Insight

      Marketing content that identifies the benefit of the product along with a deep understanding of the buyer pain points, desired value, and benefit proof points is a key driver in delivering value to a prospect, thereby increasing marketing metrics such as open rates, time on site, page views, and click-through rates.

      Impact and Result

      Marketers that activate the SoftwareReviews message mapping architecture will be able to crack the code on the formula for improving open and click-through rates.

      By applying the SoftwareReviews message mapping architecture, clients will be able to:

      • Quickly diagnose the current state of their content marketing effectiveness compared to industry metrics.
      • Compare their current messaging approach versus the key elements of the Message Map Architecture.
      • Create more compelling and relevant content that aligns with a buyer’s needs and journey.
      • Shrink marketing and sales cycles.
      • Increase the pace of content production.

      Develop the Right Message to Engage Buyers Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Develop the Right Message to Engage Buyers Executive Brief – A mapping architecture to enable marketers to crack the code on the formula for improving open and click-through rates.

      Through this blueprint marketers will learn how to shift content away from low-performing content that only focuses on the product and company to high-performing customer-focused content that answers the “What’s in it for me?” question for a buyer, increasing engagement and conversions.

      Infographic

      Further reading

      Develop the Right Message to Engage Buyers

      Drive higher open rates, time-on-site, and click-through rates with buyer-relevant messaging.

      Analyst Perspective

      Develop the right message to engage buyers.

      Marketers only have seven seconds to capture a visitor's attention but often don't realize that the space between competitors and their company is that narrow. They often miss the mark on content and create reams of product and company-focused messaging that result in high bounce rates, low page views, low return visits, low conversions, and low click-through rates.

      We wouldn't want to sit in a conversation with someone who only speaks about themselves, so why would it be any different when we buy something? Today's marketers must quickly hook their visitors with content that answers the critical question of "What's in it for me?"

      Our research finds that leading content marketers craft messaging that lets their audience ”know they know them,” points out what’s in it for them, and includes proof points of promised value. This simple, yet often missed approach, we call Message Mapping, which helps marketers grab a visitor’s initial attention and when applied throughout the customer journey will turn prospects into customers, lifelong buyers, advocates, and referrals.

      Photo of Terra Higginson, Marketing Research Director, SoftwareReviews.

      Terra Higginson
      Marketing Research Director
      SoftwareReviews

      Executive Summary

      Your Challenge

      Globally, B2B SaaS marketers without the ability to consistently produce and activate quality content will experience:

      • High website bounce rates and low time on site
      • Low page views
      • A low percentage of return visitors
      • Low conversions
      • Low open and click-through rates on email campaigns
      Sixty percent of marketers find it hard to produce high-quality content consistently. SaaS marketers have an even more difficult job due to the technical nature of content production. Without an easy content development strategy, marketers have an insurmountable task of continually creating interesting content for an audience they don’t understand.
      Common Obstacles

      Marketers struggle to create content that quickly engages the buyer because they lack:

      • Resources to create a high volume of quality content.
      • True buyer understanding.
      • Experience in how to align technical messaging with the buyer persona.
      • Easy-to-deploy content strategy tools.
      Even though most marketers will say that it’s important to produce interesting content, only 58% of B2B markers take the time to ask their customers what’s important to them. Without a true and deep understanding of buyers, marketers continue to invest their time and resources in an uninteresting product and company-focused diatribe.
      SoftwareReviews’ Approach

      By applying the SoftwareReviews’ message mapping architecture, clients will be able to:

      • Quickly diagnose the current state of their content marketing effectiveness compared to industry metrics.
      • Compare their current messaging approach against the key elements of the Message Map Architecture.
      • Create more compelling and relevant content that aligns with a buyer’s needs and journey.
      • Shrink marketing and sales cycles.
      • Increase the pace of content production.
      Marketers that activate the SoftwareReviews message mapping architecture will be able to crack the code on the formula for improving open and click-through rates.

      SoftwareReviews Insight

      Marketing content that identifies the benefit of the product, along with a deep understanding of the buyer pain points, desired value, and benefit proof-points, is a key driver in delivering value to a prospect, thereby increasing marketing metrics such as open rates, time on site, page views, and click-through rates.

      Your Challenge

      65% of marketers find it challenging to produce engaging content.

      Globally, B2B SaaS marketers without the ability to consistently produce and activate quality content will experience:

      • High website bounce rates and low time on site
      • Low page views
      • A low percentage of return visitors
      • Low conversions
      • Low open and click-through rates on email campaigns

      A staggering 60% of marketers find it hard to produce high-quality content consistently and 62% don’t know how to measure the ROI of their campaigns according to OptinMonster.

      SaaS marketers have an even more difficult job due to the technical nature of content production. Without an easy content development strategy, marketers have an insurmountable task of continually creating interesting content for an audience they don’t understand.


      Over 64% of marketers want to learn how to build a better content
      (Source: OptinMonster, 2021)

      Benchmark your content marketing

      Do your content marketing metrics meet the industry-standard benchmarks for the software industry?
      Visualization of industry benchmarks for 'Bounce Rate', 'Organic CTR', 'Pages/Session', 'Average Session Duration', '% of New Sessions', 'Email Open Rate', 'Email CTR', and 'Sales Cycle Length (Days)' with sources linked below.
      GrowRevenue, MarketingSherpa, Google Analytics, FirstPageSage, Google Analytics, HubSpot
      • Leaders will measure content marketing performance against these industry benchmarks.
      • If your content performance falls below these benchmarks, your content architecture may be missing the mark with prospective buyers.

      Common flaws in content messaging

      Why do marketers have a hard time consistently producing messaging that engages the buyer?

      Mistake #1

      Myopic Focus on Company and Product

      Content suffers a low ROI due to a myopic focus on the company and the product. This self-focused content fails to engage prospects and move them through the funnel.

      Mistake #2

      WIIFM Question Unanswered

      Content never answers the fundamental “What’s in it for me?” question due to a lack of true buyer understanding. This leads to an inability to communicate the value proposition to the prospect.

      Mistake #3

      Inability to Select the Right Content Format

      Marketers often guess what kind of content their buyers prefer without any real understanding or research behind what buyers would actually want to consume.

      Leaders Will Avoid the “Big Three” Pitfalls
      • While outdated content, poor content organization on your website, and poor SEO are additional strategic factors (outside the scope of this research), poor messaging structure will doom your content marketing strategy.
      • Leaders will be vigilant to diagnose current messaging structure and avoid:
        1. Making messaging all about you and your company.
        2. Failing to describe what’s in it for your prospects.
        3. Often guessing at what approach to use when structuring your messaging.

      Implications of poor content

      Without quality content, the sales and marketing cycles elongate and content marketing metrics suffer.
      • Lost sales: Research shows that B2B buyers are 57-70% done with their buying research before they ever contact sales.(Worldwide Business Research, 2022)
      • The buyer journey is increasingly digital: Research shows that 67% of the buyer's journey is now done digitally.(Worldwide Business Research, 2022)
      • Wasted time: In a Moz study of 750,000 pieces of content, 50% had zero backlinks, indicating that no one felt these assets were interesting enough to reference or share. (Moz, 2015)
      • Wasted money: SaaS companies spend $342,000 to $1,080,000 per year (or more) on content marketing. (Zenpost, 2022) The wrong content will deliver a poor ROI.

      50% — Half of the content produced has no backlinks. (Source: Moz, 2015)

      Content matters more than ever since 67% of the buyer's journey is now done digitally. (Source: Worldwide Business Research, 2022)

      Benefits of good content

      A content mapping approach lets content marketers:
      • Create highly personalized content. Content mapping helps marketers to create highly targeted content at every stage of the buyer’s journey, helping to nurture leads and prospects toward a purchase decision.
      • Describe “What’s in it for me?” to buyers. Remember that you aren’t your customer. Good content quickly answers the question “What’s in it for me?” (WIIFM) developed from the findings of the buyer persona. WIIFM-focused content engages a prospect within seven seconds.
      • Increase marketing ROI. Content marketing generates leads three times greater than traditional marketing (Patel, 2016).
      • Influence prospects. Investing in a new SaaS product isn’t something buyers do every day. In a new situation, people will often look to others to understand what they should do. Good content uses the principles of authority and social proof to build the core message of WIIFM. Authority can be conferred with awards and accolades, whereas social proof is given through testimonials, case studies, and data.
      • Build competitive advantage. Increase competitive advantage by providing content that aligns with the ideal client profile. Fifty-two percent of buyers said they were more likely to buy from a vendor after reading its content (1827 Marketing, 2022).
      Avoid value claiming. Leaders will use client testimonials as proof points because buyers believe peers more than they believe you.

      “… Since 95 percent of the people are imitators and only 5 percent initiators, people are persuaded more by the actions of others than by any proof we can offer. (Robert Cialdini, Influence: The Psychology of Persuasion)

      Full slide: 'Message Map Architecture'.

      Full slide: 'Message Map Template' with field descriptions and notes.

      Full slide: 'Message Map Template' with field descriptions, no notes.

      Full slide: 'Message Map Template' with blank fields.

      Full slide: 'Message Map Template' with 'Website Example segment.com' filled in fields.

      Full slide: 'Website Example segment.com' the website as it appears online with labels on the locations of elements of the message map.

      Full slide: 'Website Example segment.com' the website as it appears online with labels on the locations of elements of the message map.

      Full slide: 'Website Example segment.com' the website as it appears online with labels on the locations of elements of the message map.

      Full slide: 'Website Example segment.com' the website as it appears online with labels on the locations of elements of the message map.

      Email & Social Post Example

      Use the message mapping architecture to create other types of content.

      Examples of emails and social media posts as they appear online with labels on the locations of elements of the message map.

      Insight Summary

      Create Content That Matters

      Marketing content that identifies the benefit of the product along with a deep understanding of the buyer pain points, desired value, and benefit proof-points is a key driver in delivering value to a prospect, thereby increasing marketing metrics such as open rates, time on site, page views, and click-through rates.

      What’s in It for Me?

      Most content has a focus on the product and the company. Content that lacks a true and deep understanding of the buyer suffers low engagement and low conversions. Our research shows that all content must answer ”What’s in it for me?” for a prospect.

      Social Proof & Authority

      Buyers that are faced with a new and unusual buying experience (such as purchasing SaaS) look at what others say about the product (social proof) and what experts say about the product (authority) to make buying decisions.

      Scarcity & Loss Framing

      Research shows that scarcity is a strong principle of influence that can be used in marketing messages. Loss framing is a variation of scarcity and can be used by outlining what a buyer will lose instead of what will be gained.

      Unify the Experience

      Use your message map to structure all customer-facing content across Sales, Product, and Marketing and create a unified and consistent experience across all touchpoints.

      Close the Gap

      SaaS marketers often find the gap between product and company-focused content and buyer-focused content to be so insurmountable that they never manage to overcome it without a framework like message mapping.

      Related SoftwareReviews Research

      Sample of 'Create a Buyer Persona and Journey' blueprint.

      Create a Buyer Persona and Journey

      Make it easier to market, sell, and achieve product-market fit with deeper buyer understanding.
      • Reduce time and treasure wasted chasing the wrong prospects.
      • Improve product-market fit.
      • Increase open and click-through rates in your lead gen engine.
      • Perform more effective sales discovery and increase eventual win rates.
      Sample of 'Diagnose Brand Health to Improve Business Growth' blueprint.

      Diagnose Brand Health to Improve Business Growth

      Have a significant and well-targeted impact on business success and growth by knowing how your brand performs, identifying areas of improvement, and making data-driven decisions to fix it.
      • Importance of brand is recognized, endorsed, and prioritized.
      • Support and resources allocated.
      • All relevant data and information collected in one place.
      • Ability to make data-driven recommendations and decisions on how to improve.
      Sample of 'Build a More Effective Go-to-Market Strategy' blueprint.

      Build a More Effective Go-to-Market Strategy

      Creating a compelling Go-to-Market strategy, and keeping it current, is a critical software company function – as important as financial strategy, sales operations, and even corporate business development – given its huge impact on the many drivers of sustainable growth.
      • Align stakeholders on a common vision and execution plan.
      • Build a foundation of buyer and competitive understanding.
      • Deliver a team-aligned launch plan that enables commercial success.

      Bibliography

      Arakelyan, Artash. “How SaaS Companies Increase Their ROI With Content Marketing.” Clutch.co, 27 July 2018. Accessed July 2022.

      Bailyn, Evan. “Average Session Duration: Industry Benchmarks.” FirstPageSage, 16 March 2022. Accessed July 2022.

      Burstein, Daniel. “Marketing Research Chart: Average clickthrough rates by industry.” MarketingSherpa, 1 April 2014. Accessed July 2022.

      Cahoon, Sam. “Email Open Rates By Industry (& Other Top Email Benchmarks).” HubSpot, 10 June 2021. Accessed July 2022.

      Cialdini, Robert. Influence: Science and Practice. 5th ed. Pearson, 29 July 2008. Print.

      Cialdini, Robert. Influence: The Psychology of Persuasion. Revised ed. Harper Business, 26 Dec. 2006. Print.

      Content Marketing—Statistics, Evidence and Trends.” 1827 Marketing, 7 Jan. 2022. Accessed July 2022.

      Devaney, Erik. “Content Mapping 101: The Template You Need to Personalize Your Marketing.” HubSpot, 21 April 2022. Accessed July 2022.

      Hiscox Business Insurance. “Growing Your Business--and Protecting It Every Step of the Way.” Inc.com. 25 April 2022. Accessed July 2022.

      Hurley Hall, Sharon. “85 Content Marketing Statistics To Make You A Marketing Genius.” OptinMonster, 14 Jan. 2021. Accessed July 2022.

      Patel, Neil. “38 Content Marketing Stats That Every Marketer Needs to Know.” NeilPatel.com, 21 Jan. 2016. Web.

      Prater, Meg. “SaaS Sales: 7 Tips on Selling Software from a Top SaaS Company.” HubSpot, 9 June 2021. Web.

      Polykoff, Dave. “20 SaaS Content Marketing Statistics That Lead to MRR Growth in 2022.” Zenpost blog, 22 July 2022. Web.

      Rayson, Steve. “Content, Shares, and Links: Insights from Analyzing 1 Million Articles.” Moz, 8 Sept. 2015. Accessed July 2022.

      “SaaS Content Marketing: How to Measure Your SaaS Content’s Performance.” Ken Moo, 9 June 2022. Accessed July 2022.

      Taylor Gregory, Emily. “Content marketing challenges and how to overcome them.” Longitude, 14 June 2022. Accessed July 2022.

      Visitors Benchmarking Channels. Google Analytics, 2022. Accessed July 2022.

      WBR Insights. “Here's How the Relationship Between B2B Buying, Content, and Sales Reps Has Changed.” Worldwide Business Research, 2022. Accessed July 2022.

      “What’s a good bounce rate? (Here’s the average bounce rate for websites).” GrowRevenue.io, 24 Feb. 2020. Accessed July 2022.

      Run Better Meetings

      • Buy Link or Shortcode: {j2store}287|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Voice & Video Management
      • Parent Category Link: /voice-video-management

      Your newly hybrid workplace will include virtual, hybrid, and physical meetings, presenting several challenges:

      • The experience for onsite and remote attendees is not equal.
      • Employees are experiencing meeting and video fatigue.
      • Meeting rooms are not optimized for hybrid meetings.
      • The fact is that many people have not successfully run hybrid meetings before.

      Our Advice

      Critical Insight

      • Successful hybrid workplace plans must include planning around hybrid meetings. Seamless hybrid meetings are the result of thoughtful planning and documented best practices.

      Impact and Result

      • Identify your current state and the root cause of unsatisfactory meetings.
      • Review and identify meetings best practices around meeting roles, delivery models, and training.
      • Improve the technology that supports meetings.
      • Use Info-Tech’s quick checklists and decision flowchart to accelerate meeting planning and cover your bases.

      Run Better Meetings Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you should run better meetings, review Info-Tech’s methodology, and understand the ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Identify the current state of meetings

      Understand the problem before you try to fix it. Before you can improve meetings, you need to understand what your norms and challenges currently are.

      • Checklist: Run a Virtual or Hybrid Meeting

      2. Publish best practices for how meetings should run

      Document meeting roles, expectations, and how meetings should run. Decide what kind of meeting delivery model to use and develop a training program.

      • Meeting Challenges and Best Practices
      • Meeting Type Decision Flowchart (Visio)
      • Meeting Type Decision Flowchart (PDF)

      3. Improve meeting technology

      Always be consulting with users: early in the process to set a benchmark, during and after every meeting to address immediate concerns, and quarterly to identify trends and deeper issues.

      • Team Charter
      • Communications Guide Poster Template
      [infographic]

      Workshop: Run Better Meetings

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Identify Current State of Meetings

      The Purpose

      Understand the current state of meetings in your organization.

      Key Benefits Achieved

      What you need to keep doing and what you need to change

      Activities

      1.1 Brainstorm meeting types.

      1.2 Document meeting norms.

      1.3 Document and categorize meeting challenges.

      Outputs

      Documented challenges with meetings

      Meeting norms

      Desired changes to meeting norms

      2 Review and Identify Best Practices

      The Purpose

      Review and implement meeting best practices.

      Key Benefits Achieved

      Defined meeting best practices for your organization

      Activities

      2.1 Document meeting roles and expectations.

      2.2 Review common meeting challenges and identify best practices.

      2.3 Document when to use a hybrid meeting, virtual meeting, or an in-person meeting.

      2.4 Develop a training program.

      Outputs

      Meeting roles and expectations

      List of meeting best practices

      Guidelines to help workers choose between a hybrid, virtual, or in-person meeting

      Training plan for meetings

      3 Improve Meeting Technology

      The Purpose

      Identify opportunities to improve meeting technology.

      Key Benefits Achieved

      A strategy for improving the underlying technologies and meeting spaces

      Activities

      3.1 Empower virtual meeting attendees.

      3.2 Optimize spaces for hybrid meetings.

      3.3 Build a team of meeting champions.

      3.4 Iterate to build and improve meeting technology.

      3.5 Guide users toward each technology.

      Outputs

      Desired improvements to meeting rooms and meeting technology

      Charter for the team of meeting champions

      Communications Guide Poster

      Terms and Conditions for consulting to businesses

      By signing an agreement with Gert Taeymans bvba, Client declares that he agrees with the Terms and Conditions referred to hereafter. Terms and conditions on Client's order form or any other similar document shall not be binding upon Gert Taeymans bvba.

      The prices, quantities and delivery time stated in any quotation are not binding upon Gert Taeymans bvba. They are commercial estimates only which Gert Taeymans bvba will make reasonable efforts to achieve. Prices quoted in final offers will be valid only for 30 days. All prices are VAT excluded and do not cover expenses, unless otherwise agreed in writing. Gert Taeymans bvba reserves the right to increase a quoted fee in the event that Client requests a variation to the work agreed.

      The delivery times stated in any quotation are of an indicative nature and not binding upon Gert Taeymans bvba, unless otherwise agreed in writing. Delivery times will be formulated in working days. In no event shall any delay in delivery be neither cause for cancellation of an order nor entitle Client to any damages.

      Amendments or variations of the initial agreement between Client and Gert Taeymans bvba will only be valid when accepted by both parties in writing.

      Any complaints concerning the performance of services must be addressed to Gert Taeymans bvba in writing and by registered mail within 7 working days of the date of the performance of the services.

      In no event shall any complaint be just cause for non-payment or deferred payment of invoices. Any invoice and the services described therein will be deemed irrevocably accepted by Client if no official protest of non-payment has been sent by Client within 7 working days from the date of the mailing of the invoice.

      Client shall pay all invoices of Gert Taeymans bvba within thirty (30) calendar days of the date of invoice unless otherwise agreed in writing by Gert Taeymans bvba. In the event of late payment, Gert Taeymans bvba may charge a monthly interest on the amount outstanding at the rate of two (2) percent with no prior notice of default being required, in which case each commenced month will count as a full month. Any late payment will entitle Gert Taeymans bvba to charge Client a fixed handling fee of 300 EUR. All costs related to the legal enforcement of the payment obligation, including lawyer fees, will be charged to Client.

      In no event will Gert Taeymans bvba be liable for damages of any kind, including without limitation, direct, incidental or consequential damages (including, but not limited to, damages for lost profits, business interruption and loss of programs or information) arising out of the use of Gert Taeymans bvba services.

      Gert Taeymans bvba collects personal data from Client for the performance of its services and the execution of its contracts. Such personal data can also be used for direct marketing, allowing Gert Taeymans bvba to inform Client of its activities on a regular basis. If Client objects to the employment of its personal data for direct marketing, Client must inform Gert Taeymans bvba on the following address: gert@gerttaeymans.consulting.

      Client can consult, correct or amend its personal data by addressing such request to Gert Taeymans bvba by registered mail. Personal data shall in no event be sold, rented or made available to other firms or third parties where not needed for the execution of the contract. Gert Taeymans bvba reserves the right to update and amend its privacy policy from time to time to remain consistent with applicable privacy legislation.

      The logo of the Client will be displayed on the Gert Taeymans bvba website, together with a short description of the project/services.

      Any changes to Client’s contact information such as addresses, phone numbers or e-mail addresses must be communicated to Gert Taeymans bvba as soon as possible during the project.

      Both parties shall maintain strict confidence and shall not disclose to any third party any information or material relating to the other or the other's business, which comes into that party's possession and shall not use such information and material. This provision shall not, however, apply to information or material, which is or becomes public knowledge other than by breach by a party of this clause.

      Gert Taeymans bvba has the right at any time to change or modify these terms and conditions at any time without notice.

      The agreement shall be exclusively governed by and construed in accordance with the laws of Belgium. The competent courts of Antwerp, Belgium will finally settle any dispute about the validity, the interpretation or the execution of this agreement.

      These Terms and Conditions are the only terms and conditions applicable to both parties.

      If any provision or provisions of these Terms and Conditions shall be held to be invalid, illegal or unenforceable, such provision shall be enforced to the fullest extent permitted by applicable law, and the validity, legality and enforceability of the remaining provisions shall not in any way be affected or impaired thereby.

      Tech Trend Update: If Digital Ethics Then Data Equity

      • Buy Link or Shortcode: {j2store}100|cart{/j2store}
      • member rating overall impact: 9.0/10 Overall Impact
      • member rating average dollars saved: After each Info-Tech experience, we ask our members to quantify the real-time savings, monetary impact, and project improvements our research helped them achieve.
      • member rating average days saved: Read what our members are saying
      • Parent Category Name: Innovation
      • Parent Category Link: /innovation

      COVID-19 is driving the need for quick technology solutions, including some that require personal data collection. Organizations are uncertain about the right thing to do.

      Our Advice

      Critical Insight

      Data equity approaches personal data like money, putting the owner in control and helping to protect against unethical systems.

      Impact and Result

      There are some key considerations for businesses grappling with digital ethics:

      1. If partnering, set expectations.
      2. If building, invite criticism.
      3. If imbuing authority, consider the most vulnerable.

      Tech Trend Update: If Digital Ethics Then Data Equity Research & Tools

      Tech Trend Update: If Digital Ethics Then Data Equity

      Understand how to use data equity as an ethical guidepost to create technology that will benefit everyone.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      • Tech Trend Update: If Digital Ethics Then Data Equity Storyboard
      [infographic]

      Secure Operations in High-Risk Jurisdictions

      • Buy Link or Shortcode: {j2store}369|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Security Strategy & Budgeting
      • Parent Category Link: /security-strategy-and-budgeting

      Business operations in high-risk areas of the world contend with complex threat environments and risk scenarios that often require a unique response. But traditional approaches to security strategy often miss these jurisdictional risks, leaving organizations vulnerable to threats that range from cybercrime and data breaches to fines and penalties.

      Security leaders need to identify high-risk jurisdictions, inventory critical assets, identify vulnerabilities, assess risks, and identify security controls necessary to mitigate those risks.

      Secure operations and protect critical assets in high-risk regions

      Across risks that include insider threats and commercial surveillance, the two greatest vulnerabilities that organizations face in high-risk parts of the world are travel and compliance. Organizations can make small adjustments to their security program to address these risks:

      1. Support high-risk travel: Put measures and guidelines in place to protect personnel, data, and devices before, during, and after employee travel.
      2. Mitigate compliance risk: Consider data residency requirements, data breach notification, cross-border data transfer, and third-party risks to support business growth.

      Using these two prevalent risk scenarios in high-risk jurisdictions as examples, this research walks you through the steps to analyze the threat landscape, assess security risks, and execute a response to mitigate them.

      Secure Operations in High-Risk Jurisdictions Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Secure Operations in High-Risk Jurisdictions – A step-by-step approach to mitigating jurisdictional security and privacy risks.

      Traditional approaches to security strategy often miss jurisdictional risks. Use this storyboard to make small adjustments to your security program to mitigate security risks in high-risk jurisdictions.

      • Secure Operations in High-Risk Jurisdictions – Phases 1-3

      2. Jurisdictional Risk Register and Heat Map Tool – A tool to inventory, assess, and treat jurisdictional risks.

      Use this tool to track jurisdictional risks, assess the exposure of critical assets, and identify mitigation controls. Use the geographic heatmap to communicate inherent jurisdictional risk with key stakeholders.

      • Jurisdictional Risk Register and Heat Map Tool

      3. Guidelines for Key Jurisdictional Risk Scenarios – Two structured templates to help you develop guidelines for two key jurisdictional risk scenarios: high-risk travel and compliance risk

      Use these two templates to develop help you develop your own guidelines for key jurisdictional risk scenarios. The guidelines address high-risk travel and compliance risk.

      • Digital Safety Guidelines for International Travel
      • Guidelines for Compliance With Local Security and Privacy Laws Template

      Infographic

      Workshop: Secure Operations in High-Risk Jurisdictions

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Identify Context for Risk Assessment

      The Purpose

      Assess business requirements and evaluate security pressures to set the context for the security risk assessment.

      Key Benefits Achieved

      Understand the goals of the organization in high-risk jurisdictions.

      Assess the threats to critical assets in these jurisdictions and capture stakeholder expectations for information security.

      Activities

      1.1 Determine assessment scope.

      1.2 Determine business goals.

      1.3 Determine compliance obligations.

      1.4 Determine risk appetite.

      1.5 Conduct pressure analysis.

      Outputs

      Business requirements

      Security pressure analysis

      2 Analyze Key Risk Scenarios for High-Risk Jurisdictions

      The Purpose

      Build key risk scenarios for high-risk jurisdictions.

      Key Benefits Achieved

      Identify critical assets in high-risk jurisdictions, their vulnerabilities to relevant threats, and the adverse impact should malicious agents exploit them.

      Assess risk exposure of critical assets in high-risk jurisdictions.

      Activities

      2.1 Identify critical assets.

      2.2 Identify threats.

      2.3 Assess risk likelihood.

      2.4 Assess risk impact.

      Outputs

      Key risk scenarios

      Jurisdictional risk exposure

      Jurisdictional Risk Register and Heat Map

      3 Build Risk Treatment Roadmap

      The Purpose

      Prioritize and treat jurisdictional risks to critical assets.

      Key Benefits Achieved

      Build an initiative roadmap to reduce residual risks in high-risk jurisdictions.

      Activities

      3.1 Identify and assess risk response.

      3.2 Assess residual risks.

      3.3 Identify security controls.

      3.4 Build initiative roadmap.

      Outputs

      Action plan to mitigate key risk scenarios

      Further reading

      Secure Operations in High-Risk Jurisdictions

      Assessments often omit jurisdictional risks. Are your assets exposed?

      EXECUTIVE BRIEF

      Analyst Perspective

      Operations in high-risk jurisdictions face unique security scenarios.

      The image contains a picture of Michel Hebert.

      Michel Hébert

      Research Director

      Security and Privacy

      Info-Tech Research Group


      The image contains a picture of Alan Tang.

      Alan Tang

      Principal Research Director

      Security and Privacy

      Info-Tech Research Group


      Traditional approaches to security strategies may miss key risk scenarios that critical assets face in high-risk jurisdictions. These include high-risk travel, heightened insider threats, advanced persistent threats, and complex compliance environments. Most organizations have security strategies and risk management practices in place, but securing global operations requires its own effort. Assess the security risk that global operations pose to critical assets. Consider the unique assets, threats, and vulnerabilities that come with operations in high-risk jurisdictions. Focus on the business activities you support and integrate your insights with existing risk management practices to ensure the controls you propose get the visibility they need. Your goal is to build a plan that mitigates the unique security risks that global operations pose and secures critical assets in high-risk areas. Don’t leave security to chance.

      Executive Summary

      Your Challenge

      • Security leaders who support operations in many countries struggle to mitigate security risks to critical assets. Operations in high-risk jurisdictions contend with complex threat environments and security risk scenarios that often require a unique response.
      • Security leaders need to identify critical assets, assess vulnerabilities, catalog threats, and identify the security controls necessary to mitigate related operational risks.

      Common Obstacles

      • Securing operations in high-risk jurisdictions requires additional due diligence. Each jurisdiction involves a different risk context, which complicates efforts to identify, assess, and mitigate security risks to critical assets.
      • Security leaders need to engage the organization with the right questions and identify high-risk vulnerabilities and security risk scenarios to help stakeholders make an informed decision about how to assess and treat the security risks they face in high-risk jurisdictions.

      Info-Tech’s Approach

      Info-Tech has developed an effective approach to protecting critical assets in high-risk jurisdictions.

      This approach includes tools for:

      • Evaluating the security context of your organization’s high-risk jurisdictions.
      • Identifying security risk scenarios unique to high-risk jurisdictions and assessing the exposure of critical assets.
      • Planning and executing a response.

      Info-Tech Insight

      Organizations with global operations must contend with a more diverse set of assets, threats, and vulnerabilities when they operate in high-risk jurisdictions. Security leaders need to take additional steps to secure operations and protect critical assets.

      Business operations in high-risk jurisdictions face a more complex security landscape

      Information security risks to business operations vary widely by region.

      The 2022 Allianz Risk Barometer surveyed 2,650 business risk specialists in 89 countries to identify the most important risks to operations. The report identified cybercrime, IT failures, outages, data breaches, fines, and penalties as the most important global business risks in 2022, but their results varied widely by region. The standout finding of the 2022 Allianz Risk Barometer is the return of security risks as the most important threat to business operations. Security risks will continue to be acute beyond 2022, especially in Africa, the Middle East, Europe, and the Asia-Pacific region, where they will dwarf risks of supply chain interruptions, natural catastrophe, and climate change.

      Global operations in high-risk jurisdictions contend with more diverse threats. These security risk scenarios are not captured in traditional security strategies.

      The image contains a picture of the world map that has certain areas of the map highlighted in various shades of blue based on higher security-related business risks.

      Figures represent the number of cybersecurity risks business risk specialists selected as a percentage of all business risks (Allianz, 2022). Higher scores indicate jurisdictions with higher security-related business risks. Jurisdictions without data are in grey.

      Different jurisdictions’ commitment to cybersecurity also varies widely, which increases security risks further

      The Global Cybersecurity Index (GCI) provides insight into the commitment of different countries to cybersecurity.

      The index assesses a country’s legal framework to identify basic requirements that public and private stakeholders must uphold and the legal instruments prohibiting harmful actions.

      The 2020 GCI results show overall improvement and strengthening of the cybersecurity agenda globally, but significant regional gaps persist. Of the 194 countries surveyed:

      • 33% had no data protection legislation.
      • 47% had no breach notification measures in place.
      • 50% had no legislation on the theft of personal information.
      • 19% still had no legislation on illegal access.

      Not every jurisdiction has the same commitment to cybersecurity. Protecting critical assets in high-risk jurisdictions requires additional due diligence.

      The image contains a picture of the world map that has certain areas of the map highlighted in various shades of blue based on scores in relation to the Global Security Index.

      The diagram sets out the score and rank for each country that took part in the Global Cybersecurity Index (ITU, 2021)

      Higher scores show jurisdictions with a lower rank on the CGI, which implies greater risk. Jurisdictions without data are in grey.

      Securing critical assets in high-risk jurisdictions requires additional effort

      Traditional approaches to security strategy may miss these key risk scenarios.

      As a result, security leaders who support operations in many countries need to take additional steps to mitigate security risks to critical assets.

      Guide stakeholders to make informed decisions about how to assess and treat the security risks and secure operations.

      • Engage the organization with the right questions.
      • Identify critical assets and assess vulnerabilities.
      • Catalogue threats and build risk scenarios.
      • Identify the security controls necessary to mitigate risks.

      Work with your organization to analyze the threat landscape, assess security risks unique to high-risk jurisdictions, and execute a response to mitigate them.

      This project blueprint works through this process using the two most prevalent risk scenarios in high-risk jurisdictions: high-risk travel and compliance risk.

      Key Risk Scenarios

      • High-Risk Travel
      • Compliance Risk
      • Insider Threat
      • Advanced Persistent Threat
      • Commercial Surveillance
      The image contains a screenshot of an Info-Tech thought model regarding secure global operations in high-risk jurisdictions.

      Travel risk is the first scenario we use as an example throughout the blueprint

      • This project blueprint outlines a process to identify, assess, and mitigate key risk scenarios in high-risk jurisdictions. We use two common key risk scenarios as examples throughout the deck to illustrate how you create and assess your own scenarios.
      • Supporting high-risk travel is the first scenario we will study in-depth as an example. Business growth, service delivery, and mergers and acquisitions can lead end users to travel to high-risk jurisdictions where staff, devices, and data are at risk.
      • Compromised or stolen devices can provide threat actors with access to data that could compromise the organization’s strategic, economic, or competitive advantage or expose the organization to regulatory risk.

      The project blueprint includes template guidance in Phase 3 to help you build and deploy your own travel guidelines to protect critical assets and support end users before they leave, during their trip, and when they return.

      Before you leave

      • Identify high-risk countries.
      • Enable controls.
      • Limit what you pack.

      During your trip

      • Assume you are monitored.
      • Limit access to systems.
      • Prevent theft.

      When you return

      • Change your password.
      • Restore your devices.

      Compliance risk is the second scenario we use as an example

      • Mitigating compliance risk is the second scenario we will study as an example in this blueprint. The legal and regulatory landscape is evolving rapidly to keep step with the pace of technological change. Security and privacy leaders are expected to mitigate the risk of noncompliance as the organization expands to new jurisdictions.
      • Later sections will show how to think through at least four compliance risks, including:
        • Cross-border data transfer
        • Third-party risk management
        • Data breach notification
        • Data residency

      The project blueprint includes template guidance in Phase 3 to help you deploy your own compliance governance controls as a risk mitigation measure.

      Secure Operations in High-Risk Jurisdictions: Info-Tech’s methodology

      1. Identify Context

      2. Assess Risks

      3. Execute Response

      Phase Steps

      1. Assess business requirements
      2. Evaluate security pressures
      1. Identify risks
      2. Assess risk exposure
      1. Treat security risks
      2. Build initiative roadmap

      Phase Outcomes

      • Internal security pressures that capture the governance, policies, practices, and risk tolerance of the organization
      • External security pressures that capture the expectations of customers, regulators, legislators, and business partners
      • A heatmap that captures not only the global exposure of your critical assets but also the business processes they support
      • A security risk register to allow for the easy transfer of critical assets’ global security risk data to your organization’s enterprise risk management practice
      • A roadmap of prioritized initiatives to apply relevant controls and secure global assets
      • A set of key risk indicators to monitor and report your progress

      Blueprint deliverables

      Each step of this blueprint is accompanied by supporting deliverables to help you accomplish your goals:

      Business Security Requirements

      Identify the context for the global security risk assessment, including risk appetite and risk tolerance.

      Jurisdictional Risk Register and Heatmap

      Identify critical global assets and the threats they face in high-risk jurisdictions and assess exposure.

      Mitigation Plan

      Roadmap of initiatives and security controls to mitigate global risks to critical assets. Tools and templates to address key security risk scenarios.

      Key deliverable:

      Jurisdictional Risk Register and Heatmap

      Use the Jurisdictional Risk Register and Heatmap Tool to capture information security risks to critical assets in high-risk jurisdictions. The tool generates a world chart that illustrates the risks global operations face to help you engage the business and execute a response.

      Blueprint benefits

      Protect critical assets in high-risk jurisdictions

      IT Benefits

      Assess and remediate information security risk to critical assets in high-risk jurisdictions.

      Easily integrate your risk assessment with enterprise risk assessments to improve communication with the business.

      Illustrate key information security risk scenarios to make the case for action in terms the business understands.

      Business Benefits

      Develop mitigation plans to protect staff, devices, and data in high-risk jurisdictions.

      Support business growth in high-risk jurisdictions without compromising critical assets.

      Mitigate compliance risk to protect your organization’s reputation, avoid fines, and ensure business continuity.

      Quantify the impact of securing global operations

      The tool included with this blueprint can help you measure the impact of implementing the research

      • Use the Jurisdictional Risk Register and Heatmap Tool to describe the key risk scenarios you face, assess their likelihood and impact, and estimate the cost of mitigating measures. Working through the project in this way will help you quantify the impact of securing global operations.
      The image contains a screenshot of Info-Tech's Jurisdictional Risk Register and Heatmap Tool. The image contains a screenshot of the High-Risk Travel Jurisdiction.

      Establish Baseline Metrics

      • Review existing information security and risk management metrics and the output of the tools included with the blueprint.
      • Identify metrics to measure the impact of your risk management efforts. Focus specifically on high-risk jurisdictions.
      • Compare your results with those in your overall security and risk management program.

      ID

      Metric

      Why is this metric valuable?

      How do I calculate it?

      1.

      Overall Exposure – High-Risk Jurisdictions

      Illustrates the overall exposure of critical assets in high-risk jurisdictions.

      Use the Jurisdictional Risk Register and Heatmap Tool. Calculate the impact times the probability rating for each risk. Take the average.

      2.

      # Risks Identified – High-Risk Jurisdictions

      Informs risk tolerance assessments.

      Use the Jurisdictional Risk Register and Heatmap Tool.

      3.

      # Risks Treated – High-Risk Jurisdictions

      Informs residual risk assessments.

      Use the Jurisdictional Risk Register and Heatmap Tool.

      4.

      Mitigation Cost – High-Risk Jurisdictions

      Informs cost-benefit analysis to determine program effectiveness.

      Use the Jurisdictional Risk Register and Heatmap Tool.

      5.

      # Security Incidents – High-Risk Jurisdictions

      Informs incident trend calculations to determine program effectiveness.

      Draw the information from your service desk or IT service management tool.

      6.

      Incident Remediation Cost – High-Risk Jurisdictions

      Informs cost-benefit analysis to determine program effectiveness.

      Estimate based on cost and effort, including direct and indirect cost such as business disruptions, administrative finds, reputational damage, etc.

      7.

      TRENDS: Program Effectiveness – High-Risk Jurisdictions

      # of security incidents over time. Remediation : Mitigation costs over time

      Calculate based on metrics 5 to 7.

      Info-Tech offers various levels of support to best suit your needs.

      DIY Toolkit

      "Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful."

      Guided Implementation

      "Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track."

      Workshop

      "We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place."

      Consulting

      "Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project."

      Diagnostics and consistent frameworks are used throughout all four options.

      Guided Implementation

      What does a typical GI on this topic look like?

      Phase 1

      Call #1: Scope project requirements, determine assessment scope, and discuss challenges.

      Phase 2

      Call #2: Conduct initial risk assessment and determine risk tolerance.

      Call #3: Evaluate security pressures in high-risk jurisdictions.

      Call #4: Identify risks in high-risk jurisdictions.

      Call #5: Assess risk exposure.

      Phase 3

      Call #6: Treat security risks in high-risk jurisdictions.

      A Guided Implementation (GI) is a series of calls with an Info-Tech analyst to help implement our best practices in your organization. A typical GI is between 8 to 12 calls over the course of 4 to 6 months.

      Workshop Overview

      Contact your account representative for more information. workshops@infotech.com 1-888-670-8889

      Days 1

      Days 2-3

      Day 4

      Day 5

      Identify Context

      Key Risk Scenarios

      Build Roadmap

      Next Steps and Wrap-Up (offsite)

      Activities

      1.1.1 Determine assessment scope.

      1.1.2 Determine business goals.

      1.1.3 Identify compliance obligations.

      1.2.1 Determine risk appetite.

      1.2.2 Conduct pressure analysis.

      2.1.1 Identify assets.

      2.1.2 Identify threats.

      2.2.1 Assess risk likelihood.

      2.2.2 Assess risk impact.

      3.1.1 Identify and assess risk response.

      3.1.2 Assess residual risks.

      3.2.1 Identify security controls.

      3.2.2 Build initiative roadmap.

      5.1 Complete in-progress deliverables from previous four days.

      5.2 Set up review time for workshop deliverables and to discuss next steps.

      Deliverables

      1. Business requirements for security risk assessment
      2. Identification of high-risk jurisdictions
      3. Security threat landscape for high-risk jurisdictions
      1. Inventory of relevant threats, critical assets, and their vulnerabilities
      2. Assessment of adverse effects should threat agents exploit vulnerabilities
      3. Risk register with key risk scenarios and heatmap of high-risk jurisdictions
      1. Action plan to mitigate key risk scenarios
      2. Investment and implementation roadmap
      1. Completed information security risk assessment for two key risk scenarios
      2. Risk mitigation roadmap

      No safe jurisdictions

      Stakeholders sometimes ask information security and privacy leaders to produce a list of safe jurisdictions from which to operate. We need to help them see that there are no safe jurisdictions, only relatively risky ones. As you build your security program, deepen the scope of your risk assessments to include risk scenarios critical assets face in different jurisdictions. These risks do not need to rule out operations, but they may require additional mitigation measures to keep staff, data, and devices safe and reduce potential reputational harms.

      Traditional approaches to security strategy often omit jurisdictional risks.

      Global operations must contend with a more complex security landscape. Secure critical assets in high-risk jurisdictions with a targeted risk assessment.

      The two greatest risks are high-risk travel and compliance risk.

      You can mitigate them with small adjustments to your security program.

      Support High-Risk Travel

      When securing travel to high-risk jurisdictions, you must consider personnel safety as well as data and device security. Put measures and guidelines in place to protect them before, during, and after travel.

      Mitigate Compliance Risk

      Think through data residency requirements, data breach notification, cross-border data transfer, and third-party risks to support business growth and mitigate compliance risks in high-risk jurisdictions to protect your organization’s reputation and avoid hefty fines or business disruptions.

      Phase 1

      Identify Context

      This phase will walk you through the following activities:

      • Assess business requirements to understand the goals of the organization’s global operations, as well as its risk governance, policies, and practices.
      • Evaluate jurisdictional security pressures to understand threats to critical assets and capture the expectations of external stakeholders, including customers, regulators, legislators, and business partners, and assess risk tolerance.

      This phase involves the following participants:

      • Business stakeholders
      • IT leadership
      • Security team
      • Risk and Compliance

      Step 1.1

      Assess Business Requirements

      Activities

      1.1.1 Determine assessment scope

      1.1.2 Identify enterprise goals in high-risk jurisdictions

      1.1.3 Identify compliance obligations

      This step involves the following participants:

      • Business stakeholders
      • IT leadership
      • Security team
      • Risk and Compliance

      Outcomes of this step

      • Assess business requirements to understand the goals of the organization’s global operations, as well as its risk governance, policies, and practices.

      Focus the risk assessment on high-risk jurisdictions

      Traditional approaches to information security strategy often miss threats to global operations

      • Successful security strategies are typically sensitive to risks to different IT systems and lines of business.
      • However, securing global operations requires additional focus on high-risk jurisdictions, considering what makes them unique.
      • This first phase of the project will help you evaluate the business context of operations in high-risk jurisdictions, including:
        • Enterprise and security goals.
        • Lines of business, physical locations, and IT systems that need additional oversight.
        • Unique compliance obligations.
        • Unique risks and security pressures.
        • Organizational risk tolerance in high-risk jurisdictions.

      Focus your risk assessment on the business activities security supports in high-risk jurisdictions and the unique threats they face to bridge gaps in your security strategy.

      Identify jurisdictions with higher inherent risks

      Your security strategy may not describe jurisdictional risk adequately.

      • Security strategies list lines of business, physical locations, and IT systems the organization needs to secure and those whose security will depend on a third-party. You can find additional guidance on fixing the scope and boundaries of a security strategy in Phase 1 of Build an Information Security Strategy.
      • However, security risks vary widely from one jurisdiction to another according to:
        • Active cyber threats.
        • Legal and regulatory frameworks.
        • Regional security and preparedness capabilities.
      • Your first task is to identify high-risk jurisdictions to target for additional oversight.

      Work closely with your enterprise risk management function.

      Enterprise risk management functions are often tasked with developing risk assessments from composite sources. Work closely with them to complete your own assessment.

      Countries at heightened risk of money laundering and terrorism financing are examples of high-risk jurisdictions. The Financial Action Task Force and the U.S. Treasury publish reports three times a year that identify Non-Cooperative Countries or Territories.

      Develop a robust jurisdictional assessment

      Design an intelligence collection strategy to inform your assessment

      Strategic Intelligence

      White papers, briefings, reports. Audience: C-Suite, board members

      Tactical Intelligence

      Internal reports, vendor reports. Audience: Security leaders

      Operational intelligence

      Indicators of compromise. Audience: IT Operations

      Operational intelligence focuses on machine-readable data used to block attacks, triage and validate alerts, and eliminate threats from the network. It becomes outdated in a matter of hours and is less useful for this exercise.

      Determine travel risks to bolster your assessments

      Not all locations and journeys will require the same security measures.

      • Travel risks vary significantly according to destination, the nature of the trip, and traveler profile.
      • Access to an up-to-date country risk rating system enables your organization and individual staff to quickly determine the overall level of risk in a specific country or location.
      • Based on this risk rating, you can specify what security measures are required prior to travel and what level of travel authorization is appropriate, in line with the organization's security policy or travel security procedures.
      • While some larger organizations can maintain their own country risk ratings, this requires significant capacity, particularly to obtain the necessary information to keep these regularly updated.
      • It may be more effective for your organization to make use of the travel risk ratings provided by an external security information provider, such as a company linked to your travel insurance or travel booking service, if available.
      • Alternatively, various open-source travel risk ratings are available via embassy travel sites or other website providers.

      Without a flexible system to account for the risk exposures of different jurisdictions, staff may perceive measures as a hindrance to operations.

      Develop a tiered risk rating

      The example below outlines potential risk indicators for high-risk travel.

      Rating

      Description

      Low

      Generally secure with adequate physical security. Low violent crime rates. Some civil unrest during significant events. Acts of terrorism rare. Risks associated with natural disasters limited and health threats mainly preventable.

      Moderate

      Periodic civil unrest. Antigovernment, insurgent, or extremist groups active with sporadic acts of terrorism. Staff at risk from common and violent crime. Transport and communications services are unreliable and safety records are poor. Jurisdiction prone to natural disasters or disease epidemics.

      High

      Regular periods of civil unrest, which may target foreigners. Antigovernment, insurgent, or extremist groups very active and threaten political or economic stability. Violent crime rates high, often targeting foreigners. Infrastructure and emergency services poor. May be regular disruption to transportation or communications services. Certain areas off-limits to foreigners. Jurisdictions experiencing natural disasters or epidemics are considered high risk.

      Extreme

      Undergoing active conflict or persistent civil unrest. Risk of being caught up in a violent incident or attack is very high. Authorities may have lost control of significant portions of the country. Lines between criminality and political and insurgent violence are blurred. Foreigners are likely to be denied access to parts of the country. Transportation and communication services are severely degraded or nonexistent. Violence presents a direct threat to staff security.

      Ratings are formulated by assessing several types of risk, including conflict, political/civil unrest, terrorism, crime, and health and infrastructure risks.

      1.1.1 Determine assessment scope

      1 – 2 hours

      1. As a group, brainstorm a list of high-risk jurisdictions to target for additional assessment. Write down as many items as possible to include in:
      • Lines of business
      • Physical locations
      • IT systems

      Pay close attention to elements of the assessment that are not in scope.

    • Discuss the response and the rationale for targeting each of them for additional risk assessments. Identify security-related concerns for different lines of business, locations, user groups, IT systems, and data.
    • Record your responses and your comments in the Information Security Requirements Gathering Tool.
    • Input

      Output

      • Corporate strategy
      • IT strategy
      • Security strategy
      • Relevant threat intelligence
      • A list of high-risk jurisdictions to focus your risk assessment

      Materials

      Participants

      • Laptop
      • Projector
      • Security team
      • IT leadership
      • Business stakeholders
      • Enterprise Risk Management
      • Compliance
      • Legal

      Download the Information Security Requirements Gathering Tool

      Position your efforts in a business context

      Securing critical assets in high-risk jurisdictions is a business imperative

      • Many companies relegate their information security strategies to their IT department. Aside from the strain the choice places on a department that already performs many different functions, it wrongly implies that mitigating information security risk is simply an IT problem.
      • Managing information security risks is a business problem. It requires that organizations identify their risk appetite, prioritize relevant threats, and define risk mitigation initiatives. Business leaders can only do these activities effectively in a context that recognizes the business and financial benefits of implementing protections.
      • This is notably true of businesses with operations in many different countries. Each jurisdiction has its own set of security risks the organization must account for, as well as unique local laws and regulations that affect business operations.
      • In high-risk jurisdictions, your efforts must consider the unique operational challenges your organization may not face in its home country. Your efforts to secure critical assets will be most successful if you describe key risk scenarios in terms of their impact on business goals.
      • You can find additional guidance on assessing the business context of a security strategy in Phase 1 of Build an Information Security Strategy.

      Do you understand the unique business context of operations in high-risk jurisdictions?

      1.1.2 Identify business goals

      Estimated Time: 1-2 hours

      1. As a group, brainstorm the primary and secondary business goals of the organization. Focus your assessment on operations in high-risk jurisdictions you identified in Exercise 1.1.1. Review:
      • Relevant corporate and IT strategies.
      • The business goal definitions and indicator metrics in tab 2, “Goals Definition,” of the Information Security Requirements Gathering Tool.
    • Limit business goals to no more than two primary goals and three secondary goals. This limitation will help you prioritize security initiatives at the end of the project.
    • For each business goal, identify up to two security alignment goals that will support business goals in high-risk jurisdictions.
    • Input

      Output

      • Corporate strategy
      • IT strategy
      • Security strategy
      • Your goals for the security risk assessment for high-risk jurisdictions

      Materials

      Participants

      • Laptop
      • Projector
      • Security team
      • IT leadership
      • Business stakeholders
      • Risk Management
      • Compliance
      • Legal

      Download the Information Security Requirements Gathering Tool

      Record business goals

      Capture the results in the Information Security Requirements Gathering Tool

      1. Record the primary and secondary business goals you identified in tab 3, “Goals Cascade,” of the Information Security Requirements Gathering Tool.
      2. Next, record the two security alignment goals you selected for each business goal based on the tool’s recommendations.
      3. Finally, review the graphic diagram that illustrates your goals on tab 6, “Results,” of the Information Security Requirements Gathering Tool.
      4. Revisit this exercise whenever operations expands to a new jurisdiction to capture how they contribute to the organization’s mission and vision and how the security program can support them.
      The image contains a screenshot of Tab 3, Goals Cascade.

      Tab 3, Goals Cascade

      The image contains a screenshot of Tab 6, Results.

      Tab 6, Results

      Analyze business goals

      Assess how operating in multiple jurisdictions adds nuance to your business goals

      • Security leaders need to understand the direction of the business to propose relevant security initiatives that support business goals in high-risk jurisdictions.
      • Operating in different jurisdictions carries its own degree of risk. The organization is subject not only to the information security risks and legal frameworks of its country of origin but also to those associated with international jurisdictions.
      • You need to understand where your organization operates and how these different jurisdictions contribute to your business goals to support their performance and protect the firm’s reputation.
      • This exercise will make an explicit link between security and privacy concerns in high-risk jurisdictions, what the business cares about, and what security is trying to accomplish.

      If the organization is considering a merger and acquisition project that will expand operations in jurisdictions with different travel risk profiles, the security organization needs to revise the security strategy to ensure the organization can support high-risk travel and mitigate risks to critical assets.

      Identify compliance obligations

      Data compliance obligations loom large in high-risk jurisdictions

      The image contains four hexagons, each with their own words. SOX, PCI DSS, HIPAA, HITECH.

      Security leaders are familiar with most conventional regulatory obligations that govern financial, personal, and healthcare data in North America and Europe.

      The image contains four hexagons, each with their own words. Residency, Cross-Border Transfer, Breach Notification, Third-Party Risk Mgmt.

      Data privacy concerns, nationalism, and the economic value of data are all driving jurisdictions to adopt data residency and data localization and to shut down the cross-border transfer of data.

      The next step requires you to consider the compliance obligations the organization needs to meet to support the business as it expands to other jurisdictions through natural growth, mergers, and acquisitions.

      1.1.3 Identify compliance obligations

      Estimated Time: 1-2 hours

      1. As a group, brainstorm compliance obligations in target jurisdictions. Focus your assessment on operations in high-risk jurisdictions.
      2. Include:

      • Laws
      • Governing regulations
      • Industry standards
      • Contractual agreements
    • Record your compliance obligations and comments on tab 4, “Compliance Obligations,” of the Information Security Requirements Gathering Tool.
    • If you need to take full stock of the laws and regulations in place in the jurisdictions where you operate that you are not familiar with, consider seeking local legal counsel to help you navigate this exercise.
    • Input

      Output

      • Legal and compliance frameworks in target jurisdictions
      • Mandatory and voluntary compliance obligations for target jurisdictions

      Materials

      Participants

      • Laptop
      • Projector
      • Security team
      • IT leadership
      • Business stakeholders
      • Risk Management
      • Compliance
      • Legal

      Download the Information Security Requirements Gathering Tool

      Step 1.2

      Evaluate Security Pressures

      Activities

      1.2.1 Conduct initial risk assessment

      1.2.2 Conduct pressure analysis

      1.2.3 Determine risk tolerance

      This step involves the following participants:

      • Security team
      • Risk and Compliance
      • IT leadership (optional)

      Outcomes of this step

      Identify threats to global assets and capture the security expectations of external stakeholders, including customers, regulators, legislators, and business partners, and determine risk tolerance.

      Evaluate security pressures to set the risk context

      Perform an initial assessment of high-risk jurisdictions to set the context.

      Assess:

      • The threat landscape.
      • The security pressures from key stakeholders.
      • The risk tolerance of your organization.

      You should be able to find the information in your existing security strategy. If you don’t have the information, work through the next three steps of the project blueprint.

      The image contains a diagram to demonstrate evaluating security pressures, as described in the text above.

      Some jurisdictions carry inherent risks

      • Jurisdictional risks stem from legal, regulatory, or political factors that exist in different countries or regions. They can also stem from unexpected legal changes in regions where critical assets have exposure. Understanding jurisdictional risks is critical because they can require additional security controls.
      • Jurisdictional risk tends to be higher in jurisdictions:
        • Where the organization:
          • Conducts high-value or high-volume financial transactions.
          • Supports and manages critical infrastructure.
          • Has high-cost data or data whose compromise could undermine competitive advantage.
          • Has a high percentage of part-time employees and contractors.
          • Experiences a high rate of employee turnover.
        • Where state actors:
          • Have a low commitment to cybersecurity, financial, and privacy legislation and regulation.
          • Support cybercrime organizations within their borders.

      Jurisdictional risk is often reduced to countries where money laundering and terrorist activities are high. In this blueprint, the term refers to the broader set of information security risks that arise when operating in a foreign country or jurisdiction.

      Five key risk scenarios are most prevalent

      Key Risk Scenarios

      • High-Risk Travel
      • Compliance Risk
      • Insider Threat
      • Advanced Persistent Threat
      • Commercial Surveillance

      Security leaders who support operations in many countries need to take additional steps to mitigate security risks to critical assets. The goal of the next two exercises is to analyze the threat landscape and security pressures unique to high-risk jurisdictions, which will inform the construction of key scenarios in Phase 2. These five scenarios are most prevalent in high-risk jurisdictions. Keep them in mind as you go through the exercises in this section.

      1.2.1 Assess jurisdictional risk

      1-3 hours

      1. As a group, review the questions on tab 2, “Risk Assessment,” of the Information Security Pressure Analysis Tool.
      2. Gather the required information from subject matter experts on the following risk elements with a focus on high-risk jurisdictions:
      3. Review each question in tab 2 of the Information Security Pressure Analysis Tool and select the most appropriate response.

      Input

      Output

      • Existing security strategy
      • List of organizational assets
      • Historical data on information security incidents
      • Completed risk assessment

      Materials

      Participants

      • Information Security Pressure Analysis Tool
      • Security team
      • IT leadership
      • Risk Management

      For more information on how to complete the risk assessment questionnaire, see Step 1.2.1 of Build an Information Security Strategy.

      1.2.2 Conduct pressure analysis

      1-3 hours

      1. As a group, review the questions on tab 3, “Pressure Analysis,” of the Information Security Pressure Analysis Tool.
      2. Gather the required information from subject matter experts on the following pressure elements with a focus on high-risk jurisdictions:
      • Compliance and oversight
      • Customer expectations
      • Business expectations
      • IT expectations
    • Review each question in the questionnaire and provide the most appropriate response using the drop-down list. It may be helpful to consult with the appropriate departments to obtain their perspectives.
    • For more information on how to complete the pressure analysis questionnaire, see Step 1.3 of Build an Information Security Strategy.

      Input

      Output

      • Information on various pressure elements within the organization
      • Existing security strategy
      • Completed pressure analysis

      Materials

      Participants

      • Information Security Pressure Analysis Tool
      • Security team
      • IT leadership
      • Business leaders
      • Compliance

      A low security pressure means that your stakeholders do not assign high importance to information security. You may need to engage stakeholders with the right key risk scenarios to illustrate jurisdictional risk and generate support for new security controls.

      Download the Information Security Pressure Analysis Tool

      Assess risk tolerance

      • Risk tolerance expresses the types and amount of risk the organization is willing to accept in pursuit of its goals.
      • These expectations can help you identify, manage, and report on key risk scenarios in high-risk jurisdictions.
      • For instance, an organization with a low risk tolerance will require a stronger information security program to minimize operational security risks.
      • It’s up to business leaders to determine the risks they are willing to accept. They may need guidance to understand how system-level risks affect the organization’s ability to pursue its goals.

      A formalized risk tolerance statement can help:

      • Support risk-based security decisions that align with business goals.
      • Provide a meaningful rationale for security initiatives.
      • Improve the transparency of investments in the organization’s security program.
      • Provide guidance for monitoring inherent risk and residual risk exposure.

      The role of security professionals is to identify and analyze key risk scenarios that may prevent the organization from reaching its goals.

      1.2.3 Determine risk tolerance

      1-3 hours

      1. As a group, review the questions on tab 4, “Risk Tolerance,” of the Information Security Pressure Analysis Tool.
      2. Gather the required information from subject matter experts on the following risk tolerance elements:
      • Recent IT problems, especially downtime and data recovery issues
      • Historical security incidents
    • Review any relevant documentation, including:
      • Existing security strategy
      • Business impact assessments
      • Service-level agreements

      For more information on how to complete the risk tolerance questionnaire, see Step 1.4 of Build an Information Security Strategy.

      Input

      Output

      • Existing security strategy
      • Data on recent IT problems and incidents
      • Business impact assessments
      • Completed risk tolerance statement

      Materials

      Participants

      • Information Security Pressure Analysis Tool
      • Security team
      • IT leadership
      • Risk Management

      Download the Information Security Pressure Analysis Tool

      Review the output of the results tab

      • The organizational risk assessment provides a high-level assessment of inherent risks in high-risk jurisdictions. Use the results to build and assess key risk scenarios in Phase 2.
      • Use the security pressure analysis to inform stakeholder management efforts. A low security pressure indicates that stakeholders do not yet grasp the impact of information security on organizational goals. You may need to communicate its importance before you discuss additional security controls.
      • Jurisdictions in which organizations have a low risk tolerance will require stronger information security controls to minimize operational risks.
      The image contains a screenshot of the organizational risk assessment. The image contains a screenshot of the security pressure analysis. The image contains a screenshot of the risk tolerance curve.

      Phase 2

      Assess Security Risks to Critical Assets

      This phase will walk you through the following activities:

      • Identify critical assets, their vulnerabilities to relevant threats, and the adverse impact a successful threat event would have on the organization.
      • Assess risk exposure of critical assets in high-risk jurisdictions for each risk scenario through an analysis of its likelihood and impact.

      This phase involves the following participants:

      • Security team
      • Risk and Compliance
      • IT leadership (optional)

      Step 2.1

      Identify Risks

      Activities

      2.1.1 Identify assets

      2.1.2 Identify threats

      This step involves the following participants:

      • Security team
      • Risk and Compliance
      • IT leadership (optional)

      Outcomes of this step

      • Define risk scenarios that identify critical assets, their vulnerabilities to relevant threats, and the adverse impact a successful threat event would have on the organization.

      This blueprint focuses on mitigating jurisdictional risks

      The image contains a screenshot of the IT Risk Management Framework. The framework includes: Risk Identification, Risk Assessment, Risk Response, and Risk Governance.

      For a deeper dive into building a risk management program, see Info-Tech’s core project blueprints on risk management:

      Build an IT Risk Management Program

      Combine Security Risk Management Components Into One Program

      Draft key risk scenarios to illustrate adverse events

      Risk scenarios help decision-makers understand how adverse events affect business goals.

      • Risk-scenario building is the process of identifying the critical factors that contribute to an adverse event and crafting a narrative that describes the circumstances and consequences if it were to happen.
      • Risk scenarios set up the risk analysis stage of the risk assessment process. They are narratives that describe in detail:
        • The asset at risk.
        • The threat that can act against the asset.
        • Their intent or motivation.
        • The circumstances and threat actor model associated with the threat event.
        • The potential effect on the organization.
        • When or how often the event might occur.

      Risk scenarios are further distilled into a single sentence or risk statement that communicates the essential elements from the scenario.

      Well-crafted risk scenarios have four components

      The second phase of the project will help you craft meaningful risk scenarios

      Threat

      Exploits an

      Asset

      Using a

      Method

      Creating an

      Effect

      An actor capable of harming an asset

      Anything of value that can be affected and results in loss

      Technique an actor uses to affect an asset

      How loss materializes

      Examples: Malicious or untrained employees, cybercriminal groups, malicious state actors

      Examples: Systems, regulated data, intellectual property, people

      Examples: Credential compromise, privilege escalation, data exfiltration

      Examples: Loss of data confidentiality, integrity, or availability; impact on staff health & safety

      Risk scenarios are concise, four to six sentence narratives that describe the core elements of forecasted adverse events. Use them to engage stakeholders with the right questions and guide them to make informed decisions about how to address and treat security risks in high-risk jurisdictions.

      The next slides review five key risk scenarios prevalent in high-risk jurisdictions. Use them as examples to develop your own.

      Travel to high-risk jurisdictions requires special measures to protect staff, devices, and data

      Governmental, academic, and commercial advisors compile lists of jurisdictions that pose greater travel risks annually.

      For instance, in the US, these lists might include countries that are:

      • Subjects of travel warnings by the US Department of State.
      • Identified as high risk by other US government sources such as:
        • The Department of the Treasury Office of Foreign Assets Control (OFAC).
        • The Federal Bureau of Investigation (FBI).
        • The Office of the Director of National Intelligence (ODNI).
      • Compiled from academic and commercial sources, such as Control Risks.

      When securing travel to high-risk jurisdictions, you must consider personnel safety as well as data and device security.

      The image contains a diagram to present high-risk jurisdictions.

      The diagram presents high-risk jurisdictions based on US governmental sources (2021) listed on this slide.

      High-risk travel

      Likelihood: Medium

      Impact: Medium

      Key Risk Scenario #1

      Malicious state actors, cybercriminals, and competitors can threaten staff, devices, and data during travel to high-risk jurisdictions. Device theft or compromise may occur while traveling through airports, accessing hotel computer and phone networks, or in internet cafés or other public areas. Threat actors can exploit data from compromised or stolen devices to undermine the organization’s strategic, economic, or competitive advantage. They can also infect compromised devices with malware that delivers malicious payloads once they reconnect with home networks.

      Threat Actor:

      • Malicious state actors
      • Cybercriminals
      • Competitors

      Assets:

      • Staff
      • IT systems
      • Sensitive data

      Effect:

      • Compromised staff health and safety
      • Loss of data
      • Lost of system integrity

      Methods:

      • Identify, steal, or target mobile devices.
      • Compromise network, wireless, or Bluetooth connections.
      • Leverage stolen devices as a means of infecting other networks.
      • Access devices to track user location.
      • Activate microphones on devices to collect information.
      • Intercept electronic communications users send from high-risk jurisdictions.

      The data compliance landscape is a jigsaw puzzle of data protection and data residency requirements

      Since the EU passed the GDPR in 2016, jurisdictions have turned to data regulations to protect citizen data

      Data privacy concerns, nationalism, and the economic value of data are all driving jurisdictions to adopt data residency, breach notification, and cross-border data transfer regulations. As 2021 wound down to a close, nearly all the world’s 30 largest economies had some form of data regulation in place. The regulatory landscape is shifting rapidly, which complicates operations as organizations grow into new markets or engage in merger and acquisition activities.

      Global operations require special attention to data-residency requirements, data breach notification requirements, and cross-border data transfer regulations to mitigate compliance risk.

      The image contains a diagram to demonstrate the data regulations placed in various places around the world.

      Compliance risk

      Likelihood: Medium

      Impact: High

      Key Risk Scenario #2

      Rapid changes in the privacy and security regulatory landscape threaten organizations’ ability to meet their compliance obligations from local legal and regulatory frameworks. Organizations risk reputational damage, administrative fines, criminal charges, and loss of market share. In extreme cases, organizations may lose their license to operate in high-risk jurisdictions. Shifts in the regulatory landscape can involve additional requirements for data residency, cross-border data transfer, data breach notification, and third-party risk management.

      Threat Actor:

      • Local, regional, and national state actors

      Asset:

      • Reputation, market share
      • License to operate

      Effect:

      • Administrative fines
      • Loss of reputation, brand trust, and consumer loyalty
      • Loss of market share
      • Suspension of business operations
      • Lawsuits due to collective actions and claims
      • Criminal charges

      Methods:

      • Shifts in the privacy and security regulatory landscape, including requirements for:
        • Data residency.
        • Cross-border data transfer.
        • Data breach notification.
        • Third-party security and privacy risk management.

      The incidence of insider threats varies widely by jurisdiction in unexpected ways

      On average, companies in North America, the Middle East, and Africa had the most insider incidents in 2021, while those in the Asia-Pacific region had the least.

      The Ponemon Institute set out to understand the financial consequences that result from insider threats and gain insight into how well organizations are mitigating these risks.

      In the context of this research, insider threat is defined as:

      • Employee or contractor negligence.
      • Criminal or malicious insider activities.
      • Credential theft (imposter risk).

      On average, the total cost to remediate insider threats in 2021 was US$15.4 million per incident.

      In all regions, employee or contractor negligence occurred most frequently. Organizations in North America and in the Middle East and Africa were most likely to experience insider threat incidents in 2021.

      the image contains a diagram of the world, with various places coloured in different shades of blue.

      The diagram represents the average number of insider incidents reported per organization in 2021. The results are analyzed in four regions (Ponemon Institute, 2022)

      Insider threat

      Likelihood: Low to Medium

      Impact: High

      Key Risk Scenario #3

      Malicious insiders, negligent employees, and credential thieves can exploit inside access to information systems to commit fraud, steal confidential or commercially valuable information, or sabotage computer systems. Insider threats are difficult to identify, especially when security is geared toward external threats. They are often familiar with the organization’s data and intellectual property as well as the methods in place to protect them. An insider may steal information for personal gain or install malicious software on information systems. They may also be legitimate users who make errors and disregard policies, which places the organization at risk.

      Threat Actor:

      • Malicious insiders
      • Negligent employees
      • Infiltrators

      Asset:

      • Sensitive data
      • Employee credentials
      • IT systems

      Effects:

      • Loss of system integrity
      • Loss of data confidentiality
      • Financial loss

      Methods:

      • Infiltrators may compromise credentials.
      • Malicious or negligent insiders may use corporate email to steal or share sensitive data, including:
        • Regulated data.
        • Intellectual property.
        • Critical business information.
      • Malicious agents may facilitate data exfiltration, as well as open-port and vulnerability scans.

      The risk of advanced persistent threats is more prevalent in Central and South America and the Asia-Pacific region

      Attacks from advanced persistent threat (APT) actors are more sophisticated than traditional ones.

      • More countries will use legal indictments as part of their cyber strategy. Exposing toolsets of APT groups carried out at the governmental level will drive more states to do the same.
      • Expect APTs to increasingly target network appliances like VPN gateways as organizations continue to sustain hybrid workforces.
      • The line between APTs and state-sanctioned ransomware groups is blurring. Expect cybercriminals to wield better tools, mount more targeted attacks, and use double-extortion tactics.
      • Expect more disruption and collateral damage from direct attacks on critical infrastructure.

      Top 10 Significant Threat Actors:

      • Lazarus
      • DeathStalker
      • CactusPete
      • IAmTheKing
      • TransparentTribe
      • StrongPity
      • Sofacy
      • CoughingDown
      • MuddyWater
      • SixLittleMonkeys

      Top 10 Targets:

      • Government
      • Banks
      • Financial Institutions
      • Diplomatic
      • Telecommunications
      • Educational
      • Defense
      • Energy
      • Military
      • IT Companies
      The image contains a world map coloured in various shades of blue.
      Top 12 countries targeted by APTs (Kaspersky, 2020)

      Track notable APTs to revise your list of high-risk jurisdictions and review the latest tactics and techniques

      Governmental advisors track notable APT actors that pose greater risks.

      The CISA Shields Up site, SANS Storm Center site, and MITRE ATT&CK group site provide helpful and timely information to understand APT risks in different jurisdictions.

      The following threat actors are currently associated with cyberattacks affiliated with the Russian government.

      Activity Group

      Risks

      APT28 (GRU)

      Known as Fancy Bear, this threat group has been tied to espionage since 2004. They compromised the Hillary Clinton campaign, amid other major events.

      APT29 (SVT)

      Tied to espionage since 2008. Reportedly compromised the Democratic National Committee in 2015. Cited in the 2021 SolarWinds compromise.

      Buhtrap/RTM Group

      Group focused on financial targets since 2014. Currently known to target Russian and Ukrainian banks.

      Gamaredon

      Operating in Crimea. Aligned with Russian interests. Has previously targeted Ukrainian government officials and organizations.

      DEV-0586

      Carried out wiper malware attacks on Ukrainian targets in January 2022.

      UNC1151

      Active since 2016. Linked to information operation campaigns and the distribution of anti-NATO material.

      Conti

      Most successful ransomware gang of 2021, with US$188M revenue. Supported Russian invasion of Ukraine, threatening attacks on allied critical infrastructure.

      Sources: MITRE ATT&CK; Security Boulevard, 2022; Reuters, 2022; The Verge, 2022

      Advanced persistent threat

      Likelihood: Low to Medium

      Impact: High

      Key Risk Scenario #4

      Advanced persistent threats are state actors or state-sponsored affiliates with the means to avoid detection by anti-malware software and intrusion detection systems. These highly-skilled and persistent malicious agents have significant resources with which to bypass traditional security controls, establish a foothold in the information technology infrastructure, and exfiltrate data undetected. APTs have the resources to adapt to a defender’s efforts to resist them over time. The loss of system integrity and data confidentiality over time can lead to financial losses, business continuity disruptions, and the destruction of critical infrastructure.

      Threat Actor:

      • State actors
      • State-sponsored affiliates

      Asset:

      • Sensitive data
      • IT systems
      • Critical infrastructure

      Effects:

      • Loss of system integrity
      • Loss of data confidentiality
      • Financial loss
      • Business continuity disruptions
      • Infrastructure destruction

      Methods:

      • Persistent, consistent attacks using the most advanced threats and tactics to bypass security defenses.
      • The goal of APTs is to maintain access to networks for prolonged periods without being detected.
      • The median dwell time differs widely between regions. FireEye reported the mean dwell time for 2018:
        • Americas: 71 days
        • Europe, Middle East, and Africa: 177 days
        • Asia-Pacific: 204 days
      Sources: Symantec, 2011; FireEye, 2019

      Threat agents have deployed invasive technology for commercial surveillance in at least 76 countries since 2015

      State actors and their affiliates purchased and used invasive spyware from companies in Europe, Israel, and the US.

      • “Customers are predominantly repressive regimes looking for new ways to control the flow of information and stifle dissent. Less than 10% of suspected customers are considered full democracies by the Economist Intelligence Unit.” (Top10VPN, 2021)
      • Companies based in economically developed and largely democratic states are profiting off the technology.
      • The findings demonstrate the need to consider geopolitical realities when assessing high-risk jurisdictions and to take meaningful action to increase layered defenses against invasive malware.
      • Spyware is having an increasingly well-known impact on civil society. For instance, since 2016, over 50,000 individual phone numbers have been identified as potential targets by NSO Group, the Israeli manufacturers of the notorious Pegasus Spyware. The target list contained the phone numbers of politicians, journalists, activists, doctors, and academics across the world.
      • The true number of those affected by spyware is almost impossible to determine given that many fall victim to the technology and do not notice.
      The image contains a map of the world with various countries highlighted in shades of blue.

      Countries where commercial surveillance tools have been deployed (“Global Spyware Market Index,” Top10VPN, 2021)

      The risks and effects of spyware vary greatly

      Spyware can steal mundane information, track a user’s every move, and everything in between.

      Adware

      Software applications that display advertisements while the program is running.

      Keyboard Loggers

      Applications that monitor and record keystrokes. Malicious agents use them to steal credentials and sensitive enterprise data.

      Trojans

      Applications that appear harmless but inflict damage or data loss to a system.

      Mobile Spyware

      Surveillance applications that infect mobile devices via SMS or MMS channels, though the most advanced can infect devices without user input.

      State actors and their affiliates use system monitors to track browsing habits, application usage, and keystrokes and capture information from devices’ GPS location data, microphone, and camera. The most advanced system monitor spyware, such as NSO Group’s Pegasus, can infect devices without user input and record conversations from end-to-end encrypted messaging systems.

      Commercial surveillance

      Likelihood: Low to Medium

      Impact: Medium

      Key Risk Scenario #5

      Malicious agents can deploy malware on end-user devices with commercial tools available off the shelf to secretly monitor the digital activity of users. Attacks exploit widespread vulnerabilities in telecommunications protocols. They occur through email and text phishing campaigns, malware embedded in untested applications, and sophisticated zero-click attacks that deliver payloads without requiring user interactions. Attacks target sensitive as well as mundane information. They can be used to track employee activities, investigate criminal activity, or steal credentials, credit card numbers, or other personally identifiable information.

      Threat Actor:

      • State actors
      • State-sponsored affiliates

      Asset:

      • Sensitive data
      • Staff health and safety
      • IT systems

      Effects:

      • Data breaches
      • Loss of data confidentiality
      • Increased risk to staff health and safety
      • Misuse of private data
      • Financial loss

      Methods:

      • Email and text phishing attacks that delivery malware payloads
      • Sideloading untested applications from a third-party source rather than an official retailer
      • Sophisticated zero-click attacks that deliver payloads without requiring user interaction

      Use the Jurisdictional Risk Register and Heatmap Tool

      The tool included with this blueprint can help you draft risk scenarios and risk statements in this section.

      The risk register will capture a list of critical assets and their vulnerabilities, the threats that endanger them, and the adverse effect your organization may face.

      The image includes two screenshots of the jurisdictional risk register and heatmap tool. The image contains a screenshot of the High-Risk Travel Jurisdiction.

      Download the Jurisdictional Risk Register and Heatmap Tool

      2.1.1 Identify assets

      1 – 2 hours

      1. As a group, consider critical or mission-essential functions in high-risk jurisdictions and the systems on which they depend. Brainstorm a list of the organization’s mission-supporting assets in high-risk jurisdictions. Consider:
      • Staff
      • Critical IT systems
      • Sensitive data
      • Critical operational processes
    • On a whiteboard, brainstorm the potential adverse effect of malicious agents in high-risk jurisdictions compromising critical assets. Consider the impact on:
      • Information systems.
      • Sensitive or regulated data.
      • Staff health and safety.
      • Critical operations and objectives.
      • Organizational finances.
      • Reputation and brand loyalty

      Threat

      Exploits an

      Asset

      Using a

      Method

      Creating an

      Effect

      Inputs for risk scenario identification

      Input

      Output

      • Corporate strategy
      • IT strategy
      • Security strategy
      • Business impact analyses
      • A list of the organization’s mission-supporting assets

      Materials

      Participants

      • Laptop
      • Projector
      • Whiteboard
      • Security team
      • IT leadership
      • System owner
      • Enterprise Risk Management

      Threat

      Exploits an

      Asset

      Using a

      Method

      Creating an

      Effect

      Inputs for risk scenario identification

      The image contains an example of the activity mentioned in the text above.

      Model threats to narrow the range of scenarios

      Motives and capabilities to perform attacks on critical assets vary across different threat actors.

      Category

      Actions

      Motivation

      Sophistication

      Nation-states

      Cyberespionage, cyberattacks

      Geopolitical

      High. Dedicated resources and personnel, extensive planning and coordination.

      Proxy organizations

      Espionage, destructive attacks

      Geopolitical, Ideological, Profit

      Moderate. Some planning and support functions and technical expertise.

      Cybercrime

      Theft, fraud, extortion

      Profit

      Moderate. Some planning and support functions and technical expertise.

      Hacktivists

      Disrupt operations, attack brands, release sensitive data

      Ideological

      Low. Rely on widely available tools that require little skill to deploy.

      Insiders

      Destruction or release of sensitive data, theft, exposure through negligence

      Incompetence, Discontent

      Internal access. Acting on their own or in concert with any of the above.

      • Criminals, hacktivists, and insiders vary in sophistication. Some criminal groups demonstrate a high degree of sophistication; however, a large cyber event that damages critical infrastructure does not align with their incentives to make money at minimal risk.
      • Proxy actors conduct offensive cyber operations on behalf of a beneficiary. They may be acting on behalf of a competitor, national government, or group of individuals.
      • Nation-states engage in long-term espionage and offensive cyber operations that support geopolitical and strategic policy objectives.

      2.1.2 Identify threats

      1 – 2 hours

      1. Review the outputs from activity 1.1.1 and activity 2.1.1.
      2. Identify threat agents that could undermine the security of critical assets in high-risk jurisdictions. Include internal and external actors.
      3. Assess their motives, means, and opportunities.
      • Which critical assets are most attractive? Why?
      • What paths and vulnerabilities can threat agents exploit to reach critical assets without going through a control?
      • How could they defeat existing controls? Draw on the MITRE framework to inform your analysis.
      • Once agents defeat a control, what further attack can they launch?

      Threat

      Exploits an

      Asset

      Using a

      Method

      Creating an

      Effect

      Inputs for risk scenario identification

      Input

      Output

      • Jurisdictional assessment from activity 1.1.1
      • Critical assets from activity 2.1.1
      • Potential vulnerabilities from:
        • Security control gap analysis
        • Security risk register
      • Threat intelligence
      • MITRE framework
      • A list of critical assets, threat agents, vulnerabilities, and potential attack vectors.

      Materials

      Participants

      • Laptop
      • Projector
      • Whiteboard
      • Security team
      • Infrastructure & Operations team
      • Enterprise Risk Management

      2.1.2 Identify threats (continued)

      1 – 2 hours

      1. On a whiteboard, brainstorm how threat agents will exploit vulnerabilities in critical assets to reach their goal. Redefine attack vectors to capture what could result from a successful initial attack.

      For example:

      • State actors and cybercriminals may steal or compromise end-user devices during travel to high-risk jurisdictions using malware they embed in airport charging stations, internet café networks, or hotel business centers.
      • Compromised devices may infect corporate networks and threaten sensitive data once they reconnect to them.

      Threat

      Exploits an

      Asset

      Using a

      Method

      Creating an

      Effect

      The image contains a screenshot of activity 2.1.2 as described in the text above.

      Bring together the critical risk elements into a single risk scenario

      Summarize the scenario further into a single risk statement

      Risk Scenario: High-Risk Travel

      State actors and cybercriminals can threaten staff, devices, and data during travel to high-risk jurisdictions. Device theft or compromise may occur while traveling through airports, accessing hotel computer and phone networks, or in internet cafés or other public areas. Threat actors can exploit data from compromised or stolen devices to undermine the organization’s strategic, economic, or competitive advantage. They can also infect compromised devices with malware that delivers malicious payloads once they reconnect with home networks.

      Risk Statement

      Cybercriminals compromise end-user devices during travel to high-risk jurisdictions, jeopardizing staff safety and leading to loss of sensitive data.

      Risk Scenario: Compliance Risk

      Rapid changes in the privacy and security regulatory landscape threaten an organization’s ability to meet its compliance obligations from local legal and regulatory frameworks. Organizations that fail to do so risk reputational damage, administrative fines, criminal charges, and loss of market share. In extreme cases, organizations may lose their license to operate in high-risk jurisdictions. Shifts in the regulatory landscape can involve additional requirements for data residency, cross-border data transfer, data breach notification, and third-party risk management.

      Risk Statement

      Rapid changes in the privacy and security regulations landscape threaten our ability to remain compliant, leading to reputational and financial loss.

      Fill out the Jurisdictional Risk Register and Heatmap Tool

      The tool is populated with data from two key risk scenarios: high-risk travel and compliance risk.

      The image includes two screenshots of the Jurisdictional Risk Register and Heatmap Tool.

      1. Label the risk in Tab 3, Column B.
      2. Record your risk scenario in Tab 3, Column C.
      3. Record your risk statement in Tab 3, Column D.
      4. Identify the applicable jurisdictions in Tab 3, Column E.
      5. You can further categorize the scenario as:
        • an enterprise risk (Column G).
        • an IT risk (Column H).

      Download the Jurisdictional Risk Register and Heatmap Tool

      Step 2.2

      Assess Risk Exposure

      Activities

      2.2.1 Identify existing controls

      2.2.2 Assess likelihood and impact

      This step involves the following participants:

      • Security team
      • Risk and Compliance
      • IT leadership (optional)

      Outcomes of this step

      • Assess risk exposure for each risk scenario through an analysis of its likelihood and impact.

      Brush up on risk assessment essentials

      The next step will help you prioritize IT risks based on severity.

      Likelihood of Occurrence X Likelihood of Impact = Risk Severity

      Likelihood of occurrence: How likely the risk is to occur.

      Likelihood of impact: The likely impact of a risk event.

      Risk severity: The significance of the risk.

      Evaluate risk severity against the risk tolerance thresholds and the cost of risk response.

      Identify existing controls before you proceed

      Existing controls will reduce the inherent likelihood and impact of the risk scenario you face.

      Existing controls were put in place to avoid, mitigate, or transfer key risks your organization faced in the past. Without considering existing controls, you run the risk of overestimating the likelihood and impact of the risk scenarios your organization faces in high-risk jurisdictions.

      For instance, the ability to remote-wipe corporate-owned devices will reduce the potential impact of a device lost or compromised during travel to high-risk jurisdictions.

      As you complete the risk assessment for each scenario, document existing controls that reduce their inherent likelihood and impact.

      2.2.1 Document existing controls

      6-10 hours

      1. Document the Risk Category and Existing Controls in the Jurisdictional Risk Register and Heatmap Tool.
        • Tactical controls apply to individual risks only. For instance, the ability to remote-wipe devices mitigates the impact of a device lost in a high-risk jurisdiction.
        • Strategic controls apply to multiple risks. For instance, deploying MFA for critical applications mitigates the likelihood that malicious actors can compromise a lost device and impedes their access in devices they do compromise.

      Input

      Output

      • Risk scenarios
      • Existing controls for risk scenarios

      Materials

      Participants

      • Jurisdictional Risk Register and Heatmap Tool
      • Laptop
      • Projector
      • Security team
      • IT leadership
      • Business stakeholders
      • Enterprise Risk Management

      Download the Jurisdictional Risk Register and Heatmap Tool.

      Assess the risk scenarios you identified in Phase 1

      The risk register is the central repository for risks in high-risk jurisdictions.

      • Use the second tab of the Jurisdictional Risk Register and Heatmap Tool to create likelihood, impact, and risk tolerance assessment scales to evaluate every risk event effectively.
      • Severity-level assessment is a “first pass” of your risk scenarios that will reveal your organization’s most severe risks in high-risk jurisdictions.
      • You can incorporate expected cost calculations into your evaluation to assess scenarios in greater detail.
      • Expected cost represents how much you would expect to pay in an average year for each risk event. Expected cost calculations can help compare IT risks to non-IT risks that may not use the same scales and communicate system-level risk to the business in a language they will understand.

      Expected cost calculations may not be practical. Determining robust likelihood and impact values to produce cost estimates can be challenging and time consuming. Use severity-level assessments as a first pass to make the case for risk mitigation measures and take your lead from stakeholders.

      The image contains two screenshots of the Jurisdictional Risk Register and Heatmap Tool.

      Use the Jurisdictional Risk Register and Heatmap Tool to capture and analyze your data.

      2.2.2 Assess likelihood and impact

      6-10 hours

      1. Assign each risk scenario a likelihood of occurrence and a likely impact level that represents the impact of the scenario on the whole organization considering existing controls. Record your results in Tab 3, column R and S, respectively.
      2. You can further dissect likelihood and impact into component parameters but focus first on total likelihood and impact to keep the task manageable.
      3. As you input the first few likelihood and impact values, compare them to one another to ensure consistency and accuracy. For instance, is a device lost in a high-risk jurisdiction truly more impactful than a device compromised with commercial surveillance software?
      4. The tool will calculate the probability of risk exposure based on the likelihood and consequence associated with the scenario. The results are published in Tab 3, Column T.

      Input

      Output

      • Risk scenarios
      • Assessed the likelihood of occurrence and impact for all identified risk events

      Materials

      Participants

      • Jurisdictional Risk Register and Heatmap Tool
      • Laptop
      • Projector
      • Security team
      • IT leadership
      • Business stakeholders
      • Enterprise Risk Management

      Download the Jurisdictional Risk Register and Heatmap Tool.

      Refine your risk assessment to justify your estimates

      Document the rationale behind each value and the level of consensus in group discussions.

      Stakeholders will likely ask you to explain some of the numbers you assigned to likelihood and impact assessments. Pointing to an assessment methodology will give your estimates greater credibility.

      • Assign one individual to take notes during the assessment exercise.
      • Have them document the main rationale behind each value and the level of consensus.

      The goal is to develop robust intersubjective estimates of the likelihood and impact of a risk scenario.

      We assigned a 50% likelihood rating to a risk scenario. Were we correct?

      Assess the truth of the following statements to test likelihood assessments. In this case, do these two statements seem true?

      • The risk event will likely occur once in the next two years, all things being equal.
      • In two nearly identical organizations, one out of two will experience the risk event this year.
      The image includes a screenshot of the High-Risk Travel Jurisdictions.

      Phase 3

      Execute Response

      This phase will walk you through the following activities:

      • Prioritize and treat global risks to critical assets based on their value and exposure.
      • Build an initiative roadmap that identifies and applies relevant controls to protect critical assets. Identify key risk indicators to monitor progress.

      This phase involves the following participants:

      • Security team
      • Risk and Compliance
      • IT leadership (optional)

      Step 3.1

      Treat Security Risks

      Activities

      3.1.1 Identify and assess risk response

      This step involves the following participants:

      • Security team
      • Risk and Compliance
      • IT leadership (optional)

      Outcomes of this step

      • Prioritize and treat global risks to critical assets based on their value and exposure.

      Analyze and select risk responses

      The next step will help you treat the risk scenarios you built in Phase 2.

      Identify

      Identify risk responses.

      Predict

      Predict the effectiveness of the risk response, if implemented, by estimating the residual likelihood and impact of the risk.

      Calculate

      The tool will calculate the residual severity of the risk after applying the risk response.

      The first part of the phase outlines project activities. The second part elaborates on high-risk travel and compliance risk, the two key risk scenarios we are following throughout the project. Use the Jurisdictional Risk Register and Heatmap Tool to capture your work.

      Analyze likelihood and impact to identify response

      The image contains a diagram of he risk response analysis. Risk Transfer and Risk Avoidance has the most likelihood, and Risk Acceptance and Risk Mitigation have the most impact. Risk Avoidance has the most likelihood and most impact in regards to risk response.

      3.1.1 Identify and assess risk response

      Complete the following steps for each risk scenario.

      1. Identify a risk response action that will help reduce the likelihood of occurrence or the impact if the scenario were to occur. Indicate the type of risk response (avoidance, mitigation, transfer, acceptance, or no risk exists).
      2. Assign each risk response action a residual likelihood level and a residual impact level. This is the same step you performed in Activity 2.2.2, but you are now are estimating the likelihood and impact of the risk event after you implemented the risk response action successfully. The Jurisdictional Risk Register and Heatmap Tool will generate a residual risk severity level for each risk event.
      3. Identify the potential Risk Action Owner (Project Manager) if the response is selected and turned into an IT project, and document this in the Jurisdictional Risk Register and Heatmap Tool .
      4. For each risk event, document risk response actions, residual likelihood and impact levels, and residual risk severity level.

      Input

      Output

      • Risk scenarios from Phase 2
      • Risk scenario mitigation plan

      Materials

      Participants

      • Whiteboard/flip charts
      • Jurisdictional Risk Register and Heatmap Tool
      • Security team
      • Risk and Compliance
      • IT leadership (optional)

      Download the Jurisdictional Risk Register and Heatmap Tool

      Step 3.2

      Mitigate Travel Risk

      Activities

      3.2.1 Develop a travel policy

      3.2.2 Develop travel procedures

      3.2.3 Design high-risk travel guidelines

      This step involves the following participants:

      • Security team
      • Risk and Compliance
      • IT leadership (optional)

      Outcomes of this step

      • Prioritize and treat global risks to critical assets based on their value and exposure.

      Identify controls to mitigate jurisdictional risk

      This section provides guidance on the most prevalent risk scenarios identified in Phase 2 and provides a more in-depth examination of the two most prevalent ones, high-risk travel and compliance risk. Determine the appropriate response to each risk scenario to keep global risks to critical assets aligned with the organization’s risk tolerance.

      Key Risk Scenarios

      • High-Risk Travel
      • Compliance Risk
      • Insider Threat
      • Advanced Persistent Threat
      • Commercial Surveillance

      Travel risk is a common concern in organizations with global operations

      • The security of staff, devices, and data is one of the biggest challenges facing organizations with a global footprint. Working and traveling in unpredictable environments will aways carry a degree of risk, but organizations can do much to develop a safer and more secure working environment.
      • Compromised or stolen devices can provide threat actors with access to data that could compromise the organization’s strategic, economic, or competitive advantage or expose the organization to regulatory risk.
      • For many organizations, security risk assessments, security plans, travel security procedures, security training, and incident reporting systems are a key part of their operating language.
      • The following section provides a simple structure to help organizations demystify travel in high-risk jurisdictions.

      The image contains a diagram to present high-risk jurisdictions.

      Before you leave

      • Identify high-risk countries.
      • Enable controls.
      • Limit what you pack.

      During your trip

      • Assume you are monitored.
      • Limit access to systems.
      • Prevent theft.

      When you return

      • Change your password.
      • Restore your devices.

      Case study

      Higher Education: Camosun College

      Interview: Evan Garland

      Frame additional security controls as a value-added service.

      Situation

      The director of the international department at Camosun College reached out to IT security for additional support. Department staff often traveled to hostile environments. They were concerned malicious agents would either steal end-user devices or compromise them and access sensitive data. The director asked IT security for options that would better protect traveling staff, their devices, and the information they contain.

      Challenges

      First, controls would need to admit both work and personal use of corporate devices. Staff relied exclusively on work devices for travel to mitigate the risk of personal device theft. Personal use of corporate devices during travel was common. Second, controls needed to strike the right balance between friction and effortless access. Traveling staff had only intermittent access to IT support. Restrictive controls could prevent them from accessing their devices and data altogether.

      Solution

      IT consulted staff to discuss light-touch solutions that would secure devices without introducing too much complexity or compromising functionality. They then planned security controls that involved user interaction and others that did not and identified training requirements.

      Results

      Controls with user interaction

      Controls without user interaction

      • Multifactor authentication for college systems and collaboration platforms
      • Password manager for both work and personal use for staff for stronger passwords and practices
      • Security awareness training to help traveling staff identify potential threats while traveling through airports or accessing public Wi-Fi.
      • Drive encryption and always-on VPN to protect data at rest and in transit
      • Increased setting for phishing and spam filtering for traveling staff email
      • Enhanced anti-malware/endpoint detection and response (EDR) solution for traveling laptops

      Build a program to mitigate travel risks

      There is no one-size-fits-all solution.

      The most effective solution will take advantage of existing risk management policies, processes, and procedures at your organization.

      • Develop a framework. Outline the organization’s approach to high-risk travel, including the policies, procedures, and mechanisms put in place to ensure safe travel to high-risk jurisdictions.
      • Draft a policy. Outline the organization’s risk attitude and key security principles and define roles and responsibilities. Include security responsibilities and obligations in job descriptions of staff members and senior managers.
      • Provide flexible options. Inherent travel risk will vary from one jurisdiction to another. You will likely not find an approach that works for every case. Establish locally relevant measures and plans in different security contexts and risk environments.
      • Look for quick wins. Identify measures or requirements that you can establish quickly but that can have a positive effect on the security of staff, data, and devices.
      • Monitor and review. Undertake periodic reviews of the organization’s security approach and management framework, as well as their implementation, to ensure the framework remains effective.

      3.2.1 Develop a travel policy

      1. Work with your business leaders to build a travel policy for high-risk jurisdictions. The policy should be a short and accessible document structured around four key sections:
        • A statement on the importance of staff security and safety, the scope of the policy, and who it applies to (staff, consultants, contractors, volunteers, visitors, accompanying dependants, etc.).
        • A principles section explaining the organization’s security culture, risk attitude, and the key principles that shape the organization’s approach to staff security and safety.
        • A responsibilities section setting out the organization’s security risk management structure and the roles and actions allocated to specific positions.
        • A minimal security requirements section establishing the specific security requirements that must be in place in all locations and specific locations.
      2. Common security principles include:
      • Shared responsibility – Managing risks to staff is a shared organizational responsibility.
      • Acknowledgment of risk – Managing security will not remove all risks. Staff need to appreciate, as part of their informed consent, that they are still exposed to risk.
      • Primacy of life – Staff safety is of the highest importance. Staff should never place themselves at excessive risk to meet program objectives or protect property.
      • Proportionate risk – Risks must be assessed to ensure they are proportionate to the benefits organizational activities provide and the ability to manage those risks.
      • Right to withdraw – Staff have the right to withdraw from or refuse to take up work in a particular area due to security concerns.
      • No right to remain – The organization has the right to suspend activities that it considers too dangerous.
    • Cross-reference the organization’s other governing policies that outline requirements related to security risk management, such as the health and safety policy, access control policy, and acceptable use of security assets.
    • Input

      Output

      • List of high-risk jurisdictions
      • Risk scenarios from Phase 2
      • Data inventory and data flows
      • Travel policy for high-risk jurisdictions

      Materials

      Participants

      • Whiteboard/flip charts
      • Jurisdictional Risk Register and Heatmap Tool
      • Security team
      • Legal team
      • IT leadership
      • Risk Management

      Develop security plans for high-risk travel

      Security plans advise staff on how to manage the risk identified in assessments.

      Security plans are key country documents that outline the security measures and procedures in place and the responsibilities and resources required to implement them. Security plans should be established in high-risk jurisdictions where your organization has a regular, significant presence. Security plans must remain relevant and accessible documents that address the specific risks that exist in that location, and, if appropriate, are specific about where the measures apply and who they apply to. Plans should be updated regularly, especially following significant incidents or changes in the operating environment or activities.

      Key Components

      Critical information – One-page summary of pertinent information for easy access and quick reference (e.g. curfew times, no-go areas, important contacts).

      Overview – Purpose and scope of the document, responsibilities for security plan, organization’s risk attitude, date of completion and review date, and a summary of the security strategy and policy.

      Current Context – Summary of current operating context and overall security situation; main risks to staff, assets, and operations; and existing threats and risk rating.

      Procedures – Simple security procedures that staff should adhere to in order to prevent incidents and how to respond should problems arise. Standard operating procedures (SOPs) should address key risks identified in the assessment.

      Security levels – The organization's security levels/phases, with situational indicators that reflect increasing risks to staff in that context and location and specific actions/measures required in response to increasing insecurity.

      Incident reporting – The procedures and responsibilities for reporting security-related incidents; for example, the type of incidents to be reported, the reporting structure, and the format for incident reporting.

      Determine travel risk

      Tailor your risk response to the security risk assessment you conducted in earlier stages of this project.

      Ratings are formulated by assessing several types of risk, including conflict, political/civil unrest, terrorism, crime, and health and infrastructure risks.

      Rating

      Description (Examples)

      Recommended Action

      Low

      Generally secure with adequate physical security. Low violent crime rates. Some civil unrest during significant events. Acts of terrorism rare. Risks associated with natural disasters limited and health threats mainly preventable.

      Basic personal security, travel, and health precautions required.

      Moderate

      Periodic civil unrest. Antigovernment, insurgent, or extremist groups active with sporadic acts of terrorism. Staff at risk from common and violent crime. Transport and communications services are unreliable and safety records are poor. Jurisdiction prone to natural disasters or disease epidemics.

      Increased vigilance and routine security procedures required.

      High

      Regular periods of civil unrest, which may target foreigners. Antigovernment, insurgent, or extremist groups very active and threaten political or economic stability. Violent crime rates high and targeting of foreigners is common. Infrastructure and emergency services poor. May be regular disruption to transportation or communications services. Certain areas off-limits to foreigners. Jurisdictions experiencing a natural disaster or a disease epidemic are considered high risk.

      High level of vigilance and effective, context-specific security precautions required.

      Extreme

      Undergoing active conflict or persistent civil unrest. Risk of being caught up in a violent incident or attack is very high. Civil authorities may have lost control of significant portions of the country. Lines between criminality and political and insurgent violence are blurred. Foreigners are likely to be denied access to significant parts of the country. Transportation and communication services are severely degraded or non-existent. Violence presents a direct threat to staff security.

      Stringent security precautions essential and may not be sufficient to prevent serious incidents.

      Program activities may be suspended and staff withdrawn at very short notice.

      3.2.2 Develop travel procedures

      1. Work with your business leaders to build travel procedures for high-risk jurisdictions. The procedures should be tailored to the risk assessment and address the risk scenarios identified in Phase 2.
      2. Use the categories outlined in the next two slides to structure the procedure. Address all types of travel, detail security measures, and outline what the organization expects of travelers before, during, and after their trip.
      3. Consider the implementation of special measures to limit the impact of a potential security event, including:
        • Information end-user device loaner programs.
        • Temporary travel service email accounts.
      4. Specify what happens when staff add personal travel to their work trip to cover issues such as insurance, check-in, actual travel times, etc.
      5. Discuss the rationale for each procedure. Ensure the components align with the policy statements outlined in the high-risk travel policy developed in the previous step.

      Input

      Output

      • List of high-risk jurisdictions
      • Risk scenarios from Phase 2
      • High-risk travel policy
      • Travel procedures for high-risk jurisdictions

      Materials

      Participants

      • Whiteboard/flip charts
      • Jurisdictional Risk Register and Heatmap Tool
      • Security team
      • Legal team
      • IT leadership
      • Risk Management

      Draft procedures to mitigate travel risks

      Address all types of travel, detail security measures, and outline what the organization expects of travelers before, during, and after their trip

      Introduction

      Clarifies who the procedures apply to. Highlights any differences in travel security requirements or support provided to staff, consultants, partners, and official visitors.

      Travel risk ratings

      Explains the travel or country risk rating system, how staff access the information, the different categories and indicators, and their implications.

      Roles and responsibilities

      Clarifies the responsibilities of travelers, their line managers or contact points, and senior management regarding travel security and how this changes for destinations with higher risk ratings.

      Travel authorization

      Stipulates who in the organization authorizes travel, the various compliance measures required, and how this changes for destinations with higher risk ratings.

      Travel risk assessment

      Explains when travel risk assessments are required, the template that should be used, and who approves the completed assessments.

      Travel security procedures should specify what happens when staff add personal travel to their work trip to cover issues such as insurance, check-in, actual travel times, etc.

      Pre-travel briefings

      Outlines the information that must be provided to travelers prior to departure, the type of briefing required and who provides it, and how these requirements change as risk ratings increase.

      Security training

      Explain security training required prior to travel. This may vary depending on the country’s risk rating. Includes information on training waiver system, including justifications and authorization.

      Traveler profile forms

      Travelers should complete a profile form, which includes personal details, emergency contacts, medical details, social media footprint, and proof-of-life questions (in contexts where there are abduction risks).

      Check-in protocol

      Specifies who travelers must maintain contact with while traveling and how often, as well as the escalation process in case of loss of contact. The frequency of check-ins should reflect the increase in the risk rating for the destination.

      Emergency procedures

      Outlines the organization's emergency procedures for security and medical emergencies.

      3.2.3 Design high-risk travel guidelines

      • Supplement the high-risk travel policies and procedures with guidelines to help international travelers stay safe.
      • The document is intended for an end-user audience and should reflect your organization’s policies and procedures for the use of information and information systems during international travel.
      • Use the Digital Safety Guidelines for International Travel template in concert with this blueprint to provide guidance on what end users can do to stay safe before they leave, during their trip, and when they return.
      • Consider integrating the guidelines into specialized security awareness training sessions that target end users who travel to high-risk jurisdictions.
      • The guidelines should supplement and align with existing technical controls.

      Input

      Output

      • List of high-risk jurisdictions
      • Risk scenarios from Phase 2
      • High-risk travel policy
      • High-risk travel procedure
      • Travel guidelines for high-risk jurisdictions

      Materials

      Participants

      • Whiteboard/flip charts
      • Jurisdictional Risk Register and Heatmap Tool
      • Security team
      • Legal team
      • IT leadership
      • Risk Management

      Download the Digital Safety Guidelines for International Travel template

      Step 3.3

      Mitigate Compliance Risk

      Activities

      3.3.1 Identify data localization obligations

      3.3.2 Integrate obligations into IT system design

      3.3.3 Document data processing activities

      3.3.4 Choose the right mechanism

      3.3.5 Implement the appropriate controls

      3.3.6 Identify data breach notification obligations

      3.3.7 Integrate data breach notification into incident response

      3.3.8 Identify vendor security and data protection requirements

      3.3.9 Build due diligence questionnaire

      3.3.10 Build appropriate data processing agreement

      This step involves the following participants:

      • Security team
      • Risk and Compliance
      • IT leadership (optional)

      Outcomes of this step

      • Prioritize and treat global risks to critical assets based on their value and exposure.

      Compliance risk is a prevalent risk in organizations with a global footprint

      • The legal and regulatory landscape is evolving rapidly to keep step with the pace of technological change. Security and privacy leaders are expected to mitigate the risk of noncompliance as the organization expands to new jurisdictions.
      • Organizations with a global footprint must stay abreast of local regulations and provide risk management guidance to business leaders to support global operations.
      • This sections describes four compliance risks in this context:
        • Cross-border data transfer
        • Third-party risk management
        • Data breach notification
        • Data residency

      Compliance with local obligations

      Likelihood: Medium to High

      Impact: High

      Data Residency

      Gap Controls

      • Identify and document the data localization obligations for the jurisdictions that the organization is operating in.
      • Design and implement IT systems that satisfy the data localization requirements.
      • Comply with data localization obligations within each jurisdiction.

      Heatmap of Global Data Residency Regulations

      The image contains a screenshot of a picture of a world map with various shades of blue to demonstrate the heatmap of global data residency regulations.
      Source: InCountry, 2021

      Examples of Data Residency Requirements

      Country

      Data Type

      Local Storage Requirements

      Australia

      Personal data – heath record

      My Health Records Act 2012

      China

      Personal information — critical information infrastructure operators

      Cybersecurity law

      Government cloud data

      Opinions of the Office of the Central Leading Group for Cyberspace Affairs on Strengthening Cybersecurity Administration of Cloud Computing Services for Communist Party and Government Agencies

      India

      Government email data

      The Public Records Act of 1993

      Indonesia

      Data held by electronic system operator for the public service

      Regulation 82 concerning “Electronic System and Transaction Operation”

      Germany

      Government cloud service data

      Criteria for the procurement and use of cloud services by the federal German administration

      Russia

      Personal data

      The amendments of Data Protection Act No. 152 FZ

      Vietnam

      Data held by internet service providers

      The Decree on Management, Provision, and Use of Internet Services and Information Content Online (Decree 72)

      US

      Government cloud service data

      Defense Federal Acquisition Regulation Supplement: Network Penetration Reporting and Contracting for Cloud Services (DFARS Case 2013-D018)

      3.3.1 Identify data localization obligations

      1-2 hours

      1. Work with your business leaders to identify and document the jurisdictions where your organization is operating in or providing services and products to consumers within.
      2. Work with your legal team to identify and document all relevant data localization obligations for the data your organization generates, collects, and processes in order to operate your business.
      3. Record your data localization obligations in the table below.

      Jurisdiction

      Relevant Regulations

      Local Storage Requirements

      Date Type

      Input

      Output

      • List of jurisdictions your organization is operating in
      • Relevant security and data protection regulations
      • Data inventory and data flows
      • Completed list of data localization obligations

      Materials

      Participants

      • Guidelines for Compliance With Local Security and Privacy Laws Template
      • Privacy team
      • Security team
      • Legal team
      • IT leadership
      • Risk Management

      Download the Guidelines for Compliance With Local Security and Privacy Laws Template

      3.3.2 Integrate obligations into your IT system design

      1-2 hours

      1. Work with your IT department to design the IT architecture and systems to satisfy the data localization requirements.
      2. The table below provides a checklist for integrating privacy considerations into your IT systems.

      Item

      Consideration

      Answer

      Supporting Document

      1

      Have you identified business services that process data that will be subject to localization requirements?

      2

      Have you identified IT systems associated with the business services mentioned above?

      3

      Have you established a data inventory (i.e. data types, business purposes) for the IT systems mentioned above?

      4

      Have you established a data flow diagram for the data identified above?

      5

      Have you identified the types of data that should be stored locally?

      6

      Have you confirmed whether a copy of the data locally stored will satisfy the obligations?

      7

      Have you confirmed whether an IT redesign is needed or whether modifications (e.g. adding a server) to the IT systems would satisfy the obligations?

      8

      Have you confirmed whether access from another jurisdiction is allowed?

      9

      Have you identified how long the data should be stored?

      Input

      Output

      • Data localization obligations
      • Business services that process data that will be subject to localization requirements
      • IT systems associated with business services
      • Data inventory and data flows
      • Completed checklist of localization obligations for IT system design

      Materials

      Participants

      • Guidelines for Compliance With Local Security and Privacy Laws Template
      • Privacy team
      • Security team
      • Legal team
      • IT leadership
      • Risk Management

      Download the Guidelines for Compliance With Local Security and Privacy Laws Template

      Compliance with local obligations

      Likelihood: Medium to High

      Impact: High

      Cross-Border Transfer

      Gap Controls

      • Know where you transfer your data.
      • Identify jurisdictions that your organization is operating in and that impose different requirements for the cross-border transfer of personal data.
      • Adopt and implement a proper cross-border data transfer mechanism in accordance with applicable privacy laws and regulations.
      • Re-evaluate at appropriate intervals.

      Which cross-border transfer mechanism should I choose?

      Transfer Mechanism

      Advantages

      Disadvantages

      Standard Contractual Clauses (SCC)

      • Easy to implement
      • No DPA (data processing agreement) approval
      • Not suitable for complex data transfers
      • Do not meet business agility
      • Needs legal solution

      Binding Corporate Rules (BCRs)

      • Meets business agility needs
      • Raises trust in the organization
      • Doubles as solution for art. 24/25 of the GDPR
      • Sets high compliance maturity level
      • Takes time to draft/implement
      • Requires DPA approval (scrutiny)
      • Requires culture of compliance
      • Approved by one "lead" authority and two other "co-lead“ authorities
      • Takes usually between six and nine months for the approval process only

      Code of Conduct

      • Raises trust in the sector
      • Self-regulation instead of law
      • No code of conduct approved yet
      • Takes time to draft/implement
      • Requires DPA approval and culture of compliance
      • Needs of organization may not be met

      Certification

      • Raises trust in the organization
      • No certification schemes available yet
      • Risk of compliance at minimum necessary
      • Requires audits

      Consent

      • Legal certainty
      • Transparent
      • Administrative burden
      • Some data subjects are incapable of consenting all or nothing

      3.3.3 Document data processing activities

      1-2 hours

      1. Identify and document the following information:
        • Name of business process
        • Purposes of processing
        • Lawful basis
        • Categories of data subjects and personal data
        • Data subject categories
        • Which system the data resides in
        • Recipient categories
        • Third country/international organization
        • Documents for appropriate safeguards for international transfer (adequacy, SCCs, BCRs, etc.)
        • Description of mitigating measures

      Input

      Output

      • Name of business process
      • Categories of personal data
      • Which system the data resides
      • Third country/international organization
      • Documents for appropriate safeguards for international transfer
      • Completed list of data processing activities

      Materials

      Participants

      • Guidelines for Compliance With Local Security and Privacy Laws Template
      • Privacy team
      • Security team
      • Legal team
      • IT leadership
      • Risk Management

      Download the Guidelines for Compliance With Local Security and Privacy Laws Template

      3.3.4 Choose the right mechanism

      1-2 hours

      1. Identify jurisdictions that your organization is operating in and that impose different requirements for the cross-border transfer of personal data. For example, the EU’s GDPR and China’s Personal Information Protection Law require proper cross-border transfer mechanisms before the data transfers. Your organization should decide which cross-border transfer mechanism is the best fit for your cross-border data transfer scenarios.
      2. Use the following table to identify and document the pros and cons of each data transfer mechanism and the final decision.

      Data Transfer Mechanism

      Pros

      Cons

      Final Decision

      SCC

      BCR

      Code of Conduct

      Certification

      Consent

      Input

      Output

      • List of relevant data transfer mechanisms
      • Assessment of the pros and cons of each mechanism
      • Final decision regarding which data transfer mechanism is the best fit for your organization

      Materials

      Participants

      • Guidelines for Compliance With Local Security and Privacy Laws Template
      • Privacy team
      • Security team
      • Legal team
      • IT leadership
      • Risk Management

      Download the Guidelines for Compliance With Local Security and Privacy Laws Template

      3.3.5 Implement the appropriate controls

      1-3 hours

      • One of the most common mechanisms is standard contractual clauses (SCCs).
      • Use Info-Tech’s Standard Contractual Clauses Template to facilitate your cross-border transfer activities.
      • Identify and check whether the following core components are covered in your SCC and record the results in the table below.
      # Core Components Status Note
      1 Purpose and scope
      2 Effect and invariability of the Clauses
      3 Description of the transfer(s)
      4 Data protection safeguards
      5 Purpose limitation
      6 Transparency
      7 Accuracy and data minimization
      8 Duration of processing and erasure or return of data
      9 Storage limitation
      10 Security of processing
      11 Sensitive data
      12 Onward transfers
      13 Processing under the authority of the data importer
      14 Documentation and compliance
      15 Use of subprocessors
      16 Data subject rights
      17 Redress
      18 Liability
      19 Local laws and practices affecting compliance with the Clauses
      20 Noncompliance with the Clauses and termination
      21 Description of data processing activities, such as list of parties, description of transfer, etc.
      22 Technical and organizational measures
      InputOutput
      • Description of the transfer(s)
      • Duration of processing and erasure or return of data
      • Onward transfers
      • Use of subprocessors
      • Etc.
      • Draft of the standard contractual clauses (SCC)
      MaterialsParticipants
      • Guidelines for Compliance With Local Security and Privacy Laws Template
      • Legal team
      • Privacy team
      • Security team
      • IT leadership
      • Risk Management

      Download the Guidelines for Compliance With Local Security and Privacy Laws Template

      Compliance with local obligations

      Likelihood: High

      Impact: Medium to High

      Data Breach

      Gap Controls

      • Identify jurisdictions that your organization is operating in and that impose different obligations for data breach reporting.
      • Document the notification obligations for various business scenarios, such as controller to DPA, controller to data subject, and processor to controller.
      • Integrate breach notification obligations into security incident response process.

      Examples of Data Breach Notification Obligations

      Location

      Regulation/ Standard

      Reporting Obligation

      EU

      GDPR

      72 hours

      China

      PIPL

      Immediately

      US

      HIPAA

      No later than 60 days

      Canada

      PIPEDA

      As soon as feasible

      Global

      PCI DSS

      • Visa – immediately after breach discovered
      • Mastercard – within 24 hours of discovering breach
      • American Express – immediately after breach discovered

      Summary of US State Data Breach Notification Statutes

      The image contains a graph to show the summary of the US State Data Breach Notification Statutes.

      Source: Davis Wright Tremaine

      3.3.6 Identify data breach notification obligations

      1-2 hours

      1. Identify jurisdictions that your organization is operating in and that impose different obligations for data breach reporting.
      2. Document the notification obligations for various business scenarios, such as controller to DPA, controller to data subject, and processor to controller.
      3. Record your data breach obligations in the table below.
      Region Regulation/Standard Reporting Obligation

      Input

      Output

      • List of regions and jurisdictions your business is operating in
      • List of relevant regulations and standards
      • Documentation of data breach reporting obligations in applicable jurisdictions

      Materials

      Participants

      • Guidelines for Compliance With Local Security and Privacy Laws Template
      • Legal team
      • Privacy team
      • Security team
      • IT leadership
      • Risk Management

      Download the Guidelines for Compliance With Local Security and Privacy Laws Template

      3.3.7 Integrate data breach notification into incident response

      1-2 hours

      • Integrate breach notification obligations into the security incident response process. Understand the security incident management framework.
      • All incident runbooks follow the same process: detection, analysis, containment, eradication, recovery, and post-incident activity.
      • The table below provides a basic checklist for you to consider when implementing your data breach and incident handling process.
      # Phase Considerations Status Notes
      1 Prepare Ensure the appropriate resources are available to best handle an incident.
      2 Detect Leverage monitoring controls to actively detect threats.
      3 Analyze Distill real events from false positives.
      4 Contain Isolate the threat before it can cause additional damage.
      5 Eradicate Eliminate the threat from your operating environment.
      6 Recover Restore impacted systems to a normal state of operations.
      7 Report Report data breaches to relevant regulators and data subjects if required.
      8 Post-Incident Activities Conduct a lessons-learned post-mortem analysis.
      InputOutput
      • Security and data protection incident response steps
      • Key considerations for integrating data breach notifications into incident response
      • Data breach notifications integrated into the incident response process
      MaterialsParticipants
      • Guidelines for Compliance With Local Security and Privacy Laws Template
      • Security team
      • Privacy team
      • Legal team
      • IT leadership
      • Risk Management

      Download the Guidelines for Compliance With Local Security and Privacy Laws Template

      Compliance with local obligations

      Likelihood: High

      Impact: Medium to High

      Third-Party Risk

      Gap Controls

      • Build an end-to-end third-party security and privacy risk management process.
      • Perform internal due diligence prior to selecting a service provider.
      • Stipulate the security and privacy protection obligations of the third party in a legally binding document such as contract or data processing agreement, etc.

      End-to-End Third-Party Security and Privacy Risk Management

      1. Pre-Contract
      • Due diligence check
    • Signing of Contract
      • Data processing agreement
    • Post-Contract
      • Continuous monitoring
      • Regular check or audit
    • Termination of Contract
      • Data deletion
      • Access deprovisioning

      Examples of Vendor Security Management Requirements

      Region

      Law/Standard

      Section

      EU

      General Data Protection Regulation (GDPR)

      Article 28 (1)

      Article 46 (1)

      US

      Health Insurance Portability and Accountability Act (HIPAA)

      §164.308(b)(1)

      US

      New York Department of Financial Services Cybersecurity Requirements

      500.11(a)

      Global

      ISO 27002:2013

      15.1.1

      15.1.2

      15.1.3

      15.2.1

      15.2.2

      US

      NIST 800-53

      SA-12

      SA-12 (2)

      US

      NIST Cybersecurity Framework

      ID-SC-1

      ID-SC-2

      ID-SC-3

      ID-SC-4

      Canada

      OSFI Cybersecurity Guidelines

      4.25

      4.26

      3.3.8 Identify vendor security and data protection requirements

      1-2 hours

      • Effective vendor security risk management is an end-to-end process that includes assessment, risk mitigation, and periodic reassessments.
      • An efficient and effective assessment process can only be achieved when all stakeholders are participating.
      • Identify and document your vendor security and data protection requirements in the table below.
      Region Law/Standard Section Requirements

      Input

      Output

      • List of regions and jurisdictions your business is operating in
      • List of relevant regulations and standards
      • Documentation of vendor security and data protection obligations in applicable jurisdictions

      Materials

      Participants

      • Guidelines for Compliance With Local Security and Privacy Laws Template
      • Legal team
      • Privacy team
      • Security team
      • IT leadership
      • Risk Management

      Download the Guidelines for Compliance With Local Security and Privacy Laws Template

      3.3.9 Build due diligence questionnaire

      1-2 hours

      Perform internal due diligence prior to selecting a service provider.

      1. Build and right-size your vendor security questionnaire by leveraging Info-Tech’s Vendor Security Questionnaire template.
      2. Document your vendor security questionnaire in the table below.
      # Question Vendor Request Vendor Comments
      1 Document Requests
      2 Asset Management
      3 Governance
      4 Supply Chain Risk Management
      5 Identify Management, Authentication, and Access Control
      InputOutput
      • List of regions and jurisdictions your business is operating in
      • List of relevant regulations and standards
      • Business security and data protection requirements and expectations
      • Draft of due diligence questionnaire
      MaterialsParticipants
      • Guidelines for Compliance With Local Security and Privacy Laws Template
      • Legal team
      • Privacy team
      • Security team
      • IT leadership
      • Risk Management

      Download the Guidelines for Compliance With Local Security and Privacy Laws Template

      3.3.10 Build appropriate data processing agreement

      1-2 hours

      1. Stipulate the security and privacy protection obligations of the third party in a legally binding document such as contract or data processing agreement, etc.
      2. Leverage Info-Tech’s Data Processing Agreement Template to put the language into your legally binding document.
      3. Use the table below to check whether core components of a typical DPA are covered in your document.
      # Core Components Status Note
      1 Processing of personal data
      2 Scope of application and responsibilities
      3 Processor's obligations
      4

      Controller's obligations

      5 Data subject requests
      6 Right to audit and inspection
      7 Subprocessing
      8 Data breach management
      9 Security controls
      10 Transfer of personal data
      11 Duty of confidentiality
      12 Compliance with applicable laws
      13 Service termination
      14 Liability and damages
      InputOutput
      • Processing of personal data
      • Processor’s obligations
      • Controller’s obligations
      • Subprocessing
      • Etc.
      • Draft of data processing agreement (DPA)
      MaterialsParticipants
      • Guidelines for Compliance With Local Security and Privacy Laws Template
      • Legal team
      • Privacy team
      • Security team
      • IT leadership
      • Risk Management

      Download the Guidelines for Compliance With Local Security and Privacy Laws Template

      Summary of Accomplishment

      Problem Solved

      By following Info-Tech’s methodology for securing global operations, you have:

      • Evaluated the security context of your organization’s global operations.
      • Identified security risks scenarios unique to high-risk jurisdictions and assessed the exposure of critical assets.
      • Planned and executed a response.

      You have gone through a deeper analysis of two key risk scenarios that affect global operations:

      • Travel to high-risk jurisdictions.
      • Compliance risk.

      If you would like additional support, have our analysts guide you through an Info-Tech workshop or Guided Implementation.

      Contact your account representative for more information.

      workshop@infotech.com

      1-888-670-8889

      Additional Support

      If you would like additional support, have our analysts guide you through other phases as part of an Info-Tech Workshop.

      The image contains a picture of Michel Hebert.

      Contact your account representative for more information.

      workshops@infotech.com 1-888-670-8889

      To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team. Info-Tech analysts will join you and your team at your location or welcome you to Info-Tech’s historic Toronto office to participate in an innovative onsite workshop.

      The following are sample activities that will be conducted by Info-Tech analysts with your team:

      The image contains a screenshot of High-Risk Travel Jurisdictions.

      Identify High-Risk Jurisdictions

      Develop requirements to identify high-risk jurisdictions.

      The image contains a screenshot of Build Risk Scenarios.

      Build Risk Scenarios

      Build risk scenarios to capture assets, vulnerabilities, threats, and the potential effect of a compromise.

      External Research Contributors

      Ken Muir

      CISO

      LMC Security

      Premchand Kurup

      CEO

      Paramount Computer Systems

      Preeti Dhawan

      Manager, Security Governance

      Payments Canada

      Scott Wiggins

      Information Risk and Governance

      CDPHP

      Fritz Y. Jean Louis

      CISO

      Globe and Mail

      Eric Gervais

      CIO

      Ovivo Water

      David Morrish

      CEO

      MBS Techservices

      Evan Garland

      Manager, IT Security

      Camosun College

      Jacopo Fumagalli

      CISO

      Axpo

      Dennis Leon

      Governance and Security Manager

      CPA Canada

      Tero Lehtinen

      CIO

      Planmeca Oy

      Related Info-Tech Research

      Build an IT Risk Management Program

      • Build a program to identify, evaluate, assess, and treat IT risks.
      • Monitor and communicate risks effectively to support business decision making.

      Combine Security Risk Management Components Into One Program

      • Develop a program focused on assessing and managing information system risks.
      • Build a governance structure that integrates security risks within the organization’s broader approach to risk management.

      Build an Information Security Strategy

      • Build a holistic, risk-aware strategy that aligns to business goals.
      • Develop a roadmap of prioritized initiatives to implement the strategy over 18 to 36 months.

      Bibliography

      2022 Cost of Insider Threats Global Report.” Ponemon Institute, NOVIPRO, 9 Feb. 2022. Accessed 25 May 22.

      “Allianz Risk Barometer 2022.” Allianz Global Corporate & Specialty, Jan. 2022. Accessed 25 May 22.

      Bickley, Shaun. “Security Risk Management: a basic guide for smaller NGOs”. European Interagency Security Forum (EISF), 2017. Web.

      “Biden Administration Warns against spyware targeting dissidents.” New York Times, 7 Jan 22. Accessed 20 Jan 2022.

      Boehm, Jim, et al. “The risk-based approach to cybersecurity.” McKinsey & Company, October 2019. Web.

      “Cost of a Data Breach Report 2021.” IBM Security, July 2021. Web.

      “Cyber Risk in Asia-Pacific: The Case for Greater Transparency.” Marsh & McLennan Companies, 2017. Web.

      “Cyber Risk Index.” NordVPN, 2020. Accessed 25 May 22

      Dawson, Maurice. “Applying a holistic cybersecurity framework for global IT organizations.” Business Information Review, vol. 35, no. 2, 2018, pp. 60-67.

      “Framework for improving critical infrastructure cybersecurity.” National Institute of Standards and Technology, 16 Apr 2018. Web.

      “Global Cybersecurity Index 2020.” International Telecommunication Union (ITU), 2021. Accessed 25 May 22.

      “Global Risk Survey 2022.” Control Risks, 2022. Accessed 25 May 22.

      “International Travel Guidance for Government Mobile Devices.” Federal Mobility Group (FMG), Aug. 2021. Accessed 18 Nov 2021.

      Kaffenberger, Lincoln, and Emanuel Kopp. “Cyber Risk Scenarios, the Financial System, and Systemic Risk Assessment.” Carnegie Endowment for International Peace, September 2019. Accessed 11 Jan 2022.

      Koehler, Thomas R. Understanding Cyber Risk. Routledge, 2018.

      Owens, Brian. “Cybersecurity for the travelling scientist.” Nature, vol. 548, 3 Aug 2017. Accessed 19 Jan. 2022.

      Parsons, Fintan J., et al. “Cybersecurity risks and recommendations for international travellers.” Journal of Travel Medicine, vol. 1, no. 4, 2021. Accessed 19 Jan 2022.

      Quinn, Stephen, et al. “Identifying and estimating cybersecurity risk for enterprise risk management.” National Institute of Standards and Technology (NIST), Interagency or Internal Report (IR) 8286A, Nov. 2021.

      Quinn, Stephen, et al. “Prioritizing cybersecurity risk for enterprise risk management.” NIST, IR 8286B, Sept. 2021.

      “Remaining cyber safe while travelling security recommendations.” Government of Canada, 27 April 2022. Accessed 31 Jan 2022.

      Stine, Kevin, et al. “Integrating cybersecurity and enterprise risk management.” NIST, IR 8286, Oct. 2020.

      Tammineedi, Rama. “Integrating KRIs and KPIs for effective technology risk management.” ISACA Journal, vol. 4, 1 July 2018.

      Tikk, Eneken, and Mika Kerttunen, editors. Routledge Handbook of International Cybersecurity. Routledge, 2020.

      Voo, Julia, et al. “National Cyber Power Index 2020.” Belfer Center for Science and International Affairs, Harvard Kennedy School, Sept. 2020. Web.

      Zhang, Fang. “Navigating cybersecurity risks in international trade.” Harvard Business Review, Dec 2021. Accessed 31 Jan 22.

      Appendix

      Insider Threat

      Key Risk Scenario

      Likelihood: Medium to High

      Impact: High

      Gap Controls

      The image contains a picture of the Gap Controls. The controls include: Policy and Awareness, Identification, Monitoring and Visibility, which leads to Cooperation.

      • Identification: Effective and efficient management of insider threats begins with a threat and risk assessment to establish which assets and which employees to consider, especially in jurisdictions associated with sensitive or critical data. You need to pay extra attention to employees who are working in satellite offices in jurisdictions with loose security and privacy laws.
      • Monitoring and Visibility: Organizations should monitor critical assets and groups with privileged access to defend against malicious behavior. Implement an insider threat management platform that provides your organization with the visibility and context into data movement, especially cross-border transfers that might cause security and privacy breaches.
      • Policy and Awareness Training: Insider threats will persist without appropriate action and culture change. Training and consistent communication of best practices will mitigate vulnerabilities to accidental or negligent attacks. Customized training materials using local languages and role-based case studies might be needed for employees in high-risk jurisdictions.
      • Cooperation: An effective insider threat management program should be built with cross-team functions such as Security, IT, Compliance and Legal, etc.

      For more holistic approach, you can leverage our Reduce and Manage Your Organization’s Insider Threat Risk blueprint.

      Info-Tech Insight

      You can’t just throw tools at a human problem. While organizations should monitor critical assets and groups with privileged access to defend against malicious behavior, good management and supervision can help detect attacks and prevent them from happening in the first place.

      Insider threats are not industry specific, but malicious insiders are

      Industry

      Actors

      Risks

      Tactics

      Motives

      State and Local Government

      • Full-time employees
      • Current employees
      • Privileged access to personally identifiable information, financial assets, and physical property
      • Abuse of privileged access
      • Received or transferred fraudulent funds
      • Financial gain
      • Recognition
      • Benefiting foreign entity

      Information Technology

      • Equal mix of former and current employees
      • Privileged access to networks or systems as well as data
      • Highly technical attacks
      • Received or transferred fraudulent funds
      • Revenge
      • Financial gain

      Healthcare

      • Majority were full-time and current employees
      • Privileged access to customer data with personally identifiable information, financial assets
      • Abuse of privileged access
      • Received or transferred fraudulent funds
      • Financial gain
      • Entitlement

      Finance and Insurance

      • Majority were full-time and current employees
      • Authorized users
      • Electronic financial assets
      • Privileged access to customer data
      • Created or used fraudulent accounts
      • Fraudulent purchases
      • Identity theft
      • Financial gain
      • Gambling addiction
      • Family pressures
      • Multiple motivations

      Source: Carnegie Mellon University Software Engineering Institute, 2019

      Advanced Persistent Threat

      Key Risk Scenario #4

      Likelihood: Medium to High

      Impact: High

      Gap Controls

      The image contains a screenshot of the Gap Controls listed: Prevent, Detect, Analyze, Respond.

      Prevent: Defense in depth is the best approach to protect against unknown and unpredictable attacks. Effective anti-malware, diligent patching and vulnerability management, and strong human-centric security are essential.

      Detect: There are two types of companies – those who have been breached and know it, and those who have been breached and don’t know it. Ensure that monitoring, logging, and event detection tools are in place and appropriate to your organizational needs.

      Analyze: Raw data without interpretation cannot improve security and is a waste of time, money, and effort. Establish a tiered operational process that not only enriches data but also provides visibility into your threat landscape.

      Respond: Organizations can’t rely on ad hoc response anymore – don’t wait until a state of panic. Formalize your response processes in a detailed incident runbook to reduce incident remediation time and effort.

      Best practices moving forward

      Defense in Depth

      Lock down your organization. Among other tactics, control administrative privileges, leverage threat intelligence, use IP whitelisting, adopt endpoint protection and two-factor authentication, and formalize incident response measures.

      Block Indicators

      Information alone is not actionable. A successful threat intelligence program contextualizes threat data, aligns intelligence with business objectives, and then builds processes to satisfy those objectives. Actively block indicators and act upon gathered intelligence.

      Drive Adoption

      Create organizational situational awareness around security initiatives to drive adoption of foundational security measures: network hardening, threat intelligence, red-teaming exercises, and zero-day mitigation, policies, and procedures.

      Supply Chain Security

      Security extends beyond your organization. Ensure your organization has a comprehensive view of your organizational threat landscape and a clear understanding of the security posture of any managed service providers in your supply chain.

      Awareness and Training

      Conduct security awareness and training. Teach end users how to recognize current cyberattacks before they fall victim – this is a mandatory first line of defense.

      Additional Resources

      Follow only official sources of information to help you assess risk

      The image contains an image highlighting a few additional resources.

      As misinformation is a major attack vector for malicious actors, follow only reliable sources for cyberalerts and actionable intelligence. Aggregate information from these reliable sources.

      Federal Cyber Agency Alerts

      Informational Resources

      Info-Tech Insight

      The CISA Shields Up site provides the latest cyber risk updates on the Russia-Ukraine conflict and should provide the most value in staying informed.

      Secure IT-OT Convergence

      • Buy Link or Shortcode: {j2store}382|cart{/j2store}
      • member rating overall impact: 9.0/10 Overall Impact
      • member rating average dollars saved: $10,499 Average $ Saved
      • member rating average days saved: 19 Average Days Saved
      • Parent Category Name: Security Processes & Operations
      • Parent Category Link: /security-processes-and-operations

      IT and OT are both very different complex systems. However, significant benefits have driven OT to be converged to IT. This results in IT security leaders, OT leaders and their teams' facing challenges in:

      • Governing and managing IT and OT security and accountabilities.
      • Converging security architecture and controls between IT and OT environments.
      • Compliance with regulations and standards.
      • Metrics for OT security effectiveness and efficiency.

      Our Advice

      Critical Insight

      • Returning to isolated OT is not beneficial for the organization, therefore IT and OT need to learn to collaborate starting with communication to build trust and to overcome differences between IT and OT. Next, negotiation is needed on components such as governance and management, security controls on OT environments, compliance with regulations and standards, and metrics for OT security.
      • Most OT incidents start with attacks against IT networks and then move laterally into the OT environment. Therefore, converging IT and OT security will help protect the entire organization.
      • OT interfaces with the physical world while IT system concerns more on cyber world. Thus, the two systems have different properties. The challenge is how to create strategic collaboration between IT-OT based on negotiation and this needs top-down support.

      Impact and Result

      Info-Tech’s approach in preparing for IT/OT convergence in the planning phase is coordination and collaboration of IT and OT to

      • initiate communication to define roles and responsibilities.
      • establish governance and build cross-functional team.
      • identify convergence components and compliance obligations.
      • assess readiness.

      Secure IT/OT Convergence Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Secure IT/OT Convergence Storyboard – A step-by-step document that walks you through how to secure IT-OT convergence.

      Info-Tech provides a three-phase framework of secure IT/OT convergence, namely Plan, Enhance, and Monitor & Optimize. The essential steps in Plan are to:

    • Initiate communication to define roles and responsibilities.
    • Establish governance and build a cross-functional team.
    • Identify convergence components and compliance obligations.
    • Assess readiness.
      • Secure IT/OT Convergence Storyboard

      2. Secure IT/OT Convergence Requirements Gathering Tool – A tool to map organizational goals to secure IT-OT goals.

      This tool serves as a repository for information about the organization, compliance, and other factors that will influence your IT/OT convergence.

      • Secure IT/OT Convergence Requirements Gathering Tool

      3. Secure IT/OT Convergence RACI Chart Tool – A tool to identify and understand the owners of various IT/OT convergence across the organization.

      A critical step in secure IT/OT convergence is populating a RACI (Responsible, Accountable, Consulted, and Informed) chart. The chart assists you in organizing roles for carrying out convergence steps and ensures that there are definite roles that different individuals in the organization must have. Complete this tool to assign tasks to suitable roles.

      • Secure IT/OT Convergence RACI Chart Tool
      [infographic]

      Further reading

      Secure IT/OT Convergence

      Create a holistic IT/OT security culture.

      Analyst Perspective

      Are you ready for secure IT/OT convergence?

      IT/OT convergence is less of a convergence and more of a migration. The previously entirely separate OT ecosystem is migrating into the IT ecosystem, primarily to improve access via connectivity and to leverage other standard IT capabilities for economic benefit.

      In the past, OT systems were engineered to be air gapped, relying on physical protection and with little or no security in design, (e.g. OT protocols without confidentiality properties). However, now, OT has become dependent on the IT capabilities of the organization, thus OT inherits IT’s security issues, that is, OT is becoming more vulnerable to attack from outside the system. IT/OT convergence is complex because the culture, policies, and rules of IT are quite foreign to OT processes such as change management, and the culture, policies, and rules of OT are likewise foreign to IT processes.

      A secure IT/OT convergence can be conceived of as a negotiation of a strong treaty between two systems: IT and OT. The essential initial step is to begin with communication between IT and OT, followed by necessary components such as governing and managing OT security priorities and accountabilities, converging security controls between IT and OT environments, assuring compliance with regulations and standards, and establishing metrics for OT security.

      Photo of Ida Siahaan, Research Director, Security and Privacy Practice, Info-Tech Research Group. Ida Siahaan
      Research Director, Security and Privacy Practice
      Info-Tech Research Group

      Executive Summary

      Your Challenge

      IT and OT are both very different complex systems. However, significant benefits have driven OT to converge with IT. This results in IT security leaders, OT leaders, and their teams facing challenges with:

      • Governing and managing IT and OT security and accountabilities.
      • Converging security architecture and controls between IT and OT environments.
      • Compliance with regulations and standards.
      • Metrics for OT security effectiveness and efficiency.
      Common Obstacles
      • IT/OT network segmentation and remote access issues, as most OT incidents indicate that the attackers gained access through the IT network, followed by infiltration into OT networks.
      • OT proprietary devices and unsecure protocols use outdated systems which may be insecure by design.
      • Different requirements of OT and IT security – i.e. IT (confidentiality, integrity, and availability) vs. OT (safety, reliability, and availability).
      Info-Tech’s Approach

      Info-Tech’s approach in preparing for IT/OT convergence (i.e. the Plan phase) is coordination and collaboration of IT and OT to:

      • Initiate communication to define roles and responsibilities.
      • Establish governance and build a cross-functional team.
      • Identify convergence components and compliance obligations.
      • Assess readiness.

      Info-Tech Insight

      Returning to isolated OT is not beneficial for the organization, so IT and OT need to learn to collaborate, starting with communication to build trust and to overcome their differences. Next, negotiation is needed on components such as governance and management, security controls on OT environments, compliance with regulations and standards, and establishing metrics for OT security.

      Consequences of unsecure IT/OT convergence

      OT systems were built with no or little security design

      90% of organizations that use OT experienced a security incident. (Fortinet, 2021. Ponemon, 2019.)

      Bar graph comparing three years, 2019-2021, of four different OT security incidents: 'Ransomeware', 'Insider breaches', 'Phishing', and 'Malware'.
      (Source: Fortinet, 2021.)
      Lack of visibility

      86% of OT security-related service engagements lack complete visibility of OT network in 2021 (90% in 2020, 81% in 2019). (Source: “Cybersecurity Year In Review” Dragos, 2022.)

      The need for secure IT/OT convergence

      Important Industrial Control System (ICS) cyber incidents

      2000
      Target: Australian sewage plant. Method: Insider attack. Impact: 265,000 gallons of untreated sewage released.
      2012
      Target: Middle East energy companies. Method: Shamoon. Impact: Overwritten Windows-based systems files.
      2014
      Target: German Steel Mill. Method: Spear-phishing. Impact: Blast furnace failed to shut down.
      2017
      Target: Middle East safety instrumented system (SIS). Method: TRISIS/TRITON. Impact: Modified SIS ladder logic.
      2022
      Target: Viasat’s KA-SAT network. Method: AcidRain. Impact: Significant loss of communication for the Ukrainian military, which relied on Viasat’s services.
      Timeline of Important Industrial Control System (ICS) cyber incidents.
      1903
      Target: Marconi wireless telegraph presentation. Method: Morse code. Impact: Fake message sent “Rats, rats, rats, rats. There was a young fellow of Italy, Who diddled the public quite prettily.”
      2010
      Target: Iranian uranium enrichment plant. Method: Stuxnet. Impact: Compromised programmable logic controllers (PLCs).
      2013
      Target: ICS supply chain. Method: Havex. Impact: Remote Access Trojan (RAT) collected information and uploaded data to command-and-control (C&C) servers
      2016
      Target: Ukrainian power grid. Method: BlackEnergy. Impact: For 1-6 hours, power outages for 230,000 consumers.
      2021
      Target: Colonial Pipeline. Method: DarkSide ransomware. Impact: Compromised billing infrastructure halted the pipeline operation.

      (Source: US Department of Energy, 2018.


      ”Significant Cyber Incidents,” CSIS, 2022


      MIT Technology Review, 2022.)

      Info-Tech Insight

      Most OT incidents start with attacks against IT networks and then move laterally into the OT environment. Therefore, converging IT and OT security will help protect the entire organization.

      Case Study

      Horizon Power
      Logo for Horizon Power.
      INDUSTRY
      Utilities
      SOURCE
      Interview

      Horizon Power is the regional power provider in Western Australia and stands out as a leader not only in the innovative delivery of sustainable power, but also in digital transformation. Horizon Power is quite mature in distributed energy resource management; moving away from centralized generation to decentralized, community-led generation, which reflects in its maturity in converging IT and OT.

      Horizon Power’s IT/OT convergence journey started over six years ago when advanced metering infrastructure (AMI) was installed across its entire service area – an area covering more than one quarter of the Australian continent.

      In these early days of the journey, the focus was on leveraging matured IT approaches such as adoption of cloud services to the OT environment, rather than converging the two. Many years later, Horizon Power has enabled OT data to be more accessible to derive business benefits such as customer usage data using data analytics with the objective of improving the collection and management of the OT data to improve business performance and decision making.

      The IT/OT convergence meets legislation such as the Australian Energy Sector Cyber Security Framework (AESCSF), which has impacts on the architectural layer of cybersecurity that support delivery of the site services.

      Results

      The lessons learned in converging IT and OT from Horizon Power were:

      • Start with forming relationships to build trust and overcome any divide between IT and OT.
      • Collaborate with IT and OT teams to successfully implement solutions, such as vulnerability management and discovery tools for OT assets.
      • Switch the focus from confidentiality and integrity to availability in solutions evaluation
      • Develop training and awareness programs for all levels of the organization.
      • Actively encourage visible sponsorship across management by providing regular updates and consistent messaging.
      • Monitor cybersecurity metrics such as vulnerabilities, mean time to treat vulnerabilities, and intrusion attempts.
      • Manage third-party vendors using a platform which not only performs external monitoring but provides third-party vendors with visibility or potential threats in their organization.

      The Secure IT/OT Convergence Framework

      IT/OT convergence is less of a convergence and more of a migration. The previously entirely separate OT ecosystem is migrating onto the IT ecosystem, to improve access via the internet and to leverage other standard IT capabilities. However, IT and OT are historically very different, and without careful calculation, simply connecting the two systems will result in a problem. Therefore, IT and OT need to learn to live together starting with communication to build trust and to overcome differences between IT and OT.
      Convergence Elements
      • Process convergence
      • Software and data convergence
      • Network and infrastructure convergence
      Target Groups
      • OT leader and teams
      • IT leader and teams
      • Security leader and teams
      Security Components
      • Governance and compliance
      • Security strategy
      • Risk management
      • Security policies
      • IR, DR, BCP
      • Security awareness and training
      • Security architecture and controls

      Plan

      • Initiate communication
      • Define roles and responsibilities
      • Establish governance and build a cross-functional team
      • Identify convergence elements and compliance obligations
      • Assess readiness

      Governance

      Compliance

      Enhance

      • Update security strategy for IT/OT convergence
      • Update risk-management framework for IT/OT convergence
      • Update security policies and procedures for IT/OT convergence
      • Update incident response, disaster recovery, and business continuity plan for IT/OT convergence

      Security strategy

      Risk management

      Security policies and procedures

      IR, DR, and BCP

      Monitor &
      Optimize

      • Implement awareness, induction, and cross-training program
      • Design and deploy converging security architecture and controls
      • Establish and monitor IT/OT security metrics on effectiveness and efficiency
      • Red-team followed by blue-team activity for cross-functional team building

      Awareness and cross-training

      Architecture and controls

      Phases
      Color-coded phases with arrows looping back up from the bottom to top phase.
      • Plan
      • Enhance
      • Monitor & Optimize
      Plan Outcomes
      • Mapping business goals to IT/OT security goals
      • RACI chart for priorities and accountabilities
      • Compliance obligations register
      • Readiness checklist
      Enhance Outcomes
      • Security strategy for IT/OT convergence
      • Risk management framework
      • Security policies & procedures
      • IR, DR, BCP
      Monitor & Optimize Outcomes
      • Security awareness and training
      • Security architecture and controls
      Plan Benefits
      • Improved flexibility and less divided IT/OT
      • Improved compliance
      Enhance Benefits
      • Increased strategic common goals
      • Increased efficiency and versatility
      Monitor & Optimize Benefits
      • Enhanced security
      • Reduced costs

      Plan

      Initiate communication

      To initiate communication between the IT and OT teams, it is important to understand how the two groups are different and to build trust to find a holistic approach which overcomes those differences.
      IT OT
      Remote Access Well-defined access control Usually single-level access control
      Interfaces Human Machine, equipment
      Software ERP, CRM, HRIS, payroll SCADA, DCS
      Hardware Servers, switches, PCs PLC, HMI, sensors, motors
      Networks Ethernet Fieldbus
      Focus Reporting, communication Up-time, precision, safety
      Change management Frequent updates and patches Infrequent updates and patches
      Security Confidentiality, integrity, availability Safety, reliability, availability
      Time requirement Normally not time critical Real time

      Info-Tech Insight

      OT interfaces with the physical world while IT system concerns more on cyber world. Thus, the two systems have different properties. The challenge is how to create strategic collaboration between IT and OT based on negotiation, and this needs top-down support.

      Identifying organization goals is the first step in aligning your secure IT/OT convergence with your organization’s vision.

      • Security leaders need to understand the direction the organization is headed in.
      • Wise security investments depend on aligning your security initiatives to the organization.
      • Secure IT/OT convergence should contribute to your organization’s objectives by supporting operational performance and ensuring brand protection and shareholder value.

      Map organizational goals to IT/OT security goals

      Input: Corporate, IT, and OT strategies

      Output: Your goals for the security strategy

      Materials: Secure IT/OT Convergence Requirements Gathering Tool

      Participants: Executive leadership, OT leader, IT leader, Security leader, Compliance, Legal, Risk management

      1. As a group, brainstorm organization goals.
        1. Review relevant corporate, IT, and OT strategies.
      2. Record the most important business goals in the Secure IT/OT Convergence Requirements Gathering Tool. Try to limit the number of business goals to no more than 10 goals. This limitation will be critical to helping focus on your secure IT/OT convergence.
      3. For each goal, identify one to two security alignment goals. These should be objectives for the security strategy that will support the identified organization goals.

      Download the Secure IT/OT Convergence Requirements Gathering Tool

      Record organizational goals

      Sample of the definitions table with columns numbered 1-4.

      Refer to the Secure IT/OT Convergence Framework when filling in the following elements.

      1. Record your identified organization goals in the Goals Cascade tab of the Secure IT/OT Convergence Requirements Gathering Tool.
      2. For each of your organizational goals, identify IT alignment goals.
      3. For each of your organizational goals, identify OT alignment goals.
      4. For each of your organizational goals, select one to two IT/OT security alignment goals from the drop-down lists.

      Establish scope and boundaries

      It is important to know at the outset of the strategy: What are we trying to secure in IT/OT convergence ?
      This includes physical areas we are responsible for, types of data we care about, and departments or IT/OT systems we are responsible for.

      This also includes what is not in scope. For some outsourced services or locations, you may not be responsible for their security. In some business departments, you may not have control of security processes. Ensure that it is made explicit at the outset what will be included and what will be excluded from security considerations.

      Physical Scope and Boundaries

      • How many offices and locations does your organization have?
      • Which locations/offices will be covered by your information security management system (ISMS)?
      • How sensitive is the data residing at each location?
      • You may have many physical locations, and it is not necessary to list each one. Rather, list exceptional cases that are specifically in or out of scope.

      IT Systems Scope and Boundaries

      • There may be hundreds of applications that are run and maintained in your organization. Some of these may be legacy applications. Do you need to secure all your programs or only a select few?
      • Is the system owned or outsourced?
      • Where are you accountable for security?
      • How sensitive is the data that each system handles?

      Organizational Scope and Boundaries

      • Will your ISMS cover all departments within your organization? For example, do certain departments (e.g. operations) not need any security coverage?
      • Do you have the ability to make security decisions for each department?
      • Who are the key stakeholders/data owners for each department?

      OT Systems Scope and Boundaries

      • There may be hundreds of OT systems that are run and maintained in your organization. Do you need to secure all OT or a select subset?
      • Is the system owned or outsourced?
      • Where are you accountable for safety and security?
      • What reliability requirements does each system handle?

      Record scope and boundaries

      Sample Scope and Boundaries table. Refer to the Secure IT/OT Convergence Framework when filling in the following elements:
      • Record your security-related organizational scope, physical location scope, IT systems scope, and OT systems scope in the Scope tab of the Secure IT/OT Convergence Requirements Gathering Tool.
      • For each item scoped, give the rationale for including it in the comments column. Careful attention should be paid to any elements that are not in scope.

      Plan

      Define roles and responsibilities

      Input: List of relevant stakeholders

      Output: Roles and responsibilities for the secure IT/OT convergence program

      Materials: Secure IT/OT Convergence RACI Chart Tool

      Participants: Executive leadership, OT leader, IT leader, Security leader

      There are many factors that impact an organization’s level of effectiveness as it relates to IT/OT convergence. How the two groups interact, what skill sets exist, the level of clarity around roles and responsibilities, and the degree of executive support and alignment are only a few. Thus, it is imperative in the planning phase to identify stakeholders who are:

      • Responsible: The people who do the work to accomplish the activity; they have been tasked with completing the activity and/or getting a decision made.
      • Accountable: The person who is accountable for the completion of the activity. Ideally, this is a single person and will often be an executive or program sponsor.
      • Consulted: The people who provide information. This is usually several people, typically called subject matter experts (SMEs).
      • Informed: The people who are updated on progress. These are resources that are affected by the outcome of the activities and need to be kept up to date.

      Download the Secure IT/OT Convergence RACI Chart Tool

      Define RACI Chart

      Sample RACI chart with only the 'Plan' section enlarged.

      Define responsible, accountable, consulted, and informed (RACI) stakeholders.
      1. Customize the "work units" to best reflect your operation with applicable stakeholders.
      2. Customize the "action“ rows as required.
      Info-Tech Insight

      The roles and responsibilities should be clearly defined. For example, IT network should be responsible for the communication and configuration of all access points and devices from the remote client to the control system DMZ, and controls engineering should be responsible from the control system DMZ to the control system.

      Plan

      Establish governance and build cross-functional team

      To establish governance and build an IT/OT cross-functional team, it is important to understand the operation of OT systems and their interactions with IT within the organization, e.g. ad hoc, centralized, decentralized.

      The maturity ladder with levels 'Fully Converged', 'Collaborative Partners', 'Trusted Resources', 'Affiliated Entities', and 'Siloed' at the bottom. Each level has four maturity indicators listed.

      Info-Tech Insight

      To determine IT/OT convergence maturity level, Info-Tech provides the IT/OT Convergence Self-Evaluation Tool.

      Centralized security governance model example

      Example of a centralized security governance model.

      Plan

      Identify convergence elements and compliance obligations

      To switch the focus from confidentiality and integrity to safety and availability for OT system, it is important to have a common language such as the Purdue model for technical communication.
      • A lot of OT compliance standards are technically focused and do not address governance and management, e.g. IT standards like the NIST Cybersecurity Framework. For example, OT system modeling with Purdue model will help IT teams to understand assets, networking, and controls. This understanding is needed to know the possible security solutions and where these solutions could be embedded to the OT system with respect to safety, reliability, and availability.
      • However, deployment of technical solutions or patches to OT system may nullify warranty, so arrangements should be made to manage this with the vendor or manufacturer prior to modification.
      • Finally, OT modernizations such as smart grid together with the advent of IIoT where data flow is becoming less hierarchical have encouraged the birth of a hybrid Purdue model, which maintains segmentation with flexibility for communications.

      Level 5: Enterprise Network

      Level 4: Site Business

      Level 3.5: DMZ
      Example: Patch Management Server, Application Server, Remote Access Server

      Level 3: Site Operations
      Example: SCADA Server, Engineering Workstation, Historian

      Level 2: Area Supervisory Control
      Example: SCADA Client, HMI

      Level 1: Basic Control
      Example: Batch Controls, Discrete Controls, Continuous Process Controls, Safety Controls, e.g. PLCs, RTUs

      Level 0: Process
      Example: Sensors, Actuators, Field Devices

      (Source: “Purdue Enterprise Reference Architecture (PERA) Model,” ISA-99.)

      Identify compliance obligations

      To manage compliance obligations, it is important to use a platform which not only performs internal and external monitoring, but also provides third-party vendors with visibility on potential threats in their organization.
      Example table of compliance obligations standards. Example tables of compliance obligations regulations and guidelines.

      Source:
      ENISA, 2013
      DHS, 2009.

      • OT system has compliance obligations with industry regulations and security standards/regulations/guidelines. See the lists given. The lists are not exhaustive.
      • OT system owner can use the standards/regulations/guidelines as a benchmark to determine and manage the security level provided by third parties.
      • It is important to understand the various frameworks and to adhere to the appropriate compliance obligations, e.g. IEC/ISA 62443 - Security for Industrial Automation and Control Systems Series.

      IEC/ISA 62443 - Security for Industrial Automation and Control Systems Series

      International series of standards for asset owners, system integrators, and product manufacturers.
      Diagram of the international series of standards for asset owners.
      (Source: Cooksley, 2021)
      • IEC/ISA 62443 is a comprehensive international series of standards covering security for ICS systems, which recognizes three roles, namely: asset owner, system integrator, and product manufacturer.
      • In IEC/ISA 62443, requirements flow from the asset owner to the product manufacturer, while solutions flow in the opposite direction.
      • For the asset owner who owns and operates a system, IEC 62443-2 enables defining target security level with reference to a threat level and using the standard as a benchmark to determine the current security level.
      • For the system integrator, IEC 62443-3 assists to evaluate the asset owner’s requirements to create a system design. IEC 62443-3 also provides a method for verification that components provided by the product manufacturer are securely developed and support the functionality required.

      Record your compliance obligations

      Refer to the “Goals Cascade” tab of the Secure IT/OT Convergence Requirements Gathering Tool.
      1. Identify your compliance obligations. Most organizations have compliance obligations that must be adhered to. These can include both mandatory and voluntary obligations. Mandatory obligations include:
        1. Laws
        2. Government regulations
        3. Industry standards
        4. Contractual agreements
        Voluntary obligations include standards that the organization has chosen to follow for best practices and any obligations that are required to maintain certifications. Organizations will have many different compliance obligations. For the purposes of your secure IT/OT convergence, include only those that have OT security requirements.
      2. Record your compliance obligations, along with any notes, in your copy of the Secure IT/OT Convergence Requirements Gathering Tool.
      3. Refer to the “Compliance DB” tab for lists of standards/regulations/guidelines.
      Table of mandatory and voluntary security compliance obligations.

      Plan

      Assess readiness

      Readiness checklist for secure IT/OT convergence

      People

      • Define roles and responsibilities on interaction based on skill sets and the degree of support and alignment.
      • Adopt well-established security governance practices for cross-functional teams.
      • Analyze and develop skills required by implementing awareness, induction, and cross-training program.

      Process

      • Conduct a maturity assessment of key processes and highlight interdependencies.
      • Redesign cybersecurity processes for your secure IT/OT convergence program.
      • Develop a baseline and periodically review on risks, security policies and procedures, incident response, disaster recovery, and business continuity plan.

      Technology

      • Conduct a maturity assessment and identify convergence elements and compliance obligations.
      • Develop a roadmap and deploy converging security architecture and controls step by step, working with trusted technology partners.
      • Monitor security metrics on effectiveness and efficiency and conduct continuous testing by red-team and blue-team activities.

      (Source: “Grid Modernization: Optimize Opportunities And Minimize Risks,” Info-Tech)

      Enhance

      Update security strategy

      To update security strategy, it is important to actively encourage visible sponsorship across management and to provide regular updates.

      Cycle for updating security strategy: 'Architecture design', 'Procurement', 'Installation', 'Maintenance', 'Decommissioning'.
      (Source: NIST SP 800-82 Rev.3, “Guide to Operational Technology (OT) Security,” NIST, 2022.)
      • OT system life cycle is like the IT system life cycle, starting with architectural design and ending with decommissioning.
      • Currently, IT only gets involved from installation or maintenance, so they may not fully understand the OT system. Therefore, if OT security is compromised, the same personnel who commissioned the OT system (e.g. engineering, electrical, and maintenance specialists) must be involved. Thus, it is important to have the IT team collaborate with the OT team in each stage of the OT system’s life cycle.
      • Finally, it is necessary to have propositional sharing of responsibilities between IT leaders, security leaders, and OT leaders who have broader responsibilities.

      Enhance

      Update risk management framework

      The need for asset and threat taxonomy

      • One of issues in IT/OT convergence is that OT systems focus on production, so IT solutions like security patching or updates may deteriorate a machine or take a machine offline and may not be applicable. For example, some facilities run with reliability of 99.999%, which only allows maximum of 5 minutes and 35 seconds or less of downtime per year.
      • Managing risks requires an understanding of the assets and threats for IT/OT systems. Having a taxonomy of the assets and the threats cand help.
      • Applying normal IT solutions to mitigate security risks may not be applicable in an OT environment, e.g. running an antivirus tool on OT system may remove essential OT operations files. Thus, this approach must be avoided; instead, systems must be rebuilt from golden images.
      Risk management framework.
      (Source: ENISA, 2018.)

      Enhance

      Update security policies and procedures

      • Policy is the link between people, process, and technology for any size of organization. Small organizations may think that having formal policies in place is not necessary for their operations, but compliance is applicable to all organizations, and vulnerabilities affect organizations of all sizes as well. Small organizations partnering with clients or other organizations are sometimes viewed as ideal proxies for attackers.
      • Updating security policies to align with the OT system so that there is a uniform approach to securing both IT and OT environments has several benefits. For example, enhancing the overall security posture as issues are pre-emptively avoided, being better prepared for auditing and compliance requirements, and improving governance especially when OT governance is weak.
      • In updating security policies, it is important to redefine the policy framework to include the OT framework and to prioritize the development of security policies. For example, entities that own or manage US and Canadian electric power grids must comply with North American Electric Reliability Corporation Critical Infrastructure Protection (NERC CIP) standards, specifically CIP-003 for Policy and Governance. This can be achieved by understanding the current state of policies and by right-sizing the policy suite based on a policy hierarchy.
      The White House released an Executive Order on Improving the Nation’s Cybersecurity (EO 14028) in 2021 that establishes new requirements on the scope of protection and security policy such that it must include both IT and OT.

      Policy hierarchy example

      This example of a policy hierarchy features templates from Info-Tech’s Develop and Deploy Security Policies and Identify the Best Framework for Your Security Policies research.

      Example policy hierarchy with four levels, from top-down: 'Governance', 'Process-based policies', 'Prescriptive/ technical (for IT including OT elements)', 'Prescriptive/ technical (for users)'.

      Enhance

      Update IR, DR, and BCP

      A proactive approach to security is important, so actions such as updating and testing the incident response plan for OT are a must. (“Cybersecurity Year In Review” Dragos, 2022.)

      1. Customize organizational chart for IT/OT IR, DR, BCP based on governance and management model.
        E.g. ad hoc, internal distributed, internal centralized, combined distributed, and decentralized. (Software Engineering Institute, 2003)
      2. Adjust the authority of the new organizational chart and decide if it requires additional staffing.
        E.g. full authority, shared authority. (Software Engineering Institute, 2003)
      3. Update IR plan, DR plan, and BCP for IT/OT convergence.
        E.g. incorporate zero trust principles for converge network
      4. Testing updated IR plan, DR plan, and BCP.

      Optimize

      Implement awareness, induction, and cross-training

      To develop training and awareness programs for all levels of the organization, it is important to understand the common challenges in IT security that also affect secure IT/OT convergence and how to overcome those challenges.

      Alert Fatigue

      Too many false alarms, too many events to process, and an evolving threat landscape that wastes analysts’ valuable time on mundane tasks such as evidence collection. Meanwhile, only limited time is given for decision and conclusion, which results in fear of missing an incident and alert fatigue.

      Skill Shortages

      Obtaining and retaining cybersecurity-skilled talent is challenging. Organizations need to invest in the people, but not all organizations will be able to invest sufficiently to have their own dedicated security team.

      Lack of Insight

      To report progress, clear metrics are needed. However, cybersecurity still falls short in this area, as the system itself is complex, and much work is siloed. Furthermore, lessons learned are not yet distilled into insights yet for improving future accuracy.

      Lack of Visibility

      Ensuring complete visibility of the threat landscape, risks, and assets requires system integration and consistent workflow across the organization, and the convergence of OT, IoT, and IT enhances this challenge (e.g. machines cannot be scanned during operational uptime).
      (Source: Security Intelligence, 2020.)
      “Cybersecurity staff are feeling burnout and stressed to the extent that many are considering leaving their jobs.” (Danny Palmer, ZDNET News, 2022)

      Awareness may not correspond to readiness

      • An issue with IT/OT convergence training and awareness happens when awareness exists, but the personnel are trained only for IT security and are not trained for OT-specific security. For example, some organizations still use generic topics such as not opening email attachments, when the personnel do not even operate using email nor in a web browsing environment. (“Assessing Operational Readiness,” Dragos, 2022)
      • Meanwhile, as is the case with IT, OT security training topics are broad, such as OT threat intelligence, OT-specific incident response, and tabletop exercises.
      • Hence, it requires the creation of a training program development plan that considers the various audiences and topics and maps them accordingly.
      • Moreover, roles are also evolving due to convergence and modernization. These new roles require an integrative skill set. For example, the grid security & ops team might consist of an IT security specialist, SCADA technician/engineer, and OT/IIOT security specialist where OT/IIOT security specialist is a new role. (Grid Modernization: Optimize Opportunities and Minimize Risks,” Info-Tech)
      • In conclusion, it is important to approach talent development with an open mind. The ability to learn and flexibility in the face of change are important attributes, and technical skill sets can be improved with certifications and training.
      “One area regularly observed by Dragos is a weakness in overall cyber readiness and training tailored specific to the OT environment.” (“Assessing Operational Technology,” Dragos, 2022.)

      Certifications

      What are the options?
      • One of issues in certification is the complexity on relevancy in topics with respect to roles and levels.
      • An example solution is the European Union Agency for Cybersecurity (ENISA)’s approach to analyzing existing certifications by orientation, scope, and supporting bodies, grouped into specific certifications, relevant certifications, and safety certifications.

      Specific cybersecurity certification of ICS/SCADA
      Example: ISA-99/IEC 62443 Cybersecurity Certificate Program, GIAC Global Industrial Cyber Security Professional (GICSP), Certified SCADA Security Architect (CSSA), EC-Council ICS/SCADA Cybersecurity Training Course.

      Other relevant certification schemes
      Example: Network and Information Security (NIS) Driving License, ISA Certified Automation Professional (CAP), Industrial Security Professional Certification (NCMS-ISP).

      Safety Certifications
      Example: Board of Certified Safety Professionals (BCSP), European Network of Safety and Health Professional Organisations (ENSHPO).

      Order of certifications with 'Orientation' at the top, 'Scope', then 'Support'.(Source: ENISA, 2015.)

      Optimize

      Design and deploy converging security architecture and controls

      • IT/OT convergence architecture can be modeled as a layered structure based on security. In this structure, the bottom layer is referred as “OT High-Security Zone” and the topmost layer is “IT Low-Security Zone.” In this model, each layer has its own set of controls configured and acts like an additional layer of security for the zone underneath it.
      • The data flows from the “OT High-Security Zone” to the topmost layer, the “IT Low-Security Zone,” and the traffic must be verified to pass to another zone based on the need-to-know principle.
      • In the normal control flow within the “OT High-Security Zone” from level 3 to level 0, the traffic must be verified to pass to another level based on the principle of least privilege.
      • Remote access (dotted arrow) is allowed under strict access control and change control based on the zero-trust principle with clear segmentation and a point for disconnection between the “OT High-Security Zone” and the “OT Low-Security Zone”
      • This model simplifies the security process, as if the lower layers have been compromised, then the compromise can be confined on that layer, and it also prevents lateral movement as access is always verified.
      Diagram for the deployments of converging security architecture.(Source: “Purdue Enterprise Reference Architecture (PERA) model,” ISA-99.)

      Off-the-shelf solutions

      Getting the right recipe: What criteria to consider?

      Image of a shopping cart with the four headlines on the right listed in order from top to bottom.
      Icon of an eye crossed out. Visibility and Asset Management

      Passive data monitoring using various protocol layers, active queries to devices, or parsing configuration files of OT, IoT, and IT environments on assets, processes, and connectivity paths.

      Icon of gears. Threat Detection, Mitigation, and Response (+ Hunting)

      Automation of threat analysis (signature-based, specification-based, anomaly-based, sandboxing) not only in IT but also in relevant environments, e.g. IoT, IIoT, and OT on assets, data, network, and orchestration with threat intelligence sharing and analytics.

      Icon of a check and pen. Risk Assessment and Vulnerability Management

      Risk scoring approach (qualitative, quantitative) based on variables such as behavioral patterns and geolocation. Patching and vulnerability management.

      Icon of a wallet. Usability, Architecture, Cost

      The user and administrative experience, multiple deployment options and extensive integration capabilities, and affordability.

      Optimize

      Establish and monitor IT/OT security metrics for effectiveness and efficiency

      Role of security metrics in a cybersecurity program (EPRI, 2017.)
      • Requirements for secure IT/OT are derived from mandatory or voluntary compliance, e.g. NERC CIP, NIST SP 800-53.
      • Frameworks for secure IT/OT are used to build and implement security, e.g. NIST CSF, AESCSF.
      • Maturity of secure IT/OT is used to measure the state of security, e.g. C2M2, CMMC.
      • Security metrics have the role of measuring effectiveness and efficiency.

      Icon of a person ascending stairs.
      Safety

      OT interfaces with the physical world. Thus, metrics based on risks related with life, health, and safety are crucial. These metrics motivate personnel by making clear why they should care about security. (EPRI, 2017.)

      Icon of a person ascending stairs.
      Business Performance

      The impact of security on the business can be measured in various metrics such as operational metrics, service level agreements (SLAs), and financial metrics. (BMC, 2022.)

      Icon of a person ascending stairs.
      Technology Performance

      Early detection will lead to faster remediation and less damage. Therefore, metrics such as maximum tolerable downtime (MTD) and mean time to recovery (MTR) indicate system reliability. (Dark Reading, 2022)

      Icon of a person ascending stairs.
      Security Culture

      The metrics for the overall quality of security culture with indicators such as compliance and audit, vulnerability management, and training and awareness.

      Further information

      Related Info-Tech Research

      Sample of 'Build an Information Security Strategy'.

      Build an Information Security Strategy

      Info-Tech has developed a highly effective approach to building an information security strategy – an approach that has been successfully tested and refined for over seven years with hundreds of organizations.

      This unique approach includes tools for ensuring alignment with business objectives, assessing organizational risk and stakeholder expectations, enabling a comprehensive current-state assessment, prioritizing initiatives, and building a security roadmap.

      Sample of 'Preparing for Technology Convergence in Manufacturing'.

      Preparing for Technology Convergence in Manufacturing

      Information technology (IT) and operational technology (OT) teams have a long history of misalignment and poor communication.

      Stakeholder expectations and technology convergence create the need to leave the past behind and build a culture of collaboration.

      Sample of 'Implement a Security Governance and Management Program'.

      Implement a Security Governance and Management Program

      Your security governance and management program needs to be aligned with business goals to be effective.

      This approach also helps provide a starting point to develop a realistic governance and management program.

      This project will guide you through the process of implementing and monitoring a security governance and management program that prioritizes security while keeping costs to a minimum.

      Bibliography

      Assante, Michael J. and Robert M. Lee. “The Industrial Control System Cyber Kill Chain.” SANS Institute, 2015.

      “Certification of Cyber Security Skills of ICS/SCADA Professionals.” European Union Agency for Cybersecurity (ENISA), 2015. Web.

      Cooksley, Mark. “The IEC 62443 Series of Standards: A Product Manufacturer‘s Perspective.” YouTube, uploaded by Plainly Explained, 27 Apr. 2021. Accessed 26 Aug. 2022.

      “Cyber Security Metrics for the Electric Sector: Volume 3.” Electric Power Research Institute (EPRI), 2017.

      “Cybersecurity and Physical Security Convergence.” Cybersecurity and Infrastructure Security Agency (CISA). Accessed 19 May 2022.

      “Cybersecurity in Operational Technology: 7 Insights You Need to Know,” Ponemon, 2019. Web.

      “Developing an Operational Technology and Information Technology Incident Response Plan.” Public Safety Canada, 2020. Accessed 6 Sep. 2022.

      Gilsinn, Jim. “Assessing Operational Technology (OT) Cybersecurity Maturity.” Dragos, 2021. Accessed 02 Sep. 2022.

      “Good Practices for Security of Internet of Things.” European Union Agency for Cybersecurity (ENISA), 2018. Web.

      Greenfield, David. “Is the Purdue Model Still Relevant?” AutomationWorld. Accessed 1 Sep. 2022

      Hemsley, Kevin E., and Dr. Robert E. Fisher. “History of Industrial Control System Cyber Incidents.” US Department of Energy (DOE), 2018. Accessed 29 Aug. 2022.

      “ICS Security Related Working Groups, Standards and Initiatives.” European Union Agency for Cybersecurity (ENISA), 2013.

      Killcrece, Georgia, et al. “Organizational Models for Computer Security Incident Response Teams (CSIRTs).” Software Engineering Institute, CMU, 2003.

      Liebig, Edward. “Security Culture: An OT Survival Story.” Dark Reading, 30 Aug. 2022. Accessed 29 Aug. 2022.

      Bibliography

      O'Neill, Patrick. “Russia Hacked an American Satellite Company One Hour Before the Ukraine Invasion.” MIT Technology Review, 10 May 2022. Accessed 26 Aug. 2022.

      Palmer, Danny. “Your Cybersecurity Staff Are Burned Out – And Many Have Thought About Quitting.” Zdnet, 08 Aug. 2022. Accessed 19 Aug. 2022.

      Pathak, Parag. “What Is Threat Management? Common Challenges and Best Practices.” SecurityIntelligence, 23 Jan. 2020. Web.

      Raza, Muhammad. “Introduction To IT Metrics & KPIs.” BMC, 5 May 2022. Accessed 12 Sep. 2022.

      “Recommended Practice: Developing an Industrial Control Systems Cybersecurity Incident Response Capability.” Department of Homeland Security (DHS), Oct. 2009. Web.

      Sharma, Ax. “Sigma Rules Explained: When and How to Use Them to Log Events.” CSO Online, 16 Jun. 2018. Accessed 15 Aug. 2022.

      “Significant Cyber Incidents.” Center for Strategic and International Studies (CSIS). Accessed 1 Sep. 2022.

      Tom, Steven, et al. “Recommended Practice for Patch Management of Control Systems.” Department of Homeland Security (DHS), 2008. Web.

      “2021 ICS/OT Cybersecurity Year In Review.” Dragos, 2022. Accessed 6 Sep. 2022.

      “2021 State of Operational Technology and Cybersecurity Report,” Fortinet, 2021. Web.

      Zetter, Kim. “Pre-Stuxnet, Post-Stuxnet: Everything Has Changed, Nothing Has Changed.” Black Hat USA, 08 Aug. 2022. Accessed 19 Aug. 2022.

      Research Contributors and Experts

      Photo of Jeff Campbell, Manager, Technology Shared Services, Horizon Power, AU. Jeff Campbell
      Manager, Technology Shared Services
      Horizon Power, AU

      Jeff Campbell has more than 20 years' experience in information security, having worked in both private and government organizations in education, finance, and utilities sectors.

      Having focused on developing and implementing information security programs and controls, Jeff is tasked with enabling Horizon Power to capitalize on IoT opportunities while maintaining the core security basics of confidentiality, integrity and availability.

      As Horizon Power leads the energy transition and moves to become a digital utility, Jeff ensures the security architecture that supports these services provides safer and more reliable automation infrastructures.

      Christopher Harrington
      Chief Technology Officer (CTO)
      Carolinas Telco Federal Credit Union

      Frank DePaola
      Vice President, Chief Information Security Officer (CISO)
      Enpro

      Kwasi Boakye-Boateng
      Cybersecurity Researcher
      Canadian Institute for Cybersecurity

      Master the MSA for Your Managed Services Providers

      • Buy Link or Shortcode: {j2store}235|cart{/j2store}
      • member rating overall impact: 9.7/10 Overall Impact
      • member rating average dollars saved: $9,869 Average $ Saved
      • member rating average days saved: 4 Average Days Saved
      • Parent Category Name: Vendor Management
      • Parent Category Link: /vendor-management
      • Master Services Agreements and Service Level Agreements are tedious, and reviewers may lack the skills and experience to effectively complete the process.
      • Managed services providers have a repository of contract terms and conditions that are road-tested and prepackaged, and which are often biased in their favor.
      • With many different pricing options, it is difficult to choose the services you need.

      Our Advice

      Critical Insight

      • Manage your managed services providers. Added value is realized when managed service providers are in tune with your IT strategies, goals, and mission.
      • Negotiate an agreement that is beneficial to both parties. The most successful partnerships are a win-win agreement.
      • Lawyers can’t ensure you get the best business deal. They tend to look at general terms and conditions and may overlook IT-specific components.

      Impact and Result

      • Understanding managed services providers, including their roles and pricing models, will give you valuable insight into negotiating the best deal for your organization.
      • Info-Tech’s contract review methodology will help you navigate the complex process of managed services provider contract evaluation and review all the key details to maximize the benefits to your organization.
      • This blueprint provides guidance on catching vendor-biased terms and conditions, and suggests tips for getting managed services providers to take on their fair share of responsibilities.

      Master the MSA for Your Managed Services Providers Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you should master the MSA for your MSPs, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Review terms and conditions for your MSP contract

      Use Info-Tech’s MSA Contract Review Tool to locate and track improvement areas in your MSAs.

      • Master the MSA for Your Managed Services Providers – Phase 1: Review Terms and Conditions of Your MSP Contract
      • MSA Contract Review Tool
      [infographic]

      Establish a Communication and Collaboration System Strategy

      • Buy Link or Shortcode: {j2store}293|cart{/j2store}
      • member rating overall impact: 9.3/10 Overall Impact
      • member rating average dollars saved: $6,459 Average $ Saved
      • member rating average days saved: 10 Average Days Saved
      • Parent Category Name: End-User Computing Applications
      • Parent Category Link: /end-user-computing-applications
      • Communication and collaboration portfolios are overburdened with redundant and overlapping services. Between Office 365, Slack, Jabber, and WebEx, IT is supporting a collection of redundant apps. This redundancy takes a toll on IT, and on the user.
      • Shadow IT is easier than ever, and cheap sharing tools are viral. Users are literally carrying around computers in their pockets (in the form of smartphones). IT often has no visibility into how these devices – and the applications on them – are used for work.

      Our Advice

      Critical Insight

      • You don’t know what you don’t know. Unstructured conversations with users will uncover insights.
      • Security is meaningless without usability. If security controls make a tool unusable, then users will rush to adopt something that’s free and easy.
      • Training users on a new tool once isn’t effective. Engage with users throughout the collaboration tool’s lifecycle.

      Impact and Result

      • Few supported apps and fewer unsupported apps. This will occur by ensuring that your collaboration tools will be useful to and used by users. Give users a say through surveys, focus groups, and job shadowing.
      • Lower total cost of ownership and greater productivity. Having fewer apps in the workplace, and better utilizing the functionality of those apps, will mean that IT can be much more efficient at managing your ECS.
      • Higher end-user satisfaction. Tools will be better suited to users’ needs, and users will feel heard by IT.

      Establish a Communication and Collaboration System Strategy Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you should develop a new approach to communication and collaboration apps, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Create a shared vision on the future of communication and collaboration

      Identify and validate goals and collaboration tools that are used by your users, and the collaboration capabilities that must be supported by your desired ECS.

      • Establish a Communication and Collaboration System Strategy – Phase 1: Create a Shared Vision on the Future of Communication and Collaboration
      • Enterprise Collaboration Strategy Template
      • Building Company Communication and Collaboration Technology Improvement Plan Executive Presentation
      • Communications Infrastructure Stakeholder Focus Group Guide
      • Enterprise Communication and Collaboration System Business Requirements Document

      2. Map a path forward

      Map a path forward by creating a collaboration capability map and documenting your ECS requirements.

      • Establish a Communication and Collaboration System Strategy – Phase 2: Map a Path Forward
      • Collaboration Capability Map

      3. Build an IT and end-user engagement plan

      Effectively engage everyone to ensure the adoption of your new ECS. Engagement is crucial to the overall success of your project.

      • Establish a Communication and Collaboration System Strategy – Phase 3: Proselytize the Change
      • Collaboration Business Analyst
      • Building Company Exemplar Collaboration Marketing One-Pager Materials
      • Communication and Collaboration Strategy Communication Plan
      [infographic]

      Workshop: Establish a Communication and Collaboration System Strategy

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Identify What Needs to Change

      The Purpose

      Create a vision for the future of your ECS.

      Key Benefits Achieved

      Validate and bolster your strategy by involving your end users.

      Activities

      1.1 Prioritize Components of Your ECS Strategy to Improve

      1.2 Create a Plan to Gather Requirements From End Users

      1.3 Brainstorm the Collaboration Services That Are Used by Your Users

      1.4 Focus Group

      Outputs

      Defined vision and mission statements

      Principles for your ECS

      ECS goals

      End-user engagement plan

      Focus group results

      ECS executive presentation

      ECS strategy

      2 Map Out the Change

      The Purpose

      Streamline your collaboration service portfolio.

      Key Benefits Achieved

      Documented the business requirements for your collaboration services.

      Reduced the number of supported tools.

      Increased the effectiveness of training and enhancements.

      Activities

      2.1 Create a Current-State Collaboration Capability Map

      2.2 Build a Roadmap for Desired Changes

      2.3 Create a Future-State Capability Map

      2.4 Identify Business Requirements

      2.5 Identify Use Requirements and User Processes

      2.6 Document Non-Functional Requirements

      2.7 Document Functional Requirements

      2.8 Build a Risk Register

      Outputs

      Current-state collaboration capability map

      ECS roadmap

      Future-state collaboration capability map

      ECS business requirements document

      3 Proselytize the Change

      The Purpose

      Ensure the system is supported effectively by IT and adopted widely by end users.

      Key Benefits Achieved

      Unlock the potential of your ECS.

      Stay on top of security and industry good practices.

      Greater end-user awareness and adoption.

      Activities

      3.1 Develop an IT Training Plan

      3.2 Develop a Communications Plan

      3.3 Create Initial Marketing Material

      Outputs

      IT training plan

      Communications plan

      App marketing one-pagers

      IT Risk management

      • Buy Link or Shortcode: {j2store}40|cart{/j2store}
      • Related Products: {j2store}40|crosssells{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Security and Risk
      • Parent Category Link: /security-and-risk
      Mitigation is about balance: take a cost-focused approach to risk management.

      Develop Infrastructure & Operations Policies and Procedures

      • Buy Link or Shortcode: {j2store}452|cart{/j2store}
      • member rating overall impact: 9.5/10 Overall Impact
      • member rating average dollars saved: $46,324 Average $ Saved
      • member rating average days saved: 42 Average Days Saved
      • Parent Category Name: Operations Management
      • Parent Category Link: /i-and-o-process-management
      • Time and money are wasted dealing with mistakes or missteps that should have been addressed by procedures or policies.
      • Standard operating procedures are less effective without a policy to provide a clear mandate and direction.
      • Adhering to policies is rarely a priority, as compliance often feels like an impediment to getting work done.
      • Processes aren’t measured or audited to assess policy compliance, which makes enforcing the policies next to impossible.

      Our Advice

      Critical Insight

      • Document what you need to document and forget the rest. Always check to see if you can use a previously approved policy before you create a new one. You may only need to create new guidelines or standards rather than approve a new policy.

      Impact and Result

      • Start with a comprehensive policy framework to help you identify policy gaps. Prioritize and address those policy gaps.
      • Create effective policies that are reasonable, measurable, auditable, and enforceable.
      • Create and document procedures to support policy changes.

      Develop Infrastructure & Operations Policies and Procedures Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you should change your approach to developing Infrastructure & Operations policies and procedures, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Identify policy and procedure gaps

      Create a prioritized action plan for documentation based on business need.

      • Develop Infrastructure & Operations Policies and Procedures – Phase 1: Identify Policy and Procedure Gaps

      2. Develop policies

      Adapt policy templates to meet your business requirements.

      • Develop Infrastructure & Operations Policies and Procedures – Phase 2: Develop Policies
      • Availability and Capacity Management Policy
      • Business Continuity Management Policy
      • Change Control – Freezes & Risk Evaluation Policy
      • Change Management Policy
      • Configuration Management Policy
      • Firewall Policy
      • Hardware Asset Management Policy
      • IT Triage and Support Policy
      • Release Management Policy
      • Software Asset Management Policy
      • System Maintenance Policy – NIST
      • Internet Acceptable Use Policy

      3. Document effective procedures

      Improve policy adherence and service effectiveness through procedure standardization and documentation.

      • Develop Infrastructure & Operations Policies and Procedures – Phase 3: Document Effective Procedures
      • Capacity Plan Template
      • Change Management Standard Operating Procedure
      • Configuration Management Standard Operation Procedures
      • Incident Management and Service Desk SOP
      • DRP Summary Template
      • Service Desk Standard Operating Procedure
      • HAM Standard Operating Procedures
      • SAM Standard Operating Procedures
      [infographic]

      Further reading

      Develop Infrastructure & Operations Policies and Procedures

      Document what you need to document and forget the rest.

      Table of contents

      Project Rationale

      Project Outlines

      • Phase 1: Identify Policy and Procedure Gaps
      • Phase 2: Develop Policies
      • Phase 3: Document Effective Procedures

      Bibliography

      ANALYST PERSPECTIVE

      Document what you need to document now and forget the rest.

      "Most IT organizations struggle to create and maintain effective policies and procedures, despite known improvements to consistency, compliance, knowledge transfer, and transparency.

      The numbers are staggering. Fully three-quarters of IT professionals believe their policies need improvement, and the same proportion of organizations don’t update procedures as required.

      At the same time, organizations that over-document and under-document perform equally poorly on key measures such as policy quality and policy adherence. Take a practical, step-by-step approach that prioritizes the documentation you need now. Leave the rest for later."

      (Andrew Sharp, Research Manager, Infrastructure & Operations Practice, Info-Tech Research Group)

      Our understanding of the problem

      This Research Is Designed For:

      • Infrastructure Managers
      • Chief Technology Officers
      • IT Security Managers

      This Research Will Help You:

      • Address policy gaps
      • Develop effective procedures and procedure documentation to support policy compliance

      This Research Will Also Assist:

      • Chief Information Officers
      • Enterprise Risk and Compliance Officers
      • Chief Human Resources Officers
      • Systems Administrators and Engineers

      This Research Will Help Them:

      • Understand the importance of a coherent approach to policy development
      • Understand the importance of Infrastructure & Operations policies
      • Support Infrastructure & Operations policy development and enforcement

      Info-Tech Best Practice

      This blueprint supports templates for key policies and procedures that help Infrastructure & Operations teams to govern and manage internal operations. For security policies, see the NIST SP 800-171 aligned Info-Tech blueprint, Develop and Deploy Security Policies.

      Executive Summary

      Situation

      • Time and money are wasted dealing with mistakes or missteps that should have been addressed by procedures or policies.
      • Standard operating procedures are less effective without a policy to provide a clear mandate and direction.

      Complication

      • Existing policies were written, approved, signed – and forgotten for years because no one has time to maintain them.
      • Adhering to policies is rarely a priority, as compliance often feels like an impediment to getting work done.
      • Processes aren’t measured or audited to assess policy compliance, which makes enforcing the policies next to impossible.

      Resolution

      • Start with a comprehensive policy framework to help you identify policy gaps. Prioritize and address those policy gaps.
      • Create effective policies that are reasonable, measurable, auditable, and enforceable.
      • Create and document procedures to support policy changes.

      Info-Tech Insight

      1. Document what you need to document and forget the rest.
        Always check if a previously approved policy exists before you create a new one. You may only need to create new guidelines or standards rather than approve a new policy.
      2. Support policies with documented procedures.
        Build procedures that embed policy adherence in daily operations. Find opportunities to automate policy adherence (e.g. removing local admin rights from user computers).

      What are policies, procedures, and processes?

      A policy is a governing document that states the long-term goals of the organization and in broad strokes outlines how they will be achieved (e.g. a Data Protection Policy).

      In the context of policies, a procedure is composed of the steps required to complete a task (e.g. a Backup and Restore Procedure). Procedures are informed by required standards and recommended guidelines. Processes, guidelines, and standards are three pillars that support the achievement of policy goals.

      A process is higher level than a procedure – a set of tasks that deliver on an organizational goal.

      Better policies and procedures reduce organizational risk and, by strengthening the ability to execute processes, enhance the organization’s ability to execute on its goals.

      Visualization of policies, procedures, and processes using pillars. Two separate structures, 'Policy A' and 'Policy B', are each held up by three pillars labelled 'Standards', 'Procedures', and 'Guidelines'. Two lines pass through the pillars of both structures and are each labelled 'Value-creating process'.

      Document to improve governance and operational processes

      Deliver value

      Build, deliver, and support Infrastructure assets in a consistent way, which ultimately reduces costs associated with downtime, errors, and rework. A good manual process is the foundation for a good automated process.

      Simplify Training

      Use documentation for knowledge transfer. Routine tasks can be delegated to less-experienced staff.

      Maintain compliance

      Comply with laws and regulations. Policies are often required for compliance, and formally documented and enforced policies help the organization maintain compliance by mandating required due diligence, risk reduction, and reporting activities.

      Provide transparency

      Build an open kitchen. Other areas of the organization may not understand how Infra & Ops works. Your documentation can provide the answer to the perennial question: “Why does that take so long?”

      Info-Tech Best Practice

      Governance goals must be supported with effective, well-aligned procedures and processes. Use Info-Tech’s research to support the key Infrastructure & Operations processes that enable your business to create value.

      Document what you need to document – and forget the rest

      Half of all organizations believe their policy suite is insufficient. (Info-Tech myPolicies Survey Data (N=59))

      Pie chart with three sections labelled 'Too Many Policies and Procedures 14%', 'Adequate Policies and Procedures 37%', 'Insufficient Policies and Procedures 49%'

      Too much documentation and a lack of documentation are both ineffective. (Info-Tech myPolicies Survey Data (N=59))

      Two bar charts labelled 'Policy Adherence' and 'Policy Quality' each with three bars representing 'Too Many Policies and Procedures', 'Insufficient Policies and Procedures', and 'Adequate Policies and Procedures'. The values shown are an average score out of 5. For Policy Adherence: Too Many is 2.4, Insufficient is 2.1, and Adequate is 3.2. For Policy Quality: Too Many is 2.9, Insufficient is 2.6, and Adequate is 4.1.

      77% of IT professionals believe their policies require improvement. (Kaspersky Lab)

      Presenting: A COBIT-aligned policy suite

      We’ve developed a suite of effective policy templates for every Infra & Ops manager based on Info-Tech’s IT Management & Governance Framework.

      Policy templates and the related aspects of Info-Tech's IT Management & Governance Framework

      Info-Tech Best Practice

      Look for these symbols as you work through the deck. Prioritize and focus on the policies you work on first based on the value of the policy to the enterprise and the existing gaps in your governance structure.

      Project outline

      Phases

      1. Identify policy and procedure gaps 2. Develop policies 3. Document effective procedures

      Steps

      • Review and right-size the existing policy set
      • Create an action plan to address policy gaps
      • Modify policy templates and gather feedback
      • Implement, enforce, measure, and maintain new policies
      • Scope and outline procedures
      • Document and maintain procedures

      Outcomes

      Action list of policy and procedure gaps New or updated Infrastructure & Operations policies Procedure documentation

      Use these icons to help direct you as you navigate this research

      Use these icons to help guide you through each step of the blueprint and direct you to content related to the recommended activities.

      A small monochrome icon of a wrench and screwdriver creating an X.

      This icon denotes a slide where a supporting Info-Tech tool or template will help you perform the activity or step associated with the slide. Refer to the supporting tool or template to get the best results and proceed to the next step of the project.

      A small monochrome icon depicting a person in front of a blank slide.

      This icon denotes a slide with an associated activity. The activity can be performed either as part of your project or with the support of Info-Tech team members, who will come onsite to facilitate a workshop for your organization.

      Info-Tech offers various levels of support to best suit your needs

      DIY Toolkit

      Guided Implementation

      Workshop

      Consulting

      "Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful." "Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track." "We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place." "Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project."

      Diagnostics and consistent frameworks used throughout all four options

      Accelerate policy development with a Guided Implementation

      Your trusted advisor is just a call away.

      • Identify Policy and Procedure Gaps (Calls 1-2)
        Assess current policies, operational challenges, and gaps. Mitigate significant risks first.
      • Create and Review Policies (Calls 2-4)
        Modify and review policy templates with an Info-Tech analyst.
      • Create and Review Procedures (Calls 4-6)
        Workflow procedures, using templates wherever possible. Review documentation best practices.

      Contact Info-Tech to set up a Guided Implementation with a dedicated advisor who will walk you through every stage of your policy development project.

      Develop Infrastructure & Operations Policies and Procedures

      Phase 1

      Identify Policy and Procedure Gaps

      PHASE 1: Identify Policy and Procedure Gaps

      Step 1.1: Review and right-size the existing policy set

      This step will walk you through the following activities:

      • Identify gaps in your existing policy suite
      • Document challenges to core Infrastructure & Operations processes
      • Identify documentation that can close gaps
      • Prioritize your documentation effort

      This step involves the following participants:

      • Infrastructure & Operations Manager
      • Infrastructure Supervisors

      Results & Insights

      • Results: A review of the existing policy suite and identification of opportunities for improvement.
      • Insights: Not all gaps necessarily require a fresh policy. Repurpose, refresh, or supplement existing documentation wherever appropriate.

      Conduct a policy review

      Associated Activity icon 1(a) 30 minutes per policy

      You’ve got time to review your policy suite. Make the most of it.

      1. Start with organizational requirements.
        • What initiatives are on the go? What policies or procedures do you have a mandate to create?
      2. Weed out expired and dated policies.
        • Gather your existing policies. Identify when each one was published or last reviewed.
        • Decide whether to retire, merge, or update expired or obviously dated policy.
      3. Review policy statements.
        • Check that the organization is adequately supporting policy statements with SOPs, standards, and guidelines. Ensure role-related information is up to date.
      4. Document and bring any gaps forward to the next activity. If no action is required, indicate that you have completed a review and submit the findings for approval.

      But they just want one policy...

      A review of your policy suite is good practice, especially when it hasn’t been done for a while. Why?
      • Existing policies may address what you’re trying to do with a new policy. Using or modifying an existing policy avoids overlap and contradiction and saves you the effort required to create, communicate, approve, and maintain a new policy.
      • Review the suite to validate that you’re addressing the most important challenges first.

      Brainstorm improvements for core Infrastructure & Operations processes

      Associated Activity icon 1(b) 1 hour

      Supplement the list of gaps from your policy review with process challenges.

      1. Write out key Infra & Ops–related processes – one piece of flipchart paper per process. You can work through all of these processes or cherry-pick the processes you want to improve first.
      2. With participants, write out in point form how you currently execute on these processes (e.g. for Asset Management, you might be tagging hardware, tracking licenses, etc.)
      3. Work through a “Start – Stop – Continue” exercise. Ask participants: What should we start doing? What must we stop doing? What do we do currently that’s valuable and must continue? Write ideas on sticky notes.
      4. Once you’ve worked through the “Start – Stop – Continue” exercise for all processes, group similar suggestions for improvements.

      Asset Management: Manage hardware and software assets across their lifecycle to protect assets and manage costs.

      Availability and Capacity Management: Balance current and future availability, capacity, and performance needs with cost-to-serve.

      Business Continuity Management: Continue operation of critical business processes and IT services.

      Change Management: Deliver technical changes in a controlled manner.

      Configuration Management: Define and maintain relationships between technical components.

      Problem Management: Identify incident root cause.

      Operations Management: Coordinate operations.

      Release and Patch Management: Deliver updates and manage vulnerabilities in a controlled manner.

      Service Desk: Respond to user requests and all incidents.

      PHASE 1: Identify Policy and Procedure Gaps

      Step 1.2: Create an action plan to address policy gaps

      This step will walk you through the following activities:

      • Identify challenges and gaps that can be addressed via documentation
      • Prioritize high-value, high-risk gaps

      This step involves the following participants:

      • Infrastructure & Operations Manager
      • Infrastructure Supervisors

      Results & Insights

      • Results: An action plan to tackle policy and procedures gaps, aligned with business requirements and business value.
      • Insights: Not all documentation is equally valuable. Prioritize documentation that delivers value and mitigates risk.

      Support policies with procedures, standards, and guidelines

      Use a working definition for each type of document.

      Policy: Directives, rules, and mandates that support the overarching, long-term goals of the organization.

      • Standards: Prescriptive, uniform requirements.
      • Procedures: Specific, detailed, step-by-step instructions for completing a task.
      • Guidelines: Non-enforceable, recommended best practices.

      Info-Tech Best Practice

      Take advantage of your Info-Tech advisory membership by scheduling review sessions with an analyst. We provide high-level feedback to ensure your documentation is clear, concise, and consistent and aligns with the governance objectives you’ve identified.

      Answer the following questions to decide if governance documentation can help close gaps

      Associated Activity icon 1(c) 30 minutes

      Documentation supports knowledge sharing, process consistency, compliance, and transparency. Ask the following questions:

      1. What is the purpose of the documentation?
        Procedures support task completion. Policies set direction and manage organizational risk.
      2. Should it be enforceable?
        Policies and standards are enforceable; guidelines are not. Procedures are enforceable in that they should support policy enforcement.
      3. What is the scope?
        To document a task, create a procedure. Set overarching rules with policies. Use standards and guidelines to set detailed rules and best practices.
      4. What’s the expected cadence for updates?
        Policies should be revisited and revised less frequently than procedures.

      Info-Tech Best Practice

      Reinvent the wheel? I don’t think so!

      Always check to see if a gap can be addressed with existing tools before drafting a new policy

      • Is there an existing policy that could be supported with new or updated procedures, technical standards, or guidelines?
      • Is there a technical control you can deploy that would enforce the terms of an existing, approved policy?
      • It may be simpler to amend an existing policy instead of creating a new one.

      Some problems can’t be solved by better documentation (or by documentation alone). Consider additional strategies that address people, process, and technology.

      Tackle high-value, high-risk gaps first

      Associated Activity icon 1(d) 30 minutes

      Prioritize your documentation effort.

      1. List each proposed piece of documentation on the board.
      2. Assign a score to the risk posed to the business by the lack of documentation and to the expected benefit of completing the documentation. Use a scoring scale between 1 and 3 such as the one on the right.
      3. Prioritize documentation that mitigates risks and maximizes benefits.
      4. If you need to break ties, consider effort required to develop, implement, and enforce policies or procedures.

      Example Scoring Scale

      Score Business risk of missing documentation Business benefit of value of documentation

      1

      Low: Affects ad hoc activities or non-critical data. Low: Minimal impact.

      2

      Moderate: Impacts productivity or internal goodwill. Moderate: Required periodically; some cross-training opportunities.

      3

      High: Impacts revenue, safety, or external goodwill. High: Save time for common or ongoing processes; extensive improvement to training/knowledge transfer.

      Info-Tech Insight

      Documentation pulls resources away from other important programs and projects, so ultimately it must be a demonstrably higher priority than other work. This exercise is designed to align documentation efforts with business goals.

      Phase 1: Review accomplishments

      Policy pillars: Standards, Procedures, Guidelines

      Summary of Accomplishments

      • Identified gaps in the existing policy suite and identified pain points in existing Infra & Ops processes.
      • Developed a list of policies and procedures that can address existing gaps and prioritized the documentation effort.

      Develop Infrastructure & Operations Policies and Procedures

      Phase 2

      Develop Policies

      PHASE 2: Develop Policies

      Step 2.1: Modify policy templates and gather feedback

      This step will walk you through the following activities:

      • Modify policy templates

      This step involves the following participants:

      • Infrastructure & Operations Manager
      • Technical Writer

      Results & Insights

      • Results: Your own COBIT-aligned policies built by modifying Info-Tech templates.
      • Insights: Effective policies are easy to read and navigate.

      Write Good-er: Be Clear, Consistent, and Concise

      Effective policies adhere to the three Cs of documentation.

      1. Be clear. Make it as easy as possible for a user to learn how to comply with your policy.
      2. Be consistent. Write policies that complement each other, not contradict each other.
      3. Be concise. Make it as quick and easy as possible to read and understand your policy.

      Info-Tech Best Practice

      To download the full suite of templates all at once, click the “Download Research” button on the research landing page on the website.

      Use the three Cs: Be Clear

      Understanding makes compliance possible. Create policy with the goal of making compliance as easy as possible. Use positive, simple language to convey your intentions and rationale to your audience. Staff will make an effort adhere to your policy when they understand the need and are able to comply with the terms.

      1. Choose a skilled writer. Select a writer who can write clearly and succinctly.
      2. Default to simple language and define key terms. Define scope and key terms upfront. Avoid using technical terms outside of technical documentation; if they’re necessary be sure to define them as well.
      3. Use active, positive language. Where possible, tell people what they can do, not what they can’t.
      4. Keep the structure simple. Complicated documents are less likely to be understood and read. Use short sentences and paragraphs. Lists are a helpful way to summarize important information. Guide your reader through the document with appropriately named section headers, tables of contents, and numeration.
      5. Add a process for handling exceptions. Refer to procedures, standards, and guidelines documentation. Try to keep these links as static as possible. Also, refer to a process for handling exceptions.
      6. Manage the integrity of electronic documents. When published electronically, the policy should have restricted editing access or should be published in a non-editable format. Access to the procedure and policy storage database for employees should be read-only.

      Info-Tech Insight

      Highly effective policies are easy to navigate. Your policies should be “skimmable.” Very few people will fully read a policy before accepting it. Make it easy to navigate so the reader can easily find the policy statements that apply to them.

      Use the three Cs: Be Consistent

      Ensure that policies are aligned with other organizational policies and procedures. It detracts from compliance if different policies prescribe different behavior in the same situation. Moreover, your policies should reflect the corporate culture and other company standards. Use your policies to communicate rules and get employees aligned with how your company works.

      1. Use standard sentences and paragraphs. Policies are usually expressed in short, standard sentences. Lists should also be used when necessary or appropriate.
      2. Remember the three Ws. When writing a policy, always be sure to clearly state what the rule is, when it should be applied, and who needs to follow it. Policies should clearly define their scope of application and whether directives are mandatory or recommended.
      3. Use an outline format. Using a numbered or outline format will make a document easier to read and will make content easier to look up when referring back to the document at a later time.
      4. Avoid amendments. Avoid the use of information that is quickly outdated and requires regular amendment (e.g. names of people).
      5. Reference a set of supplementary documents. Codify your tactics outside of the policy document, but make reference to them within the text. This makes it easier to ensure consistency in the behavior prescribed by your policies.

      "One of the issues is the perception that policies are rules and regulations. Instead, your policies should be used to say ‘this is the way we do things around here.’" (Mike Hughes CISA CGEIT CRISC, Principal Director, Haines-Watts GRC)

      Use the three Cs: Be Concise

      Reading and understanding policies shouldn’t be challenging, and it shouldn’t significantly detract from productive time. Long policies are more difficult to read and understand, increasing the work required for employees to comply with them. Put it this way: How often do you read the Terms and Conditions of software you’ve installed before accepting them?

      1. Be direct. The quicker you get to the point, the easier it is for the reader to interpret and comply with your policy.
      2. Your policy is a rule, not a recipe. Your policy should outline what needs to be accomplished and why – your standards, guidelines, and SOPs address the how.
      3. Keep policies short. Nobody wants to read a huge policy book, so keep your policies short.
      4. Use additional documentation where needed. In addition to making consistency easier, this shortens the length of your policies, making them easier to read.
      5. Policy still too large? Modularize it. If you have an extremely large policy, it’s likely that it’s too widely scoped or that you’re including statements that should be part of procedure documentation. Consider breaking your policy into smaller, focused, more digestible documents.

      "If the policy’s too large, people aren’t going to read it. Why read something that doesn’t apply to me?" (Carole Fennelly, Owner and Principal, cFennelly Consulting)

      "I always try to strike a good balance between length and prescriptiveness when writing policy. Your policies … should be short and describe the problem and your approach to solving it. Below policies, you write standards, guidelines, and SOPs." (Michael Deskin, Policy and Technical Writer, Canadian Nuclear Safety Commission)

      Customize policy documents

      Associated Activity icon 2(a) 1-2 hours per policy

      Use the policies templates to support key Infrastructure & Operations programs.

      INPUT: List of prioritized policies

      OUTPUT: Written policy drafts ready for review

      Materials: Policy templates

      Participants: Policy writer, Signing authority

      No policy template will be a perfect fit for your organization. Use Info-Tech’s research to develop your organization’s program requirements. Customize the policy templates to support those requirements.

      1. Work through policies from highest to lowest priority as defined in Phase 1.
      2. Follow the instructions written in grey text to customize the policy. Follow the three Cs when you write your policy.
      3. When your draft is finished, prepare to request signoff from your signing authority by reviewing the draft with an Info-Tech analyst.
      4. Complete the highest ranked three or four draft policies. Review all these policies with relevant stakeholders and include all relevant signing authorities in the signoff process.
      5. Rinse and repeat. Iterate until all relevant polices are complete.

      Request, Incident, and Problem Management

      An effective, timely service desk correlates with higher overall end-user satisfaction across all other IT services. (Info-Tech Research Group, 2016 (N=25,998))

      An icon for the 'DSS02 Service Desk' template. An icon for the 'DSS03 Incident and Problem Management' template.

      Use the following template to create a policy that outlines the goals and mandate for your service and support organization:

      • IT Triage and Support Policy

      Support the program and associated policy statements using Info-Tech’s research:

      • Standardize the Service Desk
      • Incident and Problem Management
      • Design & Build a User-Facing Service Catalog

      Embrace Standardization

      • Outline the support and service mandate with the policy. Support the policy with the methodology in Info-Tech’s research.
      • Over time, organizations without standardized processes face confusion, redundancies, and cost overruns. Standardization avoids wasting energy and effort building new solutions to solved issues.
      • Standard processes for IT services define repeatable approaches to work and sandbox creative activities.
      • Create tickets for every task and categorize them using a standard classification system. Use the resulting data to support root-cause analysis and long-term trend management.
      • Create a single point of contact for users for all incidents and requests. Escalate and resolve tickets faster.
      • Empower end users and technicians with knowledge bases that help them solve problems without intervention.

      Change, Release, and Patch Management

      Slow turnaround, unauthorized changes, and change-related incidents are all too familiar to many managers.

      An icon for the 'BAI06 Change Management' template. An icon for the 'BAI07 Release Management' template.

      Use the following templates to create policies that define effective patch, release, and change management:

      • Change Management Policy
      • Release and Patch Management Policy
      • Change Control – Freezes & Risk Evaluation Policy

      Ensure the policy is supported by using the following Info-Tech research:

      • Optimize Change Management

      Embrace Change

      • IT system owners resist change management when they see it as slow and bureaucratic.
      • At the same time, an increasingly interlinked technical environment may cause issues to appear in unexpected places. Configuration management systems are often not kept up to date, so preventable conflicts get missed.
      • No process exists to support the identification and deployment of critical security patches. Tracking down users to find a maintenance window takes significant, dedicated effort and intervention from the management team.
      • Create a unified change management process that reduces risk and is balanced in its approach toward deploying changes, while also maintaining throughput of patches, fixes, enhancements, and innovation.

      IT Asset Management (ITAM)

      A proactive, dynamic ITAM program will pay dividends in support, contract management, appropriate provisioning, and more.

      An icon for the 'BAI09 Asset Management' template.

      Start by outlining the requirements for effective asset management:

      • Hardware Asset Management Policy
      • Software Asset Management Policy

      Support ITAM policies with the following Info-Tech research:

      • Implement IT Asset Management

      Leverage Asset Data

      • Create effective, directional policies for your asset management program that provide a mandate for action. Support the policies with robust procedures, capable staff, and right-fit technology solutions.
      • Poor management of assets generally leads to higher costs due to duplicated purchases, early replacement, loss, and so on.
      • Visibility into asset location and ownership improves security and accountability.
      • A centralized repository of asset data supports request fulfilment and incident management.
      • Asset management is an ongoing program, not a one-off project, and must be resourced accordingly. Organizations often implement an asset management program and let it stagnate.

      "Many of the large data breaches you hear about… nobody told the sysadmin the client data was on that server. So they weren’t protecting and monitoring it." (Carole Fennelly, Owner and Principal, cFennelly Consulting)

      Business Continuity Management (BCM)

      Streamline the traditional approach to make BCM practical and repeatable.

      An icon for the 'DSS04 DR and Business Continuity' template.

      Set the direction and requirements for effective BCM:

      • Business Continuity Management Policy

      Support the BCM policy with the following Info-Tech research:

      • Create a Right-Sized Disaster Recovery Plan
      • Develop a Business Continuity Plan

      Build Organizational Resilience

      • Evidence of disaster recovery and business continuity planning is increasingly required to comply with regulations, mitigate business risk, and meet customer demands.
      • IT leaders are often asked to take the lead on business continuity, but overall accountability for business continuity rests with the board of directors, and each business unit must create and maintain its business continuity plan.
      • Set an organizational mandate for BCM with the policy.
      • Divide the business continuity mandate into manageable parcels of work. Follow Info-Tech’s practical methodology to tackle key disaster recovery and business continuity planning activities one at a time.

      Info-Tech Best Practice

      Governance goals must be supported with effective, well-aligned procedures and processes. Use Info-Tech’s research to support the key Infrastructure & Operations processes that enable your business to create value.

      Availability, Capacity, and Operations Management

      What was old is new again. Use time-tested techniques to manage and plan cloud capacity and costs.

      An icon for the 'BAI04 Availability and Capacity Management' template. An icon for the 'DSS01 Operations Management' template. An icon for the 'BAI10 Configuration Management' template.

      Set the direction and requirements for effective availability and capacity management:

      • Availability and Capacity Management Policy
      • System Maintenance Policy – NIST

      Support the policy with the following Info-Tech research:

      • Develop an Availability and Capacity Management Plan
      • Improve IT Operations Management
      • Develop an IT Infrastructure Services Playbook

      Mature Service Delivery

      • Hybrid IT deployments – managing multiple locations, delivery models, and service providers – are the future of IT. Hybrid deployments significantly complicate capacity planning and operations management.
      • Effective operations management practices develop structured processes to automate activities and increase process consistency across the IT organization, ultimately improving IT efficiency.
      • Trying to add mature service delivery can feel like playing whack-a-mole. Systematically improve your service capabilities using the tactical, iterative approach outlined in Improve IT Operations Management.

      Enhance your overall security posture with a defensible, prescriptive policy suite

      Align your security policy suite with NIST Special Publication 800-171.

      Security policies support the organization’s larger security program. We’ve created a dedicated research blueprint and a set of templates that will help you build security policies around a robust framework.

      • Start with a security charter that aligns the security program with organizational objectives.
      • Prioritize security policies that address significant risks.
      • Work with technical and business stakeholders to adapt Info-Tech’s NIST SP 800-171–aligned policy templates (at right) to reflect your organizational objectives.

      A diagram listing all the different elements in a 'Security Charter': 'Access Control', 'Audit & Acc.', 'Awareness and Training', 'Config. Mgmt.', 'Identification and Auth.', 'Incident Response', 'Maintenance', 'Media Protection', 'Personnel Security', 'Physical Protection', 'Risk Assessment', 'Security Assessment', 'System and Comm. Protection', and 'System and Information Integrity'.

      Review and download Info-Tech's blueprint Develop and Deploy Security Policies.

      Info-Tech Best Practice

      Customize Info-Tech’s policy framework to align your policy suite to NIST SP 800-171. Given NIST’s requirements for the control of confidential information, organizations that align their policies to NIST standards will be in a strong governance position.

      PHASE 2: Develop Policies

      Step 2.2: Implement, enforce, measure, and maintain new policies

      This step will walk you through the following activities:

      • Gather stakeholder feedback
      • Identify preventive and detective controls
      • Identify required supports
      • Seek policy approval
      • Establish roles and responsibilities for policy maintenance

      This step involves the following participants:

      • Infrastructure & Operations Manager
      • Infrastructure Supervisors
      • Technical Writer
      • Policy Stakeholders

      Results & Insights

      • Results: Well-supported policies that have received signoff.
      • Insights: If you’re not prepared to enforce the policy, you might not actually need a policy. Use the policy statements as guidelines or standards, create and implement procedures, and build a culture of compliance. Once you can confidently execute on required controls, seek signoff.

      Gather feedback from users to assess the feasibility of the new policies

      Associated Activity icon 2(b) Review period: 1-2 weeks

      Once the policies are drafted, roundtable the drafts with stakeholders.

      INPUT: Draft policies

      OUTPUT: Reviewed policy drafts ready for approval

      Materials: Policy drafts

      Participants: Policy stakeholders

      1. Form a test group of users who will be affected by the policy in different ways. Keep the group to around five staff.
      2. Present new policies to the testers. Allow them to read the documents and attempt to comply with the new policies in their daily routines.
      3. Collect feedback from the group.
        • Consider using interviews, email surveys, chat channels, or group discussions.
        • Solicit ideas on how policy statements could be improved or streamlined.
      4. Make reasonable changes to the first draft of the policies before submitting them for approval. Policies will only be followed if they’re realistic and user friendly.

      Info-Tech Best Practice

      Allow staff the opportunity to provide input on policy development. Giving employees a say in policy development helps avoid obstacles down the road. This is especially true if you’re trying to change behavior rather than lock it in.

      Develop mechanisms for monitoring and enforcement

      Associated Activity icon 2(c) 20 minutes per policy

      Brainstorm preventive and detective controls.

      INPUT: Draft policies

      OUTPUT: Reviewed policy drafts ready for approval

      Materials: Policy drafts

      Participants: Policy stakeholders

      Preventive controls are designed to discourage or pre-empt policy breaches before they occur. Training, approvals processes, and segregation of duties are examples of preventive controls. (Ohio University)

      Detective controls help enforce the policy by identifying breaches after they occur. Forensic analysis and event log auditing are examples of detective controls. (Ohio University)

      Not all policies require the same level of enforcement. Policies that are required by law or regulation generally require stricter enforcement than policies that outline best practices or organizational values.

      Identify controls and enforcement mechanisms that are in line with policy requirements. Build control and enforcement into procedure documentation as needed.

      Suggestions:

      1. Have staff sign off on policies. Disclose any monitoring/surveillance.
      2. Ensure consequences match the severity of the infraction. Document infractions and ensure that enforcement is applied consistently across all infractions.
      3. Automatic controls shouldn’t get in the way of people’s ability to do their jobs. Test controls with users before you roll them out widely.

      Support the policy before seeking approval

      A policy is only as strong as its supporting pillars.

      Create Standards

      Standards are requirements that support policy adherence. Server builds and images, purchase approval criteria, and vulnerability severity definitions can all be examples of standards that improve policy adherence.

      Where reasonable, use automated controls to enforce standards. If you automate the control, consider how you’ll handle exceptions.

      Create Guidelines

      If no standards exist – or best practices can’t be monitored and enforced, as standards require – write guidelines to help users remain in compliance with the policy.

      Create Procedures: We’ll cover procedure development and documentation in Phase 3.

      Info-Tech Insight

      In general, failing to follow or strictly enforce a policy creates a risk for the business. If you’re not confident a policy will be followed or enforced, consider using policy statements as guidelines or standards as an interim measure as you update procedures and communicate and roll out changes that support adherence and enforcement.

      Seek approval and communicate the policy

      Policies ultimately need to be accepted by the business.

      • Once the drafts are completed, identify who is in charge of approving the policies.
      • Ensure all stakeholders understand the importance, context, and repercussions of the policies.
      • The approvals process is about appropriate oversight of the drafted policies. For example:
        • Do the policies satisfy compliance and regulatory requirements?
        • Do the policies work with the corporate culture?
        • Do the policies address the underlying need?

      If the draft is rejected:

      • Acquire feedback and make revisions.
      • Resubmit for approval.

      If the draft is approved:

      • Set the effective date and a review date.
      • Begin communication, training, and implementation.
      • Employees must know that there are new policies and understand the steps they must take to comply with the policies in their work.
      • Employees must be able to interpret, understand, and know how to act upon the information they find in the policies.
      • Employees must be informed on where to get help or ask questions and from whom to request policy exceptions.

      "A lot of board members and executive management teams… don’t understand the technology and the risks posed by it." (Carole Fennelly, Owner and Principal, cFennelly Consulting)

      Identify policy management roles and responsibilities

      Associated Activity icon 2(d) 30 minutes

      Discuss and assign roles and responsibilities for ongoing policy management.

      Role

      Responsibilities

      Executive sponsor

    • Supports the program at the highest levels of the business, as needed
    • Program lead

    • Leads the Infrastructure & Operations policy management program
    • Identifies and communicates status updates to the executive sponsor and the project team
    • Coordinates business demands and interviews and organizes stakeholders to identify requirements
    • Manages the work team and coordinates policy rollout
    • Policy writer

    • Authors and updates policies based on requirements
    • Coordinates with outsourced editor for completion of written documents
    • IT infrastructure SMEs

    • Provide technical insight into capabilities and limitations of infrastructure systems
    • Provide advice on possible controls that can aid policy rollout, monitoring, and enforcement
    • Legal expert

    • Provides legal advice on the policy’s legal terms and enforceability
    • "Whether at the level of a government, a department, or a sub-organization: technology and policy expertise complement one another and must be part of the conversation." (Peter Sheingold, Portfolio Manager, Cybersecurity, MITRE Corporation)

      Phase 2: Review accomplishments

      Effective Policies: Clear, Consistent, and Concise

      An icon for the 'DSS02 Service Desk' template.

      An icon for the 'DSS03 Incident and Problem Management' template.

      An icon for the 'BAI06 Change Management' template.

      An icon for the 'BAI07 Release Management' template.

      An icon for the 'BAI09 Asset Management' template.

      An icon for the 'DSS04 DR and Business Continuity' template.

      An icon for the 'BAI04 Availability and Capacity Management' template.

      An icon for the 'DSS01 Operations Management' template.

      An icon for the 'BAI10 Configuration Management' template.

      Summary of Accomplishments

      • Built priority policies based on templates aligned with the IT Management & Governance Framework and COBIT 5.
      • Reviewed controls and policy supports.
      • Assigned roles and responsibilities for ongoing policy maintenance.

      Develop Infrastructure & Operations Policies and Procedures

      Phase 3

      Document Effective Procedures

      PHASE 3: Document Effective Procedures

      Step 3.1: Scope and outline procedures

      This step will walk you through the following activities:

      • Prioritize SOP documentation
      • Draft workflows using a tabletop exercise
      • Modify templates, as applicable

      This step involves the following participants:

      • Infrastructure & Operations Manager
      • Technical Writer
      • Infrastructure Supervisors

      Results & Insights

      • Results: An action plan for SOP documentation and an outline of procedure workflows.
      • Insights: Don’t let tools get in the way of documentation – low-tech solutions are often the most effective way to build and analyze workflows.

      Prioritize your SOP documentation effort

      Associated Activity icon 3(a) 1-2 hours

      Build SOP documentation that gets used and doesn’t just check a box.

      1. Review the list of procedure gaps from Phase 1. Are any other procedures needed? Are some of the procedures now redundant?
      2. Establish the scope of the proposed procedures. Who are the stakeholders? What policies do they support?
      3. Run a basic prioritization exercise using a three-point scale. Higher scores mean greater risks or greater benefits. Score the risk of the undocumented procedure to the business (e.g. potential effect on data, productivity, goodwill, health and safety, or compliance). Score the benefit to the business of documenting the procedure (e.g. throughput improvements or knowledge transfer).
      4. Different procedures require different formats. Decide on one or more formats that can help you effectively document the procedure:
        • Flowcharts: Depict workflows and decision points. Provide an at-a-glance view that is easy to follow. Can be supported by checklists and diagrams where more detail is required.
        • Checklists: A reminder of what to do, rather than how to do it. Keep instructions brief.
        • Diagrams: Visualize objects, topologies, and connections for reference purposes.
        • Tables: Establish relationships between related categories.
        • Prose: Use full-text instructions where other documentation strategies are insufficient.

      Modify the following Info-Tech templates for larger SOPs

      Support these processes...

      ...with these blueprints...

      ...to create SOPs using these templates.

      An icon for the 'DSS04 DR and Business Continuity' template. Create a Right-Sized Disaster Recovery Plan DRP Summary
      An icon for the 'BAI09 Asset Management' template. Implement IT Asset Management HAM SOP and SAM SOP
      An icon for the 'BAI06 Change Management' template. An icon for the 'BAI07 Release Management' template. Optimize Change Management Change Management SOP
      An icon for the 'DSS02 Service Desk' template. An icon for the 'DSS03 Incident and Problem Management' template. Standardize the Service Desk Service Desk SOP

      Use tabletop planning or whiteboards to draft workflows

      Associated Activity icon 3(b) 30 minutes

      Tabletop planning is a paper-based exercise in which your team walks through a particular process and maps out what happens at each stage.

      OUTPUT: Steps in the current process for one SOP

      Materials: Tabletop, pen, and cue cards

      Participants: Process owners, SMEs

      1. For this exercise, choose one particular process to document.
      2. Document each step of the process on cue cards, which can be arranged on the table in sequence.
      3. Be sure to include task ownership in your steps.
      4. Map out the process as it currently happens – we’ll think about how to improve it later.
      5. Keep focused. Stay on task and on time.

      Example:

      • Step 3: PM reviews new defects daily
      • Step 4: PM assigns defects to tech leads
      • Step 5: Assigned resource updates status – frequency is based on ticket priority

      Info-Tech Insight

      Don’t get weighed down by tools. Relying on software or other technological tools can detract from the exercise. Use simple tools such as cue cards to record steps so that you can easily rearrange steps or insert steps based on input from the group.

      Collaborate to optimize the SOP

      Associated Activity icon 3(c) 30 minutes

      Review the tabletop exercise. What gaps exist in current processes?
      How can the processes be made better? What are the outputs and checkpoints?

      OUTPUT: Identify steps to optimize the SOP

      Materials: Tabletop, pen, and cue cards

      Participants: Process owners, SMEs

      Example:

      • Step 3: PM reviews new defects daily
      • NEW STEP: Schedule 10-minute daily defect reviews with PM and tech leads to evaluate ticket priority
      • Step 4: PM assigns defects to tech leads
      • Step 5: Assigned resource updates status – frequency is based on ticket priority
        • Step 5 Subprocess: Ticket status update
        • Step 5 Output: Ticket status moved to OPEN by assigned resource – acknowledges receipt by assigned resource

      A note on colors: Use white cards to record steps. Record gaps on yellow cards (e.g. a process step not documented) and risks on red cards (e.g. only one person knows how to execute a step) to highlight your gaps/to-dos and risks to be mitigated or accepted.

      If it’s necessary to clarify complex process flows during the exercise, you can also use green cards for decision diamonds, purple for document/report outputs, and blue for subprocesses.

      PHASE 3: Document Effective Procedures

      Step 3.2: Document effective procedures

      This step will walk you through the following activities:

      • Document workflows, checklists, and diagrams
      • Establish a cadence for document review and updates

      This step involves the following participants:

      • Infrastructure Manager
      • Technical Writer

      Results & Insights

      • Results: Improved SOP documentation and document management practices.
      • Insights: It’s possible to keep up with changes if you put the right cues and accountabilities in place. Include document review in project and change management procedures and hold staff accountable for completion.

      Document workflows with flowcharting software

      Suggestions for workflow documentation

      • Whether you draft the workflow on a whiteboard or using cue cards, the first iteration is usually messy. Clean up the flow as you document the results of the exercise.
      • Make the workflow as simple as possible and no simpler. Eliminate any decision points that aren’t strictly necessary to complete the procedure.
      • Use standard flowchart shapes (see next slide).
      • Use links to connect to related documentation.
      • Review the documented workflow with participants.

      Download the following workflow examples:

      Establish flowcharting standards

      If you don’t have existing flowchart standards, then keep it simple and stick to basic flowcharting conventions as described below.

      Basic flowcharting convention: a circle can be used for 'Start, End, and Connector'. Start, End, and Connector: Traditional flowcharting standards reserve this shape for connectors to other flowcharts or other points in the existing flowchart. Unified Modeling Language (UML) also uses the circle for start and end points.
      Basic flowcharting convention: a rounded rectangle can be used for 'Start and End'. Start and End: Traditional flowcharting standards use this for start and end. However, Info-Tech recommends using the circle shape to reduce the number of shapes and avoid confusion with other similar shapes.
      Basic flowcharting convention: a rectangle can be used for 'Process Step'. Process Step: Individual process steps or activities (e.g. create ticket or escalate ticket). If it’s a series of steps, then use the subprocess symbol and flowchart the subprocess separately.
      Basic flowcharting convention: a rectangle with double-line on the ends can be used for 'Subprocess'. Subprocess: A series of steps. For example, a critical incident SOP might reference a recovery process as one of the possible actions. Marking it as a subprocess, rather than listing each step within the critical incident SOP, streamlines the flowchart and avoids overlap with other flowcharts (e.g. the recovery process).
      Basic flowcharting convention: a diamond can be used for 'Decision'. Decision: Represents decision points, typically with Yes/No branches, but you could have other branches depending on the question (e.g. a “Priority?” question could branch into separate streams for Priority 1, 2, 3, 4, and 5 issues).
      Basic flowcharting convention: a rectangle with a wavy bottom can be used for 'Document/Report Output'. Document/Report Output: For example, the output from a backup process might include an error log.

      Support workflows with checklists and diagrams

      Diagrams

      • Diagrams are a visual representation of real-world phenomena and the connections between them.
      • Be sure to use standard shapes. Clearly label elements of the diagram. Use standard practices, including titles, dates, authorship, and versioning.
      • IT systems and interconnections are layered. Include physical, logical, protocol, and data flow connections.

      Examples:

      • XMPL Recovery Workflows
      • Workflow Library

      Checklists

      • Checklists are best used as short-form reminders on how to complete a particular task.
      • Remember the audience. If the process will be carried out by technical staff, there’s technical background material you won’t need to spell out in detail.

      Examples:

      • Employee Termination Process Checklist
      • XMPL Systems Recovery Playbook

      Establish a cadence for documentation review and maintenance

      Lock-in the work with strong document management practices.

      • Identify documentation requirements as part of project planning.
      • Require a manager or supervisor to review and approve SOPs.
      • Check documentation status as part of change management.
      • Hold staff accountable for documentation.

      "It isn’t unusual for us to see infrastructure or operations documentation that is wildly out of date. We’re talking months, even years. Often it was produced as one big effort and then not reliably maintained." (Gary Patterson, Consultant, Quorum Resources)

      Only a quarter of organizations update SOPs as needed

      A bar chart representing how often organizations update SOPs. Each option has two bars, one representing 'North America', the other representing 'Europe and Asia'. 'Never or rarely' is 11% in North America and 3% in Europe and Asia. 'Ad-hoc approach' is 38% in North America and 28% in Europe and Asia. 'For audits/annual reviews' is 33% in North America and 45% in Europe and Asia. 'As needed/via change management' is 18% in North America and 25% in Europe and Asia. Source: Info-Tech Research Group (N=104)

      Info-Tech Best Practice

      Use Info-Tech’s research Create Visual SOP Documents to further evaluate document management practices and toolsets.

      Phase 3: Review accomplishments

      Workflow documentation: Cue cards into flowcharts

      Summary of Accomplishments

      • Identified priority procedures for documentation activities.
      • Created procedure documentation in the appropriate format and level of granularity to support Infra & Ops policies.
      • Published and maintained procedure documentation.

      Research contributors and experts

      Carole Fennelly, Owner
      cFennelly Consulting

      Picture of Carole Fennelly, Owner, cFennelly Consulting.

      Carole Fennelly provides pragmatic cyber security expertise to help organizations bridge the gap between technical and business requirements. She authored the Center for Internet Security (CIS) Solaris and Red Hat benchmarks, which are used globally as configuration standards to secure IT systems. As a consultant, Carole has defined security strategies, and developed policies and procedures to implement them, at numerous Fortune 500 clients. Carole is a Certified Information Security Manager (CISM), Certified Security Compliance Specialist (CSCS), and Certified HIPAA Professional (CHP).

      Marko Diepold, IT Audit Manager
      audit2advise

      Picture of Marko Diepold, IT Audit Manager, audit2advise.

      Marko is an IT Audit Manager at audit2advise, where he delivers audit, risk advisory, and project management services. He has worked as a Security Officer, Quality Manager, and Consultant at some of Germany’s largest companies. He is a CISA and is ITIL v3 Intermediate and ITGCP certified.

      Research contributors and experts

      Martin Andenmatten, Founder & Managing Director
      Glenfis AG

      Picture of Martin Andenmatten, Founder and Managing Director, Glenfis AG.

      Martin is a digital transformation enabler who has been involved in various fields of IT for more than 30 years. At Glenfis, he leads large Governance and Service Management projects for various customers. Since 2002, he has been the course manager for ITIL® Foundation, ITIL® Service Management, and COBIT training. He has published two books on ISO 20000 and ITIL.

      Myles F. Suer, CIO Chat Facilitator
      CIO.com/Dell Boomi

      Picture of Myles F. Suer, CIO Chat Facilitator, CIO.com/Dell Boomi.

      Myles Suer, according to LeadTails, is the number 9 influencer of CIOs. He is also the facilitator for the CIOChat, which has executive-level participants from around the world in such industries as banking, insurance, education, and government. Myles is also the Industry Solutions Marketing Manager at Dell Boomi.

      Research contributors and experts

      Peter Sheingold, Portfolio Manager
      Cybersecurity, Homeland Security Center, The MITRE Corporation

      Picture of Peter Sheingold, Portfolio Manager, Cybersecurity, Homeland Security Center, The MITRE Corporation.

      Peter leads tasks that involve collaboration with the Department of Homeland Security (DHS) sponsors and MITRE colleagues and connect strategy, policy, organization, and technology. He brings a deep background in homeland security and strategic analysis to his work with DHS in the immigration, border security, and cyber mission spaces. Peter came to MITRE in 2005 but has worked with DHS from its inception.

      Robert D. Austin, Professor
      Ivey Business School

      Picture of Robert D. Austin, Professor, Ivey Business School.

      Dr. Austin is a professor of Information Systems at Ivey Business School and an affiliated faculty member at Harvard Medical School. Before his appointment at Ivey, he was a professor of Innovation and Digital Transformation at Copenhagen Business School, and, before that, a professor of Technology and Operations Management at the Harvard Business School.

      Research contributors and experts

      Ron Jones, Director of IT Infrastructure and Service Management
      DATA Communications

      Picture of Ron Jones, Director of IT Infrastructure and Service Management, DATA Communications.

      Ron is a senior IT leader with over 20 years of management experiences from engineering to IT Service Management and operations support. He is known for joining organizations and leading enhanced process efficiency and has improved software, hardware, infrastructure, and operations solution delivery and support. Ron has worked for global and Canadian firms including BlackBerry, DoubleClick, Cogeco, Infusion, Info-Tech Research Group, and Data Communications Management.

      Scott Genung, Executive Director of Networking, Infrastructure, and Service Operations
      University of Chicago

      Picture of Scott Genung, Executive Director of Networking, Infrastructure, and Service Operations, University of Chicago.

      Scott is an accomplished IT executive with 26 years of experience in technical and leadership roles. In his current role, Scott provides strategic leadership, vision, and oversight for an IT portfolio supporting 31,000 users consisting of services utilized by campuses located in North America, Asia, and Europe; oversees the University’s Command Center; and chairs the UC Cyberinfrastructure Alliance (UCCA), a group of research IT providers that collectively deliver services to the campus and partners.

      Research contributors and experts

      Steve Weil, CISSP, CISM, CRISC, Information Security Director, Cybersecurity Principal Consultant
      Point B

      Picture of Steve Weil, CISSP, CISM, CRISC, Information Security Director, Cybersecurity Principal Consultant, Point B.

      Steve has 20 years of experience in information security design, implementation, and assessment. He has provided information security services to a wide variety of organizations, including government agencies, hospitals, universities, small businesses, and large enterprises. With his background as a systems administrator, security consultant, security architect, and information security director, Steve has a strong understanding of both the strategic and tactical aspects of information security. Steve has significant hands-on experience with security controls, operating systems, and applications. Steve has a master's degree in Information Science from the University of Washington.

      Tony J. Read, Senior Program/Project Lead & Interim IT Executive
      Read & Associates

      Picture of Tony J. Read, Senior Program/Project Lead and Interim IT Executive, Read and Associates.

      Tony has over 25 years of international IT leadership experience, within high tech, computing, telecommunications, finance, banking, government, and retail industries. Throughout his career, Tony has led and successfully implemented key corporate initiatives, contributing millions of dollars to the top and bottom line. He established Read & Associates in 2002, an international IT management and program/project delivery consultancy practice whose aim is to provide IT value-based solutions, realizing stakeholder economic value and network advantage. These key concepts are presented in his new book: The IT Value Network: From IT Investment to Stakeholder Value, published by J. Wiley, NJ.

      Related Info-Tech research

      • Develop and Deploy Security Policies
      • Develop an Availability and Capacity Management Plan
      • Improve IT Operations Management
      • Develop an IT Infrastructure Services Playbook
      • Create a Right-Sized Disaster Recovery Plan
      • Develop a Business Continuity Plan
      • Implement IT Asset Management
      • Optimize Change Management
      • Standardize the Service Desk
      • Incident and Problem Management
      • Design & Build a User-Facing Service Catalog

      Bibliography

      “About Controls.” Ohio University, ND. Web. 2 Feb 2018.

      England, Rob. “How to implement ITIL for a client?” The IT Skeptic. Two Hills Ltd, 4 Feb. 2010. Web. 2018.

      “Global Corporate IT Security Risks: 2013.” Kaspersky Lab, May 2013. Web. 2018.

      “Information Security and Technology Policies.” City of Chicago, Department of Innovation and Technology, Oct. 2014. Web. 2018.

      ISACA. COBIT 5: Enabling Processes. International Systems Audit and Control Association. Rolling Meadows, IL.: 2012.

      “IT Policy & Governance.” NYC Information Technology & Telecommunications, ND. Web. 2018.

      King, Paula and Kent Wada. “IT Policy: An Essential Element of IT Infrastructure”. EDUCAUSE Review. May-June 2001. Web. 2018.

      Luebbe, Max. “Simplicity.” Site Reliability Engineering. O’Reilly Media. 2017. Web. 2018.

      Swartout, Shawn. “Risk assessment, acceptance, and exception with a process view.” ISACA Charlotte Chapter September Event, 2013. Web. 2018.

      “User Guide to Writing Policies.” Office of Policy and Efficiency, University of Colorado, ND. Web. 2018.

      “The Value of Policies and Procedures.” New Mexico Municipal League, ND. Web. 2018.

      Create a Service Management Roadmap

      • Buy Link or Shortcode: {j2store}394|cart{/j2store}
      • member rating overall impact: 8.9/10 Overall Impact
      • member rating average dollars saved: $71,003 Average $ Saved
      • member rating average days saved: 24 Average Days Saved
      • Parent Category Name: Service Management
      • Parent Category Link: /service-management
      • Inconsistent adoption of holistic practices has led to a chaotic service delivery model that results in poor customer satisfaction.
      • There is little structure, formalization, or standardization in the way IT services are designed and managed, leading to diminishing service quality and low business satisfaction.

      Our Advice

      Critical Insight

      • Having effective service management practices in place will allow you to pursue activities, such as innovation, and drive the business forward.
      • Addressing foundational elements like business alignment and management practices will enable you to build effective core practices that deliver business value.
      • Providing consistent leadership support and engagement is essential to allow practitioners to focus on delivering expected outcomes.

      Impact and Result

      • Understand the foundational and core elements that allow you to build a successful service management practice focused on outcomes.
      • Use Info-Tech’s advice and tools to perform an assessment of your organization’s current state, identify the gaps, and create a roadmap for success.
      • Increase business and customer satisfaction by delivering services focused on creating business value.

      Create a Service Management Roadmap Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why many service management maturity projects fail to address foundational and core elements, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Launch the project

      Kick-off the project and complete the project charter.

      • Create a Service Management Roadmap – Phase 1: Launch Project
      • Service Management Roadmap Project Charter

      2. Assess the current state

      Determine the current state for service management practices.

      • Create a Service Management Roadmap – Phase 2: Assess the Current State
      • Service Management Maturity Assessment Tool
      • Organizational Change Management Capability Assessment Tool
      • Service Management Roadmap Presentation Template

      3. Build the roadmap

      Build your roadmap with identified initiatives.

      • Create a Service Management Roadmap – Phase 3: Identify the Target State

      4. Build the communication slide

      Create the communication slide that demonstrates how things will change, both short and long term.

      • Create a Service Management Roadmap – Phase 4: Build the Roadmap
      [infographic]

      Workshop: Create a Service Management Roadmap

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Understand Service Management

      The Purpose

      Understand service management.

      Key Benefits Achieved

      Gain a common understanding of service management, the forces that impact your roadmap, and the Info-Tech Service Management Maturity Model.

      Activities

      1.1 Understand service management.

      1.2 Build a compelling vision and mission.

      Outputs

      Constraints and enablers chart

      Service management vision, mission, and values

      2 Assess the Current State of Service Management

      The Purpose

      Assess the organization’s current service management capabilities.

      Key Benefits Achieved

      Understand attitudes, behaviors, and culture.

      Understand governance and process ownership needs.

      Understand strengths, weaknesses, opportunities, and threats.

      Defined desired state.

      Activities

      2.1 Assess cultural ABCs.

      2.2 Assess governance needs.

      2.3 Perform SWOT analysis.

      2.4 Define desired state.

      Outputs

      Cultural improvements action items

      Governance action items

      SWOT analysis action items

      Defined desired state

      3 Continue Current-State Assessment

      The Purpose

      Assess the organization’s current service management capabilities.

      Key Benefits Achieved

      Understand the current maturity of service management processes.

      Understand organizational change management capabilities.

      Activities

      3.1 Perform service management process maturity assessment.

      3.2 Complete OCM capability assessment.

      3.3 Identify roadmap themes.

      Outputs

      Service management process maturity activities

      OCM action items

      Roadmap themes

      4 Build Roadmap and Communication Tool

      The Purpose

      Use outputs from previous steps to build your roadmap and communication one-pagers.

      Key Benefits Achieved

      Easy-to-understand roadmap one-pager

      Communication one-pager

      Activities

      4.1 Build roadmap one-pager.

      4.2 Build communication one-pager.

      Outputs

      Service management roadmap

      Service management roadmap – Brought to Life communication slide

      Further reading

      Create a Service Management Roadmap

      Implement service management in an order that makes sense.

      ANALYST PERSPECTIVE

      "More than 80% of the larger enterprises we’ve worked with start out wanting to develop advanced service management practices without having the cultural and organizational basics or foundational practices fully in place. Although you wouldn’t think this would be the case in large enterprises, again and again IT leaders are underestimating the importance of cultural and foundational aspects such as governance, management practices, and understanding business value. You must have these fundamentals right before moving on."

      Tony Denford,

      Research Director – CIO

      Info-Tech Research Group

      Our understanding of the problem

      This Research Is Designed For:

      • CIO
      • Senior IT Management

      This Research Will Help You:

      • Create or maintain service management (SM) practices to ensure user-facing services are delivered seamlessly to business users with minimum interruption.
      • Increase the level of reliability and availability of the services provided to the business and improve the relationship and communication between IT and the business.

      This Research Will Also Assist

      • Service Management Process Owners

      This Research Will Help Them:

      • Formalize, standardize, and improve the maturity of service management practices.
      • Identify new service management initiatives to move IT to the next level of service management maturity.

      Executive summary

      Situation

      • Inconsistent adoption of holistic practices has led to a chaotic service delivery model that results in poor customer satisfaction.
      • There is little structure, formalization, or standardization in the way IT services are designed and managed, leading to diminishing service quality and low business satisfaction.

      Complication

      • IT organizations want to be seen as strategic partners, but they fail to address the cultural and organizational constraints.
      • Without alignment with the business goals, services often fail to provide the expected value.
      • Traditional service management approaches are not adaptable for new ways of working.

      Resolution

      • Follow Info-Tech’s methodology to create a service management roadmap that will help guide the optimization of your IT services and improve IT’s value to the business.
      • The blueprint will help you right-size your roadmap to best suit your specific needs and goals and will provide structure, ownership, and direction for service management.
      • This blueprint allows you to accurately identify the current state of service management at your organization. Customize the roadmap and create a plan to achieve your target service management state.

      Info-Tech Insight

      Having effective service management practices in place will allow you to pursue activities such as innovation and drive the business forward. Addressing foundational elements like business alignment and management practices will enable you to build effective core practices that deliver business value. Consistent leadership support and engagement is essential to allow practitioners to focus on delivering expected outcomes.

      Poor service management manifests in many different pains across the organization

      Immaturity in service management will not result in one pain – rather, it will create a chaotic environment for the entire organization, crippling IT’s ability to deliver and perform.

      Low Service Management Maturity

      These are some of the pains that can be attributed to poor service management practices.

      • Frequent service-impacting incidents
      • Low satisfaction with the service desk
      • High % of failed deployments
      • Frequent change-related incidents
      • Frequent recurring incidents
      • Inability to find root cause
      • No communication with the business
      • Frequent capacity-related incidents

      And there are many more…

      Mature service management practices are a necessity, not a nice-to-have

      Immature service management practices are one of the biggest hurdles preventing IT from reaching its true potential.

      In 2004, PwC published a report titled “IT Moves from Cost Center to Business Contributor.” However, the 2014-2015 CSC Global CIO Survey showed that a high percentage of IT is still considered a cost center.

      And low maturity of service management practices is inhibiting activities such as agility, DevOps, digitalization, and innovation.

      A pie chart is shown that is titled: Where does IT sit? The chart has 3 sections. One section represents IT and the business have a collaborative partnership 28%. The next section represents at 33% where IT has a formal client/service provider relationship with the business. The last section has 39% where IT is considered as a cost center.
      Source: CSC Global CIO Survey: 2014-2015 “CIOs Emerge as Disruptive Innovators”

      39%: Resources are primarily focused on managing existing IT workloads and keeping the lights on.

      31%: Too much time and too many resources are used to handle urgent incidents and problems.

      There are many misconceptions about what service management is

      Misconception #1: “Service management is a process”

      Effective service management is a journey that encompasses a series of initiatives that improves the value of services delivered.

      Misconception #2: “Service Management = Service Desk”

      Service desk is the foundation, since it is the main end-user touch point, but service management is a set of people and processes required to deliver business-facing services.

      Misconception #3: “Service management is about the ITSM tool”

      The tool is part of the overall service management program, but the people and processes must be in place before implementing.

      Misconception #4: “Service management development is one big initiative”

      Service management development is a series of initiatives that takes into account an organization’s current state, maturity, capacities, and objectives.

      Misconception #5: “Service management processes can be deployed in any order, assuming good planning and design”

      A successful service management program takes into account the dependencies of processes.

      Misconception #6: “Service management is resolving incidents and deploying changes”

      Service management is about delivering high-value and high-quality services.

      Misconception #7: “Service management is not the key determinant of success”

      As an organization progresses on the service management journey, its ability to deliver high-value and high-quality services increases.

      Misconception #8: “Resolving Incidents = Success”

      Preventing incidents is the name of the game.

      Misconception #9: “Service Management = Good Firefighter”

      Service management is about understanding what’s going on with user-facing services and proactively improving service quality.

      Misconception #10: “Service management is about IT and technical services (e.g. servers, network, database)”

      Service management is about business/user-facing services and the value the services provide to the business.

      Service management projects often don’t succeed because they are focused on process rather than outcomes

      Service management projects tend to focus on implementing process without ensuring foundational elements of culture and management practices are strong enough to support the change.

      1. Aligning your service management goals with your organizational objectives leads to better understanding of the expected outcomes.
      2. Understand your customers and what they value, and design your practices to deliver this value.

      3. IT does not know what order is best when implementing new practices or process improvements.
      4. Don't run before you can walk. Fundamental practices must reach the maturity threshold before developing advanced practices. Implement continuous improvement on your existing processes so they continue to support new practices.

      5. IT does not follow best practices when implementing a practice.
      6. Our best-practice research is based on extensive experience working with clients through advisory calls and workshops.

      Info-Tech can help you create a customized, low-effort, and high-value service management roadmap that will shore up any gaps, prove IT’s value, and achieve business satisfaction.

      Info-Tech’s methodology will help you customize your roadmap so the journey is right for you

      With Info-Tech, you will find out where you are, where you want to go, and how you will get there.

      With our methodology, you can expect the following:

      • Eliminate or reduce rework due to poor execution.
      • Identify dependencies/prerequisites and ensure practices are deployed in the correct order, at the correct time, and by the right people.
      • Engage all necessary resources to design and implement required processes.
      • Assess current maturity and capabilities and design the roadmap with these factors in mind.

      Doing it right the first time around

      You will see these benefits at the end

        ✓ Increase the quality of services IT provides to the business.

        ✓ Increase business satisfaction through higher alignment of IT services.

        ✓ Lower cost to design, implement, and manage services.

        ✓ Better resource utilization, including staff, tools, and budget.

      Focus on a strong foundation to build higher value service management practices

      Info-Tech Insight

      Focus on behaviors and expected outcomes before processes.

      Foundational elements

      • Operating model facilitates service management goals
      • Culture of service delivery
      • Governance discipline to evaluate, direct, and monitor
      • Management discipline to deliver

      Stabilize

      • Deliver stable, reliable IT services to the business
      • Respond to user requests quickly and efficiently
      • Resolve user issues in a timely manner
      • Deploy changes smoothly and successfully

      Proactive

      • Avoid/prevent service disruptions
      • Improve quality of service (performance, availability, reliability)

      Service Provider

      • Understand business needs
      • Ensure services are available
      • Measure service performance, based on business-oriented metrics

      Strategic Partner

      • Fully aligned with business
      • Drive innovation
      • Drive measurable value

      Info-Tech Insight

      Continued leadership support of the foundational elements will allow delivery teams to provide value to the business. Set the expectation of the desired maturity level and allow teams to innovate.

      Follow our model and get to your target state

      A model is depicted that shows the various target states. There are 6 levels showing in the example, and the example is made to look like a tree with a character watering it. In the roots, the level is labelled foundational. The trunk is labelled the core. The lowest hanging branches of the tree is the stabilize section. Above it is the proactive section. Nearing the top of the tree is the service provider. The canopy of the tree are labelled strategic partner.

      Before moving to advanced service management practices, you must ensure that the foundational and core elements are robust enough to support them. Leadership must nurture these practices to ensure they are sustainable and can support higher value, more mature practices.

      Each step along the way, Info-Tech has the tools to help you

      Phase 1: Launch the Project

      Assemble a team with the right talent and vision to increase the chances of project success.

      Phase 2: Assess Current State

      Understand where you are currently on the service management journey using the maturity assessment tool.

      Phase 3: Build Roadmap

      Based on the assessments, build a roadmap to address areas for improvement.

      Phase 4: Build Communication slide

      Based on the roadmap, define the current state, short- and long-term visions for each major improvement area.

      Info-Tech Deliverables:

      • Project Charter
      • Assessment Tools
      • Roadmap Template
      • Communication Template

      CIO call to action

      Improving the maturity of the organization’s service management practice is a big commitment, and the project can only succeed with active support from senior leadership.

      Ideally, the CIO should be the project sponsor, even the project leader. At a minimum, the CIO needs to perform the following activities:

      1. Walk the talk – demonstrate personal commitment to the project and communicate the benefits of the service management journey to IT and the steering committee.
      2. Improving or adopting any new practice is difficult, especially for a project of this size. Thus, the CIO needs to show visible support for this project through internal communication and dedicated resources to help complete this project.

      3. Select a senior, capable, and results-driven project leader.
      4. Most likely, the implementation of this project will be lengthy and technical in some nature. Therefore, the project leader must have a good understanding of the current IT structure, senior standing within the organization, and the relationship and power in place to propel people into action.

      5. Help to define the target future state of IT’s service management.
      6. Determine a realistic target state for the organization based on current capability and resource/budget restraints.

      7. Conduct periodic follow-up meetings to keep track of progress.
      8. Reinforce or re-emphasize the importance of this project to the organization through various communication channels if needed.

      Stabilizing your environment is a must before establishing any more-mature processes

      CASE STUDY

      Industry: Manufacturing

      Source: Engagement

      Challenge

      • The business landscape was rapidly changing for this manufacturer and they wanted to leverage potential cost savings from cloud-first initiatives and consolidate multiple, self-run service delivery teams that were geographically dispersed.

      Solution

      Original Plan

      • Consolidate multiple service delivery teams worldwide and implement service portfolio management.

      Revised Plan with Service Management Roadmap:

      • Markets around the world had very different needs and there was little understanding of what customers value.
      • There was also no understanding of what services were currently being offered within each geography.

      Results

      • Plan was adjusted to understand customer value and services offered.
      • Services were then stabilized and standardized before consolidation.
      • Team also focused on problem maturity and drove a continuous improvement culture and increasing transparency.

      MORAL OF THE STORY:

      Understanding the value of each service allowed the organization to focus effort on high-return activities rather than continuous fire fighting.

      Understand the processes involved in the proactive phase

      CASE STUDY

      Industry: Manufacturing

      Source: Engagement

      Challenge

      • Services were fairly stable, but there were significant recurring issues for certain services.
      • The business was not satisfied with the service quality for certain services, due to periodic availability and reliability issues.
      • Customer feedback for the service desk was generally good.

      Solution

      Original Plan

      • Review all service desk and incident management processes to ensure that service issues were handled in an effective manner.

      Revised Plan with Service Management Roadmap:

      • Design and deploy a rigorous problem management process to determine the root cause of recurring issues.
      • Monitor key services for events that may lead to a service outage.

      Results

      • Root cause of recurring issues was determined and fixes were deployed to resolve the underlying cause of the issues.
      • Service quality improved dramatically, resulting in high customer satisfaction.

      MORAL OF THE STORY:

      Make sure that you understand which processes need to be reviewed in order to determine the cause for service instability. Focusing on the proactive processes was the right answer for this company.

      Have the right culture and structure in place before you become a service provider

      CASE STUDY

      Industry: Healthcare

      Source:Journal of American Medical Informatics Association

      Challenge

      • The IT organization wanted to build a service catalog to demonstrate the value of IT to the business.
      • IT was organized in technology silos and focused on applications, not business services.
      • IT services were not aligned with business activities.
      • Relationships with the business were not well established.

      Solution

      Original Plan

      • Create and publish a service catalog.

      Revised Plan: with Service Management Roadmap:

      • Establish relationships with key stakeholders in the business units.
      • Understand how business activities interface with IT services.
      • Lay the groundwork for the service catalog by defining services from the business perspective.

      Results

      • Strong relationships with the business units.
      • Deep understanding of how business activities map to IT services.
      • Service definitions that reflect how the business uses IT services.

      MORAL OF THE STORY:

      Before you build and publish a service catalog, make sure that you understand how the business is using the IT services that you provide.

      Calculate the benefits of using Info-Tech’s methodology

      To measure the value of developing your roadmap using the Info-Tech tools and methodology, you must calculate the effort saved by not having to develop the methods.

      A. How much time will it take to develop an industry-best roadmap using Info-Tech methodology and tools?

      Using Info-Tech’s tools and methodology you can accurately estimate the effort to develop a roadmap using industry-leading research into best practice.

      B. What would be the effort to develop the insight, assess your team, and develop the roadmap?

      This metric represents the time your team would take to be able to effectively assess themselves and develop a roadmap that will lead to service management excellence.

      C. Cost & time saving through Info-Tech’s methodology

      Measured Value

      Step 1: Assess current state

      Cost to assess current state:

      • 5 Directors + 10 Managers x 10 hours at $X an hour = $A

      Step 2: Build the roadmap

      Cost to create service management roadmap:

      • 5 Directors + 10 Managers x 8 hours at $X an hour = $B

      Step 3: Develop the communication slide

      Cost to create roadmaps for phases:

      • 5 Directors + 10 Managers x 6 hours at $X an hour = $C

      Potential financial savings from using Info-Tech resources:

      Estimated cost to do “B” – (Step 1 ($A) + Step 2 ($B) + Step 3 ($C)) = $Total Saving

      Info-Tech offers various levels of support to best suit your needs

      DIY Toolkit

      "Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful."

      Guided Implementation

      "Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keeps us on track."

      Workshop

      "We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place."

      Consulting

      "Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project."

      Diagnostics and consistent frameworks are used throughout all four options.

      Create a Service Management Roadmap – project overview


      Launch the project

      Assess the current state

      Build the roadmap

      Build communication slide

      Best-Practice Toolkit

      1.1 Create a powerful, succinct mission statement

      1.2 Assemble a project team with representatives from all major IT teams

      1.3 Determine project stakeholders and create a communication plan

      1.4 Establish metrics to track the success of the project

      2.1 Assess impacting forces

      2.2 Build service management vision, mission, and values

      2.3 Assess attitudes, behaviors, and culture

      2.4 Assess governance

      2.5 Perform SWOT analysis

      2.6 Identify desired state

      2.7 Assess SM maturity

      2.8 Assess OCM capabilities

      3.1 Document overall themes

      3.2 List individual initiatives

      4.1 Document current state

      4.2 List future vision

      Guided Implementations

      • Kick-off the project
      • Build the project team
      • Complete the charter
      • Understand current state
      • Determine target state
      • Build the roadmap based on current and target state
      • Build short- and long-term visions and initiative list

      Onsite Workshop

      Module 1: Launch the project

      Module 2: Assess current service management maturity

      Module 3: Complete the roadmap

      Module 4: Complete the communication slide

      Workshop overview

      Contact your account representative or email Workshops@InfoTech.com for more information

      Workshop Day 1

      Workshop Day 2

      Workshop Day 3

      Workshop Day 4

      Activities

      Understand Service Management

      1.1 Understand the concepts and benefits of service management.

      1.2 Understand the changing impacting forces that affect your ability to deliver services.

      1.3 Build a compelling vision and mission for your service management program.

      Assess the Current State of Your Service Management Practice

      2.1 Understand attitudes, behaviors, and culture.

      2.2 Assess governance and process ownership needs.

      2.3 Perform SWOT analysis.

      2.4 Define the desired state.

      Complete Current-State Assessment

      3.1 Conduct service management process maturity assessment.

      3.2 Identify organizational change management capabilities.

      3.3 Identify themes for roadmap.

      Build Roadmap and Communication Tool

      4.1 Build roadmap one-pager.

      4.2 Build roadmap communication one-pager.

      Deliverables

      1. Constraints and enablers chart
      2. Service management vision, mission, and values
      1. Action items for cultural improvements
      2. Action items for governance
      3. Identified improvements from SWOT
      4. Defined desired state
      1. Service Management Process Maturity Assessment
      2. Organizational Change Management Assessment
      1. Service management roadmap
      2. Roadmap Communication Tool in the Service Management Roadmap Presentation Template

      PHASE 1

      Launch the Project

      Launch the project

      This step will walk you through the following activities:

      • Create a powerful, succinct mission statement based on your organization’s goals and objectives.
      • Assemble a project team with representatives from all major IT teams.
      • Determine project stakeholders and create a plan to convey the benefits of this project.
      • Establish metrics to track the success of the project.

      Step Insights

      • The project leader should have a strong relationship with IT and business leaders to maximize the benefit of each initiative in the service management journey.
      • The service management roadmap initiative will touch almost every part of the organization; therefore, it is important to have representation from all impacted stakeholders.
      • The communication slide needs to include the organizational change impact of the roadmap initiatives.

      Phase 1 outline

      Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.

      Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.

      Guided Implementation 1: Launch the Project

      Step 1.1 – Kick-off the Project

      Start with an analyst kick-off call:

      • Identify current organization pain points relating to poor service management practices
      • Determine high-level objectives
      • Create a mission statement

      Then complete these activities…

      • Identify potential team members who could actively contribute to the project
      • Identify stakeholders who have a vested interest in the completion of this project

      With these tools & templates:

      • Service Management Roadmap Project Charter

      Step 1.2 – Complete the Charter

      Review findings with analyst:

      • Create the project team; ensure all major IT teams are represented
      • Review stakeholder list and identify communication messages

      Then complete these activities…

      • Establish metrics to complete project planning
      • Complete the project charter

      With these tools & templates:

      • Service Management Roadmap Project Charter

      Use Info-Tech’s project charter to begin your initiative

      1.1 Service Management Roadmap Project Charter

      The Service Management Roadmap Project Charter is used to govern the initiative throughout the project. It provides the foundation for project communication and monitoring.

      The template has been pre-populated with sample information appropriate for this project. Please review this sample text and change, add, or delete information as required.

      The charter includes the following sections:

      • Mission Statement
      • Goals & Objectives
      • Project Team
      • Project Stakeholders
      • Current State (from phases 2 & 3)
      • Target State (from phases 2 & 3)
      • Target State
      • Metrics
      • Sponsorship Signature
      A screenshot of Info-Tech's Service Management Roadmap Project Charter is shown.

      Use Info-Tech’s ready-to-use deliverable to customize your mission statement

      Adapt and personalize Info-Tech’s Service Management Roadmap Mission Statement and Goals & Objectives below to suit your organization’s needs.

      Goals & Objectives

      • Create a plan for implementing service management initiatives that align with the overall goals/objectives for service management.
      • Identify service management initiatives that must be implemented/improved in the short term before deploying more advanced initiatives.
      • Determine the target state for each initiative based on current maturity and level of investment available.
      • Identify service management initiatives and understand dependencies, prerequisites, and level of effort required to implement.
      • Determine the sequence in which initiatives should be deployed.
      • Create a detailed rollout plan that specifies initiatives, time frames, and owners.
      • Engage the right teams and obtain their commitment throughout both the planning and assessment of roadmap initiatives.
      • both the planning and assessment of roadmap initiatives. Obtain support for the completed roadmap from executive stakeholders.

      Example Mission Statement

      To help [Organization Name] develop a set of service management practices that will better address the overarching goals of the IT department.

      To create a roadmap that sequences initiatives in a way that incorporates best practices and takes into consideration dependencies and prerequisites between service management practices.

      To garner support from the right people and obtain executive buy-in for the roadmap.

      Create a well-balanced project team

      The project leader should be a member of your IT department’s senior executive team with goals and objectives that will be impacted by service management implementation. The project leader should possess the following characteristics:

      Leader

      • Influence and impact
      • Comprehensive knowledge of IT and the organization
      • Relationship with senior IT management
      • Ability to get things done

      Team Members

      Identify

      The project team members are the IT managers and directors whose day-to-day lives will be impacted by the service management roadmap and its implementation. The service management initiative will touch almost every IT staff member in the organization; therefore, it is important to have representatives from every single group, including those that are not mentioned. Some examples of individuals you should consider for your team:

      • Service Delivery Managers
      • Director/Manager of Applications
      • Director/Manager of Infrastructure
      • Director/Manager of Service Desk
      • Business Relationship Managers
      • Project Management Office

      Engage & Communicate

      You want to engage your project participants in the planning process as much as possible. They should be involved in the current-state assessment, the establishment of goals and objectives, and the development of your target state.

      To sell this project, identify and articulate how this project and/or process will improve the quality of their job. For example, a formal incident management process will benefit people working at the service desk or on the applications or infrastructure teams. Helping them understand the gains will help to secure their support throughout the long implementation process by giving them a sense of ownership.

      The project stakeholders should also be project team members

      When managing stakeholders, it is important to help them understand their stake in the project as well as their own personal gain that will come out of this project.

      For many of the stakeholders, they also play a critical role in the development of this project.

      Role & Benefits

      • CIO
      • The CIO should be actively involved in the planning stage to help determine current and target stage.

        The CIO also needs to promote and sell the project to the IT team so they can understand that higher maturity of service management practices will allow IT to be seen as a partner to the business, giving IT a seat at the table during decision making.

      • Service Delivery Managers/Process Owners
      • Service Delivery Managers are directly responsible for the quality and value of services provided to the business owners. Thus, the Service Delivery Managers have a very high stake in the project and should be considered for the role of project leader.

        Service Delivery Managers need to work closely with the process owners of each service management process to ensure clear objectives are established and there is a common understanding of what needs to be achieved.

      • IT Steering Committee
      • The Committee should be informed and periodically updated about the progress of the project.

      • Manager/Director – Service Desk
      • The Manager of the Service Desk should participate closely in the development of fundamental service management processes, such as service desk, incident management, and problem management.

        Having a more established process in place will create structure, governance, and reduce service desk staff headaches so they can handle requests or incidents more efficiently.

      • Manager/Director –Applications & Infrastructure
      • The Manager of Applications and Infrastructure should be heavily relied on for their knowledge of how technology ties into the organization. They should be consulted regularly for each of the processes.

        This project will also benefit them directly, such as improving the process to deploy a fix into the environment or manage the capacity of the infrastructure.

      • Business Relationship Manager
      • As the IT organization moves up the maturity ladder, the Business Relationship Manager will play a fundamental role in the more advanced processes, such as business relationship management, demand management, and portfolio management.

        This project will be an great opportunity for the Business Relationship Manager to demonstrate their value and their knowledge of how to align IT objectives with business vision.

      Ensure you get the entire IT organization on board for the project with a well-practiced change message

      Getting the IT team on board will greatly maximize the project’s chance of success.

      One of the top challenges for organizations embarking on a service management journey is to manage the magnitude of the project. To ensure the message is not lost, communicate this roadmap in two steps.

      1. Communicate the roadmap initiative

      The most important message to send to the IT organization is that this project will benefit them directly. Articulate the pains that IT is currently experiencing and explain that through more mature service management, these pains can be greatly reduced and IT can start to earn a place at the table with the business.

      2. Communicate the implementation of each process separately

      The communication of process implementation should be done separately and at the beginning of each implementation. This is to ensure that IT staff do not feel overwhelmed or overloaded. It also helps to keep the project more manageable for the project team.

      Continuously monitor feedback and address concerns throughout the entire process

      • Host lunch and learns to provide updates on the service management initiative to the entire IT team.
      • Understand if there are any major roadblocks and facilitate discussions on how to overcome them.

      Articulate the service management initiative to the IT organization

      Spread the word and bring attention to your change message through effective mediums and organizational changes.

      Key aspects of a communication plan

      The methods of communication (e.g. newsletters, email broadcast, news of the day, automated messages) notify users of implementation.

      In addition, it is important to know who will deliver the message (delivery strategy). You need IT executives to deliver the message – work hard on obtaining their support as they are the ones communicating to their staff and should be your project champions.

      Anticipate organizational changes

      The implementation of the service management roadmap will most likely lead to organizational changes in terms of structure, roles, and responsibilities. Therefore, the team should be prepared to communicate the value that these changes will bring.

      Communicating Change

      • What is the change?
      • Why are we doing it?
      • How are we going to go about it?
      • What are we trying to achieve?
      • How often will we be updated?

      The Qualities of Leadership: Leading Change

      Create a project communication plan for your stakeholders

      This project cannot be successfully completed without the support of senior IT management.

      1. After the CIO has introduced this project through management meetings or informal conversation, find out how each IT leader feels about this project. You need to make sure the directors and managers of each IT team, especially the directors of application and infrastructure, are on board.
      2. After the meeting, the project leader should seek out the major stakeholders (particularly the heads of applications and infrastructure) and validate their level of support through formal or informal meetings. Create a list documenting the major stakeholders, their level of support, and how the project team will work to gain their approval.
      3. For each identified stakeholder, create a custom communication plan based on their role. For example, if the director of infrastructure is not a supporter, demonstrate how this project will enable them to better understand how to improve service quality. Provide periodic reporting or meetings to update the director on project progress.

      INPUT

      • A collaborative discussion between team members

      OUTPUT

      • Thorough briefing for project launch
      • A committed team

      Materials

      • Communication message and plan
      • Metric tracking

      Participants

      • Project leader
      • Core project team

      If you want additional support, have our analysts guide you through this phase as part of an Info-Tech workshop

      Book a workshop with our Info-Tech analysts:

      Photo of an Info-Tech analyst is shown.
      • To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team.
      • Info-Tech analysts will join you and your team onsite at your location or welcome you to Info-Tech’s historic Toronto office to participate in an innovative onsite workshop.
      • Contact your account manager (www.infotech.com/account), or email Workshops@InfoTech.com for more information.

      The following are sample activities that will be conducted by Info-Tech analysts with your team:

      1.1

      A screenshot of activity 1.1 is shown.

      Create a powerful, succinct mission statement

      Using Info-Tech’s sample mission statement as a guide, build your mission statement based on the objectives of this project and the benefits that this project will achieve. Keep the mission statement short and clear.

      1.2

      A screenshot of activity 1.2 is shown.

      Assemble the project team

      Create a project team with representatives from all major IT teams. Engage and communicate to the project team early and proactively.

      1.3

      A screenshot of activity 1.3 is shown.

      Identify project stakeholders and create a communication plan

      Info-Tech will help you identify key stakeholders who have a vested interest in the success of the project. Determine the communication message that will best gain their support.

      1.4

      A screenshot of activity 1.4 is shown.

      Use metrics to track the success of the project

      The onsite analyst will help the project team determine the appropriate metrics to measure the success of this project.

      PHASE 2

      Assess Your Current Service Management State

      Assess your current state

      This step will walk you through the following activities:

      • Use Info-Tech’s Service Management Maturity Assessment Tool to determine your overall practice maturity level.
      • Understand your level of completeness for each individual practice.
      • Understand the three major phases involved in the service management journey; know the symptoms of each phase and how they affect your target state selection.

      Step Insights

      • To determine the real maturity of your service management practices, you should focus on the results and output of the practice, rather than the activities performed for each process.
      • Focus on phase-level maturity as opposed to the level of completeness for each individual process.

      Phase 2 outline

      Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.

      Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.

      Guided Implementation 2: Determine Your Service Management Current State

      Step 2.1 – Assess Impacting Forces

      Start with an analyst kick-off call:

      • Discuss the impacting forces that can affect the success of your service management program
      • Identify internal and external constraints and enablers
      • Review and interpret how to leverage or mitigate these elements

      Then complete these activities…

      • Present the findings of the organizational context
      • Facilitate a discussion and create consensus amongst the project team members on where the organization should start

      With these tools & templates:

      Service Management Roadmap Presentation Template

      Step 2.2 – Build Vision, Mission, and Values

      Review findings with analyst:

      • Review your service management vision and mission statement and discuss the values

      Then complete these activities…

      • Socialize the vision, mission, and values to ensure they are aligned with overall organizational vision. Then, set the expectations for behavior aligned with the vision, mission, and values

      With these tools & templates:

      Service Management Roadmap Presentation Template

      Step 2.3 – Assess Attitudes, Behaviors, and Culture

      Review findings with analyst:

      • Discuss tactics for addressing negative attitudes, behaviors, or culture identified

      Then complete these activities…

      • Add items to be addressed to roadmap

      With these tools & templates:

      Service Management Roadmap Presentation Template

      Step 2.4 – Assess Governance Needs

      Review findings with analyst:

      • Understand the typical types of governance structure and the differences between management and governance
      • Choose the management structure required for your organization

      Then complete these activities…

      • Determine actions required to establish an effective governance structure and add items to be addressed to roadmap

      With these tools & templates:

      Service Management Roadmap Presentation Template

      Step 2.5 – Perform SWOT Analysis

      Review findings with analyst:

      • Discuss SWOT analysis results and tactics for addressing within the roadmap

      Then complete these activities…

      • Add items to be addressed to roadmap

      With these tools & templates:

      Service Management Roadmap Presentation Template

      Step 2.6 – Identify Desired State

      Review findings with analyst:

      • Discuss desired state and commitment needed to achieve aspects of the desired state

      Then complete these activities…

      • Use the desired state to critically assess the current state of your service management practices and whether they are achieving the desired outcomes
      • Prep for the SM maturity assessment

      With these tools & templates:

      Service Management Roadmap Presentation Template

      Step 2.7 – Perform SM Maturity Assessment

      Review findings with analyst:

      • Review and interpret the output from your service management maturity assessment

      Then complete these activities…

      • Add items to be addressed to roadmap

      With these tools & templates:

      Service Management Roadmap Presentation Template

      Service Management Maturity Assessment

      Step 2.8 – Review OCM Capabilities

      Review findings with analyst:

      • Review and interpret the output from your organizational change management maturity assessment

      Then complete these activities…

      • Add items to be addressed to roadmap

      With these tools & templates:

      Service Management Roadmap Presentation Template

      Organizational Change Management Assessment

      Understand and assess impacting forces – constraints and enablers

      Constraints and enablers are organizational and behavioral triggers that directly impact your ability and approach to establishing Service Management practices.

      A model is shown to demonstrate the possibe constraints and enablers on your service management program. It incorporates available resources, the environment, management practices, and available technologies.

      Effective service management requires a mix of different approaches and practices that best fit your organization. There’s not a one-size-fits-all solution. Consider the resources, environment, emerging technologies, and management practices facing your organization. What items can you leverage or use to mitigate to move your service management program forward?

      Use Info-Tech’s “Organizational Context” template to list the constraints and enablers affecting your service management

      The Service Management Roadmap Presentation Template will help you understand the business environment you need to consider as you build out your roadmap.

      Discuss and document constraints and enablers related to the business environment, available resources, management practices, and emerging technologies. Any constraints will need to be addressed within your roadmap and enablers should be leveraged to maximize your results.


      Screenshot of Info-Tech's Service Management Roadmap Presentation Template is shown.

      Document constraints and enablers

      1. Discuss and document the constrains and enablers for each aspect of the management mesh: environment, resources, management practices, or technology.
      2. Use this as a thought provoker in later exercises.

      INPUT

      • A collaborative discussion

      OUTPUT

      • Organizational context constraints and enablers

      Materials

      • Whiteboards or flip charts

      Participants

      • All stakeholders

      Build compelling vision and mission statements to set the direction of your service management program

      While you are articulating the vision and mission, think about the values you want the team to display. Being explicit can be a powerful tool to create alignment.

      A vision statement describes the intended state of your service management organization, expressed in the present tense.

      A mission statement describes why your service management organization exists.

      Your organizational values state how you will deliver services.

      Use Info-Tech’s “Vision, Mission, and Values” template to set the aspiration & purpose of your service management practice

      The Service Management Roadmap Presentation Template will help you document your vision for service management, the purpose of the program, and the values you want to see demonstrated.

      If the team cannot gain agreement on their reason for being, it will be difficult to make traction on the roadmap items. A concise and compelling statement can set the direction for desired behavior and help team members align with the vision when trying to make ground-level decisions. It can also be used to hold each other accountable when undesirable behavior emerges. It should be revised from time to time, when the environment changes, but a well-written statement should stand the test of time.

      A screenshot of the Service Management Roadmap Presentation Temaplate is shown. Specifically it is showing the section on the vision, mission, and values results.

      Document your organization’s vision, mission , and values

      1. Vision: Identify your desired target state, consider the details of that target state, and create a vision statement.
      2. Mission: Consider the fundamental purpose of your SM program and craft a statement of purpose.
      3. Values: As you work through the vision and mission, identify values that your organization prides itself in or has the aspiration for.
      4. Discuss common themes and then develop a concise vision statement and mission statement that incorporates the group’s ideas.

      INPUT

      • A collaborative discussion

      OUTPUT

      • Vision statement
      • Mission statement
      • Organizational values

      Materials

      • Whiteboards or flip charts
      • Sample vision and mission statements

      Participants

      • All stakeholders
      • Senior leadership

      Understanding attitude, behavior, and culture

      Attitude

      • What people think and feel. It can be seen in their demeanor and how they react to change initiatives, colleagues, and users.

      Any form of organizational change involves adjusting people’s attitudes, creating buy-in and commitment. You need to identify and address attitudes that can lead to negative behaviors and actions or that are counter-productive. It must be made visible and related to your desired behavior.

      Behaviour

      • What people do. This is influenced by attitude and the culture of the organization.

      To implement change within IT, especially at a tactical level, both IT and organizational behavior needs to change. This is relevant because people don’t like to change and will resist in an active or passive way unless you can sell the need, value, and benefit of changing their behavior.

      Culture

      • The accepted and understood ways of working in an organization. The values and standards that people find normal and what would be tacitly identified to new resources.

      The organizational or corporate “attitude,” the impact on employee behavior and attitude is often not fully understood. Culture is an invisible element, which makes it difficult to identify, but it has a strong impact and must be addressed to successfully embed any organizational change or strategy.

      Culture is a critical and under-addressed success factor

      43% of CIOs cited resistance to change as the top impediment to a successful digital strategy.

      CIO.com

      75% of organizations cannot identify or articulate their culture or its impact.

      Info-Tech

      “Shortcomings in organizational culture are one of the main barriers to company success in the digital age.”

      McKinsey – “Culture for a digital age”

      Examples of how they apply

      Attitude

      • “I’ll believe that when I see it”
      • Positive outlook on new ideas and changes

      Behaviour

      • Saying you’ll follow a new process but not doing so
      • Choosing not to document a resolution approach or updating a knowledge article, despite being asked

      Culture

      • Hero culture (knowledge is power)
      • Blame culture (finger pointing)
      • Collaborative culture (people rally and work together)

      Why have we failed to address attitude, behavior, and culture?

        ✓ While there is attention and better understanding of these areas, very little effort is made to actually solve these challenges.

        ✓ The impact is not well understood.

        ✓ The lack of tangible and visible factors makes it difficult to identify.

        ✓ There is a lack of proper guidance, leadership skills, and governance to address these in the right places.

        ✓ Addressing these issues has to be done proactively, with intent, rigor, and discipline, in order to be successful.

        ✓ We ignore it (head in the sand and hoping it will fix itself).

      Avoidance has been a common strategy for addressing behavior and culture in organizations.

      Use Info-Tech’s “Culture and Environment” template to identify cultural constraints that should be addressed in roadmap

      The Service Management Roadmap Presentation Template will help you document attitude, behavior, and culture constraints.

      Discuss as a team attitudes, behaviors, and cultural aspects that can either hinder or be leveraged to support your vision for the service management program. Capture all items that need to be addressed in the roadmap.

      A screenshot of the Service Management Roadmap Presentation Template is shown. Specifically showing the culture and environment slide.

      Document your organization’s attitudes, behaviors, and culture

      1. Discuss and document positive and negative aspects of attitude, behavior, or culture within your organization.
      2. Identify the items that need to be addressed as part of your roadmap.

      INPUT

      • A collaborative discussion

      OUTPUT

      • Culture and environment worksheet

      Materials

      • Whiteboards or flip charts

      Participants

      • All stakeholders

      The relationship to governance

      Attitude, behavior, and culture are still underestimated as core success factors in governance and management.

      Behavior is a key enabler of good governance. Leading by example and modeling behavior has a cascading impact on shifting culture, reinforcing the importance of change through adherence.

      Executive leadership and governing bodies must lead and support cultural change.

      Key Points

      • Less than 25% of organizations have formal IT governance in place (ITSM Tools).
      • Governance tends to focus on risk and compliance (controls), but forgets the impact of value and performance.

      Lack of oversight often limits the value of service management implementations

      Organizations often fail to move beyond risk mitigation, losing focus of the goals of their service management practices and the capabilities required to produce value.

      Risk Mitigation

      • Stabilize IT
      • Service Desk
      • Incident Management
      • Change Management

      Gap

      • Organizational alignment through governance
      • Disciplined focus on goals of SM

      Value Production

      • Value that meets business and consumer needs

      This creates a situation where service management activities and roadmaps focus on adjusting and tweaking process areas that no longer support how the organization needs to work.

      How does establishing governance for service management provide value?

      Governance of service management is a gap in most organizations, which leads to much of the failure and lack of value from service management processes and activities.

      Once in place, effective governance enables success for organizations by:

      1. Ensuring service management processes improve business value
      2. Measuring and confirming the value of the service management investment
      3. Driving a focus on outcome and impact instead of simply process adherence
      4. Looking at the integrated impact of service management in order to ensure focused prioritization of work
      5. Driving customer-experience focus within organizations
      6. Ensuring quality is achieved and addressing quality impacts and dependencies between processes

      Four common service management process ownership models

      Your ownership structure largely defines how processes will need to be implemented, maintained, and improved. It has a strong impact on their ability to integrate and how other teams perceive their involvement.

      An organizational structure is shown. In the image is an arrow, with the tip facing in the right direction. The left side of the arrow is labelled: Traditional, and the right side is labelled: Complex. The four models are noted along the arrow. Starting on the left side and going to the right are: Distributed Process Ownership, Centralized Process Ownership, Federated Process Ownership, and Service Management Office.

      Most organizations are somewhere within this spectrum of four core ownership models, usually having some combination of shared traits between the two models that are closest to them on the scale.

      Info-Tech Insight

      The organizational structure that is best for you depends on your needs, and one is not necessarily better than another. The next four slides describe when each ownership level is most appropriate.

      Distributed process ownership

      Distributed process ownership is usually evident when organizations initially establish their service management practices. The processes are assigned to a specific group, who assumes some level of ownership over its execution.

      The distributed process ownership model is shown. CIO is listed at the top with four branches leading out from below it. The four branches are labelled: Service Desk, Operations, Applications, and Security.

      Info-Tech Insight

      This model is often a suitable approach for initial implementations or where it may be difficult to move out of siloes within the organization’s structure or culture.

      Centralized process ownership

      Centralized process ownership usually becomes necessary for organizations as they move into a more functional structure. It starts to drive management of processes horizontally across the organization while still retaining functional management control.

      A centralized process ownership model is shown. The CIO is at the top and the following are branches below it: Service Manager, Support, Middleware, Development, and Infrastructure.

      Info-Tech Insight

      This model is often suitable for maturing organizations that are starting to look at process integration and shared service outcomes and accountability.

      Federated process ownership

      Federated process ownership allows for global control and regional variation, and it supports product orientation and Agile/DevOps principles

      A federated process ownership model is shown. The Sponsor/CIO is at the top, with the ITSM Executive below it. Below that level is the: Process Owner, Process Manager, and Process Manager.

      Info-Tech Insight

      Federated process ownership is usually evident in organizations that have an international or multi-regional presence.

      Service management office (SMO)

      SMO structures tend to occur in highly mature organizations, where service management responsibility is seen as an enterprise accountability.

      A service management office model is shown. The CIO is at the top with the following branches below it: SMO, End-User Services, Infra., Apps., and Architecture.

      Info-Tech Insight

      SMOs are suitable for organizations with a defined IT and organizational strategy. A SMO supports integration with other enterprise practices like enterprise architecture and the PMO.

      Determine which process ownership and governance model works best for your organization

      The Service Management Roadmap Presentation Template will help you document process ownership and governance model

      Example:

      Key Goals:

        ☐ Own accountability for changes to core processes

        ☐ Understand systemic nature and dependencies related to processes and services

        ☐ Approve and prioritize improvement and CSI initiatives related to processes and services

        ☐ Evaluate success of initiative outcomes based on defined benefits and expectations

        ☐ Own Service Management and Governance processes and policies

        ☐ Report into ITSM executive or equivalent body

      Membership:

        ☐ Process Owners, SM Owner, Tool Owner/Liaison, Audit

      Discuss as a team which process ownership model works for your organization. Determine who will govern the service management practice. Determine items that should be identified in your roadmap to address governance and process ownership gaps.

      Use Info-Tech’s “SWOT” template to identify strengths, weaknesses, opportunities & threats that should be addressed

      The Service Management Roadmap Presentation Template will help you document items from your SWOT analysis.

      A screenshot of the Service Management Roadmap Presentation Template is shown. Specifically the SWOT section is shown.

      Brainstorm the strengths, weaknesses, opportunities, and threats related to resources, environment, technology, and management practices. Add items that need to be addressed to your roadmap.

      Perform a SWOT analysis

      1. Brainstorm each aspect of the SWOT with an emphasis on:
      • Resources
      • Environment
      • Technologies
      • Management Practices
    • Record your ideas on a flip chart or whiteboard.
    • Add items to be addressed to the roadmap.
    • INPUT

      • A collaborative discussion

      OUTPUT

      • SWOT analysis
      • Priority items identified

      Materials

      • Whiteboards or flip charts

      Participants

      • All stakeholders

      Indicate desired maturity level for your service management program to be successful

      Discuss the various maturity levels and choose a desired level that would meet business needs.

      The desired maturity model is depicted.

      INPUT

      • A collaborative discussion

      OUTPUT

      • Desired state of service management maturity

      Materials

      • None

      Participants

      • All stakeholders

      Use Info-Tech’s Service Management Process Maturity Assessment Tool to understand your current state

      The Service Management Process Maturity Assessment Tool will help you understand the true state of your service management.

      A screenshot of Info-Tech's Service Management Process Assessment Tool is shown.

      Part 1, Part 2, and Part 3 tabs

      These three worksheets contain questions that will determine the overall maturity of your service management processes. There are multiple sections of questions focused on different processes. It is very important that you start from Part 1 and continue the questions sequentially.

      Results tab

      The Results tab will display the current state of your service management processes as well as the percentage of completion for each individual process.

      Complete the service management process maturity assessment

      The current-state assessment will be the foundation of building your roadmap, so pay close attention to the questions and answer them truthfully.

      1. Start with tab 1 in the Service Management Process Maturity Assessment Tool. Remember to read the questions carefully and always use the feedback obtained through the end-user survey to help you determine the answer.
      2. In the “Degree of Process Completeness” column, use the drop-down menu to input the results solicited from the goals and objectives meeting you held with your project participants.
      3. A screenshot of Info-Tech's Service Management Process Assessment Tool is shown. Tab 1 is shown.
      4. Host a meeting with all participants following completion of the survey and have them bring their results. Discuss in a round-table setting, keeping a master sheet of agreed upon results.

      INPUT

      • Service Management Process Maturity Assessment Tool questions

      OUTPUT

      • Determination of current state

      Materials

      • Service Management Process Maturity Assessment Tool

      Participants

      • Project team members

      Review the results of your current-state assessment

      At the end of the assessment, the Results tab will have action items you could perform to close the gaps identified by the process assessment tool.

      A screenshot of Info-Tech's Service Management Process Maturity Assessment Results is shown.

      INPUT

      • Maturity assessment results

      OUTPUT

      • Determination of overall and individual practice maturity

      Materials

      • Service Management Maturity Assessment Tool

      Participants

      • Project team members

      Use Info-Tech’s OCM Capability Assessment tool to understand your current state

      The Organizational Change Management Capabilities Assessment tool will help you understand the true state of your organizational change management capabilities.

      A screenshot of Info-Tech's Organizational Change Management Capabilities Assessment

      Complete the Capabilities tab to capture the current state for organizational change management. Review the Results tab for interpretation of the capabilities. Review the Recommendations tab for actions to address low areas of maturity.

      Complete the OCM capability assessment

      1. Open Organizational Change Management Capabilities Assessment tool.
      2. Come to consensus on the most appropriate answer for each question. Use the 80/20 rule.
      3. Review result charts and discuss findings.
      4. Identify roadmap items based on maturity assessment.

      INPUT

      • A collaborative discussion

      OUTPUT

      • OCM Assessment tool
      • OCM assessment results

      Materials

      • OCM Capabilities Assessment tool

      Participants

      • All stakeholders

      If you want additional support, have our analysts guide you through this phase as part of an Info-Tech workshop

      Book a workshop with our Info-Tech analysts:

      Photo of an Info-Tech analyst is shown.

      • To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team.
      • Info-Tech analysts will join you and your team onsite at your location or welcome you to Info-Tech’s historic Toronto office to participate in an innovative onsite workshop.
      • Contact your account manager (www.infotech.com/account), or email Workshops@InfoTech.com for more information.

      The following are sample activities that will be conducted by Info-Tech analysts with your team:

      2.1

      A screenshot of activity 2.1 is shown.

      Create a powerful, succinct mission statement

      Using Info-Tech’s sample mission statement as a guide, build your mission statement based on the objectives of this project and the benefits that this project will achieve. Keep the mission statement short and clear.

      2.2

      A screenshot of activity 2.2 is shown.

      Complete the assessment

      With the project team in the room, go through all three parts of the assessment with consideration of the feedback received from the business.

      2.3

      A screenshot of activity 2.3 is shown.

      Interpret the results of the assessment

      The Info-Tech onsite analyst will facilitate a discussion on the overall maturity of your service management practices and individual process maturity. Are there any surprises? Are the results reflective of current service delivery maturity?

      PHASE 3

      Build Your Service Management Roadmap

      Build Roadmap

      This step will walk you through the following activities:

      • Document your vision and mission on the roadmap one-pager.
      • Using the inputs from the current-state assessments, identify the key themes required by your organization.
      • Identify individual initiatives needed to address key themes.

      Step Insights

      • Using the Info-Tech thought model, address foundational gaps early in your roadmap and establish the management methods to continuously make them more robust.
      • If any of the core practices are not meeting the vision for your service management program, be sure to address these items before moving on to more advanced service management practices or processes.
      • Make sure the story you are telling with your roadmap is aligned to the overall organizational goals.

      Phase 3 outline

      Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.

      Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.

      Guided Implementation 3: Determine Your Service Management Target State

      Step 3.1 – Document the Overall Themes

      Start with an analyst kick-off call:

      • Review the outputs from your current-state assessments to identify themes for areas that need to be included in your roadmap

      Then complete these activities…

      • Ensure foundational elements are solid by adding any gaps to the roadmap
      • Identify any changes needed to management practices to ensure continuous improvement

      With these tools & templates:

      Service Management Roadmap Presentation Template

      Step 3.2 – Determine Individual Initiatives

      Review findings with analyst:

      • Determine the individual initiatives needed to close the gaps between the current state and the vision

      Then complete these activities…

      • Finalize and document roadmap for executive socialization

      With these tools & templates:

      Service Management Roadmap Presentation Template

      Focus on a strong foundation to build higher value service management practices

      Info-Tech Insight

      Focus on behaviors and expected outcomes before processes.

      Foundational elements

      • Operating model facilitates service management goals
      • Culture of service delivery
      • Governance discipline to evaluate, direct, and monitor
      • Management discipline to deliver

      Stabilize

      • Deliver stable, reliable IT services to the business
      • Respond to user requests quickly and efficiently
      • Resolve user issues in a timely manner
      • Deploy changes smoothly and successfully

      Proactive

      • Avoid/prevent service disruptions
      • Improve quality of service (performance, availability, reliability)

      Service Provider

      • Understand business needs
      • Ensure services are available
      • Measure service performance, based on business-oriented metrics

      Strategic Partner

      • Fully aligned with business
      • Drive innovation
      • Drive measurable value

      Info-Tech Insight

      Continued leadership support of the foundational elements will allow delivery teams to provide value to the business. Set the expectation of the desired maturity level and allow teams to innovate.

      Identify themes that can help you build a strong foundation before moving to higher level practices

      A model is depicted that shows the various target states. There are 6 levels showing in the example, and the example is made to look like a tree with a character watering it. In the roots, the level is labelled foundational. The trunk is labelled the core. The lowest hanging branches of the tree is the stabilize section. Above it is the proactive section. Nearing the top of the tree is the service provider. The top most branches of the tree is labelled strategic partner.

      Before moving to advanced service management practices, you must ensure that the foundational and core elements are robust enough to support them. Leadership must nurture these practices to ensure they are sustainable and can support higher value, more mature practices.

      Use Info-Tech’s “Service Management Roadmap” template to document your vision, themes and initiatives

      The Service Management Roadmap Presentation Template contains a roadmap template to help communicate your vision, themes to be addressed, and initiatives

      A screenshot of Info-Tech's Service Management Roadmap template is shown.

      Working from the lower maturity items to the higher value practices, identify logical groupings of initiatives into themes. This will aid in communicating the reasons for the needed changes. List the individual initiatives below the themes. Adding the service management vision and mission statements can help readers understand the roadmap.

      Document your service management roadmap

      1. Document the service management vision and mission on the roadmap template.
      2. Identify, from the assessments, areas that need to be improved or implemented.
      3. Group the individual initiatives into logical themes that can ease communication of what needs to happen.
      4. Document the individual initiatives.
      5. Document in terms that business partners and executive sponsors can understand.

      INPUT

      • Current-state assessment outputs
      • Maturity model

      OUTPUT

      • Service management roadmap

      Materials

      • Whiteboard
      • Roadmap template

      Participants

      • All stakeholders

      If you want additional support, have our analysts guide you through this phase as part of an Info-Tech workshop

      Book a workshop with our Info-Tech analysts:

      Photo of an Info-Tech analyst is shown.

      • To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team.
      • Info-Tech analysts will join you and your team onsite at your location or welcome you to Info-Tech’s historic Toronto office to participate in an innovative onsite workshop.
      • Contact your account manager (www.infotech.com/account), or email Workshops@InfoTech.com for more information.

      The following are sample activities that will be conducted by Info-Tech analysts with your team:

      3.1

      A screenshot of activity 3.1 is shown.

      Identify themes to address items from the foundational level up to higher value service management practices

      Identify easily understood themes that will help others understand the expected outcomes within your organization.

      A screenshot of activity 3.2 is shown.

      Document individual initiatives that contribute to the themes

      Identify specific activities that will close gaps identified in the assessments.

      PHASE 2

      Build Communication Slide

      Complete your service management roadmap

      This step will walk you through the following activities:

      • Use the current-state assessment exercises to document the state of your service management practices. Document examples of the behaviors that are currently seen.
      • Document the expected short-term gains. Describe how you want the behaviors to change.
      • Document the long-term vision for each item and describe the benefits you expect to see from addressing each theme.

      Step Insights

      • Use the communication template to acknowledge the areas that need to be improved and paint the short- and long-term vision for the improvements to be made through executing the roadmap.
      • Write it in business terms so that it can be used widely to gain acceptance of the upcoming changes that need to occur.
      • Include specific areas that need to be fixed to make it more tangible.
      • Adding the values from the vision, mission, and values exercise can also help you set expectations about how the team will behave as they move towards the longer-term vision.

      Phase 4 Outline

      Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.

      Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.

      Guided Implementation 4: Build the Service Management Roadmap

      Step 4.1: Document the Current State

      Start with an analyst kick-off call:

      • Review the pain points identified from the current state analysis
      • Discuss tactics to address specific pain points

      Then complete these activities…

      • Socialize the pain points within the service delivery teams to ensure nothing is being misrepresented
      • Gather ideas for the future state

      With these tools & templates:

      Service Management Roadmap Presentation Template

      Step 4.2: List the Future Vision

      Review findings with analyst:

      • Review short- and long-term vision for improvements for the pain points identified in the current state analysis

      Then complete these activities…

      • Prepare to socialize the roadmap
      • Ensure long-term vision is aligned with organizational objectives

      With these tools & templates:

      Service Management Roadmap Presentation Template

      Use Info-Tech’s “Service Management Roadmap – Brought to Life” template to paint a picture of the future state

      The Service Management Roadmap Presentation Template contains a communication template to help communicate your vision of the future state

      A screenshot of Info-Tech's Service Management Roadmap - Brought to Life template

      Use this template to demonstrate how existing pain points to delivering services will improve over time by painting a near- and long-term picture of how things will change. Also list specific initiatives that will be launched to affect the changes. Listing the values identified in the vision, mission, and values exercise will also demonstrate the team’s commitment to changing behavior to create better outcomes.

      Document your current state and list initiatives to address them

      1. Use the previous assessments and feedback from business or customers to identify current behaviors that need addressing.
      2. Focus on high-impact items for this document, not an extensive list.
      3. An example of step 1 and 2 are shown.
      4. List the initiatives or actions that will be used to address the specific pain points.

      An example of areas for improvement.

      INPUT

      • Current-state assessment outputs
      • Feedback from business

      OUTPUT

      • Service Management Roadmap Communication Tool, in the Service Management Roadmap Presentation

      Materials

      • Whiteboard
      • Roadmap template

      Participants

      • All stakeholders

      Document your future state

      An example of document your furture state is shown.

      1. For each pain point document the expected behaviors, both short term and longer term.
      2. Write in terms that allow readers to understand what to expect from your service management practice.

      INPUT

      • Current-state assessment outputs
      • Feedback from business

      OUTPUT

      • Service Management Roadmap Communication Tool, in the Service Management Roadmap Presentation Template

      Materials

      • Whiteboard
      • Roadmap template

      Participants

      • All stakeholders

      If you want additional support, have our analysts guide you through this phase as part of an Info-Tech workshop

      Book a workshop with our Info-Tech analysts:

      Photo of an Info-Tech analyst is shown.

      • To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team.
      • Info-Tech analysts will join you and your team onsite at your location or welcome you to Info-Tech’s historic Toronto office to participate in an innovative onsite workshop.
      • Contact your account manager (www.infotech.com/account), or email Workshops@InfoTech.com for more information.

      The following are sample activities that will be conducted by Info-Tech analysts with your team:

      4.1

      A screenshot of activity 4.1 is shown.

      Identify the pain points and initiatives to address them

      Identify items that the business can relate to and initiatives or actions to address them.

      4.2

      A screenshot of activity 4.2 is shown.

      Identify short- and long-term expectations for service management

      Communicate the benefits of executing the roadmap both short- and long-term gains.

      Research contributors and experts

      Photo of Valence Howden

      Valence Howden, Principal Research Director, CIO Practice

      Info-Tech Research Group

      Valence helps organizations be successful through optimizing how they govern, design, and execute strategies, and how they drive service excellence in all work. With 30 years of IT experience in the public and private sectors, he has developed experience in many information management and technology domains, with focus in service management, enterprise and IT governance, development and execution of strategy, risk management, metrics design and process design, and implementation and improvement.

      Photo of Graham Price

      Graham Price, Research Director, CIO Practice

      Info-Tech Research Group

      Graham has an extensive background in IT service management across various industries with over 25 years of experience. He was a principal consultant for 17 years, partnering with Fortune 500 clients throughout North America, leveraging and integrating industry best practices in IT service management, service catalog, business relationship management, IT strategy, governance, and Lean IT and Agile.

      Photo of Sharon Foltz

      Sharon Foltz, Senior Workshop Director

      Info-Tech Research Group

      Sharon is a Senior Workshop Director at Info-Tech Research Group. She focuses on bringing high value to members via leveraging Info-Tech’s blueprints and other resources enhanced with her breadth and depth of skills and expertise. Sharon has spent over 15 years in various IT roles in leading companies within the United States. She has strong experience in organizational change management, program and project management, service management, product management, team leadership, strategic planning, and CRM across various global organizations.

      Related Info-Tech Research

      Build a Roadmap for Service Management Agility

      Extend the Service Desk to the Enterprise

      Bibliography

      • “CIOs Emerge as Disruptive Innovators.” CSC Global CIO Survey: 2014-2015. Web.
      • “Digital Transformation: How Is Your Organization Adapting?” CIO.com, 2018. Web.
      • Goran, Julie, Laura LaBerge, and Ramesh Srinivasan. “Culture for a digital age.” McKinsey, July 2017. Web.
      • The Qualities of Leadership: Leading Change. Cornelius & Associates, 14 April 2012.
      • Wilkinson, Paul. “Culture, Ethics, and Behavior – Why Are We Still Struggling?” ITSM Tools, 5 July 2018. Web.

      Quality Management

      • Buy Link or Shortcode: {j2store}45|cart{/j2store}
      • Related Products: {j2store}45|crosssells{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Service Planning and Architecture
      • Parent Category Link: /service-planning-and-architecture
      Drive efficiency and agility with right-sized quality management

      2021 CIO Priorities Report

      • Buy Link or Shortcode: {j2store}83|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: IT Strategy
      • Parent Category Link: /it-strategy
      • It is a new year, but the challenges of 2020 remain: COVID-19 infection rates continue to climb, governments continue to enforce lockdown measures, we continue to find ourselves in the worst economic crisis since the Great Depression, and civil unrest grows in many democratic societies.
      • At the start of 2020, no business leader predicted the disruption that was to come. This left IT in a reactive but critical role as the health crisis hit. It was core to delivering the organization’s products and services, as it drove the radical shift to work-from-home.
      • For the year ahead, IT will continue to serve a critical function in uncertain times. However, unlike last year, CIOs can better prepare for 2021. That said, in the face of the uncertainty and volatility of the year ahead, what they need to prepare for is still largely undefined.
      • But despite the lack of confidence on knowing specifically what is to come, most business leaders will admit they need to get ready for it. This year’s priority report will help.

      Our Advice

      Critical Insight

      • “Resilience” is the theme for this year’s CIO Priorities Report. In this context, resilience is about building up the capacity and the capabilities to effectively respond to emergent and unforeseen needs.
      • Early in 2021 is a good time to develop resilience in several different areas. As we explore in this year’s Report, CIOs can best facilitate enterprise resilience through strategic financial planning, proactive risk management, effective organizational change management and capacity planning, as well as through remaining tuned into emergent technologies to capitalize on innovations to help weather the uncertainty of the year ahead.

      Impact and Result

      • Use Info-Tech’s 2021 CIO Priorities Report to prepare for the uncertainty of the year ahead. Across our five priorities we provide five avenues through which CIOs can demonstrate resilient planning, enabling the organization as a whole to better confront what’s coming in 2021.
      • Each of our priorities is backed up by a “call to action” that will help CIOs start to immediately implement the right drivers of resilience for their organization.
      • By building up resilience across our five key areas, CIOs will not only be able to better prepare for the year to come, but also strengthen business relations and staff morale in difficult times.

      2021 CIO Priorities Report Research & Tools

      Read the 2021 CIO Priorities Report

      Use Info-Tech’s 2021 CIO Priorities Report to prepare for the uncertainty of the year ahead. Across our five priorities we provide five avenues through which CIOs can demonstrate resilient planning, enabling the organization as a whole to better confront what’s coming in 2021.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Create an appropriate budget reserve

      Identifying and planning sources of financial contingency will help ensure CIOs can meet unforeseen and emergent operational and business needs throughout the year.

      • 2021 CIO Priorities Report: Priority 1 – Create an Appropriate Budget Reserve

      2. Refocus IT risk planning

      The start of 2021 is a time to refocus and redouble IT risk management and business continuity planning to bring it up to the standards of our “new normal.” Indeed, if last year taught us anything, it’s that no “black swan” should be off the table in terms of scenarios or possibilities for business disruption.

      • 2021 CIO Priorities Report: Priority 2 – Refocus IT Risk Planning

      3. Strengthen organizational change management capabilities

      At its heart, resilience is having the capacity to deal with unexpected change. Organizational change management can help build up this capacity, providing the ability to strategically plot known changes while leaving some capacity to absorb the unknowns as they present themselves.

      • 2021 CIO Priorities Report: Priority 3 – Strengthen Organizational Change Management Capabilities

      4. Establish capacity awareness

      Capacity awareness facilitates resilience by providing capital in the form of resource data. With this data, CIOs can make better decisions on what can be approved and when it can be scheduled for.

      • 2021 CIO Priorities Report: Priority 4 – Establish Capacity Awareness

      5. Keep emerging technologies in view

      Having an up-to-date view of emerging technologies will enable the resilient CIO to capitalize on and deploy leading-edge innovations as the business requires.

      • 2021 CIO Priorities Report: Priority 5 – Keep Emerging Technologies in View
      [infographic]

      Build an Information Security Strategy

      • Buy Link or Shortcode: {j2store}242|cart{/j2store}
      • member rating overall impact: 9.5/10 Overall Impact
      • member rating average dollars saved: $45,303 Average $ Saved
      • member rating average days saved: 34 Average Days Saved
      • Parent Category Name: Security Strategy & Budgeting
      • Parent Category Link: /security-strategy-and-budgeting
      • Many security leaders struggle to decide how to best to prioritize their scarce information security resources
      • The need to move from a reactive approach to security towards a strategic planning approach is clear. The path to getting there is less so.

      Our Advice

      Critical Insight

      The most successful information security strategies are:

      • Holistic – They consider the full spectrum of information security, including people, processes, and technology.
      • Risk aware – They understand that security decisions should be made based on the security risks facing their organization, not just on “best practice.”
      • Business aligned – They demonstrate an understanding of the goals and strategies of the organization and how the security program can support the business.

      Impact and Result

      • Info-Tech has developed a highly effective approach to building an information security strategy, an approach that has been successfully tested and refined for more than seven years with hundreds of different organizations:
      • This approach includes tools for:
        • Ensuring alignment with business objectives.
        • Assessing organizational risk and stakeholder expectations.
        • Enabling a comprehensive current state assessment.
        • Prioritizing initiatives and building out a security roadmap.

      Build an Information Security Strategy Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Information Security (IS) Strategy Research – A step-by-step document that helps you build a holistic, risk-based, and business-aligned IS strategy.

      Your security strategy should not be based on trying to blindly follow best practices but on a holistic risk-based assessment that is risk aware and aligns with your business context. Use this storyboard to augment your security strategy by ensuring alignment with business objectives, assessing your organization's risk and stakeholder expectations, understanding your current security state, and prioritizing initiatives and a security roadmap.

      • Build an Information Security Strategy – Phases 1-4

      2. Information Security Requirements Gathering Tool – A tool to make informed security risk decisions to support business needs.

      Use this tool to formally identify business goals and customer and compliance obligations and make explicit links to how security initiatives propose to support these business interests. Then define the scope and boundaries for the security strategy and the risk tolerance definitions that will guide future security risk decisions.

      • Information Security Requirements Gathering Tool

      3. Information Security Pressure Analysis Tool – An evaluation tool to invest in the right security functions using a pressure analysis approach.

      Security pressure posture analysis helps your organization assess your real security context and enables you to invest in the right security functions while balancing the cost and value in alignment with business strategies. Security pressure sets the baseline that will help you avoid over-investing or under-investing in your security functions.

      • Information Security Pressure Analysis Tool

      4. Information Security Program Gap Analysis Tool – A structured tool to systematically understand your current security state.

      Effective security planning should not be one size fits all – it must consider business alignment, security benefit, and resource cost. To enable an effective security program, all areas of security need to be evaluated closely to determine where the organization sits currently and where it needs to go in the future.

      • Information Security Program Gap Analysis Tool

      5. Information Security Strategy Communication Deck – A best-of-breed presentation document to build a clear, concise, and compelling strategy document.

      Use this communication deck template to present the results of the security strategy to stakeholders, demonstrate the progression from the current state to the future state, and establish the roadmap of the security initiatives that will be implemented. This information security communication deck will help ensure that you’re communicating effectively for your cause.

      • Information Security Strategy Communication Deck

      6. Information Security Charter – An essential document for defining the scope and purpose of a security project or program.

      A charter is an essential document for defining the scope and purpose of security. Without a charter to control and set clear objectives for this committee, the responsibility of security governance initiatives will likely be undefined within the enterprise, preventing the security governance program from operating efficiently. This template can act as the foundation for a security charter to provide guidance to the governance of information security.

      • Information Security Charter
      [infographic]

      Workshop: Build an Information Security Strategy

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Assess Security Requirements

      The Purpose

      Understand business and IT strategy and plans.

      Key Benefits Achieved

      Defined security obligations, scope, and boundaries.

      Activities

      1.1 Define business and compliance.

      1.2 Establish security program scope.

      1.3 Analyze the organization’s risk and stakeholder pressures.

      1.4 Identify the organizational risk tolerance level.

      Outputs

      Security obligations statement

      Security scope and boundaries statement

      Defined risk tolerance level

      Risk assessment and pressure analysis

      2 Perform a Gap Analysis

      The Purpose

      Define the information security target state.

      Key Benefits Achieved

      Set goals and Initiatives for the security strategy in line with the business objectives.

      Activities

      2.1 Assess current security capabilities.

      2.2 Identify security gaps.

      2.3 Build initiatives to bridge the gaps.

      Outputs

      Information security target state

      Security current state assessment

      Initiatives to address gaps

      3 Complete the Gap Analysis

      The Purpose

      Continue assessing current security capabilities.

      Key Benefits Achieved

      Identification of security gaps and initiatives to bridge them according to the business goals.

      Activities

      3.1 Identify security gaps.

      3.2 Build initiatives to bridge the maturity gaps.

      3.3 Identify initiative list and task list.

      3.4 Define criteria to be used to prioritize initiatives.

      Outputs

      Completed security current state assessment

      Task list to address gaps

      Initiative list to address gaps

      Prioritize criteria

      4 Develop the Roadmap

      The Purpose

      Create a plan for your security strategy going forward.

      Key Benefits Achieved

      Set path forward to achieving the target state for the business through goal cascade and gap initiatives.

      Activities

      4.1 Conduct cost/benefit analysis on initiatives.

      4.2 Prioritize gap initiatives based on cost and alignment with business.

      4.3 Build an effort list.

      4.4 Determine state times and accountability.

      4.5 Finalize security roadmap and action plan.

      4.6 Create communication plan.

      Outputs

      Information security roadmap

      Draft communication deck

      5 Communicate and Implement

      The Purpose

      Finalize deliverables.

      Key Benefits Achieved

      Consolidate documentation into a finalized deliverable that can be used to present to executives and decision makers to achieve buy-in for the project.

      Activities

      5.1 Support communication efforts.

      5.2 Identify resources in support of priority initiatives.

      Outputs

      Security strategy roadmap documentation

      Detailed cost and effort estimates

      Mapping of Info-Tech resources against individual initiatives

      Further reading

      Build an Information Security Strategy

      Create value by aligning your strategy to business goals and business risks.

      Analyst Perspective

      Set your security strategy up for success.

      “Today’s rapid pace of change in business innovation and digital transformation is a call to action to information security leaders.

      Too often, chief information security officers find their programs stuck in reactive mode, a result of years of mounting security technical debt. Shifting from a reactive to proactive stance has never been more important. Unfortunately, doing so remains a daunting task for many.

      While easy to develop, security plans premised on the need to blindly follow ‘best practices’ are unlikely to win over many stakeholders. To be truly successful, an information security strategy needs to be holistic, risk-aware, and business-aligned.”

      Kevin Peuhkurinen

      Research Director – Security, Risk & Compliance

      Info-Tech Research Group

      Executive summary

      Your Challenge

      • Many security leaders struggle to decide how best to prioritize their scarce information security resources.
      • The need to move from a reactive approach to security toward a strategic planning approach is clear. The path to getting there is less clear.

      Common Obstacle

      • Developing a security strategy can be challenging. Complications include:
        • Performing an accurate assessment of your current security program can be extremely difficult when you don’t know what to assess or how.
        • Determining the appropriate target state for security can be even more challenging. A strategy built around following best practices is unlikely to garner significant support from business stakeholders.

      Info-Tech’s Approach

      • Info-Tech has developed a highly effective approach to building an information security strategy, an approach that has been successfully tested and refined for 7+ years with hundreds of organizations.
      • This unique approach includes tools for:
        • Ensuring alignment with business objectives.
        • Assessing organizational risk and stakeholder expectations.
        • Enabling a comprehensive current state assessment.
        • Prioritizing initiatives and building out a security roadmap.

      Info-Tech Insight

      The most successful information security strategies are:

      • Holistic. They consider the full spectrum of information security, including people, processes, and technologies.
      • Risk-Aware. They understand that security decisions should be made based on the security risks facing their organization, not just on best practice.
      • Business-Aligned. They demonstrate an understanding of the goals and strategies of the organization, and how the security program can support the business.

      It’s not a matter of if you have a security incident, but when

      Organizations need to prepare and expect the inevitable security breach.

      Fifty-eight percent of companies surveyed that experienced a breach were small businesses.

      Eighty-nine percent of breaches have a financial or espionage motive.

      Three graphs are depicted. The first is labeled ‘Total Cost for Three Data Breach Root Causes,’ the second ‘Distribution of Benchmark by Root Cause of the Data Breach,’ and the third ‘Per Capita for Three Root Causes of a Data Breach.’ The three root causes are malicious or criminal attack (US$166 million per capita), system glitch ($132 million per capita), and human error ($133 million per capita).

      Source: Ponemon Institute, “2019 Global Cost of Data Breach Study”

      An information security strategy can help you prepare for incidents

      Organizations need to expect the inevitable security breach.

      90%

      of businesses have experienced an external threat in the last year.

      50%

      of IT professionals consider security to be their number one priority.

      53%

      of organizations claimed to have experienced an insider attack in the previous 12 months. 1

      46%

      of businesses believe the frequency of attacks is increasing. 2

      Effective IT leaders approach their security strategy from an understanding that attacks on their organization will occur. Building a strategy around this assumption allows your security team to understand the gaps in your current approach and become proactive instead of being reactive.

      Sources: 1 Kaspersky Lab, “Global IT Security Risks Survey”; 2 CA Technologies, “Insider Threat 2018 Report”

      Persistent Issues

      Evolving Ransomware

      • Continual changes in types and platforms make ransomware a persistent threat. The frequency of ransomware attacks was reported to have increased by 67% in the past five years. 1

      Phishing Attacks

        • Despite filtering and awareness, email remains the most common threat vector for phishing attacks (94%) and an average of 3% of participants in phishing campaigns still click on them. 2

      Insider Privilege and Misuse

      • Typically, 34% of breaches are perpetrated by insiders, with 15% involving privilege misuse. Takeaway: Care less about titles and more about access levels. 3

      Denial of Service

      • The median amount of time that an organization is under attack from DDoS attack is three days.

      Emerging Trends

      Advanced Identity and Access Governance

      • Using emerging technologies in automation, orchestration, and machine learning, the management and governance of identities and access has become more advanced.

      Sources: 1 Accenture, “2019 The Cost of Cyber Crime Study”; 2,3 Verizon, “2019 Data Breach Investigations Report”

      New threat trends in information security aren’t new.

      Previously understood attacks are simply an evolution of prior implementations, not a revolution.

      Traditionally, most organizations are not doing a good-enough job with security fundamentals, which is why attackers have been able to use the same old tricks.

      However, information security has finally caught the attention of organizational leaders, presenting the opportunity to implement a comprehensive security program.

      Cyberattacks have a significant financial impact

      Global average cost of a data breach: $3.92 Million

      Source: Ponemon Institute, “2019 Cost of a Data Breach Study: Global Overview”

      A bar graph, titled ‘Average cost of data breach by industry,’ is depicted. Of 17 industries depicted, public is the lowest average cost (US$1.29 million) and health is the highest average cost ($6.45 million).

      Primary incident type (with a confirmed data breach)

      1. Leading incident type is Denial of Service attacks (DoS), taking up to 70% of all incidents.
      2. When it comes to data breaches, we see that the use of stolen credentials leads to the most cases of confirmed breaches, accounting for 29%.

      Personal records tend to be the most compromised data types, while databases tend to be the most frequently involved asset in breaches.

      Source: Verizon, “2019 Data Breach Investigations Report”

      Security threats are not going away

      We continue to see and hear of security breaches occurring regularly.

      A bar graph depicts the percentage of businesses who experienced a data breach in the last year–US total and global total. Numbers have increased from 2016 to 2019. In 2016, 19 percent of US businesses experienced a breach. In 2019, this number was 59 percent.

      An attacker must be successful only once. The defender – you – must be successful every time.

      Info-Tech’s approach

      Maturing from reactive to strategic information security

      Two circular graphs depict the move from ‘reactive security’ to ‘strategic security’ organizations can accomplish using Info-Tech’s approach.

      Tools icon that is used in the first three stages of the strategic security graph above. Indicates Info-Tech tools included in this blueprint.

      The Info-Tech difference:

      1. A proven, structured approach to mature your information security program from reactive to strategic.
      2. A comprehensive set of tools to take the pain out of each phase in the strategy building exercise.
      3. Visually appealing templates to communicate and socialize your security strategy and roadmap to your stakeholders.

      Info-Tech’s Security Strategy Model

      Info-Tech’s Security Strategy Model is depicted in this rectangular image with arrows. The first level depicts business context (enterprise goals, compliance obligations, scope and boundaries) and pressures (security risks, risk tolerance, stakeholder expectations). The second level depicts security target state (maturity model, security framework, security alignment goals, target maturity, time frame) and current state (current state assessment, gap analysis). The third level depicts the information security roadmap (initiative list, task list, prioritization methodology, and Gantt chart).

      The Info-Tech difference:

      An information security strategy model that is:

      1. Business-Aligned. Determines business context and cascades enterprise goals into security alignment goals.
      2. Risk-Aware. Understands the security risks of the business and how they intersect with the overall organizational risk tolerance.
      3. Holistic. Leverages a best-of-breed information security framework to provide comprehensive awareness of organizational security capabilities.

      Info-Tech’s best-of-breed security framework

      This image shows how Info-Tech’s framework is based on ISO 27000 series, CIS Top 20, COBIT 2019, NIST 800-53, and NIST CSF.

      Info-Tech’s approach

      Creating an information security strategy

      Value to the business

      Outcome

      Best-of-breed security strategy

      Have documentation that paints a picture of the road to compliance. Integrate your framework with your risk tolerance and external pressures.

      Be ready for future changes by aligning your security strategy to security framework best practices.

      Address the nature of your current information security

      Eliminate gaps in process and know what is in scope for your security strategy. Learn what pressures your business and industry are under.

      Gain insight into your current state, allowing you to focus on high-value projects first, transitioning towards a target state.

      Highlight overlooked functions of your current security strategy

      Build a comprehensive security program that brings to light all aspects of your security program.

      Instead of pursing ad hoc projects, know what needs work and how to prioritize your pressing security issues.

      Create a tangible roadmap to your target state

      Create a plan for your future state of information security. Refer to and update your target state as your business needs change.

      Document your current progress and path forward in the future. Know your goals and requirements, codified in a living document.

      Use our prepopulated deliverables to fast track your progress

      Let Info-Tech do the work for you. With completed deliverables, have tangible documents to convey your business needs.

      A comprehensive set of deliverables with concrete, defensible data to justify any business changes.

      A living security strategy

      Pivot and change prioritization to meet the needs of your security deficits.

      Future-proof your security strategy for any contingency.

      The Info-Tech difference:

      Evolve the security program to be more proactive by leveraging Info-Tech’s approach to building a security strategy.

      • Dive deep into security obligations and security pressures to define the business context.
      • Conduct a thorough current state and future state analysis that is aligned with a best-of-breed framework.
      • Prioritize gap-closing initiatives to create a living security strategy roadmap.

      Use Info-Tech’s blueprint to save one to three months

      This image depicts how using Info-Tech’s four-phase blueprint can save an estimated seven to 14 weeks of an organization’s time and effort.

      Iterative benefit

      Over time, experience incremental value from your initial security strategy. Through continual updates your strategy will evolve but with less associated effort, time, and costs.

      These estimates are based on experiences with Info-Tech clients throughout the creation of this blueprint.

      Key deliverable:

      Information Security Strategy Communication Deck (PPT)

      Present your findings in a prepopulated document that can summarizes all key findings of the blueprint.

      Screenshots from Info-Tech’s Information Security Strategy Communication Deck Template.

      Blueprint deliverables

      Each step of this blueprint is accompanied by supporting deliverables to help you accomplish your goals:

      Information Security Requirements Gathering Tool

      Define the business, customer, and compliance alignment for your security program.

      Information Security Pressure Analysis Tool

      Determine your organization’s security pressures and ability to tolerate risk.

      Information Security Program Gap Analysis Tool

      Use our best-of-breed security framework to perform a gap analysis between your current and target states.

      Information Security Charter

      Ensure the development and management of your security policies meet the broader program vision.

      Info-Tech offers various levels of support to best suit your needs

      DIY Toolkit

      “Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful.”

      Guided Implementation

      “Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track.”

      Workshop

      “We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place.”

      Consulting

      “Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project.”

      Diagnostic and consistent frameworks are used throughout all four options.

      Guided Implementation

      What does a typical Guided Implementation on this topic look like?

      Guided Implementation #1 - Assess security requirements
      • Call #1 - Introduce project and complete pressure analysis.
      Guided Implementation #2 - Build a gap initiative strategy
      • Call #1 - Introduce the maturity assessment.
      • Call #2 - Perform gap analysis and translate into initiatives.
      • Call #3 - Consolidate related gap initiatives and define, cost, effort, alignment, and security benefits.
      Guided Implementation #3 - Prioritize initiatives and build roadmap
      • Call #1 - Review cost/benefit analysis and build an effort map.
      • Call #2 - Build implementation waves and introduce Gantt chart.
      Guided Implementation #4 - Execute and maintain
      • Call #1 - Review Gantt chart and ensure budget/buy-in support.
      • Call #2 - Three-month check-in: Execute and maintain.

      A Guided Implementation is series of calls with an Info-Tech analyst to help implement our best practices in your organization.

      A typical Guided Implementation is between 2-12 calls over the course of 4 to 6 months.

      Workshop Overview

      Contact your account representative for more information, or contact workshops@infotech.com or 1-888-670-8889.

      Day 1

      Day 2

      Day 3

      Day 4

      Day 5

      Activities

      Assess Security Requirements

      Perform a Gap Analysis

      Complete the Gap Analysis

      Develop Roadmap

      Communicate and Implement

      1.1 Understand business and IT strategy and plans

      1.2 Define business and compliance requirements

      1.3 Establish the security program scope

      1.4 Analyze the organization’s risks and stakeholder pressures

      1.5 Identify the organizational risk tolerance level

      2.1 Define the information security target state

      2.2 Assess current security capabilities

      2.3 Identify security gaps

      2.4 Build initiatives to bridge the gaps

      3.1 Continue assessing current security capabilities

      3.2 Identify security gaps

      3.3 Build initiatives to bridge the maturity gaps

      3.4 Identify initiative list and task list

      3.5 Define criteria to be used to prioritize initiatives

      4.1 Conduct cost/benefit analysis on initiatives

      4.2 Prioritize gap initiatives based on cost, time, and alignment with the business

      4.3 Build effort map

      4.4 Determine start times and accountability

      4.5 Finalize security roadmap and action plan

      4.6 Create communication plan

      5.1 Finalize deliverables

      5.2 Support communication efforts

      5.3 Identify resources in support of priority initiatives

      Deliverables

      1.Security obligations statement

      2.Security scope and boundaries statement

      3.Defined risk tolerance level

      4.Risk assessment and pressure analysis

      1.Information security target state

      2.Security current state assessment

      3.Initiatives to address gaps

      1.Completed security current state assessment

      2.Task list to address gaps address gaps

      4.Prioritization criteria

      1.Information security roadmap

      2.Draft communication deck

      1.Security strategy roadmap documentation

      2.Detailed cost and effort estimates

      3.Mapping of Info-Tech resources against individual initiatives

      Executive Brief Case Study

      Credit Service Company

      Industry: Financial Services

      Source: Info-Tech Research group

      Founded over 100 years ago, Credit Service Company (CSC)* operates in the United States with over 40 branches located across four states. The organization services over 50,000 clients.

      Situation

      Increased regulations, changes in technology, and a growing number of public security incidents had caught the attention of the organization’s leadership. Despite awareness, an IT and security strategy had not been previously created. Management was determined to create a direction for the security team that aligned with their core mission of providing exceptional service and expertise.

      Solution

      During the workshop, the IT team and Info-Tech analysts worked together to understand the organization’s ideal state in various areas of information security. Having a concise understanding of requirements was a stepping stone to beginning to develop CSC’s prioritized strategy.

      Results

      Over the course of the week, the team created a document that concisely prioritized upcoming projects and associated costs and benefits. On the final day of the workshop, the team effectively presented the value of the newly developed security strategy to senior management and received buy-in for the upcoming project.

      *Some details have been changed for client privacy.

      Phase 1

      Assess Security Requirements

        Phase 1

      • 1.1 Define goals & scope
      • 1.2 Assess risks
      • 1.3 Determine pressures
      • 1.4 Determine risk tolerance
      • 1.5 Establish target state

        Phase 2

      • 2.1 Review Info-Tech’s security framework
      • 2.2 Assess your current state
      • 2.3 Identify gap closure actions

        Phase 3

      • 3.1 Define tasks & initiatives
      • 3.2 Perform cost/benefit analysis
      • 3.3 Prioritize initiatives
      • 3.4 Build roadmap

        Phase 4

      • 4.1 Build communication deck
      • 4.2 Develop a security charter
      • 4.3 Execute on your roadmap

      This phase will walk you through the following activities:

      1.1 Define goals and scope of the security strategy.

      1.2 Assess your organization’s current inherent security risks.

      1.3 Determine your organization’s stakeholder pressures for security.

      1.4 Determine your organization’s risk tolerance.

      1.5 Establish your security target state.

      1.1.1 Record your business goals

      Once you have identified your primary and secondary business goals, as well as the corresponding security alignment goals, record them in the Information Security Requirements Gathering Tool. The tool provides an activity status that will let you know if any parts of the tool have not been completed.

      1. Record your identified primary and secondary business goals in the Goals Cascade tab of the Information Security Requirements Gathering Tool.

      Use the drop-down lists to select an appropriate goal or choose “Other.” If you do choose “Other,” you will need to manually enter an appropriate business goal.

      2. For each of your business goals, select one to two security alignment goals. The tool will provide you with recommendations, but you can override these by selecting a different goal from the drop-down lists.

      A screenshot of the ‘Business Goals Cascade,’ which is part of the ‘Information Security Requirements Gathering Tool.’

      A common challenge for security leaders is how to express their initiatives in terms that are meaningful to business executives. This exercise helps to make an explicit link between what the business cares about and what security is trying to accomplish.

      1.1.2 Review your goals cascade

      Estimated Time: 15 minutes

      1. When you have completed the goals cascade, you can review a graphic diagram that illustrates your goals. The graphic is found on the Results tab of the Information Security Requirements Gathering Tool.
        • Security must support the primary business objectives. A strong security program will enable the business to compete in new and creative ways, rather than simply acting as an obstacle.
        • Failure to meet business obligations can result in operational problems, impacting the organization’s ability to function and the organization’s bottom line.
      2. Once you have reviewed the diagram, copy it into the Information Security Strategy Communication Deck.

      A screenshot of the ‘Goal Cascade Diagrams,’ which is part of the ‘Information Security Requirements Gathering Tool.’

      Identify your compliance obligations

      Most conventional regulatory obligations are legally mandated legislation or compliance obligations, such as:

      Sarbanes-Oxley Act (SOX)

      Applies to public companies that have registered equity or debt securities within the SEC to guarantee data integrity against financial fraud.

      Payment Card Industry Data Security Standard (PCI DSS)

      Applies to any organization that processes, transmits, or stores credit card information to ensure cardholder data is protected.

      Health Insurance Portability and Accountability Act (HIPAA)

      Applies to the healthcare sector and protects the privacy of individually identifiable healthcare information.

      Health Information Technology for Economic and Clinical Health (HITECH)

      Applies to the healthcare sector and widens the scope of privacy and security protections available under HIPAA.

      Personal Information Protection and Electronic Documents Act (PIPEDA)

      Applies to private sector organizations that collect personal information in Canada to ensure the protection of personal information in the course of commercial business.

      Compliance obligations also extend to voluntary security frameworks:

      NIST

      National Institute of Standards and Technology; a non-regulatory agency that develops and publicizes measurement

      CIS – 20 CSC

      Center for Internet Security – 20 Critical Security Controls; foundational set of effective cybersecurity practices.

      ISO 27001

      An information security management system framework outlining policies and procedures.

      COBIT 5

      An information technology and management and governance framework.

      HITRUST

      A common security framework for organizations that use or hold regulated personal health information.

      1.1.3 Record your compliance obligations

      Estimated Time: 30 minutes

      1. Identify your compliance obligations. Most organizations have compliance obligations that must be adhered to. These can include both mandatory and voluntary obligations. Mandatory obligations include:
        • Laws
        • Government regulations
        • Industry standards
        • Contractual agreements
        Voluntary obligations include standards that the organization has chosen to follow for best practices and any obligations that are required to maintain certifications. Organizations will have many different compliance obligations. For the purposes of your security strategy, include only those that have information security or privacy requirements.
      2. Record your compliance obligations, along with any notes, in your copy of the Information Security Requirements Gathering Tool.

      A screenshot of ‘Security Compliance Obligations,’ part of the ‘Information Security Requirements Gathering Tool.’

      Establish your scope and boundaries

      It is important to know at the outset of the strategy: what are we trying to secure?

      This includes physical areas we are responsible for, types of data we care about, and departments or IT systems we are responsible for.

      This also includes what is not in scope. For some outsourced services or locations, you may not be responsible for their security. In some business departments, you may not have control of security processes. Ensure that it is made explicit at the outset what will be included and what will be excluded from security considerations.

      Physical Scope and Boundaries

      • How many offices and locations does your organization have?
      • Which locations/offices will be covered by your information security management system (ISMS)?
      • How sensitive is the data residing at each location?
      • You may have many physical locations, and it is not necessary to list every one. Rather, list exceptional cases that are specifically in or out of scope.

      IT Systems Scope and Boundaries

      • There may be hundreds of applications that are run and maintained in your organization. Some of these may be legacy applications. Does your ISMS need to secure all your programs or a select few?
      • Is the system owned or outsourced?
      • Where are we accountable for security?
      • How sensitive is the data that each system handles?

      Organizational Scope and Boundaries

      • Will your ISMS cover all departments within your organization? For example, do certain departments (e.g. Operations) not need any security coverage?
      • Do you have the ability to make security decisions for each department?
      • Who are the key stakeholders/data owners for each department?

      Organizational scope considerations

      Many different groups will fall within the purview of the security strategy. Consider these two main points when deciding which departments will be in scope:

      1. If a group/user has access to data or systems that can impact the organization, then securing that group/user should be included within scope of the security strategy.
      2. If your organization provides some work direction to a group/user, they should be included within scope of the security strategy.
      1. Identify your departments and business groups
        • Start by identifying departments that provide some essential input or service to the organization or departments that interact with sensitive data.
      2. Break out different subsidiaries or divisions
        • Subsidiaries may or may not be responsible for securing themselves and protecting their data, but either way they are often heavily reliant on corporate for guidance and share IT resourcing support.
      3. Identify user groups
        • Many user groups exist, all requiring different levels of security. For example, from on-premises to remote access, from full-time employees to part-time or contractors.

      Physical scope considerations

      List physical locations by type

      Offices

      The primary location(s) where business operations are carried out. Usually leased or owned by the business.

      Regional Offices

      These are secondary offices that can be normal business offices or home offices. These locations will have a VPN connection and some sort of tenant.

      Co-Locations

      These are redundant data center sites set up for additional space, equipment, and bandwidth.

      Remote Access

      This includes all remaining instances of employees or contractors using a VPN to connect.

      Clients and Vendors

      Various vendors and clients have dedicated VPN connections that will have some control over infrastructure (whether owed/laaS/other).

      List physical locations by nature of the location

      Core areas within physical scope

      These are many physical locations that are directly managed. These are high-risk locations with many personal and services, resulting in many possible vulnerabilities and attack vectors.

      Locations on the edge of control

      These are on the edge of the physical scope, and thus, in scope of the security strategy. These include remote locations, remote access connections, etc.

      Third-party connections

      Networks of third-party users are within physical scope and need defined security requirements and definitions of how this varies per user.

      BYOD

      Mostly privately owned mobile devices with either on-network or remote access.

      It would be overkill and unhelpful to list every single location or device that is in scope. Rather, list by broad categories as suggested above or simply list exceptional cases that are in/out of scope.

      IT systems scope considerations

      Consider identifying your IT systems by your level of control or ownership.

      Fully owned systems

      These are systems that are wholly owned or managed by your organization.

      IT is almost always the admin of these systems. Generally they are hosted on premises. All securitization through methods such as patching or antivirus is done and managed by your IT department.

      Cloud/remote hosted (SaaS)

      These are systems with a lot of uncertainties because the vendor or service provided is either not known or what they are doing for security is not fully known.

      These systems need to be secured regardless, but supplier and vendor relationship management becomes a major component of how to manage these systems. Often, each system has varying levels of risk based on vendor practices.

      Hybrid owned (IaaS/PaaS)

      You likely have a good understanding of control for these systems, but they may not be fully managed by you (i.e. ownership of the infrastructure). These systems are often hosted by third parties that do some level of admin work.

      A main concern is the unclear definition of responsibility in maintaining these systems. These are managed to some degree by third parties; it is challenging for your security program to perform the full gamut of security or administrative functions.

      Unknown/unowned systems

      There are often systems that are unowned and even unknown and that very few people are using. These apps can be very small and my not fall under your IT management system framework. These systems create huge levels of risk due to limited visibility.

      For example, unapproved (shadow IT) file sharing or cloud storage applications would be unknown and unowned.

      1.1.4 Record your scope and boundaries

      Estimated Time: 30-60 minutes

      1. Divide into groups and give each group member a handful of sticky notes. Ask them to write down as many items as possible for the organization that could fall under one of the scope buckets.
      2. Collect each group’s responses and discuss the sticky notes and the rationale for including them. Discuss your security-related locations, data, people, and technologies, and define their scope and boundaries.
        • Careful attention should be paid to any elements of the strategy that are not in scope.
      3. Discuss and aggregate all responses as to what will be in scope of the security strategy and what will not be. Record these in the Information Security Requirements Gathering Tool.

      A screenshot of ‘Scope and Boundaries,’ part of the ‘Information Security Requirements Gathering Tool.’

      1.2 Conduct a risk assessment

      Estimated Time: 1-3 hours

      1. As a group, review the questions on the Risk Assessment tab of the Information Security Pressure Analysis Tool.
      2. Gather the required information from subject matter experts on the following risk elements:
        • Threats
        • Assets
        • Vulnerabilities (people, systems, supply chain)
        • Historical security incidents

      Input

      • List of organizational assets
      • Historical data on information security incidents

      Output

      • Completed risk assessment

      Materials

      • Information Security Pressure Analysis Tool

      Participants

      • Security Team
      • IT Leadership
      • Risk Management

      Download the Information Security Pressure Analysis Tool

      1.2.1 Complete the risk assessment questionnaire

      Estimated Time: 60-90 minutes

      1. Review each question in the questionnaire and provide the most appropriate response using the drop-down list.
        • If you are unsure of the answer, consult with subject matter experts to obtain the required data.
        • Otherwise, provide your best estimation
      2. When providing responses for the historical incident questions, only count incidents that had a sizeable impact on the business.

      A screenshot of the ‘Organizational Security Risk Assessment,’ part of the ‘Information Security Pressure Analysis Tool.’

      Info-Tech Insight

      Understanding your organization’s security risks is critical to identifying the most appropriate level of investment into your security program. Organizations with more security risks will need more a mature security program to mitigate those risks.

      1.2.2 Review the results of the risk assessment

      Estimated Time: 30 minutes

      1. Once you have completed the risk assessment, you can review the output on the Results tab.
      2. If required, the weightings of each of the risk elements can be customized on the Weightings tab.
      3. Once you have reviewed the results, copy your risk assessment diagram into the Information Security Strategy Communication Deck.

      A screenshot showing sample results of the ‘Organizational Risk Assessment,’ part of the ‘Information Security Pressure Analysis Tool.’

      It is important to remember that the assessment measures inherent risk, meaning the risk that exists prior to the implementation of security controls. Your security controls will be assessed later as part of the gap analysis.

      1.3 Conduct pressure analysis

      Estimated Time: 1-2 hours

      1. As a group, review the questions on the Pressure Analysis tab of the Information Security Pressure Analysis Tool.
      2. Gather the required information from subject matter experts on the following pressure elements:
        • Compliance and oversight
        • Customer expectations
        • Business expectations
        • IT expectations

      Input

      • Information on various pressure elements within the organization

      Output

      • Completed pressure analysis

      Materials

      • Information Security Pressure Analysis Tool

      Participants

      • Security Team
      • IT Leadership
      • Business Leaders
      • Compliance

      Download the Information Security Pressure Analysis Tool

      Risk tolerance considerations

      At this point, we want to frame risk tolerance in terms of business impact. Meaning, what kinds of impacts to the business would we be able to tolerate and how often? This will empower future risk decisions by allowing the impact of a potential event to be assessed, then compared against the formalized tolerance. We will consider impact from three perspectives:

      F

      Functional Impact

      The disruption or degradation of business/organizational processes.

      I

      Informational Impact

      The breach of confidentiality, privacy, or integrity of data/information.

      R

      Recoverability Impact

      The disruption or degradation of the ability to return to conditions prior to a security incident.

      Consider these questions:

      Questions to ask

      Description

      Is there a hard-dollar impact from downtime?

      This refers to when revenue or profits are directly impacted by a business disruption. For example, when an online ordering system is compromised and shut down, it affects sales, and therefore, revenue.

      Is regulatory compliance a factor?

      Depending on the circumstances of the vulnerabilities, it can be a violation of compliance obligations that would cause significant fines.

      Are any critical services dependent on this asset?

      Functional dependencies are sometimes not obvious, and assets that appear marginal can have huge impacts on critical services.

      Is there a health or safety risk?

      Some operations are critical to health and safety. For example, medical organizations have operations that are necessary to ensure uninterrupted critical health services. An exploited vulnerability that impacts these operations can have life and death consequences.

      ANALYST PERSPECTIVE

      It is crucial to keep in mind that you care about a risk scenario impact to the main business processes.

      For example, imagine a complete functional loss of the corporate printers. For most businesses, even the most catastrophic loss of printer function will have a small impact on their ability to carry out the main business functions.

      On the flip side, even a small interruption to email or servers could have a large functional impact on business processes.

      Risk tolerance descriptions

      High

      • Organizations with high risk tolerances are often found in industries with limited security risk, such as Construction, Agriculture and Fishing, or Mining.
      • A high risk tolerance may be appropriate for organizations that do not rely on highly sensitive data, have limited compliance obligations, and where their customers do not demand strong security controls. Organizations that are highly focused on innovation and rapid growth may also tend towards a higher risk tolerance.
      • However, many organizations adopt a high risk tolerance by default simply because they have not adequately assessed their risks.

      Moderate

      • Organizations with medium risk tolerances are often found in industries with moderate levels of security risk, such as Local Government, Education, or Retail and Wholesale
      • A medium risk tolerance may be appropriate for organizations that store and process some sensitive data, have a modest number of compliance obligations, and where customer expectations for security tend to be implicit rather than explicit.

      Low

      • Organizations with low risk tolerances are often found in industries with elevated security risk, such as Financial Services, Federal Governments, or Defense Contractors.
      • A low risk tolerance may be appropriate for organizations that store very sensitive data, process high-value financial transactions, are highly regulated, and where customers demand strong security controls.
      • Some organizations claim to have a low risk tolerance, but in practice will often allow business units or IT to accept more security risk than would otherwise be permissible. A strong information security program will be required to manage risks to an acceptable level.

      1.4.1 Complete the risk tolerance questionnaire

      Estimated Time: 30-60 minutes

      1. In a group discussion, review the low-, medium-, and high-impact scenarios and examples for each impact category. Ensure that everyone has a consistent understanding of the scenarios.
      2. For each impact type, use the frequency drop-down list to identify the maximum frequency that the organization could tolerate for the event scenarios, considering:
        • The current frequency with which the scenarios are occurring in your organization may be a good indication of your tolerance. However, keep in mind that you may be able to tolerate these incidents happening more frequently than they do.
        • Hoping is not the same as tolerating. While everyone hopes that high-impact incidents never occur, carefully consider whether you could tolerate them occurring more frequently.

      A screenshot showing the ‘Organizational Security Risk Tolerance Assessment,’ part of the ‘Information Security Pressure Analysis Tool.’

      1.4.2 Review the results of the risk tolerance analysis

      Estimated Time: 30 minutes

      1. Once you have completed the risk tolerance exercise, you can review the output on the Results tab.
      2. If required, the weightings of each of the impact types can be customized on the Weightings tab.
      3. Once you have reviewed the results, copy your risk tolerance diagram into the Information Security Strategy Communication Deck.

      A screenshot showing the results of the 'Information Security Risk Tolerance Assessment,' part of the ‘Information Security Pressure Analysis Tool.’

      A low risk tolerance will require a stronger information security program to ensure that operational security risk in the organization is minimized. If this tool reports that your risk tolerance is low, it is recommended that you review the results with your senior stakeholders to ensure agreement and support for the security program.

      1.5 Establish your target state

      Estimated Time: 30-60 minutes

      1. As a group, review the overall results of the requirements gathering exercise:
        • Business goals cascade
        • Compliance obligations
        • Scope
      2. Review the overall results of the risk assessment, pressure analysis, and risk tolerance exercises.
      3. Conduct a group discussion to arrive at a consensus of what the ideal target state for the information security program should look like.
        • Developing mission and vision statements for security may be useful for focusing the group.
        • This discussion should also consider the desired time frame for achieving the target state.

      Download the Information Security Pressure Analysis Tool

      Input

      • Information security requirements (goals cascade, compliance obligations, scope)
      • Risk assessment
      • Pressure analysis
      • Risk tolerance

      Output

      • Completed information security target state

      Materials

      Participants

      • Security Team
      • IT Leadership
      • Risk Management
      • Business Leaders
      • Compliance

      Understanding security target states

      Maturity models are very effective for determining information security target states. This table provides general descriptions for each maturity level. As a group, consider which description most accurately reflects the ideal target state for information security in your organization.

      1. AD HOC

        Initial/Ad hoc security programs are reactive. Lacking strategic vision, these programs are less effective and less responsive to the needs of the business.
      2. DEVELOPING

        Developing security programs can be effective at what they do but are not holistic. Governance is largely absent. These programs tend to rely on the talents of individuals rather than a cohesive plan.
      3. DEFINED

        A defined security program is holistic, documented, and proactive. At least some governance is in place, however, metrics are often rudimentary and operational in nature. These programs still often rely on best practices rather than strong risk management.
      4. MANAGED

        Managed security programs have robust governance and metrics processes. Management and board-level metrics for the overall program are produced. These are reviewed by business leaders and drive security decisions. More mature risk management practices take the place of best practices.
      5. OPTIMIZED

        An optimized security program is based on strong risk management practices, including the production of key risk indicators (KRIs). Individual security services are optimized using key performance indicators (KPIs) that continually measure service effectiveness and efficiency.

      1.5.1 Review the results of the target state recommendation

      Estimated Time: 30-60 minutes

      1. Based upon your risk assessment, pressure analysis, and risk tolerance, the Information Security Pressure Analysis Tool will provide a recommended information security target state.
      2. With your group, review the recommendation against your expectations.
      3. If required, the weightings of each of the factors can be customized on the Weightings tab.
      4. Once you have reviewed the results, copy your target state diagram into the Information Security Strategy Communication Deck.

      A screenshot showing the results of the ‘Information Security Target State,’ part of the ‘Information Security Pressure Analysis Tool.’

      Info-Tech Insight

      Higher target states require more investment to attain. It is critical to ensure that all key stakeholders agree on the security target state. If you set a target state that aims too high, you may struggle to gain support and funding for the strategy. Taking this opportunity to ensure alignment from the start will pay off dividends in future.

      1.5.2 Review and adjust risk and pressure weightings

      Estimated Time: 30 minutes

      1. If the results of your risk assessment, pressure analysis, risk tolerance, or target state do not match your expectations, you may need to review and adjust the weightings for the elements within one or more of these areas.
      2. On the Weightings tab, review each of the strategic categories and adjust the weights as required.
        • Each domain is weighted to contribute to your overall pressure score based on the perceived importance of the domain to the organization.
        • The sum of all weights for each category must add up to 100%.

      A screenshot showing the results of the weightings given to each factor in a category, part of the ‘Information Security Pressure Analysis Tool.’

      Case Study

      Credit Service Company

      Industry: Financial Services

      Source: Info-Tech Research group

      Below are some of the primary requirements that influenced CSC’s initial strategy development.

      External Pressure

      Pressure Level: High

      • Highly regulated industries, such as Finance, experience high external pressure.
      • Security pressure was anticipated to increase over the following three years due to an increase in customer requirement.

      Obligations

      Regulatory: Numerous regulations and compliance requirements as a financial institution (PCI, FFIEC guidance).

      Customer: Implicitly assumes personal, financial, and health information will be kept secure.

      Risk Tolerance

      Tolerance Level: Low

      1. Management: Are risk averse and have high visibility into information security.
      2. Multiple locations controlled by a central IT department decreased the organization’s risk tolerance.

      Summary of Security Requirements

      Define and implement dynamic information security program that understands and addresses the business’ inherent pressure, requirements (business, regulatory, and customer), and risk tolerance.

      Phase 2

      Build a Gap Initiative Strategy

        Phase 1

      • 1.1 Define goals & scope
      • 1.2 Assess risks
      • 1.3 Determine pressures
      • 1.4 Determine risk tolerance
      • 1.5 Establish target state

        Phase 2

      • 2.1 Review Info-Tech’s security framework
      • 2.2 Assess your current state
      • 2.3 Identify gap closure actions

        Phase 3

      • 3.1 Define tasks & initiatives
      • 3.2 Perform cost/benefit analysis
      • 3.3 Prioritize initiatives
      • 3.4 Build roadmap

        Phase 4

      • 4.1 Build communication deck
      • 4.2 Develop a security charter
      • 4.3 Execute on your roadmap

        This phase will walk you through the following activities:

      • 2.1 Review Info-Tech’s framework.
      • 2.2 Assess your current state of security against your target state.
      • 2.3 Identify actions required to close gaps.

      2.1 Review the Info-Tech framework

      Estimated Time: 30-60 minutes

      1. As a group, have the security team review the security framework within the Information Security Gap Analysis Tool.
      2. Customize the tool as required using the instructions on the following slides.

      Input

      • Information security requirements
      • Security target state

      Output

      • Customized security framework

      Materials

      • Information Security Gap Analysis Tool

      Participants

      • Security Team

      Download the Information Security Gap Analysis Tool

      Understand the Info-Tech framework

      Info-Tech’s security framework uses a best-of-breed approach to leverage and align with most major security standards, including:

      • ISO 27001/27002
      • COBIT
      • Center for Internet Security (CIS) Critical Controls
      • NIST Cybersecurity Framework
      • NIST SP 800-53
      • NIST SP 800-171

      A diagram depicting Info-Tech’s best-of-breed security framework.

      A best-of-breed approach ensures holistic coverage of your information security program while refraining from locking you in to a specific compliance standard.

      2.1.1 Configure the Information Security Gap Analysis Tool

      Estimated Time: 30 minutes

      Review the Setup tab of the Information Security Gap Analysis Tool. This tab contains several configurable settings that should be customized to your organization. For now, the three settings you will need to modify are:

      • The security target state. Enter the target state from your Information Security Pressure Analysis Tool. If you do not enter a target state, the tool will default to a target of 3 (Defined).
      • Your Security Alignment Goals (from your Information Security Requirements Gathering Tool).
      • The starting year for your security roadmap.

      A screenshot showing the ‘Setup’ tab of the ‘Information Security Gap Analysis Tool.’

      2.2 Assess current state of security

      Estimated Time: 8-16 hours

      1. Using the Information Security Gap Analysis Tool, review each of the controls in the Gap Analysis tab.
      2. Follow the instructions on the next slides to complete your current state and target state assessment.
      3. For most organizations, multiple internal subject matter experts will need to be consulted to complete the assessment.

      Input

      • Security target state
      • Information on current state of security controls, including sources such as audit findings, vulnerability and penetration test results, and risk registers

      Output

      • Gap analysis

      Materials

      • Information Security Gap Analysis Tool

      Participants

      • Security Team
      • Subject Matter Experts From IT, HR, Legal, Facilities, Compliance, Audit, Risk Management

      Download the Information Security Gap Analysis Tool

      Example maturity levels

      To help determine appropriate current and target maturity levels, refer to the example below for the control “Email communication is filtered for spam and potential malicious communications.”

      AD HOC 01

      There is no centrally managed spam filter. Spam may be filtered by endpoint email clients.

      DEVELOPING 02

      There is a secure email gateway. However, the processes for managing it are not documented. Administrator roles are not well defined. Minimal fine-tuning is performed, and only basic features are in use.

      DEFINED 03

      There is a policy and documented process for email security. Roles are assigned and administrators have adequate technical training. Most of the features of the solution are being used. Rudimentary reports are generated, and some fine-tuning is performed.

      MANAGED 04

      Metrics are produced to measure the effectiveness of the email security service. Advanced technical features of the solution have been implemented and are regularly fine-tuned based on the metrics.

      OPTIMIZED 05

      There is a dedicated email security administrator with advanced technical training. Custom filters are developed to further enhance security, based on relevant cyber threat intelligence. Email security metrics feed key risk indicators that are reported to senior management.

      2.2.1 Conduct current state assessment

      Estimated Time: 8-16 hours

      1. Carefully review each of the controls in the Gap Analysis tab. For each control, indicate the current maturity level using the drop-down list.
        • You should only use “N/A” if you are confident that the control is not required in your organization.
        • For example, if your organization does not perform any software development then you can select “N/A” for any controls related to secure coding practices.
      2. Provide comments to describe your current state. This step is optional but recommended as it may be important to record this information for future reference.
      3. Select the target maturity for the control. The tool will default to the target state for your security program, but this can be overridden using the drop-down list.

      2.2.1 Conduct current state assessment

      Estimated Time: 8-16 hours

      1. Carefully review each of the controls in the Gap Analysis tab. For each control, indicate the current maturity level using the drop-down list.
        • You should only use “N/A” if you are confident that the control is not required in your organization. For example, if your organization does not perform any software development then you can select “N/A” for any controls related to secure coding practices.
      2. Provide comments to describe your current state. This step is optional but recommended as it may be important to record this information for future reference.
      3. Select the target maturity for the control. The tool will default to the target state for your security program, but this can be overridden using the drop-down list.

      A screenshot showing the 'Gap Analysis' tab of the 'Information Security Gap Analysis Tool.'

      Review the Gap Analysis Dashboard

      Use the Gap Assessment Dashboard to map your progress. As you fill out the Gap Analysis Tool, check with the Dashboard to see the difference between your current and target state.

      Use the color-coded legend to see how large the gap between your current and target state is. The legend can be customized further if desired.

      Security domains that appear white have not yet been assessed or are rated as “N/A.”

      2.2.3 Identify actions required to close gaps

      Estimated Time: 4-8 hours

      1. Using the Information Security Gap Analysis Tool, review each of the controls in the Gap Analysis tab.
      2. Follow the instructions on the next slides to identify gap closure actions for each control that requires improvement.
      3. For most organizations, multiple internal subject matter experts will need to be consulted to complete the assessment.

      Input

      • Security control gap information

      Output

      • Gap closure action list

      Materials

      • Information Security Gap Analysis Tool

      Participants

      • Security Team
      • Subject Matter Experts From IT, HR, Legal, Facilities, Compliance, Audit, Risk Management

      Download the Information Security Gap Analysis Tool

      2.3.1 Identify gap closure actions

      Estimated Time: 4-8 hours

      1. For each of the controls where there is a gap between the current and target state, a gap closure action should be identified:
        • Review the example actions and copy one or more of them if appropriate. Otherwise, enter your own gap closure action.
      2. Identify whether the action should be managed as a task or as an initiative. Most actions should be categorized as an initiative. However, it may be more appropriate to categorize them as a task when:
        1. They have no costs associated with them
        2. They require a low amount of initial effort to implement and no ongoing effort to maintain
        3. They can be accomplished independently of other tasks

      A screenshot showing gap closure actions, part of the 'Gap Analysis' tab of the 'Information Security Gap Analysis Tool.'

      Considerations for gap closure actions

      • In small groups, have participants ask, “what would we have to do to achieve the target state?” Document these in the Gap Closure Actions column.
      • The example gap closure actions may be appropriate for your organization, but do not simply copy them without considering whether they are right for you.
      • Not all gaps will require their own action. You can enter one action that may address multiple gaps.
      • If you find that many of your actions are along the lines of “investigate and make recommendations,” you should consider using the estimated gap closure percentage column to track the fact that these gaps will not be fully closed by the actions.

      A screenshot showing considerations for gap closure actions, part of the 'Gap Analysis' tab of the 'Information Security Gap Analysis Tool.'

      2.3.2 Define gap closure action effectiveness

      Estimated Time: 1-2 hours

      For each of the gap closure actions, optionally enter an estimated gap closure percentage to indicate how effective the action will be in fully closing the gap.

      • For instance, an action to “investigate solutions and make recommendations” will not fully close the gap.
      • This is an optional step but will be helpful to understand how much progress towards your security target state you will make based on your roadmap.
      • If you do not fill in this column, the tool will assume that your actions will fully close all gaps.

      A screenshot showing considerations for estimated gap closure percentage, part of the 'Gap Analysis' tab of the 'Information Security Gap Analysis Tool.'

      Completing this step will populate the “Security Roadmap Progression” diagram in the Results tab, which will provide a graphic illustration of how close to your target state you will get based upon the roadmap.

      Phase 3

      Prioritize Initiatives and Build Roadmap

      Phase 1

      • 1.1 Define goals & scope
      • 1.2 Assess risks
      • 1.3 Determine pressures
      • 1.4 Determine risk tolerance
      • 1.5 Establish target state

      Phase 2

      • 2.1 Review Info-Tech’s security framework
      • 2.2 Assess your current state
      • 2.3 Identify gap closure actions

      Phase 3

      • 3.1 Define tasks & initiatives
      • 3.2 Perform cost/benefit analysis
      • 3.3 Prioritize initiatives
      • 3.4 Build roadmap

      Phase 4

      • 4.1 Build communication deck
      • 4.2 Develop a security charter
      • 4.3 Execute on your roadmap

      This phase will walk you through the following activities:

      • 3.1 Define tasks and initiatives.
      • 3.2 Define cost, effort, alignment, and security benefit of each initiative.
      • 3.3 Prioritize initiatives.
      • 3.4 Build the prioritized security roadmap

      3.1 Define tasks and initiatives

      Estimated Time: 2-4 hours

      1. As a group, review the gap actions identified in the Gap Analysis tab.
      2. Using the instructions on the following slides, finalize your task list.
      3. Using the instructions on the following slides, review and consolidate your initiative list.

      Input

      • Gap analysis

      Output

      • List of tasks and initiatives

      Materials

      • Information Security Gap Analysis Tool

      Participants

      • Security Team
      • Subject Matter Experts From IT, HR, Legal, Facilities, Compliance, Audit, Risk Management
      • Project Management Office

      Download the Information Security Gap Analysis Tool

      3.1.1 Finalize your task list

      Estimated Time: 1-2 hours

      1. Obtain a list of all your task actions by filtering on the Action Type column in the Gap Analysis tab.
      2. Paste the list into the table on the Task List tab.
        • Use Paste Values to retain the table formatting
      3. Enter a task owner and due date for each task. Without accountability, it is too easy to fall into complacency and neglect these tasks.

      A screenshot showing the 'Task List' tab of the 'Information Security Gap Analysis Tool.'

      Info-Tech Insight

      Tasks are not meant to be managed to the same degree that initiatives will be. However, they are still important. It is recommended that you develop a process for tracking these tasks to completion.

      3.1.2 Consolidate your gap closure actions into initiatives

      Estimated Time: 2-3 hours

      1. Once you have finalized your task list, you will need to consolidate your list of initiative actions. Obtain a list of all your initiative actions by filtering on the Action Type column in the Gap Analysis tab.
      2. Create initiatives on the Initiative List tab. While creating initiatives, consider the following:
        • As much as possible, it is recommended that you consolidate multiple actions into a single initiative. Reducing the total number of initiatives will allow for more efficient management of the overall roadmap.
        • Start by identifying areas of commonality between gap closure actions, for instance:
          • Group all actions within a security domain into a single initiative.
          • Group together similar actions, such as all actions that require updating policies.
          • Consider combining actions that have inter-dependencies.
        • While it is recommended that you consolidate actions as much as possible, some actions should become initiatives on their own. This will be appropriate when:
          • The action is time sensitive and consolidating it with other actions will cause scheduling issues.
          • Actions that could otherwise be consolidated have different business sponsors or owners and need to be kept separate for funding or accountability reasons.
      3. Link the initiative actions on the Gap Analysis tab using the drop-down list in the Initiative Name column.

      Initiative consolidation example

      In the example below, we see three gap closure actions within the Security Culture and Awareness domain being consolidated into a single initiative “Develop security awareness program.”

      We can also see one gap closure action within the same domain being grouped with two actions from the Security Policies domain into another initiative “Update security policies.”

      Info-Tech Insight

      As you go through this exercise, you may find that some actions that you previously categorized as tasks could be consolidated into an initiative.

      A screenshot showing how six sample gap closure actions can be distilled into two gap closure initiatives. Part of the 'Information Security Gap Analysis Tool.'

      3.1.3 Finalize your initiative list

      Estimated Time: 30 minutes

      1. Review your final list of initiatives and make any required updates.
      2. Optionally, add a description or paste in a list of the individual gap closure actions that are associated with the initiative. This will make it easier to perform the cost and benefit analysis.
      3. Use the drop-down list to indicate which of the security alignment goals most appropriately reflects the objectives of the initiative. If you are unsure, use the legend next to the table to find the primary security domain associated with the initiative and then select the recommended security alignment goal.
        • This step is important to understand how the initiative supports the business goals identified earlier.

       A screenshot showing the primary security alignment goal, part of the 'Initiative List' tab of the 'Information Security Gap Analysis Tool.'

      3.2 Conduct cost/ benefit analysis

      Estimated Time: 1-2 hours

      1. As a group, define the criteria to be used to conduct the cost/benefit analysis, following the instructions on the next slide.
      2. Assign costing and benefits information for each initiative.
      3. Define dependencies or business impacts if they will help with prioritization.

      Input

      • Gap analysis
      • Initiative list

      Output

      • Completed cost/benefit analysis for initiative list

      Materials

      • Information Security Gap Analysis Tool

      Participants

      • Security Team
      • Subject Matter Experts From IT, HR, Legal, Facilities, Compliance, Audit, Risk Management
      • Project Management Office

      Download the Information Security Gap Analysis Tool

      3.2.1 Define costing criteria

      Estimated Time: 30 minutes

      1. On the Setup tab of the Information Security Gap Analysis Tool, enter high, medium, and low ranges for initial and ongoing costs and efforts.
        1. Initial costs are one-time, upfront capital investments (e.g. hardware and software costs, project-based consulting fees, training).
        2. Ongoing cost is any annually recurring operating expenses that are new budgetary costs (e.g. licensing, maintenance, subscription fees).
        3. Initial staffing in hours is total time in person hours required to complete a project. It is not total elapsed time but dedicated time. Consider time required to gather requirements and to design, test, and implement the solution.
        4. Ongoing staffing in FTEs is the ongoing average effort required to support that initiative after implementation.
      2. In addition to ranges, provide an average for each. These will be used to calculate estimated total costs for the roadmap.

      A screenshot showing the initiative costs for estimation, part of the 'Setup' tab of the 'Information Security Gap Analysis Tool.' The range of costs is labeled with an arrow with number 1 on it, and the average cost per initiative is labeled with an arrow with number 2 on it.

      Make sure that your ranges allow for differentiation between initiatives to enable prioritization. For instance, if you set your ranges too low, all your initiatives will be assessed as high cost, providing no help when you must prioritize them.

      3.2.2 Define benefits criteria

      Estimated Time: 30 minutes

      1. On the Setup tab of the Information Security Gap Analysis Tool, enter high, medium, and low values for the Alignment with Business Benefit.
        • This variable is meant to capture how well each initiative aligns with organizational goals and objectives.
        • By default, this benefit is linked directly to business goals through the primary and secondary security alignment goals. This allows the tool to automatically calculate the benefit based on the security alignment goals associated with each initiative.
        • If you change these values, you may need to override the calculated values in the prioritization tab.
      2. Enter a high, medium, and low value for the Security Benefit.
        • This variable is meant to capture the relative security benefit or risk reduction being provided by the gap initiative.
        • By default, this benefit is linked to security risk reduction.

      A screenshot showing the initiative benefits for estimation, part of the 'Setup' tab of the 'Information Security Gap Analysis Tool.'

      Some organizations prefer to use the “Security Benefit” criteria to demonstrate how well each initiative supports specific compliance goals.

      3.2.3 Complete the cost/benefit analysis

      Estimated Time: 1-2 hours

      1. On the Prioritization tab, use the drop-down lists to enter the estimated costs and efforts for each initiative, using the criteria defined earlier.
        • If you have actual costs available, you can optionally enter them under the Detailed Cost Estimates columns.
      2. Enter the estimated benefits, also using the criteria defined earlier.
        • The Alignment with Business benefit will be automatically populated, but you can override this value using the drop-down list if desired.

      A screenshot showing the estimated cost, estimated effort, and estimated benefits section, part of the 'Prioritization' tab of the 'Information Security Gap Analysis Tool.' Estimated cost and estimated effort are labeled with an arrow with number 1 on it, and estimated benefits is labeled with an arrow with a number 2 on it.

      3.2.4 Optionally enter detailed cost estimates

      Estimated Time: 30 minutes

      1. For each initiative, the tool will automatically populate the Detailed Cost Estimates and Detailed Staffing Estimates columns using the averages that you provided in steps 3.2.1 and 3.2.2. However, if you have more detailed data about the costs and effort requirements for an initiative, you can override the calculated data by manually entering it into these columns. For example:
        • You are planning to subscribe to a security awareness vendor, and you have a quote from them specifying that the initial cost will be $75,000.
        • You have defined your “Medium” cost range as being “$10-100K”, so you select medium as your initial cost for this initiative in step 3.2.3. As you defined the average for medium costs as being $50,000, this is what the tool will put into the detailed cost estimate.
        • You can override this average by entering $75,000 as the initial cost in the detailed cost estimate column.

      A screenshot showing the detailed cost estimates and detailed staffing estimates columns, part of the 'Prioritization' tab of the 'Information Security Gap Analysis Tool.' These columns are labeled with an arrow with a number 1 on it.

      Case Study

      Credit Service Company

      Industry: Financial Services

      Source: Info-Tech Research Group

      A chart titled 'Framework Components,' displaying how the Credit Service Company profiled in the case study performed a current state assessment, created gap initiatives, and prioritized gap initiatives.

      3.3 Prioritize initiatives

      Estimated Time: 2-3 hours

      1. As a group, review the results of the cost/benefit analysis. Optionally, complete the Other Considerations columns in the Prioritization tab:
        • Dependencies can refer to other initiatives on the list or any other dependency that relates to activities or projects within the organization.
        • Business impacts can be helpful to document as they may require additional planning and communication that could impact initiative timelines.
      2. Follow step 3.3.1 to create an effort map with the results of the cost/benefit analysis.
      3. Follow step 3.3.2 to assign initiatives into execution waves.

      Input

      • Gap analysis
      • Initiative list
      • Cost/benefit analysis

      Output

      • Prioritized list of initiatives

      Materials

      • Information Security Gap Analysis Tool
      • Whiteboard

      Participants

      • Security Team
      • IT Leadership
      • Project Management Office

      Download the Information Security Gap Analysis Tool

      3.3.1 Create effort map

      Estimated Time: 30 minutes

      1. On a whiteboard, draw the quadrant diagram shown.
      2. Create sticky notes for each initiative on your initiative list.
      3. For each initiative, use the “Cost/Effort Rating” and the “Benefit Rating” calculated on the Prioritization tab to place the corresponding sticky note onto the diagram.

      An effort map is a tool used for the visualization of a cost/benefit analysis. It is a quadrant output that visually shows how your gap initiatives were prioritized. In this example, the initiative “Update Security Policies” was assessed as low cost/effort (3) and high benefit (10).

      An image showing how 'update security policies,' as ranked on a cost/effort and benefit quadrant, translates to a cost/effort and benefit rating on the 'Prioritization' tab of the 'Information Security Gap Analysis Tool.'

      3.3.2 Assign initiatives to execution waves

      Estimated Time: 60 minutes

      1. Using sticky flip chart sheets, create four sheets and label them according to the four execution waves:
        • MUST DO – These are initiatives that need to get moving right away. They may be quick wins, items with critical importance, or foundational projects upon which many other initiatives depend.
        • SHOULD DO – These are important initiatives that need to get done but cannot launch immediately due to budget constraints, dependencies, or business impacts that require preparation.
        • COULD DO – Initiatives that have merit but are not a priority.
        • WON’T DO – Initiatives where the costs outweigh the benefits.
      2. Using the further instructions on the following slides, move the initiative sticky notes from your effort map into the waves.

      Considerations for prioritization

      • Starting from the top right of the effort map, begin pulling stickies off and putting them in the appropriate roadmap category.
      • Keep dependencies in mind. If an important initiative depends on a low-priority one being completed first, then pull dependent initiatives up the list.
      • It may be helpful to think of each wave as representing a specific time frame (e.g. wave 1 = first year of your roadmap, wave 2 = year two, wave 3 = year three).

      Info-Tech Insight

      Use an iterative approach. Most organizations tend to put too many initiatives into wave 1. Be realistic about what you can accomplish and take several passes at the exercise to achieve a balance.

      An image showing how to map the sticky notes from a sample exercise, as placed on a cost/effort and benefit quadrant, into waves.

      3.3.3 Finalize prioritization

      Estimated Time: 30 minutes

      1. Once you have completed placing your initiative sticky notes into the waves, update the Prioritization tab with the Roadmap Wave column.
      2. Optionally, use the Roadmap Sub-Wave column to prioritize initiatives within a single wave.
        • This will allow you more granular control over the final prioritization, especially where dependencies require extra granularity.

      Any initiatives that are currently in progress should be assigned to Wave 0.

      An image showing the roadmap wave and roadmap sub-wave sections, part of the 'Prioritization' tab of the 'Information Security Gap Analysis Tool.' Roadmap wave is labeled with an arrow with a number 1 on it, and roadmap sub-wave is labeled with an arrow with a number 2 on it.

      3.4 Build roadmap

      Estimated Time: 1-3 hours

      1. As a group, follow step 3.4.1 to create your roadmap by scheduling initiatives into the Gantt chart within the Information Security Gap Analysis Tool.
      2. Review the roadmap for resourcing conflicts and adjust as required.
      3. Review the final cost and effort estimates for the roadmap.

      Input

      • Gap analysis
      • Cost/benefit analysis
      • Prioritized initiative list
      • (Optional) List of other non-security IT and business projects

      Output

      • Security strategic roadmap

      Materials

      • Information Security Gap Analysis Tool

      Participants

      • Security Team
      • IT Leadership
      • Project Management Office

      Download the Information Security Gap Analysis Tool

      3.4.1 Schedule initiatives using the Gantt chart

      Estimated Time: 1-2 Hours

      1. On the Gantt Chart tab for each initiative, enter an owner (the individual who will be primarily responsible for execution).
      2. Additionally, enter a start month and year for the initiative and the expected duration in months.
        • You can filter the Wave column to only see specific waves at any one time to assist with the scheduling.
        • You do not need to schedule Wave 4 initiatives as the expectation is that these initiatives will not be done.

      Info-Tech Insight

      Use the Owner column to help identify resourcing constraints. If a single individual is responsible for many different initiatives that are planned to start at the same time, consider staggering those initiatives.

      An image showing the owner and planned start sections, part of the 'Security Roadmap Gantt Chart' tab of the 'Information Security Gap Analysis Tool.' The owner column is labeled with an arrow with a 1 on it, and the planned start column is labeled with an arrow with a 2 on it.

      3.4.2 Review your roadmap

      Estimated Time: 30-60 minutes

      1. When you have completed the Gantt chart, as a group review the overall roadmap to ensure that it is reasonable for your organization. Consider the following:
        • Do you have other IT or business projects planned during this time frame that may impact your resourcing or scheduling?
        • Does your organization have regular change freezes throughout the year that will impact the schedule?
        • Do you have over-subscribed resources? You can filter the list on the Owner column to identify potential over-subscription of resources.
        • Have you considered any long vacations, sabbaticals, parental leaves, or other planned longer-term absences?
        • Are your initiatives adequately aligned to your budget cycle? For instance, if you have an initiative that is expected to make recommendations for capital expenditure, it must be completed prior to budget planning.

      A screenshot image showing parts of the 'Security Roadmap Gantt Chart' tab with sample data in it. Taken from the 'Information Security Gap Analysis Tool.'

      3.4.3 Review your expected roadmap progression

      Estimated Time: 30 minutes

      1. If you complete the optional exercise of filling in the Estimated Gap Closure Percentage column on the Gap Analysis tab, the tool will generate a diagram showing how close to your target state you can expect to get based on the tasks and initiatives in your roadmap. You can review this diagram on the Results tab.
        • Remember that this Expected Maturity at End of Roadmap score assumes that you will complete all tasks and initiatives (including all Wave 4 initiatives).
      2. Copy the diagram into the Information Security Strategy Communication Deck.

      Info-Tech Insight

      Often, internal stakeholders will ask the question “If we do everything on this roadmap, will we be at our target state?” This diagram will help answer that question.

      A screenshot image showing the 'Expected Security Roadmap Progression' with sample data in it. Part of the 'Results' tab of the 'Information Security Gap Analysis Tool.'

      3.4.4 Review your cost/effort estimates table

      Estimated Time: 30 minutes

      1. Once you have completed your roadmap, review the total cost/effort estimates. This can be found in a table on the Results tab. This table will provide initial and ongoing costs and staffing requirements for each wave. This also includes the total three-year investment. In your review consider:
        • Is this investment realistic? Will completion of your roadmap require adding more staff or funding than you otherwise expected?
        • If the investment seems unrealistic, you may need to revisit some of your assumptions, potentially reducing target levels or increasing the amount of time to complete the strategy.
        • This table provides you with the information to have important conversations with management and stakeholders
      2. When you have completed your review, copy the table into the Information Security Strategy Communication Deck.

      A screenshot image showing the 'Information Security Roadmap Cost/Effort Estimates,' part of the 'Results' tab of the 'Information Security Gap Analysis Tool.'

      Phase 4

      Execute and Maintain

      Phase 1

      • 1.1 Define goals & scope
      • 1.2 Assess risks
      • 1.3 Determine pressures
      • 1.4 Determine risk tolerance
      • 1.5 Establish target state

      Phase 2

      • 2.1 Review Info-Tech’s security framework
      • 2.2 Assess your current state
      • 2.3 Identify gap closure actions

      Phase 3

      • 3.1 Define tasks & initiatives
      • 3.2 Perform cost/benefit analysis
      • 3.3 Prioritize initiatives
      • 3.4 Build roadmap

      Phase 4

      • 4.1 Build communication deck
      • 4.2 Develop a security charter
      • 4.3 Execute on your roadmap

      This phase will walk you through the following activities:

      • 4.1 Build your security strategy communication deck.
      • 4.2 Develop a security charter.
      • 4.3 Execute on your roadmap.

      4.1 Build your communication deck

      Estimated Time: 1-3 hours

      1. As a group, review the Information Security Strategy Communication Deck.
      2. Follow the instructions within the template and on the next few slides to customize the template with the results of your strategic roadmap planning.

      Input

      • Completed Security Requirements Gathering Tool
      • Completed Security Pressure Analysis Tool
      • Completed Security Gap Analysis Tool

      Output

      • Information Security Strategy Communication Deck

      Materials

      • Information Security Strategy Communication Deck

      Participants

      • Security Team
      • IT Leadership

      Download the Information Security Gap Analysis Tool

      4.1.1 Customize the Communication Deck

      Estimated Time: 1-2 hours

      1. When reviewing the Information Security Strategy Communication Deck, you will find slides that contain instructions within green text boxes. Follow the instructions within the boxes, then delete the boxes.
        • Most slides only require that you copy and paste screenshots or tables from your tools into the slides.
        • However, some slides require that you customize or add text explanations that need to reflect your unique organization.
        • It is recommended that you pay attention to the Next Steps slide at the end of the deck. This will likely have a large impact on your audience.
      2. Once you have customized the existing slides, you may wish to add additional slides. For instance, you may wish to add more context to the risk assessment or pressure analysis diagrams or provide details on high-priority initiatives.

      An image showing the 'Business Goals Cascade,' part of the 'Information Security Strategy Communication Deck.' A green box on top of the screenshot instructs you to 'Paste your goals cascade from the Information Security Requirements Gathering Tool here.'

      Consider developing multiple versions of the deck for different audiences. Senior management may only want an executive summary, whereas the CIO may be more interested in the methodology used to develop the strategy.

      Communication considerations

      Developing an information security strategy is only half the job. For the strategy to be successful, you will need to garner support from key internal stakeholders. These may include the CIO, senior executives, and business leaders. Without their support, your strategy may never get the traction it needs. When building your communication deck and planning to present to these stakeholders, consider the following:

      • Gaining support from stakeholders requires understanding their needs. Before presenting to a new audience, carefully consider their priorities and tailor your presentation to address them.
      • Use the communication deck to clarify the business context and how your initiatives that will support business goals.
      • When presenting to senior stakeholders, anticipate what questions they might ask and be sure to prepare answers in advance. Always be prepared to speak to any data point within the deck.
      • If you are going to present your strategy to a group and you anticipate that one or more members of that group may be antagonistic, seek out an opportunity to speak to them before the meeting and address their concerns one on one.

      If you have already fully engaged your key stakeholders through the requirements gathering exercises, presenting the strategy will be significantly easier. The stakeholders will have already bought in to the business goals, allowing you to show how the security strategy supports those goals.

      Info-Tech Insight

      Reinforce the concept that a security strategy is an effort to enable the organization to achieve its core mission and goals and to protect the business only to the degree that the business demands. It is important that stakeholders understand this point.

      4.2 Develop a security charter

      Estimated Time: 1-3 hours

      1. As a group, review the Information Security Charter.
      2. Customize the template as required to reflect your information security program. It may include elements such as:
        • A mission and vision statement for information security in your organization
        • The objectives and scope of the security program
        • A description of the security principles upon which your program is built
        • High-level roles and responsibilities for information security within the organization

      Input

      • Completed Security Requirements Gathering Tool
      • Completed Security Pressure Analysis Tool
      • Completed Security Gap Analysis Tool

      Output

      • Information security charter

      Materials

      • Information Security Charter

      Participants

      • Security Team

      Download the Information Security Gap Analysis Tool

      4.2.1 Customize the Information Security Charter

      Estimated Time: 1-3 hours

      1. Involve the stakeholders that were present during Phase 1 activities to allow you to build a charter that is truly reflective of your organization.
      2. The purpose of the security charter is too:
        • Establish a mandate for information security within the organization.
        • Communicate executive commitment to risk and information security management.
        • Outline high-level responsibilities for information security within the organization.
        • Establish awareness of information security within the organization.

      A screenshot of the introduction of the 'Information Security Charter' template.

      A security charter is a formalized and defined way to document the scope and purpose of your security program. It will define security governance and allow it to operate efficiently through your mission and vision.

      4.3 Execute on your roadmap

      1. Executing on your information security roadmap will require coordinated effort by multiple teams within your organization. To ensure success, consider the following recommendations:
        1. If you have a project management office, leverage them to help apply formal project management methodologies to your initiatives.
        2. Develop a process to track the tasks on your strategy task list. Because these will not be managed as formal initiatives, it will be easy to lose track of them.
        3. Develop a schedule for regular reporting of progress on the roadmap to senior management. This will help hold yourself and others accountable for moving the project forward.
      2. Plan to review and update the strategy and roadmap on a regular basis. You may need to add, change, or remove initiatives as priorities shift.

      Input

      • Completed Security Gap Analysis Tool

      Output

      • Execution of your strategy and roadmap

      Materials

      • Information Security Gap Analysis Tool
      • Project management tools as required

      Participants

      • Security Team
      • Project Management Office
      • IT and Corporate Teams, as required

      Info-Tech Insight

      Info-Tech has many resources that can help you quickly and effectively implement most of your initiatives. Talk to your account manager to learn more about how we can help your strategy succeed.

      Summary of Accomplishment

      Knowledge Gained

      • Knowledge of organizational pressures and the drivers behind them
      • Insight into stakeholder goals and obligations
      • A defined security risk tolerance information and baseline
      • Comprehensive knowledge of security current state and summary initiatives required to achieve security objectives

      Deliverables Completed

      If you would like additional support, have our analysts guide you through other phases as part of an Info-Tech workshop.

      Contact your account representative for more information.

      workshops@infotech.com
      1-888-670-8889

      Additional Support

      If you would like additional support, have our analysts guide you through other phases as part of an Info-Tech workshop.

      To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team.

      Info-Tech analysts will join you and your team at your location or welcome you to Info-Tech’s historic Toronto office to participate in an innovative onsite workshop.

      The following are sample activities that will be conducted by Info-Tech analysts with your team:

      Information Security Program Gap Analysis Tool

      Use our best-of-breed security framework to perform a gap analysis between your current and target states.

      Information Security Requirements Gathering Tool

      Define the business, customer, and compliance alignment for your security program.

      Related Info-Tech Research

      Develop a Security Operations Strategy

      A unified security operations process actively transforms security events and threat information into actionable intelligence, driving security prevention, detection, analysis, and response processes, addressing the increasing sophistication of cyberthreats, and guiding continuous improvement.

      This blueprint will walk through the steps of developing a flexible and systematic security operations program relevant to your organization.

      Implement a Security Governance and Management Program

      Your security governance and management program needs to be aligned with business goals to be effective.

      This approach also helps to provide a starting point to develop a realistic governance and management program.

      This project will guide you through the process of implementing and monitoring a security governance and management program that prioritizes security while keeping costs to a minimum.

      Align Your Security Controls to Industry Frameworks for Compliance

      Don’t reinvent the wheel by reassessing your security program using a new framework.

      Instead, use the tools in this blueprint to align your current assessment outcomes to required standards.

      Bibliography

      “2015 Cost of Data Breach Study: United States.” Sponsored by IBM. Ponemon Institute, May 2015. Web.

      “2016 Cost of Cyber Crime Study & the Risk of Business Innovation.” Ponemon Institute, Oct. 2016. Web. 25 Oct. 2016.

      “2016 Cost of Data Breach Study: Global Analysis.” Ponemon Institute, June 2016. Web. 26 Oct. 2016.

      “2016 Data Breach Investigations Report.” Verizon, 2016. Web. 25 Oct. 2016.

      “2016 NowSecure Mobile Security Report.” NowSecure, 2016. Web. 5 Nov. 2016.

      “2017 Cost of Cyber Crime Study.” Ponemon Institute, Oct. 2017. Web.

      “2018 Cost of Data Breach Study: Global Overview.” Ponemon Institute, July 2018. Web.

      “2018 Data Breach Investigations Report.” Verizon, 2018. Web. Oct. 2019.

      “2018 Global State of Information Security Survey.” CSO, 2017. Web.

      “2018 Thales Data Threat Report.” Thales eSecurity, 2018. Web.

      “2019 Data Breach Investigations Report.” Verizon, 2020. Web. Feb. 2020.

      “2019 Global Cost of a Data Breach Study.” Ponemon Institute, Feb. 2020. Web.

      “2019 The Cost of Cyber Crime Study.” Accenture, 2019. Web Jan 2020.

      “2020 Thales Data Threat Report Global Edition.” Thales eSecurity, 2020. Web. Mar. 2020.

      Ben Salem, Malek. “The Cyber Security Leap: From Laggard to Leader.” Accenture, 2015. Web. 20 Oct. 2016.

      “Cisco 2017 Annual Cybersecurity Report.” Cisco, Jan. 2017. Web. 3 Jan. 2017.

      “Cyber Attack – How Much Will You Lose?” Hewlett Packard Enterprise, Oct. 2016. Web. 3 Jan. 2017.

      “Cyber Crime – A Risk You Can Manage.” Hewlett Packard Enterprise, 2016. Web. 3 Jan. 2017.

      “Global IT Security Risks Survey.” Kaspersky Lab, 2015. Web. 20 October 2016.

      “How Much Is the Data on Your Mobile Device Worth?” Ponemon Institute, Jan. 2016. Web. 25 Oct. 2016.

      “Insider Threat 2018 Report.” CA Technologies, 2018. Web.

      “Kaspersky Lab Announces the First 2016 Consumer Cybersecurity Index.” Press Release. Kaspersky Lab, 8 Sept. 2016. Web. 3 Jan. 2017.

      “Kaspersky Lab Survey Reveals: Cyberattacks Now Cost Large Businesses an Average of $861,000.” Press Release. Kaspersky Lab, 13 Sept. 2016. Web. 20 Oct. 2016.

      “Kaspersky Security Bulletin 2016.” Kaspersky Lab, 2016. Web. 25 Oct. 2016.

      “Managing Cyber Risks in an Interconnected World: Key Findings From the Global State of Information Security Survey 2015.” PwC, 30 Sept. 2014. Web.

      “Measuring Financial Impact of IT Security on Business.” Kaspersky Lab, 2016. Web. 25 Oct. 2016.

      “Ponemon Institute Releases New Study on How Organizations Can Leapfrog to a Stronger Cyber Security Posture.” Ponemon Institute, 10 Apr. 2015. Web. 20 Oct. 2016.

      “Predictions for 2017: ‘Indicators of Compromise’ Are Dead.” Kaspersky Lab, 2016. Web. 4 Jan. 2017.

      “Take a Security Leap Forward.” Accenture, 2015. Web. 20 Oct. 2016.

      “Trends 2016: (In)security Everywhere.” ESET Research Laboratories, 2016. Web. 25 Oct. 2016.

      Research Contributors

      • Peter Clay, Zeneth Tech Partners, Principal
      • Ken Towne, Zeneth Tech Partners, Security Architect
      • Luciano Siqueria, Road Track, IT Security Manager
      • David Rahbany, The Hain Celestial Group, Director IT Infrastructure
      • Rick Vadgama, Cimpress, Head of Information Privacy and Security
      • Doug Salah, Wabtec Corp, Manager of Information Security and IT Audit
      • Peter Odegard, Children’s Hospitals and Clinics, Information Security Officer
      • Trevor Butler, City of Lethbridge, Information Technology General Manager
      • Shane Callahan, Tractor Supply, Director of Information Security
      • Jeff Zalusky, Chrysalis, President/CEO
      • Candy Alexander, Independent Consultant, Cybersecurity and Information Security Executive
      • Dan Humbert, YMCA of Central Florida, Director of Information Technology
      • Ron Kirkland, Crawford & Co, Manager ICT Security & Customer Service
      • Jason Bevis – FireEye, Senior Director Orchestration Product Management - Office of the CTO
      • Joan Middleton, Village of Mount Prospect, IT Director
      • Jim Burns, Great America Financial Services, Vice President Information Technology
      • Ryan Breed, Hudson’s Bay, Information Security Analyst
      • James Fielder, Farm Credit Services – Central Illinois, Vice President of Information Systems

      Build a Winning Business Process Automation Playbook

      • Buy Link or Shortcode: {j2store}407|cart{/j2store}
      • member rating overall impact: 8.3/10 Overall Impact
      • member rating average dollars saved: $8,065 Average $ Saved
      • member rating average days saved: 7 Average Days Saved
      • Parent Category Name: Business Analysis
      • Parent Category Link: /business-analysis
      • Organizations often have many business processes that rely on manual, routine, and repetitive data collection and processing work. These processes need to be automated to meet strategic priorities.
      • Your stakeholders may have decided to invest in process automation solutions. They may be ready to begin the planning and delivery of their first automated processes.
      • However, if your processes are costly, slow, defective, and do not generate the value end users want, automation will only magnify these inefficiencies.

      Our Advice

      Critical Insight

      • Put the user front and center. Aim to better understand the end user and their operational environment. Use cases, data models, and quality factors allow you to visualize the human-computer interactions from an end-user perspective and initiate a discussion on how technology and process improvements can be better positioned to help your end users.
      • Build for the future. Automation sets the technology foundations and process governance and management building blocks in your organization. Expect that more automation will be done using earlier investments.
      • Manage automations as part of your application portfolio. Automations are add-ons to your application portfolio. Unmanaged automations, like applications, will sprawl and reduce in value over time. A collaborative rationalization practice pinpoints where automation is required and identifies which business inefficiencies should be automated next.

      Impact and Result

      • Clarify the problem being solved. Gain a grounded understanding of your stakeholders’ drivers for business process automation. Discuss current business operations and systems to identify automation candidates.
      • Optimate your processes. Apply good practices to first optimize (opti-) and then automate (-mate) key business processes. Take a user-centric perspective to understand how users interact with technology to complete their tasks.
      • Deliver minimum viable automations (MVAs). Maximize the learning of automation solutions and business operational changes through small, strategic automation use cases. This sets the foundations for a broader automation practice.

      Build a Winning Business Process Automation Playbook Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Business Process Automation Deck – A step-by-step document that walks you through how to optimize and automate your business processes.

      This blueprint helps you develop a repeatable approach to understand your process challenges and to optimize and automate strategic business processes.

      • Build a Winning Business Process Automation Playbook – Phases 1-3

      2. Business Process Automation Playbook – A repeatable set of practices to assess, optimize, and automate your business processes.

      This playbook template gives your teams a step-by-step guide to build a repeatable and standardized framework to optimize and automate your processes.

      • Business Process Automation Playbook

      3. Process Interview Template – A structured approach to interviewing stakeholders about their business processes.

      Info-Tech's Process Interview Template provides a number of sections that you can populate to help facilitate and document your stakeholder interviews.

      • Process Interview Template

      4. Process Mapping Guide – A guide to mapping business processes using BPMN standards.

      Info-Tech's Process Mapping Guide provides a thorough framework for process mapping, including the purpose and benefits, the best practices for facilitation, step-by-step process mapping instructions, and process mapping naming conventions.

      • Process Mapping Guide

      Infographic

      Workshop: Build a Winning Business Process Automation Playbook

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Identify Automation Opportunities

      The Purpose

      Understand the goals and visions of business process automation.

      Develop your guiding principles.

      Build a backlog of automation opportunities

      Key Benefits Achieved

      Business process automation vision, expectations, and objectives.

      High-priority automation opportunities identified to focus on.

      Activities

      1.1 State your objectives and metrics.

      1.2 Build your backlog.

      Outputs

      Business process automation vision and objectives

      Business process automation guiding principles

      Process automation opportunity backlog

      2 Define Your MVAs

      The Purpose

      Assess and optimize high-strategic-importance business process automation use cases from the end user’s perspective.

      Shortlist your automation solutions.

      Build and plan to deliver minimum viable automations (MVAs).

      Key Benefits Achieved

      Repeatable framework to assess and optimize your business process.

      Selection of the possible solutions that best fit the business process use case.

      Maximized learning with a low-risk minimum viable automation.

      Activities

      2.1 Optimize your processes.

      2.2 Automate your processes.

      2.3 Define and roadmap your MVAs.

      Outputs

      Assessed and optimized business processes with a repeatable framework

      Fit assessment of use cases to automation solutions

      MVA definition and roadmap

      3 Deliver Your MVAs

      The Purpose

      Modernize your SDLC to support business process automation delivery.

      Key Benefits Achieved

      An SDLC that best supports the nuances and complexities of business process automation delivery.

      Activities

      3.1 Deliver your MVAs

      Outputs

      Refined and enhanced SDLC

      Identify and Manage Reputational Risk Impacts on Your Organization

      • Buy Link or Shortcode: {j2store}220|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Vendor Management
      • Parent Category Link: /vendor-management

      Access to information about companies is more available to consumers than ever. Organizations must implement mechanisms to monitor and manage how information is perceived to avoid potentially disastrous consequences to their brand reputation.

      A negative event could impact your organization's reputation at any given time. Make sure you understand where such events may come from and have a plan to manage the inevitable consequences.

      Our Advice

      Critical Insight

      • Identifying and managing a vendor’s potential impact on your organization’s reputation requires efforts from multiple people in the organization across several functions. Those people all need coaching on the potential changes in the market and how social media can affect your brand.
      • Organizational leadership is often caught unaware during crises, and their response plans lack the flexibility to adjust to significant market upheavals.

      Impact and Result

      • Vendor management practices educate organizations on the different potential risks to vendors in your market and suggest creative and alternative ways to avoid and help manage them.
      • Prioritize and classify your vendors with quantifiable, standardized rankings.
      • Prioritize focus on your high-risk vendors.
      • Standardize your processes for identifying and monitoring vendor risks to manage potential impacts on your reputation and brand with our Reputational Risk Impact Tool.

      Identify and Manage Reputational Risk Impacts on Your Organization Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Identify and Manage Reputational Risk Impacts on Your Organization Deck – Use the research to better understand the negative impacts of vendor actions on your brand reputation.

      Use this research to identify and quantify the potential reputational impacts caused by vendors. Use Info-Tech's approach to look at the reputational impact from various perspectives to better prepare for issues that may arise.

      • Identify and Manage Reputational Risk Impacts on Your Organization Storyboard

      2. Reputational Risk Impact Tool – Use this tool to help identify and quantify the reputational impacts of negative vendor actions.

      By playing the “what if” game and asking probing questions to draw out – or eliminate - possible negative outcomes, everyone involved adds their insight into parts of the organization to gather a comprehensive picture of potential impacts.

      • Reputational Risk Impact Tool
      [infographic]

      Further reading

      Identify and Manage Reputational Risk Impacts on Your Organization

      Brand reputation is the most valuable asset an organization can protect.

      Analyst Perspective

      Organizations must diligently assess and protect their reputations, both in the market and internally.

      Social media, unprecedented access to good and bad information, and consumer reliance on others’ online opinions force organizations to dedicate more resources to protecting their brand reputation than ever before. Perceptions matter, and you should monitor and protect the perception of your organization with as much rigor as possible to ensure your brand remains recognizable and trusted.

      Photo of Frank Sewell, Research Director, Vendor Management, Info-Tech Research Group.

      Frank Sewell
      Research Director, Vendor Management
      Info-Tech Research Group

      Executive Summary

      Your Challenge

      Access to information about companies is more available to consumers than ever. A negative event could impact your organizational reputation at any time. As a result, organizations must implement mechanisms to monitor and manage how information is perceived to avoid potentially disastrous consequences to their brand reputation.

      Make sure you understand where negative events may come from and have a plan to manage the inevitable consequences.

      Common Obstacles

      Identifying and managing a vendor’s potential impact on your organization’s reputation requires efforts from multiple people in the organization across several functions. Those people all need coaching on the potential changes in the market and how social media can affect your brand.

      Organizational leadership is often caught unaware during crises, and their response plans lack the flexibility to adjust to significant market upheavals.

      Info-Tech’s Approach

      Vendor management practices educate organizations on the different potential risks to vendors in your market and suggest creative and alternative ways to avoid and help manage them.

      Prioritize and classify your vendors with quantifiable, standardized rankings.

      Prioritize focus on your high-risk vendors.

      Standardize your processes for identifying and monitoring vendor risks to manage potential impacts on your reputation and brand with our Reputational Risk Impact Tool.

      Info-Tech Insight

      Organizations must evolve their risk assessments to be more adaptive to respond to rapid changes in online media. Ongoing monitoring of social media and the vendors tied to their company is imperative to achieving success and avoiding reputational disasters.

      Info-Tech’s multi-blueprint series on vendor risk assessment

      There are many individual components of vendor risk beyond cybersecurity.

      Cube with each multiple colors on each face, similar to a Rubix cube, and individual components of vendor risk branching off of it: 'Financial', 'Reputational', 'Operational', 'Strategic', 'Security', and 'Regulatory & Compliance'.

      This series will focus on the individual components of vendor risk and how vendor management practices can facilitate organizations’ understanding of those risks.

      Out of scope:
      This series will not tackle risk governance, determining overall risk tolerance and appetite, or quantifying inherent risk.

      Reputational risk impacts

      Potential losses to the organization due to risks to its reputation and brand

      In this blueprint, we’ll explore reputational risks (risks to the brand reputation of the organization) and their impacts.

      Identify potentially negative events to assess the overall impact on your organization and implement adaptive measures to respond and correct.

      Cube with each multiple colors on each face, similar to a Rubix cube, and the vendor risk component 'Reputational' highlighted.

      Protect your most valuable asset: your brand

      25%

      of a company’s market value is due to reputation (Transmission Private, 2021)

      94%

      of consumers say that a bad review has convinced them to avoid a business (ReviewTrackers, 2022)

      14 hours

      is the average time it takes for a false claim to be corrected on social media (Risk Analysis, 2018)
      Image of an umbrella covering the word 'BRAND' and three arrows approaching from above.

      What is brand recognition?

      And the cost of rebranding

      Brand recognition is the ability of consumers to recognize an identifying characteristic of one company versus a competitor.” (Investopedia)

      Most trademark valuation is based directly on its projected future earning power, based on income history. For a new brand with no history, evaluators must apply experience and common sense to predict the brand's earning potential. They can also use feedback from industry experts, market surveys, and other studies.” (UpCounsel)

      The cost of rebranding for small to medium businesses is about 10 to 20% of the recommended overall marketing budget and can take six to eight months (Ignyte).

      Stock image of a house with a money sign chimney.

      "All we are at our core is our reputation and our brand, and they are intertwined." (Phil Bode, Principal Research Director, Info-Tech Research Group)

      What your vendor associations say about you

      Arrows of multiple colors coalescing in an Earth labelled 'Your Brand', and then a red arrow that reads 'Reputation' points to the terms on the right.

      Bad Customer Reviews

      Breach of Data

      Poor Security Posture

      Negative News Articles

      Public Lawsuits

      Poor Performance

      How a major vendor protects its brand

      An ideal state
      • There is a dedicated brand protection department.
      • All employees are educated annually on brand protection policies and procedures.
      • Brand protection is tied to cybersecurity.
      • The organization actively monitors its brand and reputation through various media formats.
      • The organization has criteria for assessing x-party vendors and holds them accountable through ongoing monitoring and validation of their activities.

      Brand Protection
      Done Right

      Sticker for a '5 Star Rating'.

      Never underestimate the power of local media on your profits

      Info-Tech Insight

      Keep in mind that too much exposure to media can be a negative in that it heightens the awareness of your organization to outside actors. If you do go through a period of increased exposure, make sure to advance your monitoring practices and vigilance.

      Story: Restaurant data breach

      Losing customer faith

      A popular local restaurant’s point of service (POS) machines were breached and the credit card data of their customers over a two-week period was stolen. The restaurant did the right thing: they privately notified the affected people, helped them set up credit monitoring services, and replaced their compromised POS system.

      Unfortunately, the local newspaper got wind of the breach. It published the story, leaving out that the restaurant had already notified affected customers and had replaced their POS machines.

      In response, the restaurant launched a campaign in the local paper and on social media to repair their reputation in the community and reassure people that they could safely transact at their business.

      For at least a month, the restaurant experienced a drastic decrease in revenue as customers either refused to come in to eat or paid only in cash. During this same period the restaurant was spending outside their budget on the advertising.
      Broken trust.

      Story: Monitor your subcontractors

      Trust but verify

      A successful general contractor with a reputation for fairness in their dealings needed a specialist to perform some expert carpentry work for a few of their clients.

      The contractor gave the specialist the clients’ contact information and trusted them to arrange the work.

      Weeks later, the contractor checked in with the clients and received a ton of negative feedback:

      • The specialist called them once and never called back.
      • The specialist refused to do the work as described and wanted to charge extra.
      • The specialist performed work to “fix” the issue but cut corners to lessen their costs.

      As a result, the contractor took extreme measures to regain the clients’ confidence and trust and lost other opportunities in the process.

      Stock image of a sad construction site supervisor.

      You work hard for your reputation. Don’t let others ruin it.

      Don’t forget to look within as well as without

      Stock image of a frustrated desk worker.

      Story: Internal reputation is vital

      Trust works both ways

      An organization’s relatively new IT and InfoSec department leadership have been upgrading the organization's systems and policies as fast as resources allow when the organization encounters a major breach of security.

      Trust in the developing IT and InfoSec departments' leadership wanes throughout the organization as people search for the root cause and blame the systems. This degradation of trust limits the effectiveness of the newly implemented process, procedures, and tools of the departments.

      The new leaders' abilities are called into question, and they must now rigorously defend and justify their decisions and positions to the executives and board.

      It will be some time before the two departments gain their prior trust and respect, and the new leaders face some tough times ahead regaining the organization's confidence.

      How could the new leaders approach the situation to mend their reputations in the wake of this (perhaps unfair) reputational hit?

      It is not enough to identify the potential risks; there must also be adequate controls in place to monitor and manage them

      Stock image of a fingerprint on a computer chip under a blacklight.

      Identify, manage, and monitor reputational risks

      Global markets
      • Organizations need to learn how to assess the likelihood of potential risks in the changing global markets and recognize how their partnerships and subcontracts affect their brand.
      • Now more than ever, organizations need to be mindful of the larger global landscape and how their interactions within various regions can impact their reputation.
      Social media
      • Understanding how to monitor social media activity and online content will give you an edge in the current environment.
      • Changes in social media generally happen faster than companies can recognize them. If you are not actively monitoring those risks, the damage could set in before you even have a chance to respond.
      Global shortages
      • Organizations need to accept that shortages will recur periodically and that preparing for them will significantly increase the success potential of long-term plans.
      • Customers don’t always understand what is happening in the global supply chain and may blame you for poor service if you cannot meet demands as you have in the past.

      Which way is your reputation heading?

      • Do you understand and track items that might affect your reputation?
      • Do you understand the impact they may have on your business?

      Visualization of a Newton's Cradle perpetual motion device, aka clacky balls. The lifted ball is colored green with a smiley face and is labelled 'Your Brand Reputation'. The other four balls are red with a frowny face and are labelled 'Data Breach/ Lawsuit', 'Service Disruption', 'Customer Complaint', and 'Poor Delivery'.

      Identifying and understanding potential risks is essential to adapting to the ever-changing online landscape

      Info-Tech Insight

      Few organizations are good at identifying risks. As a result, almost none realistically plan to monitor, manage, and adapt their plans to mitigate those risks.

      Reputational risks

      Not protecting your brand can have disastrous consequences to your organization

      • Data breaches & lawsuits
      • Poor vendor performance
      • Service disruptions
      • Negative reviews

      Stock image of a smiling person on their phone rating something five stars.

      What to look for in vendors

      Identify potential reputational risk impacts
      • Check online reviews from both customers and employees.
      • Check news sites:
        • Has the vendor been affected by a breach?
        • Is the vendor frequently in the news – good or bad? Greater exposure can cause an uptick in hostile attacks, so make sure the vendor has adequate protections in line with its exposure.
      • Review its financials. Is it prime for an acquisition/bankruptcy or other significant change?
      • Review your contractual protections to ensure that you are made whole in the event something goes wrong. Has anything changed with the vendor that requires you to increase your protections?
      • Has anything changed in the vendor’s market? Is a competitor taking its business, or are its resources stretched on multiple projects due to increased demand?
      Illustration of business people in a city above various icons.

      Assessing Reputational Risk Impacts

      Zigzagging icons and numbers one through 7 alternating sides downward. Review Organizational Strategy
      Understand the organizational strategy to prepare for the “what if” game exercise.
      Identify & Understand Potential Risks
      Play the “what if” game with the right people at the table.
      Create a Risk Profile Packet for Leadership
      Pull all the information together in a presentation document.
      Validate the Risks
      Work with leadership to ensure that the proposed risks are in line with their thoughts.
      Plan to Manage the Risks
      Lower the overall risk potential by putting mitigations in place.
      Communicate the Plan
      It is important not only to have a plan but also to socialize it in the organization for awareness.
      Enact the Plan
      Once the plan is finalized and socialized put it in place with continued monitoring for success.
      (Adapted from Harvard Law School Forum on Corporate Governance)

      Insight Summary

      Reputational risk impacts are often unanticipated, causing catastrophic downstream effects. Continuously monitoring your vendors’ actions in the market can help organizations head off brand disasters before they occur.

      Insight 1

      Understanding how to monitor social media activity and online content will give you an edge in the current environment.

      Do you have dedicated individuals or teams to monitor your organization's online presence? Most organizations review and approve the online content, but many forget the need to have analysts reviewing what others are saying about them.

      Insight 2

      Organizations need to learn how to assess the likelihood of potential risks in the rapidly changing online environments and recognize how their partnerships and subcontractors’ actions can affect their brand.

      For example, do you understand how a simple news article raises your profile for short-term and long-term adverse events?

      Insight 3

      Socialize the risk management process throughout the organization to heighten awareness and enable employees to help protect the company’s reputation.

      Do you include a social media and brand protection policy in your annual education?

      Identify reputational risk

      Who should be included in the discussion?
      • While it is true that executive-level leadership defines the strategy for an organization, it is vital for those making decisions to make INFORMED decisions.
      • Getting input from your organization's marketing experts will enhance your brand's long-term protection.
      • Involving those who directly manage vendors and understand the market will aid in determining the forward path for relationships with your current vendors and identifying new emerging potential partners.
      • Organizations have a wealth of experience in their marketing departments that can help identify real-world negative scenarios.
      • Include vendor relationship managers to help track what is happening in the media for those vendors.
      Keep in mind: (R=L*I)
      Risk = Likelihood x Impact

      Impact tends to remain the same, while likelihood is a very flexible variable.

      Stock image of a flowchart asking 'Risk?', 'Yes', 'No'.

      Manage and monitor reputational risk impacts

      What can we realistically do about the risks?
      • Re-evaluate corporate policies frequently.
      • Ensure proper protections in contracts:
        • Limit the use of your brand name in the publicity and trademark clauses.
        • Make sure to include security protections for your data in the event of a breach; understand that reputation can rarely be made whole again once trust is breached.
      • Introduce continual risk assessment to monitor the relevant vendor markets.
      • Be adaptable and allow for innovations that arise from the current needs.
        • Capture lessons learned from prior incidents to improve over time and adjust your strategy based on the lessons.
      • Monitor your company’s and associated vendors’ online presence.
      • Track similar companies’ brand reputations to see how yours compares in the market.

      Social media is driving the need for perpetual diligence.

      Organizations need to monitor their brand reputation considering the pace of incidents in the modern age.

      Stock image of a person on a phone that is connected to other people.

      The “what if” game

      1-3 hours

      Input: List of identified potential risk scenarios scored by likelihood and financial impact, List of potential management of the scenarios to reduce the risk

      Output: Comprehensive reputational risk profile on the specific vendor solution

      Materials: Whiteboard/flip charts, Reputational Risk Impact Tool to help drive discussion

      Participants: Vendor Management Coordinator, Organizational Leadership, Operations Experts (SMEs), Legal/Compliance/Risk Manager, Marketing

      Vendor management professionals are in an excellent position to help senior leadership identify and pull together resources across the organization to determine potential risks. By playing the "what if" game and asking probing questions to draw out – or eliminate – possible negative outcomes, everyone involved adds their insight into parts of the organization to gather a comprehensive picture of potential impacts.

      1. Break into smaller groups (or if too small, continue as a single group).
      2. Use the Reputational Risk Impact Tool to prompt discussion on potential risks. Keep this discussion flowing organically to explore all potential risk but manage the overall process to keep the discussion on track.
      3. Collect the outputs and ask the subject matter experts for management options for each one in order to present a comprehensive risk strategy. You will use this to educate senior leadership so that they can make an informed decision to accept or reject the solution.

      Download the Reputational Risk Impact Tool

      Example: Low reputational risk

      We can see clearly in this example that the contractor suffered minimal impact from the specialist's behavior. Though they did take a hit to their overall reputation with a few customers, they should be able to course-correct with a minimal outlay of effort and almost no loss of revenue.

      Stock image of construction workers.

      Sample table of 'Sample Questions to Ask to Identify Reputational Impacts'. Column headers are 'Score', 'Weight', 'Question', and 'Comments or Notes'. At the bottom the 'Reputational Score' row has a low average score of '1.3' and '%100' total weight in their respective columns.

      Example: High reputational risk

      Note in the example how the tool can represent different weights for each of the criteria depending on your needs.

      Stock image of an older person looking out a window.

      Sample table of 'Sample Questions to Ask to Identify Reputational Impacts'. Column headers are 'Score', 'Weight', 'Question', and 'Comments or Notes'. At the bottom the 'Reputational Score' row has a high average score of '3.1' and '%100' total weight in their respective columns.

      Summary

      Be vigilant and adaptable to change
      • Organizations need to learn how to assess the likelihood of potential risks in the changing global markets and recognize how their partnerships and subcontracts affect their brand.
      • Understanding how to monitor social media activity and online content will give you an edge in the current environment.
      • Bring the right people to the table to outline potential risks to your organization’s brand reputation.
      • Socialize the risk management process throughout the organization to heighten awareness and enable employees to help protect the company’s reputation.
      • Incorporate lessons learned from incidents into your risk management process to build better plans for future issues.
      Stock image of a person's face overlaid with many different images.

      Organizations must evolve their risk assessments to be more adaptive to respond to global factors in the market.

      Ongoing monitoring of online media and the vendors tied to company visibility is imperative to avoiding disaster.

      Bibliography

      "The CEO Reputation Premium: Gaining Advantage in the Engagement Era." Weber Shandwick, March 2015. Accessed June 2022.

      Glidden, Donna. "Don't Underestimate the Need to Protect Your Brand in Publicity Clauses." Info-Tech Research Group, June 2022.

      Greenaway, Jordan. "Managing Reputation Risk: A start-to-finish guide." Transmission Private, July 2020. Accessed June 2022.

      Jagiello, Robert D., and Thomas T. Hills. “Bad News Has Wings: Dread Risk Mediates Social Amplification in Risk Communication.” Risk Analysis, vol. 38, no. 10, 2018, pp. 2193-2207.

      Kenton, Will. "Brand Recognition.” Investopedia, Aug. 2021. Accessed June 2022.

      Lischer, Brian. "How Much Does it Cost to Rebrand Your Company?" Ignyte, October 2017. Accessed June 2022.

      "Powerful Examples of How to Respond to Negative Reviews." ReviewTrackers, 16 Feb. 2022. Accessed June 2022.

      Tonello, Matteo. “Strategic Risk Management: A Primer for Directors.” Harvard Law School Forum on Corporate Governance, 23 Aug. 2012. Web.

      "Valuation of Trademarks: Everything You Need to Know." UpCounsel, 2022. Accessed June 2022.

      Related Info-Tech Research

      Sample of 'Assessing Financial Risk Management'. Identify and Manage Financial Risk Impacts on Your Organization
      • Identifying and managing a vendor’s potential financial impact requires multiple people in the organization across several functions – and those people all need educating on the potential risks.
      • Organizational leadership is often unaware of decisions on organizational risk appetite and tolerance, and they assume there are more protections in place against risk impact than there truly are.
      Sample of 'How to Assess Strategic Risk'. Identify and Manage Strategic Risk Impacts on Your Organization
      • Identifying and managing a vendor’s potential strategic impact requires multiple people in the organization across several functions – and those people all need coaching on the potential changes in the market and how these changes affect strategic plans.
      • Organizational leadership is often caught unaware during crises, and their plans lack the flexibility needed to adjust to significant market upheavals.
      Research coming soon. Jump Start Your Vendor Management Initiative
      • Vendor management is not “plug and play” – each organization’s vendor management initiative (VMI) needs to fit its culture, environment, and goals. The key is to adapt vendor management principles to fit your needs…not the other way around.
      • All vendors are not of equal importance to an organization. Classifying or segmenting your vendors allows you to focus your efforts on the most important vendors first, allowing your VMI to have the greatest impact possible.

      Research Contributors and Experts

      Frank Sewell

      Research Director
      Info-Tech Research Group

      Donna Glidden

      Research Director
      Info-Tech Research Group

      Steven Jeffery

      Principal Research Director
      Info-Tech Research Group

      Mark Roman

      Managing Partner
      Info-Tech Research Group

      Phil Bode

      Principal Research Director
      Info-Tech Research Group

      Sarah Pletcher

      Executive Advisor
      Info-Tech Research Group

      Scott Bickley

      Practice Lead
      Info-Tech Research Group

      Define a Sourcing Strategy for Your Development Team

      • Buy Link or Shortcode: {j2store}161|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Development
      • Parent Category Link: /development
      • Hiring quality development team resources is becoming increasingly difficult and costly in most domestic markets.
      • Firms are seeking to do more with less and increase their development team throughput.
      • Globalization and increased competition are driving a need for more innovation in your applications.
      • Firms want more cost certainty and tighter control of their development investment.

      Our Advice

      Critical Insight

      • Choosing the right sourcing strategy is not just a question of technical skills! Successful sourcing is based on matching your organization’s culture, knowledge, and experiences to the right choice of internal or external partnership.

      Impact and Result

      • We will help you build a sourcing strategy document for your application portfolio.
      • We will examine your portfolio and organization from three different perspectives to enable you to determine the right approach:
        • From a business perspective, reliance on the business, strategic value of the product, and maturity of product ownership are critical.
        • From an organizational perspective, you must examine your culture for communication processes, conflict resolution methods, vendor management skills, and geographic coverage.
        • From a technical perspective, consider integration complexity, environmental complexity, and testing processes.

      Define a Sourcing Strategy for Your Development Team Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Define a Sourcing Strategy for Your Development Team Storyboard – A guide to help you choose the right resourcing strategy to keep pace with your rapidly changing application and development needs.

      This project will help you define a sourcing strategy for your application development team by assessing key factors about your products and your organization, including critical business, technical, and organizational factors. Use this analysis to select the optimal sourcing strategy for each situation.

      • Define a Sourcing Strategy for Your Development Team Storyboard

      2. Define a Sourcing Strategy Workbook – A tool to capture the results of activities to build your sourcing strategy.

      This workbook is designed to capture the results of the activities in the storyboard. Each worksheet corresponds with an activity from the deck. The workbook is also a living artifact that should be updated periodically as the needs of your team and organization change.

      • Define a Sourcing Strategy Workbook
      [infographic]

      Further reading

      Define a Sourcing Strategy for Your Development Team

      Choose the right resourcing strategy to keep pace with your rapidly changing application and development needs.

      Analyst Perspective

      Choosing the right sourcing strategy for your development team is about assessing your technical situation, your business needs, your organizational culture, and your ability to manage partners!

      Photo of Dr. Suneel Ghei, Principal Research Director, Application Development, Info-Tech Research Group

      Firms today are under continuous pressure to innovate and deliver new features to market faster while at the same time controlling costs. This has increased the need for higher throughput in their development teams along with a broadening of skills and knowledge. In the face of these challenges, there is a new focus on how firms source their development function. Should they continue to hire internally, offshore, or outsource? How do they decide which strategy is the right fit?

      Info-Tech’s research shows that the sourcing strategy considerations have evolved beyond technical skills and costs. Identifying the right strategy has become a function of the characteristics of the organization, its culture, its reliance on the business for knowledge, its strategic value of the application, its vendor management skills, and its ability to internalize external knowledge. By assessing these factors firms can identify the best sourcing mix for their development portfolios.

      Dr. Suneel Ghei
      Principal Research Director, Application Development
      Info-Tech Research Group

      Executive Summary

      Your Challenge
      • Hiring quality development team resources is becoming increasingly difficult and costly in most domestic markets.
      • Firms are seeking to do more with less and increase their development team throughput.
      • Globalization and increased competition is driving a need for more innovation in your applications.
      • Firms want more cost certainty and tighter control of their development investment.
      Common Obstacles
      • Development leaders are encouraged to manage contract terms and SLAs rather than build long-term relationships.
      • People believe that outsourcing means you will permanently lose the knowledge around solutions.
      • Moving work outside of the current team creates motivational and retention challenges that can be difficult to overcome.
      Info-Tech’s Approach
      • Looking at this from these three perspectives will enable you to determine the right approach:
        1. From a business perspective, reliance on the business, strategic value of the product, and maturity of product ownership are critical.
        2. From an organizational perspective, you must examine your culture for communication processes, conflict resolution methods, vendor management skills, and geographic coverage
        3. From a technical perspective, consider integration complexity, environment complexity, and testing processes.

      Info-Tech Insight

      Choosing the right sourcing strategy is not just a question of technical skills! Successful sourcing is based on matching your organization’s culture, knowledge, and experiences to the right choice of internal or external partnership.

      Define a sourcing strategy for your development team

      Business
      • Business knowledge/ expertise required
      • Product owner maturity
      Technical
      • Complexity and maturity of technical environment
      • Required level of integration
      Organizational
      • Company culture
      • Desired geographic proximity
      • Required vendor management skills
      1. Assess your current delivery posture for challenges and impediments.
      2. Decide whether to build or buy a solution.
      3. Select your desired sourcing strategy based on your current state and needs.
      Example sourcing strategy with initiatives like 'Client-Facing Apps' and 'ERP Software' assigned to 'Onshore Dev', 'Outsource Team', 'Offshore Dev', 'Outsource App (Buy)', 'Outsource Dev', or 'Outsource Roles'.

      Three Perspectives +

      Three Steps =

      Your Sourcing Strategy

      Diverse sourcing is used by many firms

      Many firms across all industries are making use of different sourcing strategies to drive innovation and solve business issues.

      According to a report by ReportLinker the global IT services outsourcing market reached US$413.8 billion in 2021.

      In a recent study of Canadian software firms, it was found that almost all firms take advantage of outside knowledge in their application development process. In most cases these firms also use outside resources to do development work, and about half the time they use externally built software packages in their products (Ghei, 2020)!

      Info-Tech Insight

      In today’s diverse global markets, firms that wish to stay competitive must have a defined ability to take advantage of external knowledge and to optimize their IT services spend.

      Modeling Absorptive Capacity for Open Innovation in the Canadian Software Industry (Source: Ghei, 2020; n=54.)

      56% of software development firms are sourcing applications instead of resources.

      68% of firms are sourcing external resources to develop software products.

      91% of firms are leveraging knowledge from external sources.

      Internal sourcing models

      Insourcing comes in three distinct flavors

      Geospatial map giving example locations for the three internal sourcing models. In this example, 'Head Office' is located in North America, 'Onshore' is 'Located in the same area or even office as your core business resources. Relative Cost: $$$', 'Near Shore' is 'Typically, within 1-3 time zones for ease of collaboration where more favorable resource costs exist. Relative Cost: $$', and 'Offshore' is 'Located in remote markets where significant labor cost savings can be realized. Relative Cost: $'.

      Info-Tech Insight

      Insourcing allows you to stay close to more strategic applications. But choosing the right model requires a strong look inside your organization and your ability to provide business knowledge support to developers who may have different skills and cultures and are in different geographies.

      Outsourcing models

      External sourcing can be done to different degrees

      Outsource Roles
      • Enables resource augmentation
      • Typically based on skills needs
      • Short-term outsourcing with eventual integration or dissolution
      Outsource Teams (or Projects)
      • Use of a full team or multiple teams of vendor resources
      • Meant to be temporary, with knowledge transfer at the end of the project
      Outsource Products
      • Use of a vendor to build, maintain, and support the full product
      • Requires a high degree of contract management skill

      Info-Tech Insight

      Outsourcing represents one of the most popular ways for organizations to source external knowledge and skills. The choice of model is a function of the organization’s ability to support the external resources and to absorb the knowledge back into the organization.

      Defining your sourcing strategy

      Follow the steps below to identify the best match for your organization

      Review Your Current Situation

      Review the issues and opportunities related to application development and categorize them based on the key factors.

      Arrow pointing right. Assess Build Versus Buy

      Before choosing a sourcing model you must assess whether a particular product or function should be bought as a package or developed.

      Arrow pointing right. Choose the Right Sourcing Strategy

      Based on the research, use the modeling tool to match the situation to the appropriate sourcing solution.

      Step 1.1

      Review Your Current Situation

      Activities
      • 1.1.1 Identify and categorize your challenges

      This step involves the following participants:

      • Product management team
      • Software development leadership team
      • Key stakeholders
      Outcomes of this step

      Review your current delivery posture for challenges and impediments.

      Define a Sourcing Strategy for Your Development Team
      Step 1.1 Step 1.2 Step 1.3

      Review your situation

      There are three key areas to examine in your current situation:

      Business Challenges
      • Do you need to gain new knowledge to drive innovation?
      • Does your business need to enhance its software to improve its ability to compete in the market?
      • Do you need to increase your speed of innovation?

      Technology Challenges

      • Are you being asked to take tighter control of your development budgets?
      • Does your team need to expand their skills and knowledge?
      • Do you need to increase your development speed and capacity?

      Market Challenges

      • Is your competition seen as more innovative?
      • Do you need new features to attract new clients?
      • Are you struggling to find highly skilled and knowledgeable development resources?
      Stock image of multi-colored arrows travelling in a line together before diverging.

      Info-Tech Insight

      Sourcing is a key tool to solve business and technical challenges and enhance market competitiveness when coupled with a robust definition of objectives and a way to measure success.

      1.1.1 Identify and categorize your challenges

      60 minutes

      Output: List of the key challenges in your software lifecycle. Breakdown of the list into categories to identify opportunities for sourcing

      Participants: Product management team, Software development leadership team, Key stakeholders

      1. What challenge is your firm is facing with respect to your software that you think sourcing can address? (20 minutes)
      2. Is the challenge related to a business outcome, development methodology, or technology challenge? (10 minutes)
      3. Is the challenge due to a skills gap, budget or resource challenge, throughput issue, or a broader organizational knowledge or process issue? (10 minutes)
      4. What is the specific objective for the team/leader in addressing this challenge? (15 minutes)
      5. How will you measure progress and achievement of this objective? (5 minutes)

      Document results in the Define a Sourcing Strategy Workbook

      Identify and categorize your challenges

      Sample table for identifying and categorizing challenges, with column groups 'Challenge' and 'Success Measures' containing headers 'Issue, 'Category', 'Breadth', and 'Stakeholder' in the former, and 'Objective' and 'Measurement' in the latter.

      Step 1.2

      Assess Build Versus Buy

      Activities
      • 1.2.1 Understand the benefits and drawbacks of build versus buy in your organizational context

      This step involves the following participants:

      • Product management team
      • Software development leadership team
      • Key stakeholders

      Outcomes of this step

      Understand in your context the benefits and drawbacks of build versus buy, leveraging Info-Tech’s recommended definitions as a starting point.

      Define a Sourcing Strategy for Your Development Team

      Step 1.1 Step 1.2 Step 1.3

      Look vertically across the IT hierarchy to assess the impact of your decision at every level

      IT Hierarchy with 'Enterprise' at the top, branching out to 'Portfolio', then to 'Solution' at the bottom. The top is 'Strategic', the bottom 'Operational'.

      Regardless of the industry, a common and challenging dilemma facing technology teams is to determine when they should build software or systems in-house versus when they should rely wholly on an outside vendor for delivering on their technology needs.

      The answer is not as cut and dried as one would expect. Any build versus buy decision may have an impact on strategic and operational plans. It touches every part of the organization, starting with individual projects and rolling up to the enterprise strategy.

      Info-Tech Insight

      Do not ignore the impact of a build or buy decision on the various management levels in an IT organization.

      Deciding whether to build or buy

      It is as much about what you gain as it is about what problem you choose to have

      BUILD BUY

      Multi-Source Best of Breed

      Integrate various technologies that provide subset(s) of the features needed for supporting the business functions.

      Vendor Add-Ons & Integrations

      Enhance an existing vendor’s offerings by using their system add-ons either as upgrades, new add-ons, or integrations.
      Pros
      • Flexibility in choice of tools
      • In some cases, cost may be lower
      • Easier to enhance with in-house teams
      Cons
      • Introduces tool sprawl
      • Requires resources to understand tools and how they integrate
      • Some of the tools necessary may not be compatible with one another
      Pros
      • Reduces tool sprawl
      • Supports consistent tool stack
      • Vendor support can make enhancement easier
      • Total cost of ownership may be lower
      Cons
      • Vendor lock-in
      • The processes to enhance may require tweaking to fit tool capability

      Multi-Source Custom

      Integrate systems built in-house with technologies developed by external organizations.

      Single Source

      Buy an application/system from one vendor only.
      Pros
      • Flexibility in choice of tools
      • In some cases, cost may be lower
      • Easier to enhance with in-house teams
      Cons
      • May introduce tool sprawl
      • Requires resources to have strong technical skills
      • Some of the tools necessary may not be compatible with one another
      Pros
      • Reduces tool sprawl
      • Supports consistent tool stack
      • Vendor support can make enhancement easier
      • Total cost of ownership may be lower
      Cons
      • Vendor lock-in
      • The processes to enhance may require tweaking to fit tool capability

      1.2.1 Understand the benefits and drawbacks of build versus buy in your organizational context

      30 minutes

      Output: A common understanding of the different approaches to build versus buy applied to your organizational context

      Participants: Product management team, Software development leadership team, Key stakeholders

      1. Look at the previous slide, Deciding whether to build or buy.
      2. Discuss the pros and cons listed for each approach.
        1. Do they apply in your context? Why or why not?
        2. Are there some approaches not applicable in terms of how you wish to work?
      3. Record the curated list of pros and cons for the different build/buy approaches.
      4. For each approach, arrange the pros and cons in order of importance.

      Document results in the Define a Sourcing Strategy Workbook

      Step 1.3

      Choose the Right Sourcing Strategy

      Activities
      • 1.3.1 Determine the right sourcing strategy for your needs

      This step involves the following participants:

      • Product management team
      • Software development leadership team
      • Key stakeholders

      Outcomes of this step

      Choose your desired sourcing strategy based on your current state and needs.

      Define a Sourcing Strategy for Your Development Team

      Step 1.1 Step 1.2 Step 1.3

      Choose the right sourcing strategy

      • Based on our research, finding the right sourcing strategy for a particular situation is a function of three key areas:
        • Business drivers
        • Organizational drivers
        • Technical drivers
      • Each area has key characteristics that must be assessed to confirm which strategy is best suited for the situation.
      • Once you have assessed the factors and ranked them from low to high, we can then match your results with the best-fit strategy.
      Business
      • Business knowledge/ expertise required
      • Product owner maturity

      Technical

      • Complexity and maturity of technical environment
      • Required level of integration

      Organizational

      • Your culture
      • Desired geographic proximity
      • Required vendor management skills

      Business drivers

      To choose the right sourcing strategy, you need to assess your key drivers of delivery

      Product Knowledge
      • The level of business involvement required to support the development team is a critical factor in determining the sourcing model.
      • Both the breadth and depth of involvement are critical factors.
      Strategic Value
      • The strategic value of the application to the company is also a critical component.
      • The more strategic the application is to the company, the closer the sourcing should be maintained.
      • Value can be assessed based on the revenue derived from the application and the depth of use of the application by the organization.
      Product Ownership Maturity
      • To support sourcing models that move further from organizational boundaries a strong product ownership function is required.
      • Product owners should ideally be fully allocated to the role and engaged with the development teams.
      • Product owners should be empowered to make decisions related to the product, its vision, and its roadmap.
      • The higher their allocation and empowerment, the higher the chances of success in external sourcing engagements.
      Stock image of a person running up a line with a positive trend.

      Case Study: The GoodLabs Studio Experience Logo for GoodLabs Studio.

      INDUSTRY: Software Development | SOURCE: Interview with Thomas Lo, Co-Founder, GoodLabs Studio
      Built to Outsource Development Teams
      • GoodLabs is an advanced software innovation studio that provides bespoke team extensions or turnkey digital product development with high-caliber software engineers.
      • Unlike other consulting firms, GoodLabs works very closely with its customers as a unified team to deliver the most significant impact on clients’ projects.
      • With this approach, it optimizes the delivery of strong software engineering skills with integrated product ownership from the client, enabling long-term and continued success for its clients.
      Results
      • GoodLabs is able to attract top engineering talent by focusing on a variety of complex projects that materially benefit from technical solutions, such as cybersecurity, fraud detection, and AI syndrome surveillance.
      • Taking a partnership approach with the clients has led to the successful delivery of many highly innovative and challenging projects for the customers.

      Organizational drivers

      To choose the right sourcing strategy for a particular problem you need to assess the organization’s key capabilities

      Stock photo of someone placing blocks with illustrated professionals one on top of the other. Vendor Management
      • Vendor management is a critical skill for effective external sourcing.
      • This can be assessed based on the organization’s ability to cultivate and grow long-term relationships of mutual value.
      • The longevity and growth of existing vendor relationships can be a good benchmark for future success.
      Absorptive Capacity
      • To effectively make use of external sourcing models, the organization must have a well-developed track record of absorbing outside knowledge.
      • This can be assessed by looking at past cases where external knowledge was sourced and internalized, such as past vendor development engagements or use of open-source code.
      Organizational Culture
      • Another factor in success of vendor engagements and long-term relationships is the matching of organizational cultures.
      • It is key to measure the organization’s current position on items like communication strategy, geographical dispersal, conflict resolution strategy, and hierarchical vs flat management.
      • These factors should be documented and matched with partners to determine the best fit.

      Case Study: WCIRB California Logo for WCIRB California.

      INDUSTRY: Workers Compensation Insurance | SOURCE: Interview with Roger Cottman, Senior VP and CIO, WCIRB California
      Trying to Find the Right Match
      • WCIRB is finding it difficult to hire local resources in California.
      • Its application is a niche product. Since no off-the-shelf alternatives exist, the organization will require a custom application.
      • WCIRB is in the early stages of a digital platform project and is looking to bring in a partner to provide a full development team, with the goal of ideally bringing the application back in-house once it is built.
      • The organization is looking for a local player that will be able to integrate well with the business.
      • It has engaged with two mid-sized players but both have been slow to respond, so it is now considering alternative approaches.
      Info-Tech’s Recommended Approach
      • WCIRB is finding that mid-sized players don’t fit its needs and is now looking for a larger player
      • Based on our research we have advised that WCIRB should ensure the partner is geographically close to its location and can be a strategic partner, not simply work on an individual project.

      Technical drivers

      To choose the right sourcing strategy for a particular problem you need to assess your technical situation and capabilities

      Environment Complexity
      • The complexity of your technical environment is a hurdle that must be overcome for external sourcing models.
      • The number of environments used in the development lifecycle and the location of environments (physical, virtual, on-premises, or cloud) are key indicators.
      Integration Requirements
      • The complexity of integration is another key technical driver.
      • The number of integrations required for the application is a good measuring stick. Will it require fewer than 5, 5-10, or more than 10?
      Testing Capabilities
      • Testing of the application is a key technical driver of success for external models.
      • Having well-defined test cases, processes, and shared execution with the business are all steps that help drive success of external sourcing models.
      • Test automation can also help facilitate success of external models.
      • Measure the percentage of test cases that are standardized, the level of business involvement, and the percentage of test cases that are automated.
      Stock image of pixelated light.

      Case Study: Management Control Systems (MC Systems) Logo for MC Systems.

      INDUSTRY: Technology Services | SOURCE: Interview with Kathryn Chin See, Business Development and Research Analyst, MC Systems
      Seeking to Outsource Innovation
      • MC Systems is seeking to outsource its innovation function to get budget certainty on innovation and reduce costs. It is looking for a player that has knowledge of the application areas it is looking to enhance and that would augment its own business knowledge.
      • In previous outsourcing experiences with skills augmentation and application development the organization had issues related to the business depth and product ownership it could provide. The collaborations did not lead to success as MC Systems lacked product ownership and the ability to reintegrate the outside knowledge.
      • The organization is concerned about testing of a vendor-built application and how the application will be supported.
      Info-Tech’s Recommended Approach
      • To date MC Systems has had success with its outsourcing approach when outsourcing specific work items.
      • It is now looking to expand to outsourcing an entire application.
      • Info-Tech’s recommendation is to seek partners who can take on development of the application.
      • MC Systems will still need resources to bring knowledge back in-house for testing and to provide operational support.

      Choosing the right model


      Legend for the table below using circles with quarters to represent Low (0 quarters) to High (4 quarters).
      Determinant Key Questions to Ask Onshore Nearshore Offshore Outsource Role(s) Outsource Team Outsource Product(s)
      Business Dependence How much do you rely on business resources during the development cycle? Circle with 4 quarters. Circle with 3 quarters. Circle with 1 quarter. Circle with 2 quarters. Circle with 1 quarter. Circle with 0 quarters.
      Absorptive Capacity How successful has the organization been at bringing outside knowledge back into the firm? Circle with 0 quarters. Circle with 1 quarter. Circle with 1 quarter. Circle with 2 quarters. Circle with 1 quarter. Circle with 4 quarters.
      Integration Complexity How many integrations are required for the product to function – fewer than 5, 5-10, or more than 10? Circle with 4 quarters. Circle with 3 quarters. Circle with 3 quarters. Circle with 2 quarters. Circle with 1 quarter. Circle with 0 quarters.
      Product Ownership Do you have full-time product owners in place for the products? Do product owners have control of their roadmaps? Circle with 1 quarter. Circle with 2 quarters. Circle with 3 quarters. Circle with 2 quarters. Circle with 4 quarters. Circle with 4 quarters.
      Organization Culture Fit What are your organization’s communication and conflict resolution strategies? Is your organization geographically dispersed? Circle with 1 quarter. Circle with 1 quarter. Circle with 3 quarters. Circle with 1 quarter. Circle with 3 quarters. Circle with 4 quarters.
      Vendor Mgmt Skills What is your skill level in vendor management? How long are your longest-standing vendor relationships? Circle with 0 quarters. Circle with 1 quarter. Circle with 1 quarter. Circle with 2 quarters. Circle with 3 quarters. Circle with 4 quarters.

      1.3.1 Determine the right sourcing strategy for your needs

      60 minutes

      Output: A scored matrix of the key drivers of the sourcing strategy

      Participants: Development leaders, Product management team, Key stakeholders

      Choose one of your products or product families and assess the factors below on a scale of None, Low, Medium, High, and Full.

      • 3.1 Assess the business factors that drive selection using these key criteria (20 minutes):
        • 3.1.1 Product knowledge
        • 3.1.2 Strategic value
        • 3.1.3 Product ownership
      • 3.2 Assess the organizational factors that drive selection using these key criteria (20 minutes):
        • 3.2.1 Vendor management
        • 3.2.2 Absorptive capacity
        • 3.2.3 Organization culture
      • 3.3 Assess the technical factors that drive selection using these key criteria (20 minutes):
        • 3.3.1 Environments
        • 3.3.2 Integration
        • 3.3.3 Testing

      Document results in the Define a Sourcing Strategy Workbook

      Things to Consider When Implementing

      Once you have built your strategy there are some additional things to consider

      Things to Consider Before Acting on Your Strategy

      By now you understand what goes into an effective sourcing strategy. Before implementing one, there are a few key items you need to consider:

      Example 'Sourcing Strategy for Your Portfolio' with initiatives like 'Client-Facing Apps' and 'ERP Software' assigned to 'Onshore Dev', 'Outsource Team', 'Offshore Dev', 'Outsource App (Buy)', 'Outsource Dev', or 'Outsource Roles'. Start with a pilot
      • Changing sourcing needs to start with one team.
      • Grow as skills develop to limit risk.
      Build an IT workforce plan Enhance your vendor management skills Involve the business early and often
      • The business should feel they are part of the discussion.
      • See our Agile/DevOps Research Center for more information on how the business and IT can better work together.
      Limit sourcing complexity
      • Having too many different partners and models creates confusion and will strain your ability to manage vendors effectively.

      Bibliography

      Apfel, Isabella, et al. “IT Project Member Turnover and Outsourcing Relationship Success: An Inverted-U Effect.” Developments, Opportunities and Challenges of Digitization, 2020. Web.

      Benamati, John, and Rajkumar, T.M. “The Application Development Outsourcing Decision: An Application of the Technology Acceptance Model.” Journal of Computer Information Systems, vol. 42, no. 4, 2008, pp. 35-43. Web.

      Benamati, John, and Rajkumar, T.M. “An Outsourcing Acceptance Model: An Application of TAM to Application Development Outsourcing Decisions.” Information Resources Management Journal, vol. 21, no. 2, pp. 80-102, 2008. Web.

      Broekhuizen, T. L. J., et al. “Digital Platform Openness: Drivers, Dimensions and Outcomes.” Journal of Business Research, vol. 122, July 2019, pp. 902-914. Web.

      Brook, Jacques W., and Albert Plugge. “Strategic Sourcing of R&D: The Determinants of Success.” Business Information Processing, vol. 55, Aug. 2010, pp. 26-42. Web.

      Delen, G. P A.J., et al. “Foundations for Measuring IT-Outsourcing Success and Failure.” Journal of Systems and Software, vol. 156, Oct. 2019, pp. 113-125. Web.

      Elnakeep, Eman, et al. “Models and Frameworks for IS Outsourcing Structure and Dimensions: A Holistic Study.” Lecture notes in Networks and Systems, 2019. Web.

      Ghei, Suneel. Modeling Absorptive Capacity for Open Innovation in the Software Industry. 2020. Faculty of Graduate Studies, Athabasca University, 2020. DBA Dissertation.

      “IT Outsourcing Market Research Report by Service Model, Organization Sizes, Deployment, Industry, Region – Global Forecast to 2027 – Cumulative Impact of COVID-19.” ReportLinker, April 2022. Web.

      Jeong, Jongkil Jay, et al. “Enhancing the Application and Measurement of Relationship Quality in Future IT Outsourcing Studies.” 26th European Conference on Information Systems: Beyond Digitization – Facets of Socio-Tehcnical Change: Proceedings of ECIS 2018, Portsmouth, UK, June 23-28, 2018. Edited by Peter Bednar, et al., 2018. Web.

      Könning, Michael. “Conceptualizing the Effect of Cultural Distance on IT Outsourcing Success.” Proceedings of Australasian Conference on Information Systems 2018, Sydney, Australia, Dec. 3-5, 2018. Edited by Matthew Noble, UTS ePress, 2018. Web.

      Lee, Jae-Nam, et al. “Holistic Archetypes of IT Outsourcing Strategy: A Contingency Fit and Configurational Approach.” MIS Quarterly, vol. 43, no. 4, Dec. 2019, pp. 1201-1225. Web.

      Loukis, Euripidis, et al. “Determinants of Software-as-a-Service Benefits and Impact on Firm Performance.” Decision Support Systems, vol. 117, Feb. 2019, pp. 38-47. Web.

      Martensson, Anders. “Patterns in Application Development Sourcing in the Financial Industry.” Proceedings of the 13th European Conference of Information Systems, 2004. Web.

      Martínez-Sánchez, Angel, et al. “The Relationship Between R&D, the Absorptive Capacity of Knowledge, Human Resource Flexibility and Innovation: Mediator Effects on Industrial Firms.” Journal of Business Research, vol. 118, Sept. 2020, pp. 431-440. Web.

      Moreno, Valter, et al. “Outsourcing of IT and Absorptive Capacity: A Multiple Case Study in the Brazilian Insurance Sector.” Brazilian Business Review, vol. 17, no. 1, Jan.-Feb. 2020, pp. 97-113. Web.

      Ozturk, Ebru. “The Impact of R&D Sourcing Strategies on Basic and Developmental R&D in Emerging Economies.” European Journal of Innovation Management, vol. 21, no. 7, May 2018, pp. 522-542. Web.

      Ribas, Imma, et al. “Multi-Step Process for Selecting Strategic Sourcing Options When Designing Supply Chains.” Journal of Industrial Engineering and Management, vol. 14, no. 3, 2021, pp. 477-495. Web.

      Striteska, Michaela Kotkova, and Viktor Prokop. “Dynamic Innovation Strategy Model in Practice of Innovation Leaders and Followers in CEE Countries – A Prerequisite for Building Innovative Ecosystems.” Sustainability, vol. 12, no. 9, May 2020. Web.

      Thakur-Wernz, Pooja, et al. “Antecedents and Relative Performance of Sourcing Choices for New Product Development Projects.” Technovation, 2020. Web.

      Adding the Right Value: Building Cloud Brokerages That Enable

      • Buy Link or Shortcode: {j2store}110|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Strategy and Organizational Design
      • Parent Category Link: /strategy-and-organizational-design

      In many cases, the answer is to develop a cloud brokerage to manage the complexity. But what should your cloud broker be delivering, and how?

      Our Advice

      Critical Insight

      • To avoid failure, you need to provide security and compliance, but basic user satisfaction means becoming a frictionless intermediary.
      • Enabling brokers provide knowledge and guidance for the best usage of cloud.
      • While GCBs fill a critical role as a control point for IT consumption, they can easily turn into a friction point for IT projects. It’s important to find the right balance between enabling compliance and providing frictionless usability.

      Impact and Result

      • Avoid disintermediation.
      • Maintain compliance.
      • Leverage economies of scale.
      • Ensure architecture discipline.

      Adding the Right Value: Building Cloud Brokerages That Enable Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Build a Cloud Brokerage Deck – A guide to help you start designing a cloud brokerage that delivers value beyond gatekeeping.

      Define the value, ecosystem, and metrics required to add value as a brokerage. Develop a brokerage value proposition that aligns with your audience and capabilities. Define and rationalize the ecosystem of partners and value-add activities for your brokerage. Define KPIs that allow you to maximize and balance both usability and compliance.

      • Adding the Right Value: Building Cloud Brokerages That Enable Storyboard
      [infographic]

      Further reading

      Adding the Right Value: Building Cloud Brokerages That Enable

      Considerations for implementing an institutional-focused cloud brokerage.

      Your Challenge

      Increasingly, large institutions and governments are adopting cloud-first postures for delivering IT resources. Combined with the growth of cloud offerings that are able to meet the certifications and requirements of this segment that has been driven by federal initiatives like Cloud-First in Canada and Cloud Smart in the United States, these two factors have left institutions (and the businesses that serve them) with the challenge of delivering cloud services to their users while maintaining compliance, control, and IT sanity.

      In many cases, the answer is to develop a cloud brokerage to manage the complexity. But what should your cloud broker be delivering and how?

      Navigating the Problem

      Not all cloud brokerages are the same. And while they can be an answer to cloud complexity, an ineffective brokerage can drain value and complicate operations even further. Cloud brokerages need to be designed:

      1. To deliver the right type of value to its users.
      2. To strike the balance between effective governance & security and flexibility & ease of use.

      Info-Tech’s Approach

      By defining your end goals, framing solutions based on the type of value and rigor your brokerage needs to deliver, and focusing on the right balance of security and flexibility, you can deliver a brokerage that delivers the best of all worlds.

      1. Define the brokerage value you want to deliver.
      2. Build the catalog and partner ecosystem.
      3. Understand how to maximize adoption and minimize disintermediation while maintaining architectural discipline and compliance.

      Info-Tech Insight

      Sometimes a brokerage delivery model makes sense, sometimes it doesn’t! Understanding the value addition you want your brokerage to provide before creating it allows you to not only avoid pitfalls and maximize benefits but also understand when a brokerage model does and doesn’t make sense in the first place.

      Project Overview

      Understand what value you want your brokerage to deliver

      Different institutions want brokerage delivery for different reasons. It’s important to define up front why your users need to work through a brokerage and what value that brokerage needs to deliver.

      What’s in the catalog? Is it there to consolidate and simplify billing and consumption? Or does it add value further up the technology stack or value chain? If so, how does that change the capabilities you need internally and from partners?

      Security and compliance are usually the highest priority

      Among institutions adopting cloud, a broker that can help deliver their defined security and compliance standards is an almost universal requirement. Especially in government institutions, this can mean the need to meet a high standard in both implementation and validation.

      The good news is that even if you lack the complete set of skills in-house, the high certification levels available from hyperscale providers combined with a growing ecosystem of service providers working on these platforms means you can usually find the right partner(s) to make it possible.

      The real goal: frictionless intermediation and enablement

      Ultimately, if end users can’t get what they need from you, they will go around you to get it. This challenge, which has always existed in IT, is further amplified in a cloud service world that offers users a cornucopia of options outside the brokerage. Furthermore, cloud users expect to be able to consume IT seamlessly. Without frictionless satisfaction of user demand your brokerage will become disintermediated, which risks your highest priorities of security and compliance.

      Understand the evolution: Info-Tech thought model

      While initial adoption of cloud brokerages in institutions was focused on ensuring the ability of IT to extend its traditional role as gatekeeper to the realm of cloud services, the focus has now shifted upstream to enabling ease of use and smart adoption of cloud services. This is evidenced clearly in examples like the US government’s renaming of its digital strategy from “Cloud First” to “Cloud Smart” and has been mirrored in other regions and institutions.

      Info-Tech Insights

      To avoid failure, you need to provide security and compliance.

      Basic user satisfaction means becoming a frictionless intermediary.

      Exceed expectations! Enabling brokers provide knowledge and guidance for the best usage of cloud.

      • Security & Compliance
      • Frictionless Intermediation
      • Cloud-Enabling Brokerage

      Define the role of a cloud broker

      Where do brokers fit in the cloud model?

      • NIST Definition: An entity that manages the use, performance, and delivery of cloud services and negotiates relationships between cloud providers and cloud consumers.
      • Similar to a telecom master agent, a cloud broker acts as the middle-person and end-user point of contact, consolidating the management of underlying providers.
      • A government or institutional cloud broker (GCB) is responsible for the delivery of all cloud services consumed by the departments or agencies it supports or that are mandated to use it.

      Balancing governance and agility

      Info-Tech Insight

      While GCBs fill a critical role as a control point for IT consumption, they can easily turn into a friction point for IT projects. It’s important to find the right balance between enabling compliance and providing frictionless usability.

      Model brokerage drivers and benefits

      Reduced costs: Security through standardization: Frictionless consumption: Avoid disinter-mediation; Maintain compliance; Leverage economies of scale; Ensure architecture discipline

      Maintain compliance and ensure architecture discipline: Brokerages can be an effective gating point for ensuring properly governed and managed IT consumption that meets the specific regulations and compliances required for an institution. It can also be a strong catalyst and enabler for moving to even more effective cloud consumption through automation.

      Avoid disintermediation: Especially in institutions, cloud brokers are a key tool in the fight against disintermediation – that is, end users circumventing your IT department’s procurement and governance by consuming an ad hoc cloud service.

      Leverage economies of scale: Simply put, consolidation of your cloud consumption drives effectiveness by making the most of your buying power.

      Info-Tech Insights

      Understanding the importance of each benefit type to your brokerage audience will help you define the type of brokerage you need to build and what skills and partners will be required to deliver the right value.

      The brokerage landscape

      The past ten years have seen governments and institutions evolve from basic acceptance of cloud services to the usage of cloud as the core of most IT initiatives.

      • As part of this evolution, many organizations now have well-defined standards and guidance for the implementation, procurement, and regulation of cloud services for their use.
      • Both Canada (Strategic Plan for Information Management and Information Technology) and the United States (Cloud Smart – formerly known as Cloud First) have recently updated their guidance on adoption of cloud services. The Australian Government has also recently updated its Cloud Computing Policy.
      • AWS and Azure both now claim Full FedRAMP (Federal Risk and Authorization Management Program) certification.
      • This has not only enabled easy adoption of these core hyperscale cloud service by government but also driven the proliferation of a large ecosystem of FedRAMP-authorized cloud service providers.
      • This trend started with government at the federal level but has cascaded downstream to provincial and municipal governments globally, and the same model seems likely to be adopted by other governments and other institution types over time.

      Info-Tech Insight

      The ecosystem of platforms and tools has grown significantly and examples of best practices, especially in government, are readily available. Once you’ve defined your brokerage’s value stance, the building blocks you need to deliver often don’t need to be built from scratch.

      Address the unique challenges of business-led IT in institutions

      With the business taking more accountability and management of their own technology, brokers must learn how to evolve from being gatekeepers to enablers.

      This image This lists the Cons of IT acting as a gatekeeper providing oversight, and the Pros of IT acting as an Enabler in an IT Partnership.  the Cons are: Restrict System Access; Deliver & Monitor Applications; Own Organizational Risk; Train the Business.  The Pros are: Manage Role-Based Access; Deliver & Monitor Platforms; Share Organizational Risk; Coach & Mentor the Business

      Turn brokerage pitfalls into opportunities

      The greatest risks in using a cloud broker come from its nature as a single point of distribution for service and support. Without resources (or automation) to enable scale, as well as responsive processes for supporting users in finding the right services and making those services available through the brokerage, you will lose alignment with your users’ needs, which inevitably leads to disintermediation, loss of IT control, and broken compliance

      Info-Tech Insights

      Standardization and automation are your friend when building a cloud brokerage! Sometimes this means having a flexible catalog of options and configurations, but great brokerages can deliver value by helping their users redefine and evolve their workloads to work more effectively in the cloud. This means providing guidance and facilitating the landing/transformation of users’ workloads in the cloud, the right way.

      Challenges Impact
      • Single point of failure
      • Managing capacity
      • Alignment of brokerage with underlying agencies
      • Additional layer of complexity
      • Inability to deliver service
      • Disintermediation
      • Broken security/compliance
      • Loss of cost control/purchasing power

      Validate your cloud brokerage strategy using Info-Tech’s approach

      Value Definition

      • Define your brokerage type and value addition

      Capabilities Mapping

      • Understand the partners and capabilities you need to be able to deliver

      Measuring Value

      • Define KPIs for both compliant delivery and frictionless intermediation

      Provide Cloud Excellence

      • Move from intermediation to enablement and help users land on the cloud the right way

      Define the categories for your brokerage’s benefit and value

      Depending on the type of brokerage, the value delivered may be as simple as billing consolidation, but many brokerages go much deeper in their value proposition.

      This image depicts a funnel, where the following inputs make up the Broker Value: Integration, Interface and Management Enhancement; User Identity and Risk Management/ Security & Compliance; Cost & Workload Efficiency, Service Aggregation

      Define the categories of brokerage value to add

      • Purchasing Agents save the purchaser time by researching services from different vendors and providing the customer with information about how to use cloud computing to support business goals.
      • Contract Managers may also be assigned power to negotiate contracts with cloud providers on behalf of the customer. In this scenario, the broker may distribute services across multiple vendors to achieve cost-effectiveness, while managing the technical and procurement complexity of dealing with multiple vendors.
        • The broker may provide users with an application program interface (API) and user interface (UI) that hides any complexity and allows the customer to work with their cloud services as if they were being purchased from a single vendor. This type of broker is sometimes referred to as a cloud aggregator.
      • Cloud Enablers can also provide the customer with additional services, such as managing the deduplication, encryption, and cloud data transfer and assisting with data lifecycle management and other activities.
      • Cloud Customizers integrate various underlying cloud services for customers to provide a custom offering under a white label or its own brand.
      • Cloud Agents are essentially the software version of a Contract Manager and act by automating and facilitating the distribution of work between different cloud service providers.

      Info-Tech Insights

      Remember that these categories are general guidelines! Depending on the requirements and value a brokerage needs to deliver, it may fit more than one category of broker type.

      Brokerage types and value addition

      Info-Tech Insights

      Each value addition your brokerage invests in delivering should tie to reinforcing efficiency, compliance, frictionlessness, or enablement.

      Value Addition Purchasing Agent Contract Manager Cloud Enabler Cloud Customizer Cloud Agent
      Underlying service selection

      Standard Activity

      Standard Activity Standard Activity Standard Activity Common Activity
      Support and info Standard Activity

      Common Activity

      Standard Activity Standard Activity Common Activity
      Contract lifecycle (pricing/negotiation) Standard Activity Common Activity Standard Activity
      Workload distribution (to underlying services) (aggregation) Common Activity Standard Activity Standard Activity Standard Activity
      Value-add or layered on services Standard Activity Common Activity
      Customization/integration of underlying services Standard Activity
      Automated workload distribution (i.e. software) Standard Activity

      Start by delivering value in these common brokerage service categories

      Security & Compliance

      • Reporting & Auditing
      • SIEM & SOC Services
      • Patching & Monitoring

      Cost Management

      • Right-Sizing
      • Billing Analysis
      • Anomaly Detection & Change Recommendations

      Data Management

      • Data Tiering
      • Localization Management
      • Data Warehouse/Lake Services

      Resilience & Reliability

      • Backup & Archive
      • Replication & Sync
      • DR & HA Management
      • Ransomware Prevention/Mitigation

      Cloud-Native & DevOps Enablement

      • Infrastructure as Code (IaC)
      • DevOps Tools & Processes
      • SDLC Automation Tools

      Design, Transformation, and Integration

      • CDN Integration
      • AI Tools Integration
      • SaaS Customizations

      Activity: Brokerage value design

      Who are you and who are you building this for?

      • Internal brokerage (i.e. you are a department in an organization that is tasked with providing IT resources to other internal groups)
        • No profit motivation
        • Primary goal is to maintain compliance and avoid disintermediation
      • Third-party brokerage (i.e. you are an MSP that needs to build a brokerage to provide a variety of downstream services and act as the single point of consumption for an organization)
        • Focus on value-addition to the downstream services you facilitate for your client
        • Increased requirement to quickly add new partners/services from downstream as required by your client

      What requirements and pains do you need to address?

      • Remember that in the world of cloud, users ultimately can go around IT to find the resources and tools they want to use. In short, if you don’t provide ease and value, they will get it somewhere else.
      • Assess the different types of cloud brokerages out there as a guide to what sort of value you want to deliver.

      Why are you creating a brokerage? There are several categories of driver and more than one may apply.

      • Compliance and security gating/validation
      • Cost consolidation and governance
      • Value-add or feature enhancement of raw/downstream services being consumed

      It’s important to clearly understand how best you can deliver unique value to ensure that they want to consume from you.

      This is an image of a Venn diagram between the following: Who are you trying to serve?; Why and how are you uniquely positioned to deliver?; What requirements do they have and what pain points can you help solve?.  Where all three circles overlap is the Brokerage Value Proposition.

      Understand the ecosystem you’ll require to deliver value

      GCB

      • Enabling Effectiveness
      • Cost Governance
      • Adoption and User Satisfaction
      • Security & Compliance

      Whatever value proposition and associated services your brokerage has defined, either internal resources or additional partners will be required to run the platform and processes you want to offer on top of the defined base cloud platforms.

      Info-Tech Insights

      Remember to always align your value adds and activities to the four key themes:

      • Efficiency
      • Compliance
      • Frictionlessness
      • Cloud Enablement

      Delivering value may require an ecosystem

      The additional value your broker delivers will depend on the tools and services you can layer on top of the base cloud platform(s) you support.

      In many cases, you may require different partners to fulfil similar functions across different base platforms. Although this increases complexity for the brokerage, it’s also a place where additional value can be delivered to end users by your role as a frictionless intermediary.

      Base Partner/Platform

      • Third-party software & platforms
      • Third-party automations & integrations
      • Third-party service partners
      • Internal value-add functions

      Build the ecosystem you need for your value proposition

      Leverage partners and automation to bake compliance in.

      Different value-add types (based on the category/categories of broker you’re targeting) require different additional platforms and partners to augment the base cloud service you’re brokering.

      Security & Config

      • IaC Tools
      • Cloud Resource Configuration Validation
      • Templating Tools
      • Security Platforms
      • SDN and Networking Platforms
      • Resilience (Backup/Replication/DR/HA) Platforms
      • Data & Storage Management
      • Compliance and Validation Platforms & Partners

      Cost Management

      • Subscription Hierarchy Management
      • Showback and Chargeback Logic
      • Cost Dashboarding and Thresholding
      • Governance and Intervention

      Adoption & User Satisfaction

      • Service Delivery SLAs
      • Support Process & Tools
      • Capacity/Availability Management
      • Portal Usability/UX

      Speed of Evolution

      • Partner and Catalog/Service Additions
      • Broker Catalog Roadmapping
      • User Request Capture (new services)
      • User Request Capture (exceptions)

      Build your features and services lists

      Incorporate your end user, business, and IT perspectives in defining the list of mandatory and desired features of your target solution.

      See our Implement a Proactive and Consistent Vendor Selection Process blueprint for information on procurement practices, including RFP templates.

      End User

      • Visual, drag-and-drop models to define data models, business logic, and user interfaces
      • One-click deployment
      • Self-healing application
      • Vendor-managed infrastructure
      • Active community and marketplace
      • Prebuilt templates and libraries
      • Optical character recognition and natural language processing

      Business

      • Audit and change logs
      • Theme and template builder
      • Template management
      • Knowledgebase and document management
      • Role-based access
      • Business value, operational costs, and other KPI monitoring
      • Regulatory compliance
      • Consistent design and user experience across applications
      • Business workflow automation

      IT

      • Application and system performance monitoring
      • Versioning and code management
      • Automatic application and system refactoring and recovery
      • Exception and error handling
      • Scalability (e.g. load balancing) and infrastructure management
      • Real-time debugging
      • Testing capabilities
      • Security management
      • Application integration management

      Understand the stakeholders

      Hyperscale Platform/Base Platform: Security; Compliance and Validation;Portal/Front-End; Cost Governance; Broker Value Add(s)

      Depending on the value-add(s) you are trying to deliver, as well as the requirements from your institution(s), you will have a different delineation of responsibilities for each of the value-add dimensions. Typically, there will be at least three stakeholders whose role needs to be considered for each dimension:

      • Base Cloud Provider
      • Third-Party Platforms/Service Providers
      • Internal Resources

      Info-Tech Insights

      It’s important to remember that the ecosystem of third-party options available to you in each case will likely be dependent on if a given partner operates or supports your chosen base provider.

      Define the value added by each stakeholder in your value chain

      Value Addition Cost Governance Security & Compliance Adoption and User Satisfaction New Service Addition Speed End-User Cloud Effectiveness
      Base platform(s)
      Third party
      Internal

      A basic table of the stakeholders and platforms involved in your value stream is a critical tool for aligning activities and partners with brokerage value.

      Remember to tie each value-add category you’re embarking on to at least one of the key themes!

      Cost Governance → Efficiency

      Security & Compliance → Compliance

      Adoption & User Satisfaction → Frictionlessness

      New Service Addition Responsiveness → Frictionlessness, Enablement

      End-User Cloud Effectiveness → Enablement

      Info-Tech Insights

      The expectations for how applications are consumed and what a user experience should look like is increasingly being guided by the business and by the disintermediating power of the cloud-app ecosystem.

      “Enabling brokers” help embrace business-led IT

      In environments where compliance and security are a must, the challenges of handing off application management to the business are even more complex. Great brokers learn to act not just as a gatekeeper but an enabler of business-led IT.

      Business Empowerment

      Organizations are looking to enhance their Agile and BizDevOps practices by shifting traditional IT practices left and toward the business.

      Changing Business Needs

      Organizational priorities are constantly changing. Cost reduction opportunities and competitive advantages are lost because of delayed delivery of features.

      Low Barrier to Entry

      Low- and no-code development tools, full-stack solutions, and plug-and-play architectures allow non-technical users to easily build and implement applications without significant internal technical support or expertise.

      Democratization of IT

      A wide range of digital applications, services, and information are readily available and continuously updated through vendor and public marketplaces and open-source communities.

      Technology-Savvy Business

      The business is motivated to learn more about the technology they use so that they can better integrate it into their processes.

      Balance usability and compliance: accelerate cloud effectiveness

      Move to being an accelerator and an enabler! Rather than creating an additional layer of complexity, we can use the abstraction of a cloud brokerage to bring a wide variety of value-adds and partners into the ecosystem without increasing complexity for end users.

      Manage the user experience

      • Your portal is a great source of data for optimizing user adoption and satisfaction.
      • Understand the KPIs that matter to your clients or client groups from both a technical and a service perspective.

      Be proactive and responsive in meeting changing needs

      • Determine dashboard consumption by partner view.
      • Regularly review and address the gaps in your catalog.
      • Provide an easy mechanism for adding user-demanded services.

      Think like a service provider

      • You do need to be able to communicate and even market internally new services and capabilities as you add them or people won't know to come to you to use them.
      • It's also critical in helping people move along the path to enablement and knowing what might be possible that they hadn't considered.

      Provide cloud excellence functions

      Enablement Broker

      • Mentorship & Training
        • Build the skills, knowledge, and experiences of application owners and managers with internal and external expertise.
      • Organizational Change Leadership
        • Facilitate cultural, governance, and other organizational changes through strong relationships with business and IT leadership.
      • Good Delivery Practices & Thinking
        • Develop, share, and maintain a toolkit of good software development lifecycle (SDLC) practices and techniques.
      • Knowledge Sharing
        • Centralize a knowledgebase of up-to-date and accurate documentation and develop community forums to facilitate knowledge transfer.
      • Technology Governance & Leadership
        • Implement the organizational standards, policies, and rules for all applications and platforms and coordinate growth and sprawl.
      • Shared Services & Integrations
        • Provide critical services and integrations to support end users with internal resources or approved third-party providers and partners.

      Gauge value with the right metrics

      Focus your effort on measuring key metrics.

      Category

      Purpose

      Examples

      Business Value – The amount of value and benefits delivered. Justify the investment and impact of the brokerage and its optimization to business operations. ROI, user productivity, end-user satisfaction, business operational costs, error rate
      Application Quality – Satisfaction of application quality standards. Evaluate organizational effort to address and maximize user satisfaction and adoption rates. Adoption rate, usage friction metrics, user satisfaction metrics
      Delivery Effectiveness – The delivery efficiency of changes. Enable members to increase their speed to effective deployment, operation, and innovation on cloud platforms. Speed of deployment, landing/migration success metrics

      Determine measures that demonstrate the value of your brokerage by aligning it with your quality definition, value drivers, and users’ goals and objectives. Recognize that your journey will require constant monitoring and refinement to adjust to situations that may arise as you adopt new products, standards, strategies, tactics, processes, and tools.

      Activity Output

      Ultimately, the goal is designing a brokerage that can evolve from gatekeeping to frictionless intermediation to cloud enablement.

      Maintain focus on the value proposition, your brokerage ecosystem, and the metrics that represent enablement for your users and avoid pitfalls and challenges from the beginning.

      Activity: Define your brokerage type and value addition; Understand the partners and capabilities you need to be able to deliver; Define KPIs for both delivery (compliance) and adoption (frictionlessness); Output: GCB Strategy Plan; Addresses: Why and when you should build a GCB; How to avoid pitfalls; How to maximize benefits; How to maximize responsiveness and user satisfaction; How to roadmap and add services with agility.

      Appendix

      Related blueprints and tools

      Document Your Cloud Strategy

      This blueprint covers aligning your value proposition with general cloud requirements.

      Define Your Digital Business Strategy

      Phase 1 of this research covers identifying value chains to be transformed.

      Embrace Business-Managed Applications

      Phase 1 of this research covers understanding the business-managed applications as a factor in developing a frictionless intermediary model.

      Implement a Proactive and Consistent Vendor Selection Process

      This blueprint provides information on partner selection and procurement practices, including RFP templates.

      Bibliography

      “3 Types of Cloud Brokers That Can Save the Cloud.” Cloud Computing Topics, n.d. Web.

      Australian Government Cloud Computing Policy. Government of Australia, October 2014. Web.

      “Cloud Smart Policy Overview.” CIO.gov, n.d. Web.

      “From Cloud First to Cloud Smart.” CIO.gov, n.d. Web.

      Gardner, Dana. “Cloud brokering: Building a cloud of clouds.” ZDNet, 22 April 2011. Web.

      Narcisi, Gina. “Cloud, Next-Gen Services Help Master Agents Grow Quickly And Beat 'The Squeeze' “As Connectivity Commissions Decline.” CRN, 14 June 2017. Web.

      Smith, Spencer. “Asigra calls out the perils of cloud brokerage model.” TechTarget, 28 June 2019. Web.

      Tan, Aaron. “Australia issues new cloud computing guidelines.” TechTarget, 27 July 2020. Web.

      The European Commission Cloud Strategy. ec.europa.eu, 16 May 2019. Web.

      “TrustRadius Review: Cloud Brokers 2022.” TrustRadius, 2022. Web.

      Yedlin, Debbie. “Pros and Cons of Using a Cloud Broker.” Technology & Business Integrators, 17 April 2015. Web.

      Take the First Steps to Embrace Open-Source Software

      • Buy Link or Shortcode: {j2store}164|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Development
      • Parent Category Link: /development

      Your organization is looking to invest in new software or a tool to solve key business and IT problems. They see open source as a viable option given the advertised opportunities and the popularity of many open-source projects, but they have concerns:

      • Despite the longevity and broad adoption of open-source software, stakeholders are hesitant about its long-term viability and the costs of ongoing support.
      • A clear direction and strategy are needed to align the expected value of open source to your stakeholders’ priorities and gain the funding required to select, implement, and support open-source software.

      Our Advice

      Critical Insight

      • Position open source in the same light as commercial software. The continuous improvement and evolution of popular open-source software and communities have established a reputation for reliability in the industry.
      • Consider open source as another form of outsource development. Open source is externally developed software where the code is accessible and customizable. Code quality may not align to your organization’s standards, which can require extensive testing and optimization.
      • Treat open source as any internally developed solution. Configurations, integrations, customizations, and orchestrations of open-source software are often done at the code level. While some community support is provided, most of the heavy lifting is done by the applications team.

      Impact and Result

      • Outline the value you expect to gain. Discuss current business and IT priorities, use cases, and value opportunities to determine what to expect from open-source versus commercial software.
      • Define your open-source selection criteria. Clarify the driving factors in your evaluation of open-source and commercial software using your existing IT procurement practices as a starting point.
      • Assess the readiness of your team. Clarify the roles, processes, and tools needed for the implementation, use, and maintenance of open-source software.

      Take the First Steps to Embrace Open-Source Software Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Take the First Steps to Embrace Open-Source Software Storyboard – A guide to learn the fit, value, and considerations of open-source software.

      This research walks you through the misconceptions about open source, factors to consider in its selection, and initiatives to prepare your teams for its adoption.

      • Take the First Steps to Embrace Open-Source Software Storyboard

      2. Open-Source Readiness Assessment – A tool to help you evaluate your readiness to embrace open-source software in your environment.

      Use this tool to identify key gaps in the people, processes, and technologies needed to support open source in your organization. It also contains a canvas to facilitate discussions about expectations with your stakeholders and applications teams.

      • Open-Source Readiness Assessment
      [infographic]

      Further reading

      Take the First Steps to Embrace Open-Source Software

      Begin to understand what is required to embrace open-source software in your organization.

      Analyst Perspective

      With great empowerment comes great responsibilities.

      Open-source software promotes enticing technology and functional opportunities to any organization looking to modernize without the headaches of traditional licensing. Many organizations see the value of open source in its ability to foster innovation, be flexible to various use cases and system configurations, and give complete control to the teams who are using and managing it.

      However, open source is not free. While the software is freely and easily accessible, its use and sharing are bound by its licenses, and its implementation requires technical expertise and infrastructure investments. Your organization must be motivated and capable of taking on the various services traditionally provided and managed by the vendor.

      Photo of Andrew Kum-Seun

      Andrew Kum-Seun
      Research Director,
      Application Delivery and Application Management
      Info-Tech Research Group

      Executive Summary

      Your Challenge

      Your organization is looking to invest in new software or a tool to solve key business and IT problems. They see open source as a viable option because of the advertised opportunities and the popularity of many open-source projects.

      Despite the longevity and the broad adoption of open-source software, stakeholders are hesitant about its adoption, its long-term viability, and the costs of ongoing support.

      A clear direction and strategy is needed to align the expected value of open source to your stakeholders’ priorities and gain the funding required to select, implement, and support open-source software.

      Common Obstacles

      Your stakeholders’ fears, uncertainties, and doubts about open source may be driven by misinterpretation or outdated information. This hesitancy can persist despite some projects being active longer than their proprietary counterparts.

      Certain software features, support capabilities, and costs are commonly overlooked when selecting open-source software because they are often assumed in the licensing and service costs of commercial software.

      Open-source software is often technically complicated and requires specific skill sets and knowledge. Unfortunately, current software delivery capability gaps impede successful adoption and scaling of open-source software.

      Info-Tech’s Approach

      Outline the value you expect to gain. Discuss current business and IT priorities, use cases, and value opportunities to determine what to expect from open-source versus commercial software.

      Define your open-source selection criteria. Clarify the driving factors in your evaluation of open-source and commercial software using your existing IT procurement practices as a starting point.

      Assess the readiness of your team. Clarify the roles, processes, and tools needed for the implementation, use, and maintenance of open-source software.

      Insight Summary

      Overarching Info-Tech Insight

      Open source is as much about an investment in people as it is about technology. It empowers applications teams to take greater control over their technology and customize it as they see fit. However, teams need the time and funding to conduct the necessary training, management, and ongoing community engagement that open-source software and its licenses require.

      • Position open source in the same light as commercial software.
        The continuous improvement and evolution of popular open-source software and communities have established a trusting and reliable reputation in the industry. Open-source software quality and community support can rival similar vendor capabilities given the community’s maturity and contributions in the technology.
      • Consider open source another form of outsource development.
        Open source is externally developed software where the code is accessible and customizable. Code quality may not align to your organization’s standards, which can require extensive testing and optimization. A thorough analysis of change logs, code repositories, contributors, and the community is recommended – much to the same degree as one would do with prospective outsourcing partners.
      • Treat open source as any internally developed solution.
        Configurations, integrations, customizations, and orchestrations of open-source software are often done at the code level. While some community support is provided, most of the heavy lifting is done by the applications team. Teams must be properly resourced, upskilled, and equipped to meet this requirement. Otherwise, third-party partners are needed.

      What is open source?

      According to Synopsys, “Open source software (OSS) is software that is distributed with its source code, making it available for use, modification, and distribution with its original rights. … Programmers who have access to source code can change a program by adding to it, changing it, or fixing parts of it that aren’t working properly. OSS typically includes a license that allows programmers to modify the software to best fit their needs and control how the software can be distributed.”

      What are the popular use cases?

      1. Programming languages and frameworks
      2. Databases and data technologies
      3. Operating systems
      4. Git public repos
      5. Frameworks and tools for AI/ML/DL
      6. CI/CD tooling
      7. Cloud-related tools
      8. Security tools
      9. Container technology
      10. Networking

      Source: OpenLogic, 2022

      Common Attributes of All Open-Source Software

      • Publicly shared repository that anyone can access to use the solution and contribute changes to the design and functionality of the project.
      • A community that is an open forum to share ideas and solution enhancements, discuss project direction and vision, and seek support from peers.
      • Project governance that sets out guidelines, rules, and requirements to participate and contribute to the project.
      • Distribution license that defines the terms of how a solution can be used, assessed, modified, and distributed.

      Take the first steps to embrace open-source software

      Begin to understand what is required to embrace open-source software in your organization.

      A diagram of open-source community.

      State the Value of Open Source: Discuss current business and IT priorities, use cases, and value opportunities to determine what to expect from open-source versus commercial software.

      Select Your Open-Source Software: Clarify the driving factors in your evaluation of open-source and commercial software using your existing IT procurement practices as a starting point.

      Prepare for Open Source: Clarify the roles, processes, and tools needed for the implementation, use, and maintenance of open-source software.

      Step 1.1: State the Value of Open Source

      Diagram of step 1.1

      Activities

      1.1.1 Outline the value you expect to gain from open-source software

      This step involves the following participants:

      • Applications team
      • Product owner

      Outcomes of this step:

      • Value proposition for open source
      • Potential open-source use cases

      Use a canvas to frame your open-source evaluation

      A photo of open-source canvas

      This canvas is intended to provide a single pane of glass to start collecting your thoughts and framing your future conversations on open-source software selection and adoption.

      Record the results in the “Open-Source Canvas” tab in the Open-Source Readiness Assessment.

      Open source presents unique software and tooling opportunities

      Innovation

      Many leading-edge and bleeding-edge technologies are collaborated and innovated in open-source projects, especially in areas that are beyond the vision and scope of vendor products and priorities.

      Niche Solutions

      Open-source projects are focused. They are designed and built to solve specific business and technology problems.

      Flexible & Customizable

      All aspects of the open-source software are customizable, including source code and integrations. They can be used to extend, complement, or replace internally developed code. Licenses define how open-source code should be and must be used, productized, and modified.

      Brand & Recognition

      Open-source communities encourage contribution and collaboration among their members to add functionality and improve quality and adoption.

      Cost

      Open-source software is accessible to everyone, free of charge. Communities do not need be consulted prior to acquisition, but the software’s use, configurations, and modifications may be restricted by its license.

      However, myths continue to challenge adoption

      • Open source is less secure or poorer quality than proprietary solutions.
      • Open source is free from risk of intellectual property (IP) infringement.
      • Open source is cheaper than proprietary solutions.

      What are the top perceived barriers to using enterprise open source?

      • Concerns about the level of support
      • Compatibility concerns
      • Concerns about inherent security of the code
      • Lack of internal skills to manage and support it

      Source: Red Hat, 2022

      Establish a Sustainable ESG Reporting Program

      • Buy Link or Shortcode: {j2store}194|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: IT Governance, Risk & Compliance
      • Parent Category Link: /it-governance-risk-and-compliance

      Consistent, high-quality disclosure of ESG practices is the means by which organizations can demonstrate they are acting responsibly and in the best interest of their customers and society. Organizations may struggle with these challenges when implementing an ESG reporting program:

      • Narrowing down ESG efforts to material ESG issues
      • Building a sustainable reporting framework
      • Assessing and solving for data gaps and data quality issues
      • Being aware of the tools and best practices available to support regulatory and performance reporting

      Our Advice

      Critical Insight

      • A tactical approach to ESG reporting will backfire. The reality of climate change and investor emphasis is not going away. For long-term success, organizations need to design an ESG reporting program that is flexible, interoperable, and digital.
      • Implementing a robust reporting program takes time. Start early, remain focused, and make plans to continually improve data quality and collection and performance metrics.
      • The “G” in ESG may not be capturing the limelight under ESG legislation yet, but there are key factors within the governance component that are under the regulatory microscope, including data, cybersecurity, fraud, and diversity and inclusion. Be sure you stay on top of these issues and include performance metrics in your internal and external reporting frameworks.

      Impact and Result

      • Successful organizations recognize that transparent ESG disclosure is necessary for long-term corporate performance.
      • Taking the time up front to design a robust and proactive ESG reporting program will pay off in the long run.
      • Future-proof your ESG reporting program by leveraging new tools, technologies, and software applications.

      Establish a Sustainable ESG Reporting Program Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Establish a Sustainable ESG Reporting Program Storyboard – A comprehensive framework to define an ESG reporting program that supports your ESG goals and reporting requirements.

      This storyboard provides a three-phased approach to establishing a comprehensive ESG reporting framework to drive sustainable corporate performance. It will help you identify what to report, understand how to implement your reporting program, and review in-house and external software and tooling options.

      • Establish a Sustainable ESG Reporting Program Storyboard

      2. ESG Reporting Workbook – A tool to document decisions, rationale, and implications of key activities to support your ESG reporting program.

      The workbook allows IT and business leaders to document decisions as they work through the steps to establish a comprehensive ESG reporting framework.

      • ESG Reporting Workbook

      3. ESG Reporting Implementation Plan – A tool to document tasks required to deliver and address gaps in your ESG reporting program.

      This planning tool guides IT and business leaders in planning, prioritizing, and addressing gaps to build an ESG reporting program.

      • ESG Reporting Implementation Plan Template

      4. ESG Reporting Presentation Template – A guide to communicate your ESG reporting approach to internal stakeholders.

      Use this template to create a presentation that explains the drivers behind the strategy, communicates metrics, demonstrates gaps and costs, and lays out the timeline for the implementation plan.

      • ESG Reporting Presentation Template

      Infographic

      Workshop: Establish a Sustainable ESG Reporting Program

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Determine Material ESG Factors

      The Purpose

      Determine material ESG factors.

      Key Benefits Achieved

      Learn how to identify your key stakeholders and material ESG risks.

      Activities

      1.1 Create a list of stakeholders and applicable ESG factors.

      1.2 Create a materiality map.

      Outputs

      List of stakeholders and applicable ESG factors

      Materiality map

      2 Define Performance and Reporting Metrics

      The Purpose

      Define performance and reporting metrics.

      Key Benefits Achieved

      Align your ESG strategy with key performance metrics.

      Activities

      2.1 Create a list of SMART metrics.

      2.2 Create a list of reporting obligations.

      Outputs

      SMART metrics

      List of reporting obligations

      3 Assess Data and Implementation Gaps

      The Purpose

      Assess data and implementation gaps.

      Key Benefits Achieved

      Surface data and technology gaps.

      Activities

      3.1 Create a list of high-priority data gaps.

      3.2 Summarize high-level implementation considerations.

      Outputs

      List of high-priority data gaps

      Summary of high-level implementation considerations

      4 Consider Software and Tooling Options

      The Purpose

      Select software and tooling options and develop implementation plan.

      Key Benefits Achieved

      Complete your roadmap and internal communication document.

      Activities

      4.1 Review tooling and technology options.

      4.2 Prepare ESG reporting implementation plan.

      4.3 Prepare the ESG reporting program presentation.

      Outputs

      Selected tooling and technology

      ESG reporting implementation plan

      ESG reporting strategy presentation

      Further reading

      Establish a Sustainable ESG Reporting Program

      Strengthen corporate performance by implementing a holistic and proactive reporting approach.

      Analyst Perspective

      The shift toward stakeholder capitalism cannot be pinned on one thing; rather, it is a convergence of forces that has reshaped attitudes toward the corporation. Investor attention on responsible investing has pushed corporations to give greater weight to the achievement of corporate goals beyond financial performance.

      Reacting to the new investor paradigm and to the wider systemic risk to the financial system of climate change, global regulators have rapidly mobilized toward mandatory climate-related disclosure.

      IT will be instrumental in meeting the immediate regulatory mandate, but their role is much more far-reaching. IT has a role to play at the leadership table shaping strategy and assisting the organization to deliver on purpose-driven goals.

      Delivering high-quality, relevant, and consistent disclosure is the key to unlocking and driving sustainable corporate performance. IT leaders should not underestimate the influence they have in selecting the right technology and data model to support ESG reporting and ultimately support top-line growth.

      Photo of Yaz Palanichamy

      Yaz Palanichamy
      Senior Research Analyst
      Info-Tech Research Group

      Photo of Donna Bales

      Donna Bales
      Principal Research Director
      Info-Tech Research Group

      Executive Summary

      Your Challenge

      Your organization needs to define a ESG reporting strategy that is driven by corporate purpose.

      Climate-related disclosure mandates are imminent; you need to prepare for them by building a sustainable reporting program now.

      There are many technologies available to support your ESG program plans. How do you choose the one that is right for your organization?

      Common Obstacles

      Knowing how to narrow down ESG efforts to material ESG issues for your organization.

      Understanding the key steps to build a sustainable ESG reporting program.

      Assessing and solving for data gaps and data quality issues.

      Being aware of the tools and best practices available to support regulatory and performance reporting.

      Info-Tech’s Approach

      Learn best-practice approaches to develop and adopt an ESG reporting program approach to suit your organization’s unique needs.

      Understand the key features, tooling options, and vendors in the ESG software market.

      Learn through analyst insights, case studies, and software reviews on best-practice approaches and tool options.

      Info-Tech Insight

      Implementing a robust reporting program takes time. Start early, remain focused, and plan to continually improve data quality and collection and performance metrics

      Putting “E,” “S,” and “G” in context

      Corporate sustainability depends on managing ESG factors well

      Environmental, social, and governance are the components of a sustainability framework that is used to understand and measure how an organization impacts or is affected by society as a whole.

      Human activities, particularly fossil fuel burning since the middle of the twentieth century, have increased greenhouse gas concentration, resulting in observable changes to the atmosphere, ocean, cryosphere, and biosphere. The “E” in ESG relates to the positive and negative impacts an organization may have on the environment, such as the energy it takes in and the waste it discharges.

      The “S” in ESG is the most ambiguous component in the framework, as social impact relates not only to risks but also to prosocial behavior. It’s the most difficult to measure but can have significant financial and reputational impact on corporations if material and poorly managed.

      The “G” in ESG is foundational to the realization of “S” and “E.” It encompasses how well an organization integrates these considerations into the business and how well the organization engages with key stakeholders, receives feedback, and is transparent with its intentions.

      A diagram that shows common examples of ESG issues.

      The impact of ESG factors on investment decisions

      Alleviate Investment Risk

      Organizational Reputation: Seventy-four percent of those surveyed were concerned that failing to improve their corporate ESG performance would negatively impact their organization’s branding and overall reputation in the market (Intelex, 2022).

      Ethical Business Compliance: Adherence to well-defined codes of business conduct and implementation of anti-corruption and anti-bribery practices is a great way to distinguish between organizations with good/poor governance intentions.

      Shifting Consumer Preferences: ESG metrics can also largely influence consumer preferences in buying behavior intentions. Research from McKinsey shows that “upward of 70 percent” of consumers surveyed on purchases in multiple industries said they would pay an additional 5 percent for a green product if it met the same performance standards as a nongreen alternative (McKinsey, 2019).

      Responsible Supply Chain Management: The successful alignment of ESG criteria with supply chain operations can lead to several benefits (e.g. producing more sustainable product offerings, maintaining constructive relationships with more sustainability-focused suppliers).

      Environmental Stewardship: The growing climate crisis has forced companies of all sizes to rethink how they plan their corporate environmental sustainability practices.

      Compliance With Regulatory Guidelines: An increasing emphasis on regulations surrounding ESG disclosure rates may result in some institutional investors taking a more proactive stance toward ESG-related initiatives.

      Sustaining Competitive Advantage: Given today’s globalized economy, many businesses are constantly confronted with environmental issues (e.g. water scarcity, air pollution) as well as social problems (e.g. workplace wellness issues). Thus, investment in ESG factors is simply a part of maintaining competitive advantage.

      Leaders increasingly see ESG as a competitive differentiator

      The perceived importance of ESG has dramatically increased from 2020 to 2023

      A diagram that shows the perceived importance of ESG in 2020 and 2023.

      In a survey commissioned by Schneider Electric, researchers categorized the relative importance of ESG planning initiatives for global IT business leaders. ESG was largely identified as a critical factor in sustaining competitive advantage against competitors and maintaining positive investor/public relations.
      Source: S&P Market Intelligence, 2020; N=825 IT decision makers

      “74% of finance leaders say investors increasingly use nonfinancial information in their decision-making.”
      Source: EY, 2020

      Regulatory pressure to report on carbon emission is building globally

      The Evolving Regulatory Landscape

      Canada

      • Canadian Securities Administrators (CSA) NI 51-107 Disclosure of Climate-related Matters

      United States

      • Securities and Exchange Commission (SEC) 33-11042 – The Enhancement and Standardization of Climate-Related Disclosures for Investors
      • SEC 33-11038 Cybersecurity Risk Management, Strategy, Governance, and Incident Disclosure
      • Nasdaq Board Diversity Rule (5605(f))

      Europe

      • European Commission Sustainable Finance Disclosure Regulation (SFDR)
      • European Commission EU Supply Chain Act
      • The German Supply Chain Act (GSCA)
      • Financial Conduct Authority UK Proposal (DP 21/4) Sustainability Disclosure Requirements and investment labels
      • UK Modern Slavery Act, 2015

      New Zealand

      • The Financial Sector (Climate-related Disclosures and Other Matters) Amendment Act 2021

      Accurate ESG reporting will be critical to meet regulatory requirements

      ESG reporting is the disclosure of environmental, social, and governance (ESG) data via qualitative and quantitative reports.

      It is how organizations make their sustainability commitments and strategies transparent to stakeholders.

      For investors it provides visibility into a company's ESG activities, enabling them to align investments to their values and avoid companies that cause damage to the environment or are offside on social and governance issues.

      Despite the growing practice of ESG reporting, reporting standards and frameworks are still evolving and the regulatory approach for climate-related disclosure is inconsistent across jurisdictions, making it challenging for organizations to develop a robust reporting program.

      “Environmental, social and governance (ESG) commitments are at the core a data problem.”

      Source: EY, 2022

      However, organizations will struggle to meet reporting requirements

      An image that shows 2 charts: How accurately can your organization report on the impact of its ESG Initiatives; and More specifically, if it was required to do so, how accurately could your organization report on its carbon footprint.

      Despite the commitment to support an ESG Initiative, less than a quarter of IT professionals say their organization can accurately report on the impact of its ESG initiatives, and 44% say their reporting on impacts is not accurate.

      Reporting accuracy was even worse for reporting on carbon footprint with 46% saying their organization could not report on its carbon footprint accurately. This despite most IT professionals saying they are working to support environmental mandates.

      Global sustainability rankings based on ESG dimensions

      Global Country Sustainability Ranking Map

      An image of Global Country Sustainability Ranking Map, with a score of 0 to 10.

      Country Sustainability Scores (CSR) as of October 2021
      Scores range from 1 (poor) to 10 (best)
      Source: Robeco, 2021

      ESG Performance Rankings From Select Countries

      Top ESG and sustainability performer

      Finland has ranked consistently as a leading sustainability performer in recent years. Finland's strongest ESG pillar is the environment, and its environmental ranking of 9.63/10 is the highest out of all 150 countries.

      Significant score deteriorations

      Brazil, France, and India are among the countries whose ESG score rankings have deteriorated significantly in the past three years.

      Increasing political tensions and risks as well as aftershock effects of the COVID-19 pandemic (e.g. high inequality and insufficient access to healthcare and education) have severely impacted Brazil’s performance across the governance and social pillars of the ESG framework, ultimately causing its overall ESG score to drop to a CSR value of 5.31.

      Largest gains and losses in ESG scores

      Canada has received worse scores for corruption, political risk, income inequality, and poverty over the past three years.

      Taiwan has seen its rankings improve in terms of overall ESG scores. Government effectiveness, innovation, a strong semiconductor manufacturing market presence, and stronger governance initiatives have been sufficient to compensate for a setback in income and economic inequality.

      Source: Robeco, 2021

      Establish a Sustainable Environmental, Social, and Governance (ESG) Reporting Program

      A diagram of establishing a sustainable ESG reporting program.

      Blueprint benefits

      Business Benefits

      • Clarity on technical and organizational gaps in the organization’s ability to deliver ESG reporting strategy.
      • Transparency on the breadth of the change program, internal capabilities needed, and accountable owners.
      • Reduced likelihood of liability.
      • Improved corporate performance and top-line growth.
      • Confidence that the organization is delivering high-quality, comprehensive ESG disclosure.

      IT Benefits

      • Understanding of IT’s role as strategic enabler for delivering high-quality ESG disclosure and sustainable corporate performance.
      • Transparency on primary data gaps and technology and tools needed to support the ESG reporting strategy.
      • Clear direction of material ESG risks and how to prioritize implementation efforts.
      • Awareness of tool selection options.

      Blueprint deliverables

      Each step of this blueprint is accompanied by supporting deliverables to help you accomplish your goals:

      Photo of Executive Presentation.

      Key deliverable: Executive Presentation

      Leverage this presentation deck to improve corporate performance by implementing a holistic and proactive ESG reporting program.

      Photo of Workbook

      Workbook

      As you work through the activities, use this workbook to document decisions and rationale and to sketch your materiality map.

      Photo of Implementation Plan

      Implementation Plan

      Use this implementation plan to address organizational, technology, and tooling gaps.

      Photo of RFP Template

      RFP Template

      Leverage Info-Tech’s RFP Template to source vendors to fill technology gaps.

      Info-Tech offers various levels of support to best suit your needs

      DIY Toolkit
      "Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful."

      Guided Implementation
      "Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track."

      Workshop
      "We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place."

      Consulting
      "Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project."

      Diagnostics and consistent frameworks are used throughout all four options.

      Guided Implementation

      A Guided Implementation (GI) is a series of calls with an Info-Tech analyst to help implement our best practices in your organization.

      A typical GI is 8 to 12 calls over the course of 4 to 6 months.

      What does a typical GI on this topic look like?

      A diagram that shows Guided Implementation in 3 phases.

      Workshop Overview

      Day 1

      Day 2

      Day 3

      Day 4

      Day 5

      Activities

      Determine Material ESG Factors

      1.1 Review ESG drivers.
      1.2 Identify key stakeholders and what drives their behavior.
      1.3 Discuss materiality frameworks options and select baseline model.
      1.4 Identify material risks and combine and categorize risks.
      1.5 Map material risks on materiality assessment map.

      Define Performance and Reporting Metrics

      2.1 Understand common program metrics for each ESG component.
      2.2 Consider and select program metrics.
      2.3 Discuss ESG risk metrics.
      2.4 Develop SMART metrics.
      2.5 Surface regulatory reporting obligations.

      Assess Data and Implementation Gaps

      3.1 Assess magnitude and prioritize data gaps.
      3.2 Discuss high-level implementation considerations and organizational gaps.

      Software and Tooling Options

      4.1 Review technology options.
      4.2 Brainstorm technology and tooling options and the feasibility of implementing.
      4.3 Prepare implementation plan.
      4.4 Draft ESG reporting program communication.
      4.5 Optional – Review software selection options.

      Next Steps and Wrap-Up (offsite)

      5.1 Complete in-progress deliverables from previous four days.
      5.2 Set up review time for workshop deliverables and to discuss next steps.

      Deliverables

      1. Customized list of key stakeholders and material ESG risks
      2. Materiality assessment map

      1. SMART metrics
      2. List of regulatory reporting obligations

      1. High-priority data gaps
      2. High-level implementation considerations

      1. Technology and tooling opportunities
      2. Implementation Plan
      3. ESG Reporting Communication

      1. ESG Reporting Workbook
      2. Implementation Plan

      Contact your account representative for more information.
      workshops@infotech.com
      1-888-670-8889

      Phase 1

      Explore ESG Reporting

      A diagram that shows phase 1 to 3 of establishing ESG reporting program.

      This phase will walk you through the following:

      • Define key stakeholders and material ESG factors.
      • Identify material ESG issues.
      • Develop SMART program metrics.
      • List reporting obligations.
      • Surface high-level data gaps.
      • Record high-level implementation considerations.

      This phase involves the following participants: CIO, CCO, CSO, business leaders, legal, marketing and communications, head of ESG reporting, and any dedicated ESG team members

      Practical steps for ESG disclosure

      Measuring and tracking incremental change among dimensions such as carbon emissions reporting, governance, and diversity, equity, and inclusion (DEI) requires organizations to acquire, analyze, and synthesize data from beyond their internal organizational ecosystems

      A diagram that shows 5 steps of identify, assess, implement, report & communicate, and monitor & improve.

      1.1 Ensure your reporting requirements are comprehensive

      A diagram of reporting lifecycle.

      This section will walk you through some key considerations for establishing your ESG reporting strategy. The first step in this process is to identify the scope of your reporting program.

      Defining the scope of your reporting program

      1. Stakeholder requirements: When developing a reporting program consider all your stakeholder needs as well as how they want to consume the information.
      2. Materiality assessment: Conduct a materiality assessment to identify the material ESG issues most critical to your organization. Organizations will need to report material risks to internal and external stakeholders.
      3. Purpose-driven goals: Your ESG reporting must include metrics to measure performance against your purpose-driven strategy.
      4. Regulatory requirements & industry: Work with your compliance and legal teams to understand which reporting requirements apply. Don’t forget requirements under the “S” and “G” components. Some jurisdictions require DEI reporting, and the Securities and Exchange Commission (SEC) in the US recently announced cybersecurity disclosure of board expertise and management oversight practices.

      Factor 1: Stakeholder requirements

      Work with key stakeholders to determine what to report

      A diagram that shows internal and external stakeholders.

      Evaluate your stakeholder landscape

      Consider each of these areas of the ESG Stakeholder Wheel and identify your stakeholders. Once stakeholders are identified, consider how the ESG factors might be perceived by delving into the ESG factors that matter to each stakeholder and what drives their behavior.

      A diagram of ESG impact, including materiality assessment, interviews, benchmark verses competitors, metrics and trend analysis.

      Determine ESG impact on stakeholders

      Review materiality assessment frameworks for your industry to surface ESG factors for your segment and stakeholder group(s).

      Perform research and analysis of the competition and stakeholder trends, patterns, and behavior

      Support your findings with stakeholder interviews.

      Stakeholders will prioritize ESG differently. Understanding their commitment is a critical success factor.

      Many of your stakeholders care about ESG commitments…

      27%: Support for social and environmental proposals at shareholder meetings of US companies rose to 27% in 2020 (up from 21% in 2017).
      Source: Sustainable Investments Institute, 2020.

      79%: of investors consider ESG risks and opportunities an important factor in investment decision making.
      Source: “Global Investor Survey,” PwC, 2021.

      ...Yet

      33%: of survey respondents cited that a lack of attention or support from senior leadership was one of the major barriers preventing their companies from making any progress on ESG issues.
      Source: “Consumer Intelligence Survey,” PwC, 2021.

      Info-Tech Insight

      To succeed with ESG reporting it is essential to understand who we hold ourselves accountable to and to focus ESG efforts in areas with the optimal balance between people, the planet, and profits

      Activity 1: Define stakeholders

      Input: Internal documentation (e.g. strategy, annual reports), ESG Stakeholder Wheel
      Output: List of key stakeholders and applicable ESG factors
      Materials: Whiteboard/flip charts, ESG Reporting Workbook
      Participants: Chief Sustainability Officer, Chief Compliance Officer, Head of ESG Reporting, Business leaders

      2 hours

      1. Using the ESG Stakeholder Wheel as a baseline, consider the breadth of your organization’s value chain and write down all your stakeholders.
      2. Discuss what drives their behavior. Be as detailed as you can be. For example, if it’s a consumer, delve into their age group and the factors that may drive their behavior.
      3. List the ESG factors that may be important to each stakeholder.
      4. Write down the communication channels you expect to use to communicate ESG information to this stakeholder group.
      5. Rate the priority of this stakeholder to your organization.
      6. Record this information in ESG Reporting Workbook.
      7. Optional – consider testing the results with a targeted survey.

      Download the ESG Reporting Workbook

      Activity 1: Example

      An example of activity 1 (defining stakeholders)

      Factor 2: Materiality assessments

      Conduct a materiality assessment to inform company strategy and establish targets and metrics for risk and performance reporting

      The concept of materiality as it relates to ESG is the process of gaining different perspectives on ESG issues and risks that may have significant impact (both positive and negative) on or relevance to company performance.

      The objective of a materiality assessment is to identify material ESG issues most critical to your organization by looking at a broad range of social and environmental factors. Its purpose is to narrow strategic focus and enable an organization to assess the impact of financial and non-financial risks aggregately.

      It helps to make the case for ESG action and strategy, assess financial impact, get ahead of long-term risks, and inform communication strategies.

      Organizations can use assessment tools from Sustainalytics or GRI, SASB Standards, or guidance and benchmarking information from industry associations to help assess ESG risks .

      An image of materiality matrix to understand ESG exposure

      Info-Tech Insight

      The materiality assessment informs your risk management approach. Material ESG risks identified should be integrated into your organization’s risk reporting framework.

      Supplement your materiality assessment with stakeholder interviews

      A diagram that shows steps of stakeholder interviews.

      How you communicate the results of your ESG assessment may vary depending on whether you’re communicating to internal or external stakeholders and their communication delivery preferences.

      Using the results from your materiality assessment, narrow down your key stakeholders list. Enhance your strategy for disclosure and performance measurement through direct and indirect stakeholder engagement.

      Decide on the most suitable format to reach out to these stakeholders. Smaller groups lend themselves to interviews and forums, while surveys and questionnaires work well for larger groups.

      Develop relevant questions tailored to your company and the industry and geography you are in.

      Once you receive the results, decide how and when you will communicate them.

      Determine how they will be used to inform your strategy.

      Steps to determine material ESG factors

      Step 1

      Select framework

      A diagram of framework

      Review reporting frameworks and any industry guidance and select a baseline reporting framework to begin your materiality assessment.

      Step 2

      Begin to narrow down

      A diagram of narrowing down stakeholders

      Work with stakeholders to narrow down your list to a shortlist of high-priority material ESG issues.

      Step 3

      Consolidate and group

      A diagram of ESG grouping

      Group ESG issues under ESG components, your company’s strategic goals, or the UN’s Sustainable Development Goals.

      Step 4

      Rate the risks of ESG factors

      A diagram of rating the risks of ESG factors

      Assign an impact and likelihood scale for each risk and assign your risk threshold.

      Step 5

      Map

      A diagram of material map

      Use a material map framework such as GRI or SASB or Info-Tech’s materiality map to visualize your material ESG risks.

      Materiality assessment

      The materiality assessment is a strategic tool used to help identify, refine, and assess the numerous ESG issues in the context of your organization.

      There is no universally accepted approach to materiality assessments. Although the concept of materiality is often embedded within a reporting standard, your approach to conducting the materiality assessment does not need to link to a specific reporting standard. Rather, it can be used as a baseline to develop your own.

      To arrive at the appropriate outcome for your organization, careful consideration is needed to tailor the materiality assessment to meet your organization’s objectives.

      When defining the scope of your materiality assessment consider:

      • Your corporate ESG purpose and sustainability strategy
      • Your audience and what drives their behavior
      • The relevance of the ESG issues to your organization. Do they impact strategy? Increase risk?
      • The boundaries of your materiality assessment (e.g. regions or business departments, supply chains it will cover)
      • Whether you want to assess from a double materiality perspective

      A diagram of framework

      Consider your stakeholders and your industry when selecting your materiality assessment tool – this will ensure you provide relevant disclosure information to the stakeholders that need it.

      Double materiality is an extension of the financial concept of materiality and considers the broader impact of an organization on the world at large – particularly to people and climate.

      Prioritize and categorize

      A diagram of narrowing down stakeholders

      Using internal information (e.g. strategy, surveys) and external information (e.g. competitors, industry best practices), create a longlist of ESG issues.

      Discuss and narrow down the list. Be sure to consider opportunities – not just material risks!

      A diagram of ESG grouping

      Group the issues under ESG components or defined strategic goals for your organization. Another option is to use the UN’s Sustainable Development Goals to categorize.

      Differentiate ESG factors that you already measure and report.

      The benefit of clustering is that it shows related topics and how they may positively or negatively influence one another.

      Internal risk disclosure should not be overlooked

      Bank of America estimates ESG disputes have cost S&P companies more than $600 billion in market capitalization in the last seven years alone.

      ESG risks are good predictors of future risks and are therefore key inputs to ensure long-term corporate success.

      Regardless of the size of your organization, it’s important to build resilience against ESG risks.

      To protect an organization against an ESG incident and potential liability risk, ESG risks should be treated like any other risk type and incorporated into risk management and internal reporting practices, including climate scenario analysis.

      Some regulated entities will be required to meet climate-related financial disclosure expectations, and sound risk management practices will be prescribed through regulatory guidance. However, all organizations should instill sound risk practices.

      ESG risk management done right will help protect against ESG mishaps that can be expensive and damaging while demonstrating commitment to stakeholders that have influence over all corporate performance.

      Source: GreenBiz, 2022.

      A diagram of risk landscape.

      IT has a role to play to provide the underlying data and technology to support good risk decisions.

      Visualize your material risks

      Leverage industry frameworks or use Info-Tech’s materiality map to visualize your material ESG risks.

      GRI’s Materiality Matrix

      A photo of GRI’s Materiality Matrix

      SASB’s Materiality Map

      A photo of SASB’s Materiality Map

      Info-Tech’s Materiality Map

      A diagram of material map

      Activity 2: Materiality assessment

      Input: ESG corporate purpose or any current ESG metrics; Customer satisfaction or employee engagement surveys; Materiality assessment tools from SASB, Sustainalytics, GRI, or industry frameworks; Outputs from stakeholder outreach/surveys
      Output: Materiality map, a list of material ESG issues
      Materials: Whiteboard/flip charts, ESG Reporting Workbook
      Participants: Chief Sustainability Officer, Chief Compliance Officer, Head of ESG Reporting, Business leaders, Participants from marketing and communications

      2-3 hour

      1. Begin by reviewing various materiality assessment frameworks to agree on a baseline framework. This will help to narrow down a list of topics that are relevant to your company and industry.
      2. As a group, discuss the potential impact and start listing material issues. At first the list will be long, but the group will work collectively to prioritize and consolidate the list.
      3. Begin to combine and categorize the results by aligning them to your ESG purpose and strategic pillars.
      4. Treat each ESG issue as a risk and map against the likelihood and impact of the risk.
      5. Map the topics on your materiality map. Most of the materiality assessment tools have materiality maps – you may choose to use their map.
      6. Record this information in the ESG Reporting Workbook.

      Download the ESG Reporting Workbook

      Case Study: Novartis

      Logo of Novartis

      • INDUSTRY: Pharmaceuticals
      • SOURCE: Novartis, 2022

      Novartis, a leading global healthcare company based in Switzerland, stands out as a leader in providing medical consultancy services to address the evolving needs of patients worldwide. As such, its purpose is to use science and technologically innovative solutions to address some of society’s most debilitating, challenging, and ethically significant healthcare issues.

      The application of Novartis’ materiality assessment process in understanding critical ESG topics important to their shareholders, stakeholder groups, and society at large enables the company to better quantify references to its ESG sustainability metrics.

      Novartis applies its materiality assessment process to better understand relevant issues affecting its underlying business operations across its entire value chain. Overall, employing Novartis’s materiality assessment process helps the company to better manage its societal, environmental, and economic impacts, thus engaging in more socially responsible governance practices.

      Novartis’ materiality assessment is a multitiered process that includes three major elements:

      1. Identifying key stakeholders, which involves a holistic analysis of internal colleagues and external stakeholders.
      2. Collecting quantitative feedback and asking relevant stakeholders to rank a set of issues (e.g. climate change governance, workplace culture, occupational health and safety) and rate how well Novartis performs across each of those identified issues.
      3. Eliciting qualitative insights by coordinating interviews and workshops with survey participants to better understand why the issues brought up during survey sessions were perceived as important.

      Results

      In 2021, Novartis had completed its most recent materiality assessment. From this engagement, both internal and external stakeholders had ranked as important eight clusters that Novartis is impacting on from an economic, societal, and environmental standpoint. The top four clusters were patient health and safety, access to healthcare, innovation, and ethical business practices.

      Factor 3: ESG program goals

      Incorporate ESG performance metrics that support your ESG strategy

      Another benefit of the materiality assessment is that it helps to make the case for ESG action and provides key information for developing a purpose-led strategy.

      An internal ESG strategy should drive toward company-specific goals such as green-house gas emission targets, use of carbon neutral technologies, focus on reusable products, or investment in DEI programs.

      Most organizations focus on incremental goals of reducing negative impacts to existing operations or improving the value to existing stakeholders rather than transformative goals.

      Yet, a strategy that is authentic and aligned with key stakeholders and long-term goals will bring sustainable value.

      The strategy must be supported by an accountability and performance measurement framework such as SMART metrics.

      A fulsome reporting strategy should include performance metrics

      A photo of SMART metrics: Specific, Measurable, Actionable, Realistic, Time-bound.

      Activity 3: SMART metrics

      Input: ESG corporate purpose or any current ESG metrics, Outputs from activities 1 and 2, Internally defined metrics (i.e. risk metrics or internal reporting requirements)
      Output: SMART metrics
      Materials: Whiteboard/flip charts, ESG Reporting Workbook
      Participants: Chief Sustainability Officer, Chief Compliance Officer, Chief Risk officer/Risk leaders, Head of ESG Reporting, Business leaders, Participants from marketing and communications

      1-2 hours

      1. Document a list of appropriate metrics to assess the success of your ESG program.
      2. Use the sample metrics listed in the table on the next slide as a starting point.
      3. Fill in the chart to indicate the:
        1. Name of the success metric
        2. Method for measuring success
        3. Baseline measurement
        4. Target measurement
        5. Actual measurements at various points throughout the process of improving the risk management program
        6. A deadline for each metric to meet the target measurement
      4. Record this information in the ESG Reporting Workbook.

      Download the ESG Reporting Workbook

      Sample ESG metrics

      Leverage industry resources to help define applicable metrics

      Environmental

      • Greenhouse gas emissions – total corporate
      • Carbon footprint – percent emitted and trend
      • Percentage of air and water pollution
      • Renewable energy share per facility
      • Percentage of recycled material in a product
      • Ratio of energy saved to actual use
      • Waste creation by weight
      • Circular transition indicators

      Social

      • Rates of injury
      • Lost time incident rate
      • Proportion of spend on local suppliers
      • Entry-level wage vs. local minimum wage
      • Percentage of management who identify with specific identity groups (i.e. gender and ethnic diversity)
      • Percentage of suppliers screened for accordance to ESG vs. total number of suppliers
      • Consumer responsiveness

      Governance

      • Annual CEO compensation compared to median
      • Percentage of employees trained in conflict-of-interest policy
      • Number of data breaches using personally identifiable information (PII)
      • Number of incidents relating to management corruption
      • Percentage of risks with mitigation plans in place

      Activity 3: Develop SMART project metrics

      1-3 hours

      Attach metrics to your goals to gauge the success of the ESG program.

      Sample Metrics

      An image of sample metrics

      Factor 4: Regulatory reporting obligations

      Identify your reporting obligations

      High-level overview of reporting requirements:

      An image of high-level reporting requirements in Canada, the United Kingdom, Europe, and the US.

      Refer to your legal and compliance team for the most up-to-date and comprehensive requirements.

      The focus of regulators is to move to mandatory reporting of material climate-related financial information.

      There is some alignment to the TCFD* framework, but there is a lack of standardization in terms of scope across jurisdictions.
      *TCFD is the Task Force on Climate-Related Financial Disclosures.

      Activity 4: Regulatory obligations

      Input: Corporate strategy documents; Compliance registry or internal governance, risk, and compliance (GRC) tool
      Output: A list of regulatory obligations
      Materials: Whiteboard/flip charts, ESG Reporting Workbook
      Participants: Chief Sustainability Officer, Chief Compliance Officer, Chief Legal Officer, Head of ESG Reporting, Business leaders

      1-2 hours

      1. Begin by listing the jurisdictions in which you operate or plan to operate.
      2. For each jurisdiction, list any known current or future regulatory requirements. Consider all ESG components.
      3. Log whether the requirements are mandatory or voluntary and the deadline to report.
      4. Write any details about reporting framework; for example, if a reporting framework such as TCFD is prescribed.
      5. Record this information in the ESG Reporting Workbook.

      Download the ESG Reporting Workbook

      1.2 Assess impact and weigh options

      A diagram of reporting lifecycle.

      Once the scope of your ESG reporting framework has been identified, further assessment is needed to determine program direction and to understand and respond to organizational impact.

      Key factors for further assessment and decisions include

      1. Reporting framework options. Consider mandated reporting frameworks and any industry standards when deciding your baseline reporting framework. Strive to have a common reporting methodology that serves all your reporting needs: regulatory, corporate, shareholders, risk reporting, etc.
      2. Perform gap analysis. The gap analysis will reveal areas where data may need to be sourced or where tools or external assistance may be needed to help deliver your reporting strategy.
      3. Organizational impact and readiness. The gap analysis will help to determine whether your current operating model can support the reporting program or whether additional resources, tools, or infrastructure will be needed.

      1.2.1 Decide on baseline reporting framework

      1. Determine the appropriate reporting framework for your organization

      Reporting standards are available to enable relevant, high-quality, and comparable information. It’s the job of the reporting entity to decide on the most suitable framework for their organization.

      The most established standard for sustainability reporting is the Global Reporting Initiative (GRI), which has supported sustainability reporting for over 20 years.

      The Task Force on Climate-Related Financial Disclosures (TCFD) was created by the Financial Stability Board to align ESG disclosure with financial reporting. Many global regulators support this framework.

      The International Sustainability Standards Board (ISSB) is developing high-quality, understandable, and enforceable global standards using the Sustainability Accounting Standards Board (SASB) as a baseline. It is good practice to use SASB Standards until the ISSB standards are available.

      2. Decide which rating agencies you will use and why they are important

      ESG ratings are provided by third-party agencies and are increasingly being used for financing and transparency to investors. ESG ratings provide both qualitative and quantitative information.

      However, there are multiple providers, so organizations need to consider which ones are the most important and how many they want to use.

      Some of the most popular rating agencies include Sustainalytics, MSCI, Bloomberg, Moody's, S&P Global, and CDP.

      Reference Appendix Below

      1.2.2 Determine data gaps

      The ESG reporting mandate is built on the assumption of consistent, good-quality data

      To meet ESG objectives, corporations are challenged with collecting non-financial data from across functional business and geographical locations and from their supplier base and supply chains.

      One of the biggest impediments to ESG implementation is the lack of high-quality data and of mature processes and tools to support data collection.

      An important step for delivering reporting requirements is to perform a gap analysis early on to surface gaps in the primary data needed to deliver your reporting strategy.

      The output of this exercise will also inform and help prioritize implementation, as it may show that new data sets need to be sourced or tools purchased to collect and aggregate data.

      Conduct a gap analysis to determine gaps in primary data

      A diagram of gap analysis to determine gaps in primary data.

      Activity 5: Gap analysis

      Input: Business (ESG) strategy, Data inventory (if exists), Output from Activity 1: Key stakeholders, Output from Activity 2: Materiality map, Output of Activity 3: SMART metrics, Output of Activity 4: Regulatory obligations
      Output: List of high-priority data gaps
      Materials: Whiteboard/flip charts, ESG Reporting Workbook
      Participants: Chief Sustainability Officer, Chief Compliance Officer, Chief Legal Officer, Head of ESG Reporting, Business leaders, Data analysts

      1-3 hours

      1. Using the outputs from activities 1-4, list your organization’s ESG issues in order of priority. You may choose to develop your priority list by stakeholder group or by material risks.
      2. List any defined SMART metric from Activity 3.
      3. Evaluate data availability and quality of the data (if existing) as well as any impediments to sourcing the data.
      4. Make note if this is a common datapoint, i.e. would you disclose this data in more than one report?
      5. Record this information in the ESG Reporting Workbook.

      Download the ESG Reporting Workbook

      1.3 Take a holistic implementation approach

      Currently, 84 percent of businesses don’t integrate their ESG performance with financial and risk management reporting.

      Source: “2023 Canadian ESG Reporting Insights,” PwC.

      A diagram of reporting lifecycle.

      When implementing an ESG reporting framework, it is important not to implement in silos but to take a strategic approach that considers the evolving nature of ESG and the link to value creation and sound decision making.

      Key implementation considerations include

      1. Setting clear metrics and targets. Key performance indicators (KPIs) and key risk indicators (KRIs) are used to measure ESG factor performance. It’s essential that they are relevant and are constructed using high-quality data. Your performance metrics should be continually assessed and adapted as your ESG program evolves.
      2. Data challenges. Without good-quality data it is impossible to accurately measure ESG performance, generate actionable insights on ESG performance and risk, and provide informative metrics to investors and other stakeholders. Design your data model to be flexible and digital where possible to enable data interoperability.
      3. Architectural approach. IT will play a key role in the design of your reporting framework, including the decision on whether to build, buy, or deliver a hybrid solution. Every organization will build their reporting program to suit their unique needs; however, taking a holistic and proactive approach will support and sustain your strategy long term.

      1.3.1 Metrics and targets for climate-related disclosure

      “The future of sustainability reporting is digital – and tagged.”
      Source: “XBRL Is Coming,” Novisto, 2022.

      In the last few years, global regulators have proposed or effected legislation requiring public companies to disclose climate-related information.

      Yet according to Info-Tech’s 2023 Trends and Priorities survey, most IT professionals expect to support environmental mandates but are not prepared to accurately report on their organization’s carbon footprint.

      IT groups have a critical role to play in helping organizations develop strategic plans to meet ESG goals, measure performance, monitor risks, and deliver on disclosure requirements.

      To future-proof your reporting structure, your data should be readable by humans and machines.

      eXtensible Business Reporting Language (XBRL) tagging is mandated in several jurisdictions for financial reporting, and several reporting frameworks are adopting XBRL for sustainability reporting so that non-financial and financial disclosure frameworks are aligned.

      Example environmental metrics

      • Amount of scope 1, 2, or 3 GHG emissions
      • Total energy consumption
      • Total water consumption
      • Progress toward net zero emission
      • Percentage of recycled material in a product

      1.3.1 Metrics and targets for social disclosure

      “59% of businesses only talk about their positive performance, missing opportunities to build trust with stakeholders through balanced and verifiable ESG reporting.”
      Source: “2023 Canadian ESG Reporting Insights,” PwC.

      To date, regulatory focus has been on climate-related disclosure, although we are beginning to see signals in Europe and the UK that they are turning their attention to social issues.

      Social reporting focuses on the socioeconomic impacts of an organization’s initiatives or activities on society (indirect or direct).

      The “social” component of ESG can be the most difficult to quantify, but if left unmonitored it can leave your organization open to litigation from consumers, employees, and activists.

      Although organizations have been disclosing mandated metrics such as occupational health and safety and non-mandated activities such as community involvement for years, the scope of reporting is typically narrow and hard to measure in financial terms.

      This is now changing with the recognition by companies of the value of social reporting to brand image, traceability, and overall corporate performance.

      Example social metrics

      • Rate of injury
      • Lost time incident rate
      • Proportion of spend on local suppliers
      • Entry-level wage versus local minimum wage
      • Percentage of management within specific identity groups (i.e. gender and ethnic diversity)
      • Number of workers impacted by discrimination

      Case Study: McDonald’s Corporation (MCD)

      Logo of McDonald’s

      • INDUSTRY: Food service retailer
      • SOURCE: RBC Capital Markets, 2021; McDonald’s, 2019

      McDonald’s Corporation is the leading global food service retailer. Its purpose is not only providing burgers to dinner tables around the world but also serving its communities, customers, crew, farmers, franchisees, and suppliers alike. As such, not only is the company committed to having a positive impact on communities and in maintaining the growth and success of the McDonald's system, but it is also committed to conducting its business operations in a way that is mindful of its ESG commitments.

      An image of McDonald’s Better Together

      McDonald’s Better Together: Gender Balance & Diversity strategy and Women in Tech initiative

      In 2019, MCD launched its Better Together: Gender Balance & Diversity strategy as part of a commitment to improving the representation and visibility of women at all levels of the corporate structure by 2023.

      In conjunction with the Better Together strategy, MCD piloted a “Women in Tech” initiative through its education and tuition assistance program, Archways to Opportunity. The initiative enabled women from company-owned restaurants and participating franchisee restaurants to learn skills in areas such as data science, cybersecurity, artificial intelligence. MCD partnered with Microsoft and Colorado Technical University to carry out the initiative (McDonald’s, 2019).

      Both initiatives directly correlate to the “S” of the ESG framework, as the benefits of gender-diverse leadership continue to be paramount in assessing the core strengths of a company’s overreaching ESG portfolio. Hence, public companies will continue to face pressure from investors to act in accordance with these social initiatives.

      Results

      MCD’s Better Together and Women in Tech programs ultimately helped improve recruitment and retention rates among its female employee base. After the initialization of the gender balance and diversification strategy, McDonald’s signed on to the UN Women’s Empowerment Principles to help accelerate global efforts in addressing the gender disparity problem.

      1.3.1 Metrics and targets for governance disclosure

      Do not lose sight of regulatory requirements

      Strong governance is foundational element of a ESG program, yet governance reporting is nascent and is often embedded in umbrella legislation pertaining to a particular risk factor.

      A good example of this is the recent proposal by the Securities and Exchange Commission in the US (CFR Parts 229, 232, 239, 240, and 249, Cybersecurity Risk Management, Strategy, Governance, and Incident Disclosure), which will require public companies to:

      • Disclosure of board oversight of cyber risk.
      • Disclose management’s role in managing and accessing cybersecurity-related risks.

      The "G” component includes more than traditional governance factors and acts as a catch-all for other important ESG factors such as fraud, cybersecurity, and data hygiene. Make sure you understand how risk may manifest in your organization and put safeguards in place.

      Example governance metrics

      • Annual CEO compensation compared to median
      • Percentage of employees trained in conflict-of-interest policy
      • Completed number of supplier assessments
      • Number of data breaches using PII
      • Number of material cybersecurity breaches

      Info-Tech Insight

      The "G" in ESG may not be capturing the limelight under ESG legislation yet, but there are key governance factors that are that are under regulatory radar, including data, cybersecurity, fraud, and DEI. Be sure you stay on top of these issues and include performance metrics into your internal and external reporting frameworks.

      1.3.2 Conquering data management challenges

      48% of investment decision makers, including 58% of institutional investors, say companies’ self-reported ESG performance data is “much more important” than companies’ conventional financial data when informing their investment decisions (Benchmark ESG, 2021).

      Due to the nascent nature of climate-related reporting, data challenges such as the availability, usability, comparability, and workflow integration surface early in the ESG program journey when sourcing and organizing data:

      • It is challenging to collect non-financial data across functional business and geographical locations and from supplier base and supply chains.
      • The lack of common standards leads to comparability challenges, hindering confidence in the outputs.

      In addition to good, reliable inputs, organizations need to have the infrastructure to access new data sets and convert raw data into actionable insights.

      The establishment of data model and workflow processes to track data lineage is essential to support an ESG program. To be successful, it is critical that flexibility, scalability, and transparency exist in the architectural design. Data architecture must scale to capture rapidly growing volumes of unstructured raw data with the associated file formats.

      A photo of conceptual model for data lineage.

      Download Info-Tech’s Create and Manage Enterprise Data Models blueprint

      1.3.3 Reporting architecture

      CIOs play an important part in formulating the agenda and discourse surrounding baseline ESG reporting initiatives

      Building and operating an ESG program requires the execution of a large number of complex tasks.

      IT leaders have an important role to play in selecting the right technology approach to support a long-term strategy that will sustain and grow corporate performance.

      The decision to buy a vendor solution or build capabilities in-house will largely depend on your organization’s ESG ambitions and the maturity of in-house business and IT capabilities.

      For large, heavily regulated entities an integrated platform for ESG reporting can provide organizations with improved risk management and internal controls.

      Example considerations when deciding to meet ESG reporting obligations in-house

      • Size and type of organization
      • Extent of regulatory requirements and scrutiny
      • The amount of data you want to report
      • Current maturity of data architecture, particularly your ability to scale
      • Current maturity of your risk and control program – how easy is it to enhance current processes?
      • The availability and quality of primary data
      • Data set gaps
      • In-house expertise in data, model risk, and change management
      • Current operating model – is it siloed or integrated?
      • Implementation time
      • Program cost
      • The availability of vendor solutions that may address gaps

      Info-Tech Insight

      Executive leadership should take a more holistic and proactive stance to not only accurately reporting upon baseline corporate financial metrics but also capturing and disclosing relevant ESG performance metrics to drive alternative streams of valuation across their respective organizational environments.

      Activity 6: High-level implementation considerations

      Input: Business (ESG) strategy, Data inventory (if exists), Asset inventory (if exists), Output from Activity 5
      Output: Summary of high-level implementation considerations
      Materials: Whiteboard/flip charts, ESG Reporting Workbook
      Participants: Chief Sustainability Officer, Head of ESG Reporting, Business leaders, Data analysts, Data and IT architect/leaders,

      2-3 hours

      1. Review the implementation considerations on the previous slide to help determine the appropriate technology approach.
      2. For each implementation consideration, describe the current state.
      3. Discuss and draft the implications of reaching the desired future state by listing implications and organizational gaps.
      4. Discuss as a group if there is an obvious implementation approach.
      5. At this point, further analysis may be needed. Form a subcommittee or assign a leader to conduct further analysis.
      6. Record this information in the ESG Reporting Workbook.

      Download the ESG Reporting Workbook

      1.3.4 Ensure your implementation team has a high degree of trust and communication

      If external partners are needed, dedicate an internal resource to managing the vendor and partner relationships.

      Communication: Teams must have some type of communication strategy. This can be broken into:

      • Regularity: Having a set time each day to communicate progress and a set day to conduct retrospectives.
      • Ceremonies: Injecting awards and continually emphasizing delivery of value to encourage relationship building and constructive motivation.
      • Escalation: Voicing any concerns and having someone responsible for addressing those concerns.

      Proximity: Distributed teams create complexity as communication can break down. This can be mitigated by:

      • Location: Placing teams in proximity to close the barrier of geographical distance and time zone differences.
      • Inclusion: Making a deliberate attempt to pull remote team members into discussions and ceremonies.
      • Communication tools: Having the right technology (e.g. videoconference) to help bring teams closer together virtually.

      Trust: Members should trust other members are contributing to the project and completing their required tasks on time. Trust can be developed and maintained by:

      • Accountability: Having frequent quality reviews and feedback sessions. As work becomes more transparent, people become more accountable.
      • Role clarity: Having a clear definition of what everyone’s role is.

      1.4 Clear effective communication

      Improving investor transparency is one of the key drivers behind disclosure, so making the data easy to find and consumable is essential

      A diagram of reporting lifecycle.

      Your communication of ESG performance is intricately linked to corporate value creation. When designing your communications strategy, consider:

      • Your message – make it authentic and tell a consistent story.
      • How data will be used to support the narrative.
      • How your ESG program may impact internal and external programs and build a communication strategy that is fit for purpose. Example programs are:
        • Employee recruitment
        • New product rollout
        • New customer campaign
      • The design of the communication and how well it suits the audience. Communications may take the form of campaigns, thought leadership, infographics, etc.
      • The appropriateness of communication channels to your various audiences and the messages you want to convey. For example, social media, direct outreach, shareholder circular, etc.

      1.5 Continually evaluate

      A diagram of reporting lifecycle.

      A recent BDC survey of 121 large companies and public-sector buyers found that 82% require some disclosure from their suppliers on ESG, and that's expected to grow to 92% by 2024.
      Source: BDC, 2023

      ESG's link to corporate performance means that organizations must stay on top of ESG issues that may impact the long-term sustainability of their business.

      ESG components will continue to evolve, and as they do so will stakeholder views. It is important to continually survey your stakeholders to ensure you are optimally managing ESG risks and opportunities.

      To keep ESG on the strategy agenda, we recommend that organizations:

      • Appoint a chief sustainability officer (CSO) with a seat on executive leadership committees.
      • Embed ESG into existing governance and form a tactical ESG working group committee.
      • Ensure ESG risks are integrated into the enterprise risk management program.
      • Continually challenge your ESG strategy.
      • Regularly review risks and opportunities through proactive outreach to stakeholders.

      Download The ESG Imperative and Its Impact on Organizations

      Phase 2

      Streamline Requirements and Tool Selection

      A diagram that shows phase 1 to 3 of establishing ESG reporting program.

      This phase will walk you through the following activities:

      • Assess technology and tooling opportunities.
      • Prepare ESG reporting implementation plan.
      • Write ESG reporting presentation document.

      This phase involves the following participants: CIO, CCO, CSO, EA, IT application and data leaders, procurement, business leaders, marketing and communications, head of ESG reporting, and any dedicated ESG team members

      2.1 Streamline your requirements and tool section

      Spend the time up front to enable success and meet expectations

      Before sourcing any technology, it’s important to have a good understanding of your requirements.

      Key elements to consider:

      1. ESG reporting scope. Large enterprises will have more complex workflow requirements, but they also will have larger teams to potentially manage in-house. Smaller organizations will need easy-to-use, low-cost solutions.
      2. Industry and value chain. Look for industry-specific solutions, as they will be more tailored to your needs and will enable you to be up and running quicker.
      3. Coverage. Ensure the tool has adequate regulatory coverage to meet your current and future needs.
      4. Gap in functionality. Be clear on the problem you are trying to solve and/or the gap in workflow. Refer to the reporting lifecycle and be clear on your needs before sourcing technology.
      5. Resourcing. Factor in capacity during and after implementation and negotiate the appropriate support.

      Industry perspective

      The importance of ESG is something that will need to be considered for most, if not every decision in the future, and having reliable and available information is essential. While the industry will continue to see investment and innovation that drives operational efficiency and productivity, we will also see strong ESG themes in these emerging technologies to ensure they support both sustainable and socially responsible operations.

      With the breadth of technology Datamine already has addressing the ESG needs for the mining industry combined with our new technology, our customers can make effective and timely decisions through incorporating ESG data into their planning and scheduling activities to meet customer demands, while staying within the confines of their chosen ESG targets.

      Photo of Chris Parry

      Chris Parry
      VP of ESG, Datamine

      Photo of Datamine Photo of isystain

      Activity 7: Brainstorm tooling options

      Use the technology feature list below to identify areas along the ESG workflow where automated tools or third-party solutions may create efficiencies

      Technological Solutions Feature Bucket

      Basic Feature Description

      Advanced Feature Description

      Natural language processing (NLP) tools

      Ability to use NLP tools to track and monitor sentiment data from news and social media outlets.

      Leveraging NLP toolsets can provide organizations granular insights into workplace sentiment levels, which is a core component of any ESG strategy. A recent study by MarketPsych, a company that uses NLP technologies to analyze sentiment data from news and social media feeds, linked stock price performance to workplace sentiment levels.

      Distributed ledger technologies (DLTs)

      DLTs can help ensure greater reporting transparency, in line with stringent regulatory reporting requirements.

      DLT as an ESG enabler, with advanced capabilities such as an option to provide demand response services linked to electricity usage and supply forecasting.

      Cloud-based data management and reporting systems

      Cloud-based data management and reporting can support ESG initiatives by providing increased reporting transparency and a better understanding of diverse social and environmental risks.

      Leverage newfound toolsets such as Microsoft Cloud for Sustainability – a SaaS offering that enables organizations to seamlessly record, report, and reduce their emissions on a path toward net zero.

      IoT technologies

      Integration of IoT devices can help enhance the integrity of ESG reporting through the collection of descriptive and accurate ESG metrics (e.g. energy efficiency, indoor air quality, water quality and usage).

      Advanced management of real-time occupancy monitoring: for example, the ability to reduce energy consumption rates by ensuring energy is only used when spaces and individual cubicles are occupied.

      2.2 Vendors tools and technologies to support ESG reporting

      In a recent survey of over 1,000 global public- and private-sector leaders, 87% said they see AI as a helpful tool to fight climate change.
      Source: Boston Consulting Group

      Technology providers are part of the solution and can be leveraged to collect, analyze, disclose, track, and report on the vast amount of data.

      Increasingly organizations are using artificial intelligence to build climate resiliency:

      • AI is useful for the predictive modelling of potential climate events due to its ability to gather and analyze and synthesize large complete data sets.

      And protect organizations from vulnerabilities:

      • AI can be used to identify and assess vulnerabilities that may lead to business disruption or risks in production or the supply chain.

      A diagram of tooling, including DLT, natural language processing, cloud-based data management and IoT.

      2.3 ESG reporting software selection

      What Is ESG Reporting Software?

      Our definition: ESG reporting software helps organizations improve the transparency and accountability of their ESG program and track, measure, and report their sustainability efforts.

      Key considerations for reporting software selection:

      • While there are boutique ESG vendors in the market, organizations with existing GRC tools may first want to discuss ESG coverage with their existing vendor as it will enable better integration.
      • Ensure that the vendors you are evaluating support the requirements and regulations in your region, industry, and geography. Regulation is moving quickly – functionality needs to be available now and not just on the roadmap.
      • Determine the level of software integration support you need before meeting with vendors and ensure they will be able to provide it – when you need it!

      Adoption of ESG reporting software has historically been low, but these tools will become critical as organizations strive to meet increasing ESG reporting requirements.

      In a recent ESG planning and performance survey conducted by ESG SaaS company Diligent Corporation, it was found that over half of all organizations surveyed do not publish ESG metrics of any kind, and only 9% of participants are actively using software that supports ESG data collection, analysis, and reporting.

      Source: Diligent, 2021.

      2.3.1 Elicit and prioritize granular requirements for your ESG reporting software

      Understanding business needs through requirements gathering is the key to defining everything about what is being purchased. However, it is an area where people often make critical mistakes.

      Poorly scoped requirements

      Fail to be comprehensive and miss certain areas of scope.

      Focus on how the solution should work instead of what it must accomplish.

      Have multiple levels of detail within the requirements that are inconsistent and confusing.

      Drill all the way down into system-level detail.

      Add unnecessary constraints based on what is done today rather than focusing on what is needed for tomorrow.

      Omit constraints or preferences that buyers think are obvious.

      Best practices

      Get a clear understanding of what the system needs to do and what it is expected to produce.

      Test against the principle of MECE – requirements should be “mutually exclusive and collectively exhaustive.”

      Explicitly state the obvious and assume nothing.

      Investigate what is sold on the market and how it is sold. Use language that is consistent with that of the market and focus on key differentiators – not table stakes.

      Contain the appropriate level of detail – the level should be suitable for procurement and sufficient for differentiating vendors.

      Download Info-Tech's Improve Requirements Gathering blueprint

      2.3.1 Identify critical and nice-to-have features

      Central Data Repository: Collection of stored data from existing databases merged into one location that can then be shared, analyzed, or updated.

      Automatic Data Collection: Ability to automate data flows, collect responses from multiple sources at specified intervals, and check them against acceptance criteria.

      Automatic KPI Calculations, Conversions, and Updates: Company-specific metrics can be automatically calculated, converted, and tracked.

      Built-In Indicator Catalogs and Benchmarking: Provides common recognized frameworks or can integrate a catalog of ESG indicators.

      Custom Reporting: Ability to create reports on company emissions, energy, and asset data in company-branded templates.

      User-Based Access and Permissions: Ability to control access to specific content or data sets based on the end user’s roles.

      Real-Time Capabilities: Ability to analyze and visualize data as soon as it becomes available in underlying systems.

      Version Control: Tracking of document versions with each iteration of document changes.

      Intelligent Alerts and Notifications: Ability to create, manage, send, and receive notifications, enhancing efficiency and productivity.

      Audit Trail: View all previous activity including any recent edits and user access.

      Encrypted File Storage and Transfer: Ability to encrypt a file before transmitting it over the network to hide content from being viewed or extracted.

      Activity 7: Technology and tooling options

      Input: Business (ESG) strategy, Data inventory (if exists), Asset inventory (if exists), Output from Activity 5, Output from Activity 6,
      Output: List of tooling options
      Materials: Whiteboard/flip charts, ESG Reporting Workbook
      Participants: Chief Sustainability Officer, Head of ESG Reporting, Business leaders, Data analysts, Data and IT architect/leaders

      1-2 hours

      1. Begin by listing key requirements and features for your ESG reporting program.
      2. Use the outputs from activities 5 and 6 and the technology feature list on the previous slide to help brainstorm technology and tooling options.
      3. Discuss the availability and readiness of each option. Note that regulatory requirements will have an effective date that will impact the time to market for introducing new tooling.
      4. Discuss and assign a priority.
      5. At this point, further analysis may be needed. Form a subcommittee or assign a leader to conduct further analysis.
      6. Record this information in the ESG Reporting Workbook.

      Download the ESG Reporting Workbook

      Activity 8: Implementation plan

      Input: Business (ESG) strategy, Output from Activity 5, Output from Activity 6, Output from Activity 7
      Output: ESG Reporting Implementation Plan
      Materials: Whiteboard/flip charts, ESG Reporting Implementation Plan Template
      Participants: Chief Sustainability Officer, Head of ESG Reporting, Business leaders, Data analysts, PMO, Data and IT architect/leaders

      1-2 hours

      1. Use the outputs from activities 5 to 7 and list required implementation tasks. Set a priority for each task.
      2. Assign the accountable owner as well as the group responsible. Larger organizations and large, complex change programs will have a group of owners.
      3. Track any dependencies and ensure the project timeline aligns.
      4. Add status as well as start and end dates.
      5. Complete in the ESG Reporting Implementation Plan Template.

      Download the ESG Reporting Implementation Plan Template

      Activity 9: Internal communication

      Input: Business (ESG) strategy, ESG Reporting Workbook, ESG reporting implementation plan
      Output: ESG Reporting Presentation Template
      Materials: Whiteboard/flip charts, ESG Reporting Presentation Template, Internal communication templates
      Participants: Chief Sustainability Officer, Head of Marketing/ Communications, Business leaders, PMO

      1-2 hours

      Since a purpose-driven ESG program presents a significant change in how organizations operate, the goals and intentions need to be understood throughout the organization. Once you have developed your ESG reporting strategy it is important that it is communicated, understood, and accepted. Use the ESG Reporting Presentation Template as a guide to deliver your story.

      1. Consider your audience and discuss and agree on the key elements you want to convey.
      2. Prepare the presentation.
      3. Test the presentation with smaller group before communicating to senior leadership/board

      Download the ESG Reporting Presentation Template

      Phase 3

      Select ESG Reporting Software

      A diagram that shows phase 1 to 3 of establishing ESG reporting program.

      This phase will provide additional material on Info-Tech’s expertise in the following areas:

      • Info-Tech’s approach to RFPs
      • Info-Tech tools for software selection
      • Example ESG software assessments

      3.1 Leverage Info-Tech’s expertise

      Develop an inclusive and thorough approach to the RFP process

      An image that a process of 7 steps.

      The Info-Tech difference:

      1. The secret to managing an RFP is to make it as manageable and as thorough as possible. The RFP process should be like any other aspect of business – with a standard process in place, you are better able to handle whatever comes your way, because you know the steps you need to follow to produce a top-notch RFP.
      2. The business then identifies the need for more information about a product/service or determines that a purchase is required.
      3. A team of stakeholders from each area impacted gather all business, technical, legal, and risk requirements. What are the expectations of the vendor relationship post-RFP? How will the vendors be evaluated?
      4. Based on predetermined requirements, either an RFI or an RFP is issued to vendors with a due date.

      Info-Tech Insight

      Review Info-Tech’s process and understand how you can prevent your organization from leaking negotiation leverage while preventing vendors from taking control of your RFP.

      Software Selection Engagement

      5 Advisory Calls Over a 5-Week Period to Accelerate Your Selection Process

      Expert Analyst Guidance over5 weeks on average to select and negotiate software.

      Save Money, Align Stakeholders, Speed Up the Process & make better decisions.

      Use a Repeatable, Formal Methodology to improve your application selection process.

      Better, Faster Results, guaranteed, included in membership.

      A diagram of selection engagement over a 5-week period.

      CLICK HERE to Book Your Selection Engagement

      Leverage the Contract Review Service to level the playing field with your shortlisted vendors

      You may be faced with multiple products, services, master service agreements, licensing models, service agreements, and more.

      Use the Contract Review Service to gain insights on your agreements.

      Consider the aspects of a contract review:

      1. Are all key terms included?
      2. Are they applicable to your business?
      3. Can you trust that results will be delivered?
      4. What questions should you be asking from an IT perspective?

      Validate that a contract meets IT’s and the business’ needs by looking beyond the legal terminology. Use a practical set of questions, rules, and guidance to improve your value for dollar spent.

      A photo of Contract Review Service.

      Click here to book The Contract Review Service

      Download blueprint Master Contract Review and Negotiation for Software Agreements

      3.2 Vendor spotlight assessments

      See above for a vendor landscape overview of key ESG reporting software providers

      The purpose of this section is to showcase various vendors and companies that provide software solutions to help users manage and prioritize their ESG reporting initiatives.

      This section showcases the core capabilities of each software platform to provide Info-Tech members with industry insights regarding some of the key service providers that operate within the ESG vendor market landscape.

      Info-Tech members who are concerned with risks stemming from the inability to sort and disseminate unstructured ESG data reporting metrics or interested in learning more about software offerings that can help automate the data collection, processing, and management of ESG metrics will find high-level insights into the ESG vendor market space.

      Vendor spotlight

      A photo of Datamine Isystain

      The establishment of the Datamine ESG unit comes at the same time the mining sector is showing an increased interest in managing ESG and its component systems as part of a single scope.

      With miners collecting and dealing with ever-increasing quantities of data and looking for ways to leverage it to make data-driven decisions that enhance risk management and increase profitability, integrated software solutions are – now more than ever – essential in supporting continuous improvement and maintaining data fidelity and data integrity across the entire mining value chain.

      An example of Datamine Isystain An example of Datamine Isystain An example of Datamine Isystain

      Key Features:

      • Discover GIS for geochemical, water, erosion, and vegetation modelling and management.
      • Qmed for workforce health management, COVID testing, and vaccine administration.
      • MineMarket and Reconcilor for traceability and auditing, giving visibility to chain of custody and governance across the value chain, from resource modelling to shipping and sales.
      • Centric Mining Systems – intelligence software for real-time transparency and governance across multiple sites and systems, including key ESG performance indicator reporting.
      • Zyght – a leading health, safety, and environment solution for high-impact industries that specializes in environment, injury, risk management, safe work plans, document management, compliance, and reporting.
      • Isystain – a cloud-based platform uniquely designed to support health, safety & environment, sustainability reporting, compliance and governance, and social investment reporting. Designed for seamless integration within an organization’s existing software ecosystems providing powerful analytics and reporting capabilities to streamline the production of sustainability and performance reporting.

      Vendor spotlight

      A logo of Benchmark ESG

      Benchmark ESG provides industry-leading ESG data management and reporting software that can assist organizations in managing operational risk and compliance, sustainability, product stewardship, and ensuring responsible sourcing across complex global operations.

      An example of Benchmark ESG An example of Benchmark ESG

      Key Features:

      Vendor spotlight

      A logo of PWC

      PwC’s ESG Management Solution provides quick insights into ways to improve reporting transparency surrounding your organization’s ESG commitments.

      According to PwC’s most recent CEO survey, the number one motivator for CEOs in mitigating climate change risks is their own desire to help solve this global problem and drive transparency with stakeholders.
      Source: “Annual Global CEO Survey,” PwC, 2022.

      An example of PWC An example of PWC

      Key Features:

      • Streamlined data mining capabilities. PwC’s ESG solution provides the means to streamline, automate, and standardize the input of sustainability data based on non-financial reporting directive (NFRD) and corporate sustainability reporting directive (CSRD) regulations.
      • Company and product carbon footprint calculation and verification modules.
      • Robust dashboarding capabilities. Option to create custom-tailored sustainability monitoring dashboards or integrate existing ESG data from an application to existing dashboards.
      • Team management functionalities that allow for more accessible cross-departmental communication and collaboration. Ability to check progress on tasks, assign tasks, set automatic notifications/deadlines, etc.

      Vendor spotlight

      A logo of ServiceNow

      ServiceNow ESG Management (ESGM) and reporting platform helps organizations transform the way they manage, visualize, and report on issues across the ESG spectrum.

      The platform automates the data collection process and the organization and storage of information in an easy-to-use system. ServiceNow’s ESGM solution also develops dashboards and reports for internal user groups and ensures that external disclosure reports are aligned with mainstream ESG standards and frameworks.

      We know that doing well as a business is about more than profits. One workflow at a time, we believe we can change the world – to be more sustainable, equitable, and ethical.
      Source: ServiceNow, 2021.

      An example of ServiceNow

      Key Features:

      1. An executive dashboard to help coherently outline the status of various ESG indicators, including material topics, goals, and disclosure policies all in one centralized hub
      2. Status review modules. Ensure that your organization has built-in modules to help them better document and monitor their ESG goals and targets using a single source of truth.
      3. Automated disclosure modules. ESGM helps organizations create more descriptive ESG disclosure reports that align with industry accountability standards (e.g. SASB, GRI, CDP).

      Other key vendors to consider

      An image of other 12 key vendors

      Related Info-Tech Research

      Photo of The ESG Imperative and Its Impact on Organizations

      The ESG Imperative and Its Impact on Organizations

      Use this blueprint to educate yourself on ESG factors and the broader concept of sustainability.

      Identify changes that may be needed in your organizational operating model, strategy, governance, and risk management approach.

      Learn about Info-Tech’s ESG program approach and use it as a framework to begin your ESG program journey.

      Photo of Private Equity and Venture Capital Growing Impact of ESG Report

      Private Equity and Venture Capital Growing Impact of ESG Report

      Increasingly, new capital has a social mandate attached to it due to the rise of ESG investment principles.

      Learn about how the growing impact of ESG affects both your organization and IT specifically, including challenges and opportunities, with expert assistance.

      Definitions

      Terms

      Definition

      Corporate Social Responsibility

      Management concept whereby organizations integrate social and environmental concerns in their operations and interactions with their stakeholders.

      Chief Sustainability Officer

      Steers sustainability commitments, helps with compliance, and helps ensure internal commitments are met. Responsibilities may extend to acting as a liaison with government and public affairs, fostering an internal culture, acting as a change agent, and leading delivery.

      ESG

      An acronym that stands for environment, social, and governance. These are the three components of a sustainability program.

      ESG Standard

      Contains detailed disclosure criteria including performance measures or metrics. Standards provide clear, consistent criteria and specifications for reporting. Typically created through consultation process.

      ESG Framework

      A broad contextual model for information that provides guidance and shapes the understanding of a certain topic. It sets direction but does not typically delve into the methodology. Frameworks are often used in conjunction with standards.

      ESG Factors

      The factors or issues that fall under the three ESG components. Measures the sustainability performance of an organization.

      ESG Rating

      An aggregated score based on the magnitude of an organization’s unmanaged ESG risk. Ratings are provided by third-party rating agencies and are increasingly being used for financing, transparency to investors, etc.

      ESG Questionnaire

      ESG surveys or questionnaires are administered by third parties and used to assess an organization’s sustainability performance. Participation is voluntary.

      Key Risk Indicator (KRI)

      A measure to indicate the potential presence, level, or trend of a risk.

      Key Performance Indicator (KPI)

      A measure of deviation from expected outcomes to help a firm see how it is performing.

      Materiality

      Material topics are topics that have a direct or indirect impact on an organization's ability to create, preserve, or erode economic, environmental, and social impact for itself and its stakeholder and society as a whole.

      Materiality Assessment

      A tool to identify and prioritize the ESG issues most critical to the organization.

      Risk Sensing

      The range of activities carried out to identify and understand evolving sources of risk that could have a significant impact on the organization (e.g. social listening).

      Sustainability

      The ability of an organization and broader society to endure and survive over the long term by managing adverse impacts well and promoting positive opportunities.

      Sustainalytics

      Now part of Morningstar. Sustainalytics provides ESG research, ratings, and data to institutional investors and companies.

      UN Guiding Principles on Business and Human Rights (UNGPs)

      An essential methodological foundation for how impacts across all dimensions should be assessed.

      Reporting and standard frameworks

      Standard

      Definition and focus

      CDP
      (Formally Carbon Disclosure Project)

      CDP has created standards and metrics for comparing sustainability impact. Focuses on environmental data (e.g. carbon, water, and forests) and on data disclosure and benchmarking.

      Audience: All stakeholders

      Dow Jones Sustainability Indices (DJSI)

      Heavy on corporate governance and company performance. Equal balance of economic, environmental, and social.

      Audience: All stakeholders

      Global Reporting Initiative (GRI)

      International standards organization that has a set of standards to help organizations understand and communicate their impacts on climate change and social responsibility. The standard has a strong emphasis on transparency and materiality, especially on social issues.

      Audience: All stakeholders

      International Sustainability Standards Board (ISSB)

      Standard-setting board that sits within the International Financial Reporting Standards (IFRS) Foundation. The IFRS Foundation is a not-for-profit, public-interest organization established to develop high-quality, understandable, enforceable, and globally accepted accounting and sustainability disclosure standards.

      Audience: Investor-focused

      United Nations Sustainable Development Goals (SDGs)

      Global partnership across sectors and industries that sets out 17 goals to achieve sustainable development for all.

      Audience: All stakeholders

      Sustainability Accounting Standards Board (SASB)
      Now part of IFSR foundation

      Industry-specific standards to help corporations select topics that may impact their financial performance. Focus on material impacts on financial condition or operating performance.

      Audience: Investor-focused

      Task Force on Climate-Related Financial Disclosures (TCFD; created by the Financial Stability Board)

      Standards framework focused on the impact of climate risk on financial and operating performance. More broadly the disclosures inform investors of positive and negative measures taken to build climate resilience and make transparent the exposure to climate-related risk.

      Audience: Investors, financial stakeholders

      Bibliography

      "2021 Global Investor Survey: The Economic Realities of ESG." PwC, Dec. 2021. Accessed May 2022.

      "2023 Canadian ESG Reporting Insights." PwC, Nov. 2022. Accessed Dec. 2022.

      Althoff, Judson. "Microsoft Cloud for Sustainability: Empowering Organizations On Their Path To Net Zero." Microsoft Blog, 14 July 2021. Accessed May 2022.

      "Balancing Sustainability and Profitability." IBM, Feb. 2022. Accessed June. 2022.

      "Beyond Compliance: Consumers and Employees Want Business to Do More on ESG." PwC, Nov. 2021. Accessed July 2022.

      Bizo, Daniel. "Multi-Tenant Datacenters and Sustainability: Ambitions and Reality." S&P Market Intelligence, Sept. 2020. Web.

      Bolden, Kyle. "Aligning nonfinancial reporting with your ESG strategy to communicate long-term value." EY, 18 Dec. 2020. Web.

      Carril, Christopher, et al. "Looking at Restaurants Through an ESG Lens: ESG Stratify – Equity Research Report." RBC Capital Markets, 5 Jan. 2021. Accessed Jun. 2022.

      "Celebrating and Advancing Women." McDonald’s, 8 March 2019. Web.

      Clark, Anna. "Get your ESG story straight: A sustainability communication starter kit." GreenBiz, 20 Dec. 2022, Accessed Dec. 2022.

      Courtnell, Jane. “ESG Reporting Framework, Standards, and Requirements.” Corporate Compliance Insights, Sept. 2022. Accessed Dec. 2022.

      “Country Sustainability Ranking. Country Sustainability: Visibly Harmed by Covid-19.” Robeco, Oct. 2021. Accessed June 2022.

      “Defining the “G” in ESG Governance Factors at the Heart of Sustainable Business.” World Economic Forum, June 2022. Web.

      “Digital Assets: Laying ESG Foundations.” Global Digital Finance, Nov. 2021. Accessed April 2022.

      “Dow Jones Sustainability Indices (DJCI) Index Family.” S&P Global Intelligence, n.d. Accessed June 2022.

      "ESG in Your Business: The Edge You Need to Land Large Contracts." BDC, March 2023, Accessed April 2023.

      “ESG Performance and Its Impact on Corporate Reputation.” Intelex Technologies, May 2022. Accessed July 2022.

      “ESG Use Cases. IoT – Real-Time Occupancy Monitoring.” Metrikus, March 2021. Accessed April 2022.

      Fanter, Tom, et al. “The History & Evolution of ESG.” RMB Capital, Dec. 2021. Accessed May 2022.

      Flynn, Hillary, et al. “A guide to ESG materiality assessments.” Wellington Management, June 2022, Accessed September 2022

      “From ‘Disclose’ to ‘Disclose What Matters.’” Global Reporting Initiative, Dec. 2018. Accessed July 2022.

      “Getting Started with ESG.” Sustainalytics, 2022. Web.

      “Global Impact ESG Fact Sheet.” ServiceNow, Dec. 2021. Accessed June 2022.

      Gorley, Adam. “What is ESG and Why It’s Important for Risk Management.” Sustainalytics, March 2022. Accessed May 2022.

      Hall, Lindsey. “You Need Near-Term Accountability to Meet Long-Term Climate Goals.” S&P Global Sustainable1, Oct. 2021. Accessed April 2022.

      Henisz, Witold, et al. “Five Ways That ESG Creates Value.” McKinsey, Nov. 2019. Accessed July 2022.

      “Integrating ESG Factors in the Investment Decision-Making Process of Institutional Investors.” OECD iLibrary, n.d. Accessed July 2022.

      “Investor Survey.” Benchmark ESG, Nov. 2021. Accessed July 2022.

      Jackson, Brian. Tech Trends 2023, Info-Tech Research Group, Dec. 2022, Accessed Dec. 2022.

      Keet, Lior. “What Is the CIO’s Role in the ESG Equation?” EY, 2 Feb. 2022. Accessed May 2022.

      Lev, Helee, “Understanding ESG risks and why they matter” GreenBiz, June 2022. Accessed Dec 2022.

      Marsh, Chris, and Simon Robinson. “ESG and Technology: Impacts and Implications.” S&P Global Market Intelligence, March 2021. Accessed April 2022.

      Martini, A. “Socially Responsible Investing: From the Ethical Origins to the Sustainable Development Framework of the European Union.” Environment, Development and Sustainability, vol. 23, Nov. 2021. Web.

      Maher, Hamid, et al. “AI Is Essential for Solving the Climate Crisis.” Boston Consulting Group, 7 July 2022. Web.

      “Materiality Assessment. Identifying and Taking Action on What Matters Most.” Novartis, n.d. Accessed June. 2022.

      Morrow, Doug, et al. “Understanding ESG Incidents: Key Lessons for Investors.” Sustainalytics, July 2017. Accessed May 2022.

      “Navigating Climate Data Disclosure.” Novisto, July 2022. Accessed Nov. 2022.

      Nuttall, Robin, et al. “Why ESG Scores Are Here to Stay.” McKinsey & Company, May 2020. Accessed July 2022.

      “Opportunities in Sustainability – 451 Research’s Analysis of Sustainability Perspectives in the Data Center Industry.” Schneider Electric, Sept. 2020. Accessed May 2022.

      Peterson, Richard. “How Can NLP Be Used to Quantify ESG Analytics?” Refinitiv, Feb. 2021. Accessed June 2022.

      “PwC’s 25th Annual Global CEO Survey: Reimagining the Outcomes That Matter.” PwC, Jan. 2022. Accessed June 2022.

      “SEC Proposes Rules on Cybersecurity, Risk Management, Strategy, Governance, and Incident Disclosure by Public Companies.” Securities and Exchange Commission, 9 May 2022. Press release.

      Serafeim, George. “Social-Impact Efforts That Create Real Value.” Harvard Business Review, Sept. 2020. Accessed May 2022.

      Sherrie, Gonzalez. “ESG Planning and Performance Survey.” Diligent, 24 Sept. 2021. Accessed July 2022.

      “Special Reports Showcase, Special Report: Mid-Year Report on Proposed SEC Rule 14-8 Change.” Sustainable Investments Institute, July 2020. Accessed April 2022.

      “State of European Tech. Executive Summary Report.” Atomico, Nov. 2021. Accessed June 2022.

      “Top Challenges in ESG Reporting, and How ESG Management Solution Can Help.” Novisto, Sept. 2022. Accessed Nov. 2022.

      Vaughan-Smith, Gary. “Navigating ESG data sets and ‘scores’.” Silverstreet Capital, 23 March 2022. Accessed Dec. 2022.

      Waters, Lorraine. “ESG is not an environmental issue, it’s a data one.” The Stack, 20 May 2021. Web.

      Wells, Todd. “Why ESG, and Why Now? New Data Reveals How Companies Can Meet ESG Demands – And Innovate Supply Chain Management.” Diginomica, April 2022. Accessed July 2022.

      “XBRL is coming to corporate sustainability Reporting.” Novisto, Aug. 2022. Accessed Dec. 2022.

      Research Contributors and Experts

      Photo of Chris Parry

      Chris Parry
      VP of ESG, Datamine

      Chris Parry has recently been appointed as the VP of ESG at Datamine Software. Datamine’s dedicated ESG division provides specialized ESG technology for sustainability management by supporting key business processes necessary to drive sustainable outcomes.

      Chris has 15 years of experience building and developing business for enterprise applications and solutions in both domestic and international markets.

      Chris has a true passion for business-led sustainable development and is focused on helping organizations achieve their sustainable business outcomes through business transformation and digital software solutions.

      Datamine’s comprehensive ESG capability supports ESG issues such as the environment, occupational health and safety, and medical health and wellbeing. The tool assists with risk management, stakeholder management and business intelligence.

      Prepare for Negotiations More Effectively

      • Buy Link or Shortcode: {j2store}224|cart{/j2store}
      • member rating overall impact: 8.0/10 Overall Impact
      • member rating average dollars saved: $6,000 Average $ Saved
      • member rating average days saved: 4 Average Days Saved
      • Parent Category Name: Vendor Management
      • Parent Category Link: /vendor-management
      • IT budgets are increasing, but many CIOs feel their budgets are inadequate to accomplish what is being asked of them.
      • Eighty percent of organizations don’t have a mature, repeatable, scalable negotiation process.
      • Training dollars on negotiations are often wasted or ineffective.

      Our Advice

      Critical Insight

      • Negotiations are about allocating risk and money – how much risk is a party willing to accept at what price point?
      • Using a cross-functional/cross-insight team structure for negotiation preparation yields better results.
      • Soft skills aren’t enough and theatrical negotiation tactics aren’t effective.

      Impact and Result

      A good negotiation process can help:

      • Maximize budget dollars.
      • Improve vendor performance.
      • Enhance relationships internally and externally.

      Prepare for Negotiations More Effectively Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you should create and follow a scalable process for preparing to negotiate with vendors, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Before

      Throughout this phase, the 12 steps for negotiation preparation are identified and reviewed.

      • Prepare for Negotiations More Effectively – Phase 1: Before
      • Before Negotiating Tool
      [infographic]

      Workshop: Prepare for Negotiations More Effectively

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 12 Steps to Better Negotiation Preparation

      The Purpose

      Improve negotiation preparation.

      Understand how to use the Info-Tech Before Negotiating Tool.

      Key Benefits Achieved

      A scalable framework for negotiation preparation will be created.

      The Before Negotiating Tool will be configured for the customer’s environment.

      Activities

      1.1 Establish specific negotiation goals and ranges.

      1.2 Identify and assess alternatives to a negotiated agreement.

      1.3 Identify and evaluate assumptions made by the parties.

      1.4 Conduct research.

      1.5 Identify and evaluate relationship issues.

      1.6 Identify and leverage the team structure.

      1.7 Identify and address leverage issues.

      1.8 Evaluate timeline considerations.

      1.9 Create a strategy.

      1.10 Draft a negotiation agenda.

      1.11 Draft and answer questions.

      1.12 Rehearse (informal and formal).

      Outputs

      Sample negotiation goals and ranges will be generated via a case study to demonstrate the concepts and how to use the Before Negotiating Tool (this will apply to each Planned Activity)

      Sample alternatives will be generated

      Sample assumptions will be generated

      Sample research will be generated

      Sample relationship issues will be generated

      Sample teams will be generated

      Sample leverage items will be generated

      Sample timeline issues will be generated

      A sample strategy will be generated

      A sample negotiation agenda will be generated

      Sample questions and answers will be generated

      Sample rehearsals will be conducted

      Improve Your IT Recruitment Process

      • Buy Link or Shortcode: {j2store}578|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Attract & Select
      • Parent Category Link: /attract-and-select

      Business and IT leaders aiming to recruit and select the best talent need to:

      • Get involved in the talent acquisition process at key moments.
      • Market their organization to top talent through an authentic employer brand.
      • Create engaging and accurate job ads.
      • Leverage purposeful sourcing for anticipated talent needs.
      • Effectively assess candidates with a strong interview process.
      • Set up new employees for success.

      Our Advice

      Critical Insight

      To create a great candidate experience, IT departments must be involved in the process at key points, recruitment and selection is not a job for HR alone!

      Impact and Result

      • Use this how-to guide to articulate an authentic (employee value proposition) EVP and employer brand.
      • Perform an analysis of current sourcing methods and build an action plan to get IT involved.
      • Create an effective and engaging job ad to insure the right people are applying.
      • Train hiring managers to effectively deliver interviews that correctly assess candidate suitability.
      • Get links to in-depth Info-Tech resources and tools.

      Improve Your IT Recruitment Process Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Improve Your IT Recruitment Process – A guide to help you attract and select the best talent.

      Train your IT department to get involved in the recruitment process to attract and select the best talent.

      • Improve Your IT Recruitment Process Capstone Deck

      2. Improve Your IT Recruitment Process Workbook – A tool to document your action plans.

      Use this tool in conjunction with the Improve you IT Recruitment Process to document your action plans

      • Improve Your IT Recruitment Process Workbook

      3. Interview Guide Template – A template to organize interview questions and their rating scales, take notes during the interview, and ensure all interviews follow a similar structure.

      To get useful information from an interview, the interviewer should be focused on what candidates are saying and how they are saying it, not on what the next question will be, what probes to ask, or how they will score the responses. This Interview Guide Template will help interviewers stay focused and collect good information about candidates.

      • Interview Guide Template

      4. IT Behavioral Interview Question Library – A tool that contains a complete list of sample questions aligned with core, leadership, and IT competencies.

      Hiring managers can choose from a comprehensive collection of core, functional, and leadership competency-based behavioral interview questions.

      • IT Behavioral Interview Question Library

      5. Job Ad Template – A template to allow complete documentation of the characteristics, responsibilities, and requirements for a given job posting in IT.

      Use this template to develop a well-written job posting that will attract the star candidates and, in turn, deflect submission of irrelevant applications by those unqualified.

      • Job Ad Template

      6. Idea Catalog – A tool to evaluate virtual TA solutions.

      The most innovative technology isn’t necessarily the right solution. Review talent acquisition (TA) solutions and evaluate the purpose each option serves in addressing critical challenges and replacing critical in-person activities.

      • Idea Catalog: Adapt the Talent Acquisition Process to a Virtual Environment
      [infographic]

      Workshop: Improve Your IT Recruitment Process

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Employee Value Proposition and Employer Branding

      The Purpose

      Establish the employee value proposition (EVP) and employer brand.

      Key Benefits Achieved

      Have a well-defined EVP that you communicate through your employer brand.

      Activities

      1.1 Gather feedback.

      1.2 Build key messages.

      1.3 Assess employer brand.

      Outputs

      Content and themes surrounding the EVP

      Draft EVP and supporting statements

      A clearer understanding of the current employer brand and how it could be improved

      2 Job Ads and Sourcing

      The Purpose

      Develop job postings and build a strong sourcing program.

      Key Benefits Achieved

      Create the framework for an effective job posting and analyze existing sourcing methods.

      Activities

      2.1 Review and update your job ads.

      2.2 Review the effectiveness of existing sourcing programs.

      2.3 Review job ads and sourcing methods for bias.

      Outputs

      Updated job ad

      Low usage sourcing methods identified for development

      Minimize bias present in ads and sourcing methods

      3 Effective Interviewing

      The Purpose

      Create a high-quality interview process to improve candidate assessment.

      Key Benefits Achieved

      Training on being an effective interviewer.

      Activities

      3.1 Create an ideal candidate scorecard.

      3.2 Map out your interview process.

      3.3 Practice behavioral interviews.

      Outputs

      Ideal candidate persona

      Finalized interview and assessment process

      Practice interviews

      4 Onboarding and Action Plan

      The Purpose

      Drive employee engagement and retention with a robust program that acclimates, guides, and develops new hires.

      Key Benefits Achieved

      Evaluation of current onboarding practice.

      Activities

      4.1 Evaluate and redesign the onboarding program.

      Outputs

      Determine new onboarding activities to fill identified gaps.

      Further reading

      Improve Your IT Recruitment Process

      Train your IT department to get involved in the recruitment process to attract and select the best talent.

      Own the IT recruitment process

      Train your IT department to get involved in the recruitment process to attract and select the best talent.

      Follow this blueprint to:

      • Define and communicate the unique benefits of working for your organization to potential candidates through a strong employer brand.
      • Learn best practices around creating effective job postings.
      • Target your job posting efforts on the areas with the greatest ROI.
      • Create and deliver an effective, seamless, and positive interview and offer process for candidates.
      • Acclimate new hires and set them up for success.

      Get involved at key moments of the candidate experience to have the biggest impact


      Employee Value Proposition (EVP) and Employer Brand



      Job Postings and a Strong Sourcing Program

      Effective Interviewing

      Onboarding: Setting up New Hires For Success

      Awareness Research Application Screening Interview and Assessment Follow Up Onboarding

      RECRUIT QUALITY STAFF

      Hiring talent is critical to organizational success

      Talent is a priority for the entire organization:

      Respondents rated “recruitment” as the top issue facing organizations today (McLean & Company 2022 HR Trends Report).

      37% of IT departments are outsourcing roles to fill internal skill shortages (Info-Tech Talent Trends 2022 Survey).

      Yet bad hires are alarmingly common:

      Hiring is one of the least successful business processes, with three-quarters of managers reporting that they have made a bad hire (Robert Half, 2021).

      48% of survey respondents stated improving the quality of hires was the top recruiting priority for 2021 (Jobvite, 2021).

      Workshop overview

      Prework

      Day 1

      Day 2

      Day 3

      Day 4

      Post work

      Current Process and Job Descriptions Documented

      Establish the Employee Value Proposition (EVP) and Employer Brand

      Develop Job Postings and Build a Strong Sourcing Program

      Effective Interviewing

      Onboarding and Action Planning

      Putting the Action Plan Into Action!

      Activities

      • Recruitment Process Mapped Out and Stakeholders Identified
      • Prepare a JD and JP for Four Priority Jobs
      • Collect Information on Where Your Best Candidates Are Coming From

      1.1 Introduce the Concept of an EVP

      1.2 Brainstorm Unique Benefits of Working at Your Organization

      1.2 Employer Brand Introduction

      2.1 What Makes an Attractive Job Posting

      2.2 Create the Framework for Job Posting

      2.3 Improve the Sourcing Process

      2.4 Review Process for Bias

      3.1 Creating an Interview Process

      3.2 Selecting Interview Questions

      3.3 Avoiding Bias During Interviews

      3.4 Practice Interviews

      4.1 Why Onboarding Matters

      4.2 Acclimatize New Hires and Set Them Up for Success

      4.3 Action Plan

      5.1 Review Outputs and Select Priorities

      5.2 Consult With HR and Senior Management to Get Buy-In

      5.3 Plan to Avoid Relapse Behaviors

      Deliverables

      1. EVP draft completed
      2. Employer brand action plan
      1. Organization-specific job posting framework
      2. Sourcing Plan Template for four priority jobs
      3. Sourcing action plan
      1. Completed Interview Guide Template
      2. Managers practice a panel interview
      1. Onboarding best practices
      2. Action plan

      Enhance Your Recruitment Strategies

      The way you position the organization impacts who is likely to apply to posted positions.

      Develop a strong employee value proposition

      What is an employee value proposition?

      And what are the key components?

      The employee value proposition is your opportunity to showcase the unique benefits and opportunities of working at your organization, allowing you to attract a wider pool of candidates.

      AN EMPLOYEE VALUE PROPOSITION IS:

      AN EMPLOYEE VALUE PROPOSITION IS NOT:

      • An authentic representation of the employee experience
      • Aligned with organizational culture
      • Fundamental to all stages of the employee lifecycle
      • A guide to help investment in programs and policies
      • Short and succinct
      • What the employee can do for you
      • A list of programs and policies
      • An annual project

      THE FOUR KEY COMPONENTS OF AN EMPLOYEE VALUE PROPOSITION

      Rewards

      Organizational Elements

      Working Conditions

      Day-to-Day Job Elements

      • Compensation
      • Health Benefits
      • Retirement Benefits
      • Vacation
      • Culture
      • Customer Focus
      • Organization Potential
      • Department Relationships
      • Senior Management Relationships
      • Work/Life Balance
      • Working Environment
      • Employee Empowerment
      • Development
      • Rewards & Recognition
      • Co-Worker Relationships
      • Manager Relationships

      Creating a compelling EVP that presents a picture of your employee experience, with a focus on diversity, will attract a wide pool of diverse candidates to your team. This can lead to many internal and external benefits for your organization.

      How to collect information on your EVP

      Existing Employee Value Proposition: If your organization or IT department has an existing employee value proposition, rather than starting from scratch, we recommend leveraging that and moving to the testing phase to see if the EVP still resonates with staff and external parties.

      Employee Engagement Results: If your organization does an employee engagement survey, review the results to identify the areas in which the IT organization is performing well. Identify and document any key comment themes in the report around why employees enjoy working for the organization or what makes your IT department a great place to work.

      Social Media Sites. Prepare for the good, the bad, and the ugly. Social media websites like Glassdoor and Indeed make it easier for employees to share their experiences at an organization honestly and candidly. While postings on these sites won’t relate exclusively to the IT department, they do invite participants to identify their department in the organization. You can search these to identify any positive things people are saying about working for the organization and potentially opportunities for improvement (which you can use as a starting point in the retention section of this report).

      1.1 Gather feedback

      1. Download the Improve Your IT Recruitment Workbook.
      2. On tab 1.1, brainstorm the top five things you value most about working at the organization. Ask yourself what would fall in each category and identify any key themes. Be sure to take note of any specific quotes you have.
      3. Brainstorm limitations that the organization currently has in each of those areas.

      Download the Recruitment Workbook

      Input

      Output
      • Employee opinions
      • Employee responses to four EVP components
      • Content for EVP

      Materials

      Participants

      • Recruitment Workbook
      • Diverse employees
      • Different departments
      • Different role levels

      1.2 Build key messages

      1. Go to tab 1.2 in your workbook
      2. Identify themes from activity 1.1 that would be considered current strengths of you organization.
      3. Identify themes from activity 1.2 that are aspirational elements of your organization.
      4. Identify up to four key statements to focus on for the EVP, ensuring that your EVP speaks to at least one of the five categories above.
      5. Integrate these into one overall statement.

      Examples below.

      Input

      Output
      • Feedback from focus groups
      • EVP and supporting statements

      Materials

      Participants

      • Workbook handout
      • Pen and paper for documenting responses
      • IT leadership team

      Sample EVPs

      Shopify

      “We’re Shopify. Our mission is to make commerce better for everyone – but we’re not the workplace for everyone. We thrive on change, operate on trust, and leverage the diverse perspectives of people on our team in everything we do. We solve problems at a rapid pace. In short, we get shit done.”

      Bettercloud

      “At Bettercloud, we have a smart, ambitious team dedicated to delighting our customers. Our culture of ownership and transparency empowers our team to achieve goals they didn’t think possible. For all those on board, it’s going to be a challenging and rewarding journey – and we’re just getting started.”

      Ellevest

      “As a team member at Ellevest, you can expect to make a difference through your work, to have a direct impact on the achievement of a very meaningful mission, to significantly advance your career trajectory, and to have room for fun and fulfillment in your daily life. We know that achieving a mission as critical as ours requires incredible talent and teamwork, and team is the most important thing to us.”

      Sources: Built In, 2021; Workology, 2022

      Ensure your EVP resonates with employees and prospects

      Test your EVP with internal and external audiences.

      INTERNAL TEST REVOLVES AROUND THE 3A’s

      EXTERNAL TEST REVOLVES AROUND THE 3C’s

      ALIGNED: The EVP is in line with the organization’s purpose, vision, values, and processes. Ensure policies and programs are aligned with the organization’s EVP.

      CLEAR: The EVP is straightforward, simple, and easy to understand. Without a clear message in the market, even the best intentioned EVPs can be lost in confusion.

      ACCURATE: The EVP is clear and compelling, supported by proof points. It captures the true employee experience, which matches the organization’s communication and message in the market.

      COMPELLING: The EVP emphasizes the value created for employees and is a strong motivator to join this organization. A strong EVP will be effective in drawing in external candidates. The message will resonate with them and attract them to your organization.

      ASPIRATIONAL: The EVP inspires both individuals and the IT organization as a whole. Identify and invest in the areas that are sure to generate the highest returns for employees.

      COMPREHENSIVE: The EVP provides enough information for the potential employee to understand the true employee experience and to self-assess whether they are a good fit for your organization. If the EVP lacks depth, the potential employee may have a hard time understanding the benefits and rewards of working for your organization.

      Want to learn more?

      Recruit IT Talent

      • Improve candidate experience to hire top IT talent.

      Recruit and Retain More Women in IT

      • Gender diversity is directly correlated to IT performance.

      Recruit and Retain People of Color in IT

      • Good business, not just good philanthropy.

      Enhance Your Recruitment Strategies

      The way you position the organization impacts who is likely to apply to posted positions.

      Market your EVP to potential candidates: Employer Brand

      Employer brand includes how you market the EVP internally and externally – consistency is key

      The employer brand is the perception internal and external stakeholders hold of the organization and exists whether it has been curated or not. Curating the employer brand involves marketing the organization and employee experience. Grounding your employer brand in your EVP enables you to communicate and market an accurate portrayal of your organization and employee experience and make you desirable to both current and potential employees.

      The image contains a picture of several shapes. There is a trapezoid that is labelled EVP, and has a an arrow pointing to the text beside it. There is also an arrowing pointing down from it to another trapezoid that is labelled Employer Brand.

      The unique offering an employer provides to employees in return for their effort, motivating them to join or remain at the organization.

      The perception internal and external stakeholders hold of the organization.

      Alignment between the EVP, employer brand, and corporate brand is the ideal branding package. An in-sync marketing strategy ensures stakeholders perceive and experience the brand the same way, creating brand ambassadors.

      The image contains three circles that are connected. The circles are labelled: EVP, Employer Brand, Corporate Brand.

      Ensure your branding material creates a connection

      How you present your employer brand is just as important as the content. Ideally, you want the viewer to connect with and personalize the material for the message to have staying power. Use Marketing’s expertise to help craft impactful promotional materials to engage and excite the viewer.

      Visuals

      Images are often the first thing viewers notice. Use visuals that connect to your employer brand to engage the viewer’s attention and increase the likelihood that your message will resonate. However, if there are too many visuals this may detract from your content – balance is key!

      Language

      Wordsmithing is often the most difficult aspect of marketing. Your message should be accurate, informative, and engaging. Work with Marketing to ensure your wording is clever and succinct – the more concise, the better.

      Composition

      Integrate visuals and language to complete your marketing package. Ensure that the text and images are balanced to draw in the viewer.

      Case Study: Using culture to drive your talent pool

      This case study is happening in real time. Please check back to learn more as Goddard continues to recruit for the position.

      Recruiting at NASA

      Goddard Space Center is the largest of NASA’s space centers with approximately 11,000 employees. It is currently recruiting for a senior technical role for commercial launches. The position requires consulting and working with external partners and vendors.

      NASA is a highly desirable employer due to its strong culture of inclusivity, belonging, teamwork, learning, and growth. Its culture is anchored by a compelling vision, “For the betterment of Humankind,” and amplified by a strong leadership team that actively lives their mission and vision daily.

      Firsthand lists NASA as #1 on the 50 most prestigious internships for 2022.

      Rural location and no flexible work options add to the complexity of recruiting

      The position is in a rural area of Eastern Shore Virginia with a population of approximately 60,000 people, which translates to a small pool of candidates. Any hire from outside the area will be expected to relocate as the senior technician must be onsite to support launches twice a month. Financial relocation support is not offered and the position is a two-year assignment with the option of extension that could eventually become permanent.

      The image contains a picture of Steve Thornton.

      “Looking for a Talent Unicorn: a qualified, experienced candidate with both leadership skills and deep technical expertise that can grow and learn with emerging technologies.”

      Steve Thornton

      Acting Division Chief, Solutions Division, Goddard Space Flight Center, NASA

      Case Study: Using culture to drive your talent pool

      A good brand overcomes challenges.

      Culture takes the lead in NASA's job postings, which attract a high number of candidates. Postings begin with a link to a short video on working at NASA, its history, and how it lives its vision. The video highlights NASA's diversity of perspectives, career development, and learning opportunities.

      NASA's company brand and employer brand are tightly intertwined, providing a consistent view of the organization.

      The employer vision is presented in the best place to reach NASA's ideal candidate: usajobs.gov, the official website of the United States Government and the “go-to” for government job listings. NASA also extends its postings to other generic job sites as well as LinkedIn and professional associations.

      The image contains a picture of Robert Leahy.

      Interview with Robert Leahy

      Chief Information Officer, Goddard Space Flight Center, NASA

      2.1 Assess your organization’s employer brand

      1. Go to tab 2.1 in the Improve Your IT Recruitment Workbook.
      2. Put yourself in the shoes of someone on the outside looking in. If they were to look up your organization, what impression would they be given about what is like to work there?
      3. Run a Google search on your organization with key words “jobs,” “culture,” and “working environment” to see what a potential candidate would see when they begin researching your organization.
      4. You can use sites like:

      • Glassdoor
      • Indeed company pages
      • LinkedIn company pages
      • Social media
      • Your own website
    • Identify what your organization is doing well and record that under the “Continue” box in your workbook.
    • Record anything your organization should stop doing under the “Stop” box.
    • Brainstorm some ideas that your organization should think about implementing to improve the employer brand under the “Start” Box.
    • Input Output
      • Existing branding material on the internet
      • A clearer understanding of the current employer brand and how it could be improved
      Materials Participants
      • Workbook handout
      • Senior IT Leaders

      Want to learn more?

      Recruit IT Talent

      • Improve candidate experience to hire top IT talent.

      Recruit and Retain More Women in IT

      • Gender diversity is directly correlated to IT performance.

      Recruit and Retain People of Color in IT

      • Good business, not just good philanthropy.

      Enhance Your Recruitment Strategies

      The way you position the organization impacts who is likely to apply to posted positions.

      Create engaging job ads to attract talent to the organization

      We have a job description; can I just post that on Indeed?

      A job description is an internal document that includes sections such as general job information, major responsibilities, key relationships, qualifications, and competencies. It communicates job expectations to incumbents and key job data to HR programs.

      A job ad is an externally facing document that advertises a position with the intent of attracting job applicants. It contains key elements from the job description as well as information on the organization and its EVP.

      Write an Effective Job Ad

      • Ensure that your job ad speaks to the audience you are targeting through the language you use.
        • E.g. If you are hiring for a creative role, use creative language and formatting. If you are writing for students, emphasize growth opportunities.
      • Highlight the organization’s EVP.
      • Paint an accurate picture of key aspects of the role but avoid the nitty gritty as it may overwhelm applicants.
      • Link to your organization’s website and social media platforms so applicants can easily find more information.

      A job description informs a job ad, it doesn’t replace it. Don’t be lulled into using a job description as a posting when there’s a time crunch to fill a position. Refer to job postings as job advertisements to reinforce that their purpose is to attract attention and talent.

      An effective job posting contains the following elements:

      Position Title
      • Clearly defined job titles are important for screening applicants as this is one of the first things the candidate will read.
      • Indicating the earnings range that the position pays cuts out time spent on reviewing candidates who may never accept the position and saves them from applying to a job that doesn’t match what they are looking for.
      Company
      • Provide a brief description of the organization including the products or services it offers, the corporate culture, and any training and career development programs.
      Summary Description
      • Describe briefly why the position exists. In other words, what is the position's primary purpose? The statement should include the overall results the job is intended to produce and some of the key means by which the position achieves these results.
      Responsibilities
      • Use bullet points to list the fundamental accountabilities of the position. Candidates want to know what they will be doing on a day-to-day basis.
      • Begin each responsibility or accountability statement with an action word and follow with a brief phrase to describe what is done to accomplish the function.
      Position Characteristics
      • Give examples of key problems and thinking challenges encountered by the position. Describe the type of analysis or creativity required to resolve these problems.
      • Provide examples of final decision-making authority. The examples should reflect the constraints placed on the position by people, policies, and/or procedures.
      Position Requirements
      • List all formal education and certifications required.
      • List all knowledge and experience required.
      • List all personal attributes required.
      Work Conditions
      • List all work conditions that the employee must accommodate. This could include any sensory, physical, or mental requirements of the position or any special conditions of employment, such as hours.
      Process to Apply
      • Include the methods in which the organization wants to receive applications and contact information of who will receive the applications.

      Bottom Line: A truly successful job posting ferrets out those hidden stars that may be over cautious and filters out hundreds of applications from the woefully under qualified.

      The do’s and don’ts of an inclusive job ad

      DON’T overlook the power of words. Avoid phrases like “strong English language skills” as this may deter non-native English speakers from applying and a “clean-shaven” requirement can exclude candidates whose faith requires them to maintain facial hair.

      DON’T post a long requirements list. A study showed that the average jobseeker spends only 49.7 seconds reviewing a listing before deciding it's not a fit.*

      DON’T present a toxic work culture; phrases such as “work hard, play hard” can put off many candidates and play into the “bro- culture” stereotype in tech.

      Position Title: Senior Lorem Ipsum

      Salary Band: $XXX to $XXX

      Diversity is a core value at ACME Inc. We believe that diversity and inclusion is our strength, and we’re passionate about building an environment where all employees are valued and can perform at their best.

      As a … you will …

      Our ideal candidate ….

      Required Education and Experience

      • Bachelor’s degree in …
      • Minimum five (5) years …

      Required Skills

      Preferred Skills

      At ACME Inc. you will find …

      DO promote pay equity by being up front and honest about salary expectations.

      DO emphasize your organization’s commitment to diversity and an inclusive workplace by adding an equity statement.

      DO limit your requirements to “must haves” or at least showcase them first before the “nice-to-haves.”

      DO involve current employees or members of your employee resource groups when creating job descriptions to ensure that they ask for what you really need.

      DO focus on company values and criteria that are important to the job, not just what’s always been done.

      *Source: Ladders, 2013

      Before posting the job ad complete the DEI job posting validation checklist

      Does the job posting highlight your organization’s EVP

      Does the job posting avoid words that might discourage women, people of color, and other members of underrepresented groups from applying?

      Has the position description been carefully reviewed and revised to reflect current and future expectations for the position, rather than expectations informed by the persons who have previously held the job?

      Has the hiring committee eliminated any unnecessary job skills or requirements (college degree, years or type of previous experience, etc.) that might negatively impact recruitment of underrepresented groups?

      Has the hiring committee posted the job in places (job boards, websites, colleges, etc.) where applicants from underrepresented groups will be able to easily view or access it?

      Have members of the hiring committee attended job fairs or other events hosted by underrepresented groups?

      Has the hiring committee asked current employees from underrepresented groups to spread the word about the position?

      Has the hiring committee worked with the marketing team to ensure that people from diverse groups are featured in the organization’s website, publications, and social media?

      es the job description clearly demonstrate the organization’s and leadership’s commitment to DEI?

      *Source: Recruit and Retain People of Color in IT

      3.1 Review and update your job ads

      1. Download the Job Ad Template.
      2. Look online or ask HR for an example of a current job advertisement you are using.
      • If you don’t have one, you can use a job description as a starting point.
    • Review all the elements of the job ad and make sure they align with the list on the previous slide, adding or changing, as necessary. Your job ad should be no more than two pages long.
    • Using the tools on the previous two slides, review your first draft to ensure the job posting is free of language or elements that will discourage diverse candidates from applying.
    • Review your job advertisement with HR to get feedback or to use as a template going forward.
    • Input Output
      • Existing job ad or job description
      • Updated job ad
      Materials Participants
      • Job ad or job description
      • Job Ad Template
      • Hiring Managers

      Want to learn more?

      Recruit IT Talent

      • Improve candidate experience to hire top IT talent.

      Recruit and Retain More Women in IT

      • Gender diversity is directly correlated to IT performance.

      Recruit and Retain People of Color in IT

      • Good business, not just good philanthropy.

      Enhance Your Recruitment Strategies

      Focus on key programs and tactics to improve the effectiveness of your sourcing approach.

      Get involved with sourcing to get your job ad seen

      To meet growing expectations, organizations need to change the way they source

      Social Media

      Social media has trained candidates to expect:

      • Organizations to stay in touch and keep track of them.
      • A personalized candidate experience.
      • To understand organizational culture and a day in the life.

      While the focus on the candidate experience is important throughout the talent acquisition process, social media, technology, and values have made it a critical component of sourcing.

      Technology

      Candidates expect to be able to access job ads from all platforms.

      • Today, close to 90% of candidates use a mobile platform to job hunt (SmartRecruiters, 2022).
      • However, only 36% of organizations are optimizing their job postings for mobile. (The Undercover Recruiter, 2021)

      Job ads must be clear, concise, and easily viewed on a mobile device.

      Candidate Values

      Job candidate’s values are changing.

      • There is a growing focus on work/life balance, purpose, innovation, and career development. Organizations need to understand candidate values and highlight how the EVP aligns with these interests.

      Authenticity remains important.

      • Clearly and accurately represent your organization and its culture.

      Focus on key programs and tactics to improve the effectiveness of your sourcing approach

      Internal Talent Mobility (ITM) Program

      Social Media Program

      Employee Referral Program

      Alumni Program

      Campus Recruiting Program

      Other Sourcing Tactics

      Take advantage of your current talent with an internal talent mobility program

      What is it?

      Positioning the right talent in the right place, at the right time, for the right reasons, and supporting them appropriately.

      Internal Talent Mobility (ITM) Program

      Social Media Program

      Employee Referral Program

      Alumni Program

      Campus Recruiting Program

      Other Sourcing Tactics

      ITM program benefits:

      1. Retention
      2. Provide opportunities to develop professionally, whether in the current role or through promotions/lateral moves. Keep strong performers and high-potential employees committed to the organization.

      3. Close Skills Gap
      4. Address rapid change, knowledge drain due to retiring Baby Boomers, and frustration associated with time to hire or time to productivity.

      5. Cost/Time Savings
      6. Reduce spend on talent acquisition, severance, time to productivity, and onboarding.

      7. Employee Engagement
      8. Increase motivation and productivity by providing increased growth and development opportunities.

      9. EVP
      10. Align with the organization’s offering and what is important to the employees from a development perspective.

      11. Employee & Leadership Development
      12. Support and develop employees from all levels and job functions.

      Leverage social media to identify and connect with talent

      Internal Talent Mobility (ITM) Program

      Social Media Program

      Employee Referral Program

      Alumni Program

      Campus Recruiting Program

      Other Sourcing Tactics

      What is it? The widely accessible electronic tools that enable anyone to publish and access information, collaborate on common efforts, and build relationships.

      Learning to use social media effectively is key to sourcing the right talent.

      • Today, 92% of organizations leverage social media for talent acquisition.
      • 80% of employers find passive candidates through social media – second only to referrals.
      • 86% percent of job seekers used social media for their most recent job search.
      (Ku, 2021)

      Benefits of social media:

      • Provides access to candidates who may not know the organization.
      • Taps extended networks.
      • Facilitates consistent communication with candidates and talent in pipelines.
      • Personalizes the candidate experience.
      • Provides access to extensive data.

      Challenges of social media:

      With the proliferation of social media and use by most organizations, social media platforms have become overcrowded. As a result:

      • Organizations are directly and very apparently competing for talent with competitors.
      • Users are bombarded with information and are tuning out.

      “It is all about how we can get someone’s attention and get them to respond. People are becoming jaded.”

      – Katrina Collier, Social Recruiting Expert, The Searchologist

      Reap the rewards of an employee referral program

      Internal Talent Mobility (ITM) Program

      Social Media Program

      Employee Referral Program

      Alumni Program

      Campus Recruiting Program

      Other Sourcing Tactics

      What is it? Employees recommend qualified candidates. If the referral is hired, the referring employee typically receives some sort of reward.

      Benefits of an employee referral program:

      1. Lower Recruiting Costs
      2. 55% of organizations report that hiring a referral is less expensive that a non-referred candidate (Clutch, 2020).

      3. Decreased time to fill
      4. The average recruiting lifecycle for an employee referral is 29 days, compared with 55 days for a non referral (Betterup, 2022).

      5. Decreased turnover
      6. 46% percent of employees who were referred stay at their organization for a least one year, compared to 33% of career site hires (Betterup, 2022).

      7. Increased quality of hire
      8. High performers are more likely to refer other high performers to an organization (The University of Chicago Press, 2019).

      Avoid the Like Me Bias: Continually evaluate the diversity of candidates sourced from the employee referral program. Unless your workforce is already diverse, referrals can hinder diversity because employees tend to recommend people like themselves.

      Tap into your network of former employees

      Internal Talent Mobility (ITM) Program

      Social Media Program

      Employee Referral Program

      Alumni Program

      Campus Recruiting Program

      Other Sourcing Tactics

      What is it? An alumni referral program is a formalized way to maintain ongoing relationships with former employees of the organization.

      Successful organizations use an alumni program:

      • 98% of the F500 have some sort of Alumni program (LinkedIn, 2019).

      Benefits of an alumni program:

      1. Branding
      • Alumni are regarded as credible sources of information. They can be a valuable resource for disseminating and promoting the employer brand.
    • Source of talent
      • Boomerang employees are doubly valuable as they understand the organization and also have developed skills and industry experience.
        • Recover some of the cost of turnover and cost per hire with a pool of prequalified candidates who will more quickly reach full productivity.
    • Referral potential
      • Developing a robust alumni network provides access to a larger network through referrals.
      • Alumni already know what is required to be successful in the organization so they can refer more suitable candidates.

      Make use of a campus recruiting program

      Internal Talent Mobility (ITM) Program

      Social Media Program

      Employee Referral Program

      Alumni Program

      Campus Recruiting Program

      Other Sourcing Tactics

      What is it? A formalized means of attracting and hiring individuals who are about to graduate from schools, colleges, or universities.

      Almost 70% of companies are looking to employ new college graduates every year (HR Shelf, 2022).

      Campus recruitment benefits:

      • Increases employer brand awareness among talent entering the workforce.
      • Provides the opportunity to interact with large groups of potential candidates at one time.
      • Presents the opportunity to identify and connect with high-quality talent before they graduate and are actively looking for positions.
      • Offers access to a highly diverse audience.

      Info-Tech Insight

      Target schools that align with your culture and needs. Do not just focus on the most prestigious schools: they are likely more costly, have more intense competition, and may not actually provide the right talent.

      Identify opportunities to integrate non-traditional techniques

      Internal Talent Mobility (ITM) Program

      Social Media Program

      Employee Referral Program

      Alumni Program

      Campus Recruiting Program

      Other Sourcing Tactics

      1. Professional industry associations
      • Tap into candidates who have the necessary competencies.

      5. Not-for-profit intermediaries

      • Partner with not-for-profits to tap into candidates in training or mentorship programs.
      • Example:
        • Year Up (General)
        • Bankwork$ (Banking)
        • Youth Build (Construction)
        • iFoster (Grocery)

      American Expresscreated a boot camp for software engineers in partnership with Year Up and Gateway Community College to increase entry-level IT hires.

      Results:

      • Annually hire 80-100 interns from Year Up.
      • Improved conversion rates: 72% of Year Up interns versus 60% of traditional interns.
      • Increased retention: 44 (Year Up) versus 18 months (traditional).
      (HBR, 2016)

      2. Special interest groups

      • Use for niche role sourcing.
      • Find highly specialized talent.
      • Drive diversity (Women in Project Management).

      6. Gamification

      • Attract curiosity and reaffirm innovation at your organization.
      • Communicate the EVP.
      3. Customers
      • Access those engaged with the organization.
      • Add the employer brand to existing messaging.

      PwC (Hungary) created Multiploy, a two-day game that allows students to virtually experience working in accounting or consulting at the organization.

      Results:

      • 78% of students said they wanted to work for PwC.
      • 92% indicated they had a more positive view of the firm.
      • Increase in the number of job applicants.
      (Zielinski, 2015)

      4. Exit interviews

      • Ask exiting employees “where should we recruit someone to replace you?”
      • Leverage their knowledge to glean insight into where to find talent.

      Partner with other organizational functions to build skills and leverage existing knowledge

      Use knowledge that already exists in the organization to improve talent sourcing capabilities.

      Marketing

      HR

      Marketing knows how to:

      • Build attention-grabbing content.
      • Use social media platforms effectively.
      • Effectively promote a brand.
      • Use creative methods to connect with people.

      HR knows how to:

      • Organize recruitment activities.
      • Identify the capabilities of various technologies available to support sourcing.
      • Solve issues that may arise along the way

      To successfully partner with other departments in your organization:

      • Acknowledge that they are busy. Like IT, they have multiple competing priorities.
      • Present your needs and prioritize them. Create a list of what you are looking for and then be willing to just pick your top need. Work with the other department to decide what needs can and cannot be met.
      • Present the business case. Emphasize how partnering is mutually beneficial. For example, illustrate to Marketing that promoting a strong brand with candidates will improve the organization’s overall reputation because often, candidates are customers.
      • Be reasonable and patient. You are asking for help, so be moderate in your expectations and flexible in working with your partner.

      Info-Tech Insight

      Encourage your team to seek out, and learn from, employees in different divisions. Training sessions with the teams may not always be possible but one-on-one chats can be just as effective and may be better received.

      5.1 Review the effectiveness of existing sourcing programs

      1. As a group review the description of each program as defined on previous slides. Ensure that everyone understands the definitions.
      2. In your workbook, look for the cell Internal Talent Mobility under the title; you will find five rows with the following
      • This program is formally structured and documented.
      • This program is consistently applied across the organization.
      • Talent is sourced this way on an ad hoc basis.
      • Our organization currently does not source talent this way.
      • There are metrics in place to assess the effectiveness of this program.
    • Ask everyone in the group if they agree with the statement for each column; once everyone has had a chance to answer each of the questions, discuss any discrepancies which exist.
    • After coming to a consensus, record the answers.
    • Repeat this process for the other four sourcing programs (social media, employee referral program, alumni network program, and campus recruiting program).
    • InputOutput
      • Existing knowledge on sourcing approach
      • Low usage sourcing methods identified for development
      MaterialsParticipants
      • Workbook
      • Hiring Managers

      Want to learn more?

      Recruit IT Talent

      • Improve candidate experience to hire top IT talent.

      Recruit and Retain More Women in IT

      • Gender diversity is directly correlated to IT performance.

      Recruit and Retain People of Color in IT

      • Good business, not just good philanthropy.

      Enhance Your Recruitment Strategies

      Interviews are the most often used yet poorly executed hiring tool.

      Create a high-quality interview process to improve candidate assessment

      Everyone believes they’re a great interviewer; self-assess your techniques, and “get real” to get better

      If you…

      • Believe everything the candidate says.
      • Ask mostly hypothetical questions: "What would you do in a situation where…"
      • Ask gimmicky questions: "If you were a vegetable, what vegetable would you be?"
      • Ask only traditional interview questions: "What are your top three strengths?”
      • Submit to a first impression bias.
      • Have not defined what you are looking for before the interview.
      • Ignore your gut feeling in an attempt to be objective.
      • Find yourself loving a candidate because they are just like you.
      • Use too few or too many interviewers in the process.
      • Do not ask questions to determine the motivational fit of the candidate.
      • Talk more than the interviewee.
      • Only plan and prepare for the interview immediately before it starts.

      …then stop. Use this research!

      Most interviewers are not effective, resulting in many poor hiring decisions, which is costly and counter-productive

      Most interviewers are not effective…

      • 82% of organizations don’t believe they hire highly talented people (Trost, 2022).
      • Approximately 76% of managers and HR representatives that McLean & Company interviewed agreed that the majority of interviewers are not very effective.
      • 66% of hiring managers come to regret their interview-based hiring decisions (DDI, 2021).

      …because, although everyone knows interviewing is a priority, most don’t make it one.

      • Interviewing is often considered an extra task in addition to an employee’s day-to-day responsibilities, and these other responsibilities take precedence.
      • It takes time to effectively design, prepare for, and conduct an interview.
      • Employees would rather spend this time on tasks they consider to be an immediate priority.

      Even those interviewers who are good at interviewing, may not be good enough.

      • Even a good interviewer can be fooled by a great interviewee.
      • Some interviewees talk the talk, but don’t walk the walk. They have great interviewing abilities but not the skills required to be successful in the specific position for which they are interviewing.
      • Even if the interviewer is well trained and prepared to conduct a strong interview, they can get caught up with an interviewee that seems very impressive on the surface, and end up making a bad hire.

      Preparing the Perfect Interview

      Step 5: Define decision rights

      Establish decision-making authority and veto power to mitigate post-interview conflicts over who has final say over a candidate’s status.

      Follow these steps to create a positive interview experience for all involved.

      Step 1: Define the ideal candidate profile; determine the attributes of the ideal candidate and their relative importance

      Define the attributes of the ideal candidate…

      Ideal candidate = Ability to do the job + Motivation to do the job + Fit

      Competencies

      • Education
      • Credentials
      • Technical skills
      • Career path
      • Salary expectations
      • Passion
      • Potential
      • Personality
      • Managerial style/preference

      Experiences

      • Years of service
      • Specific projects
      • Industry

      Data for these come from:

      • Interviews
      • Personality tests
      • Gut instinct or intuition

      Data for these come from:

      • Resumes
      • Interviews
      • Exercises and tests
      • References

      Caution: Evaluating for “organizational or cultural fit” can lead to interviewers falling into the trap of the “like me” bias, and excluding diverse candidates.

      …then determine the importance of the attributes.

      Non-negotiable = absolutely required for the job!

      Usually attributes that are hard to train, such as writing skills, or expensive to acquire after hire, such as higher education or specific technical skills.

      An Asset

      Usually attributes that can be trained, such as computer skills. It’s a bonus if the new hire has it.

      Nice-to-have

      Attributes that aren’t necessary for the job but beneficial. These could help in breaking final decision ties.

      Deal Breakers: Also discuss and decide on any deal breakers that would automatically exclude a candidate.

      The job description is not enough; meet with stakeholders to define and come to a consensus on the ideal candidate profile

      Definition of the Ideal Candidate

      • The Hiring Manager has a plan for the new hire and knows the criteria that will best fulfill that mandate.
      • The Executive team may have specific directives for what the ideal candidate should look like, depending on the level and critical nature of the position.
      • Industry standards, which are defined by regulatory bodies, are available for some positions. Use these to identify skills and abilities needed for the job.
      • Competitor information such as job descriptions and job reviews could provide useful data about a similar role in other organizations.
      • Exit interviews can offer insight into the most challenging aspects of the job and identify skills or abilities needed for success.
      • Current employees who hold the same or a similar position can explain the nuances of the day-to-day job and what attributes are most needed on the team.

      “The hardest work is accurately defining what kind of person is going to best perform this job. What are their virtues? If you’ve all that defined, the rest is not so tough.”

      – VP, Financial Services

      Use a scorecard to document the ideal candidate profile and help you select a superstar

      1. Download the Workbook and go to tab 6.1.
      2. Document the desired attributes for each category of assessment: Competencies, Experiences, Fit, and Motivation. You can find an Attribute Library on the next tab.
      3. Rank each attribute by level of priority: Required, Asset, or Nice-to-Have.
      4. Identify deal breakers that would automatically disqualify a candidate from moving forward.
      InputOutput
      • Job description
      • Stakeholder input
      • Ideal candidate persona
      MaterialsParticipants
      • Workbook
      • Hiring Managers

      To identify questions for screening interviews, use the Screening Interview Template

      A screening interview conducted by phone should have a set of common questions to identify qualified candidates for in-person interviews.

      The Screening Interview Template will help you develop a screening interview by providing:

      • Common screening questions that can be modified based on organizational needs and interview length.
      • Establishing an interview team.
      • A questionnaire format so that the same questions are asked of all candidates and responses can be recorded.

      Once completed, this template will help you or HR staff conduct candidate screening interviews with ease and consistency. Always do screening interviews over the phone or via video to save time and money.

      Info-Tech Insight

      Determine the goal of the screening interview – do you want to evaluate technical skills, communication skills, attitude, etc.? – and create questions based on this goal. If evaluating technical skill, have someone with technical competency conduct the interview.

      The image contains screenshots of the Screening Interview Template.

      Step 2: Choose interview types and techniques that best assess the ideal candidate attributes listed on the position scorecard

      There is no best interview type or technique for assessing candidates, but there could be a wrong one depending on the organization and job opening.

      • Understanding common interviewing techniques and types will help inform your own interviewing strategy and interview development.
      • Each interview technique and type has its own strengths and weakness and can be better suited for a particular organizational environment, type of job, or characteristic being assessed.
      The image contains a diagram to demonstrate the similarities and differences of Interview Technique and Interview Type. There is a Venn Diagram, the right circle is labelled: Interview Technique, and the right is: Interview Type. There is a double sided arrow below that has the following text: Unstructure, Semi-Structured, and Structured.

      Unstructured: A traditional method of interviewing that involves no constraints on the questions asked, no requirements for standardization, and a subjective assessment of the candidate. This format is the most prone to bias.

      Semi-Structured: A blend of structured and unstructured, where the interviewer will ask a small list of similar questions to all candidates along with some questions pertaining to the resume.

      Structured: An interview consisting of a standardized set of job-relevant questions and a scoring guide. The goal is to reduce interviewer bias and to help make an objective and valid decision about the best candidate.

      No matter which interview types or techniques you use, aim for it to be as structured as possible to increase its validity

      The validity of the interview increases as the degree of interview structure increases.

      Components of a highly structured interview include:

      1. Interview questions are derived from a job analysis (they are job related).
      2. Interview questions are standardized (all applicants are asked the same questions).
      3. Prompting, follow-up questioning, probing, and/or elaboration on questions are limited. Try to identify all prompts, follow-ups, and probes beforehand and include them in the interview guide so that all candidates get the same level of prompting and probing.
      4. Interview questions focus on behaviors or work samples rather than opinions or self-evaluations.
      5. Interviewer access to ancillary information (e.g. resumes, letters of reference, test scores, transcripts) is controlled. Sometimes limiting access to these documents can limit interviewer biases.
      6. Questions from the candidate are not allowed until after the interview. This allows the interviewer to stay on track and not go off the protocol.
      7. Each answer is rated during the interview using a rating scale tailored to the question (this is preferable to rating dimensions at the end of the interview and certainly preferable to just making an overall rating or ranking at the end).
      8. Rating scales are “anchored” with behavioral examples to illustrate scale points (e.g. examples of a “1,” “3,” or “5” answer).
      9. Total interview score is obtained by summing across scores for each of the questions.

      The more of these components your interview has, the more structured it is, and the more valid it will be.

      Step 3: Prepare interview questions to assess the attributes you are looking for in a candidate

      The purpose of interviewing is to assess, not just listen. Questions are what help you do this.

      Preparing questions in advance allows you to:

      • Match each question to a position requirement (included in your scorecard) to ensure that you assess all required attributes. Everything assessed should be job relevant!
      • Determine each question’s weighting, if applicable.
      • Give each candidate a chance to speak to all their job-relevant attributes.
      • Keep records should an unselected candidate decide to contest the decision.

      If you don’t prepare in advance:

      • You’ll be distracted thinking about what you are going to ask next and not be fully listening.
      • You likely won’t ask the same questions of all candidates, which impacts the ability to compare across candidates and doesn’t provide a fair process for everyone.
      • You likely won’t ask the questions you need to elicit the information needed to make the right decision.
      • You could ask illegal questions (see Acquire the Right Hires with Effective Interviewing for a list of questions not to ask in an interview).

      Use the Interview Question Planning Guide tab in the Candidate Interview Strategy and Planning Guide to prepare your interview questions.

      Use these tips to draft interview questions:

      • Use job analysis output, in particular the critical incident technique, to develop structured interview questions.
      • Search online or in books for example interview questions for the target position to inform interview question development. Just remember that candidates access these too, so be sure to ask for specific examples, include probing questions, and adapt or modify questions to change them.
      • Situational questions: The situation should be described in sufficient detail to allow an applicant to visualize it accurately and be followed by “what would you do?” Scoring anchors should reflect effective, typical, and ineffective behaviors.
      • Behavioral questions: Should assess a behavioral dimension (e.g. meeting deadlines) and apply to a variety of situations that share the underlying dimension (e.g. at work or school). Scoring anchors should be applicable to a variety of situations and reflect effective, typical, and ineffective behavior.

      Conduct an effective screening interview by listening to non-verbal cues and probing

      Follow these steps to conduct an effective screening interview:

      Introduce yourself and ask if now is a good time to talk. (Before calling, prepare your sales pitch on the organization and the position.)

      You want to catch candidates off guard so that they don’t have time to prepare scripted answers; however, you must be courteous to their schedule.

      Provide an overview of the position, then start asking pre-set questions. Take a lot of notes.

      It is important to provide candidates with as much information as possible about the position – they are deciding whether they are interested in the role as much as you are deciding whether they are suitable.

      Listen to how the questions are answered. Ask follow-up questions when appropriate and especially if the candidate seems to be holding something back.

      If there are long pauses or the candidate’s voice changes, there may be something they aren’t telling you that you should know.

      Be alert to inconsistencies between the resume and answers to the questions and address them.

      It’s important to get to the bottom of issues before the in-person interview. If dates, titles, responsibilities, etc. seem to be inconsistent, ask more questions.

      Ask candidates about their salary expectations.

      It’s important to ensure alignment of the salary expectations early on. If the expectations are much higher than the range, and the candidate doesn’t seem to be open to the lower range, there is no point interviewing them. This would be a waste of everyone’s time.

      Answer the applicant’s questions and conclude the interview.

      Wait until after the interview to rate the applicant.

      Don’t allow yourself to judge throughout the interview, or it could skew questions. Rate the applicant once the interview is complete.

      When you have a shortlist of candidates to invite to an in-person interview, use the Candidate Communication Template to guide you through proper phone and email communications.

      Don’t just prepare top-level interview questions; also prepare probing questions to probe to gain depth and clarity

      Use probing to drill down on what candidates say as much as possible and go beyond textbook answers.

      Question (traditional): “What would you identify as your greatest strength?”

      Answer: Ability to work on a team.

      Top-level interview questions set the stage for probing.

      Your interview script should contain the top two levels of questions in the pyramid and a few probes that you will likely need to ask. You can then drill down further depending on the candidate’s answers.

      Follow-Up Question:

      “Can you outline a particular example when you were able to exercise your teamwork skills to reach a team goal?”

      Probing questions start with asking what, when, who, why, and how, and gain insight into a candidate’s thought process, experiences, and successes.

      Probing Level 1:

      Probe around the what, how, who, when, and where. “How did you accomplish that?”

      How to develop probes? By anticipating the kinds of responses that candidates from different backgrounds or with different levels of experience are likely to give as a response to an interview question. Probes should provide a clear understanding of the situation, the behavior, and the outcome so that the response can be accurately scored. Common probes include:

      • What did you do? What was the outcome?
      • When did this take place (and how long did it take)?
      • Who was involved?
      • Were you leading or being led?
      • How did you accomplish what you did?
      • Why did you take those steps?

      Tailor probes to the candidate’s answers to evoke meaningful and insightful responses.

      Probing Level 2:

      Allow for some creativity.

      “What would you do differently if you were to do it again?”

      Conduct effective interviews and assessments

      Mitigate inherent biases of assessors by integrating formal assessments with objective anchors and clear criteria to create a more inclusive process.

      Consider leveraging behavioral interview questions in your interview to reduce bias.

      • In the past, companies were pushing the boundaries of the conventional interview, using unconventional questions to find top talent, e.g. “what color is your personality?” The logic was that the best people are the ones who don’t necessarily show perfectly on a resume, and they were intent on finding the best.
      • However, many companies have stopped using these questions after extensive statistical analysis revealed there was no correlation between candidates’ ability to answer them and their future performance on the job.
      • Asking behavioral interview questions based on the competency needs of the role is the best way to uncover if the candidates will be able to execute on the job.

      Assessments are created by people that have biases. This often means that assessments can be biased, especially with preferences towards a Western perspective. Even if the same assessments are administered, the questions will be interpreted differently by candidates with varying cultural backgrounds and lived experiences. If assessments do not account for this, it ultimately leads to favoring the answers of certain demographic groups, often ones similar to those who developed the assessment.

      Creating an interview question scorecard

      Attribute you are evaluating

      Probing questions prepared

      Area to take notes

      The image contains a screenshot of an Interview question scorecard.

      Exact question you will ask

      Place to record score

      Anchored scale with definitions of a poor, ok and great answer

      Step 4: Assemble an interview team

      HR and the direct reporting supervisor should always be part of the interview. Make a good impression with a good interview team.

      The must-haves:

      • The Future Manager should always be involved in the process. They should be comfortable with the new hire’s competencies and fit.
      • Human Resources should always be involved in the process – they maintain consistency, legality, and standardization. It’s their job to know the rules and follow them. HR may coordinate and maintain policy standards and/or join in assessing the candidate.
      • There should always be more than just one interviewer, even if it is not at the same time. This helps keep the process objective, allows for different opinions, and gives the interviewee exposure to multiple individuals in the company. But, try to limit the number of panel members to four or less.

      “At the end of the day, it’s the supervisor that has to live with the person, so any decision that does not involve the supervisor is a very flawed process.” – VP, Financial Services

      The nice-to-haves:

      • Future colleagues can offer benefits to both the interviewee and the colleague by:
        • Giving the candidate some insight into what their day-to-day job would be.
        • Relaxing the candidate; allowing for a less formal, less intimidating conversation.
        • Introducing potential teammates for a position that is highly collaborative.
        • Offering the interviewer an excellent professional development opportunity – a chance to present their understanding of what they do.
      • Executives should take part in interviewing for executive hiring, individuals that will report to an executive, or for positions that are extremely important. Executive time is scarce and expensive, so only use it when absolutely necessary.

      Record the interview team details in the Candidate Interview Strategy and Planning Guide template.

      Assign interviewers roles inside and outside the actual interview

      Define Interview Process Roles

      Who Should… Contact candidates to schedule interviews or communicate decisions?

      Who Should… Be responsible for candidate welcomes, walk-outs, and hand-offs between interviews?

      Who Should… Define and communicate each stakeholder’s role?

      Who Should… Chair the preparation and debrief meetings and play the role of the referee when trying to reach a consensus?

      Define Interview Roles

      • Set a role for each interviewer so they know what to focus on and where they fit into the process (e.g. Interviewer A will assess fit). Don’t ad hoc the process and allow everyone to interview based on their own ideas.
      • Consider interviewer qualifications and the impact of the new employee on each interviewer, when deciding the roles of each interviewer (i.e. who will interview for competency and who will interview for fit).
        • For example, managers may be most impacted by technical competencies and should be the interviewer to evaluate the candidate for technical competency.

      “Unless you’ve got roles within the panel really detailed and agreed upon, for example, who is going to take the lead on what area of questions, you end up with a situation where nobody is in charge or accountable for the final interview assessment." – VP, Financial Services

      Info-Tech Insight

      Try a Two Lens Assessment: One interviewer assesses the candidate as a project leader while another assesses them as a people leader for a question such as “Give me an example of when you exercised your leadership skills with a junior team member.”

      Step 5: Set decision rights in stone and communicate them in advance to manage stakeholder expectations and limit conflict

      All interviewers must understand their decision-making authority prior to the interview. Misunderstandings can lead to resentment and conflict.

      It is typical and acceptable that you, as the direct reporting manager, should have veto power, as do some executives.

      Veto Power

      Direct Supervisor or Manager

      Decision Makers: Must Have Consensus

      Other Stakeholders

      Direct Supervisor’s Boss

      Direct Supervisor

      Contributes Opinion

      HR Representative

      Peer

      After the preliminary interview, HR should not be involved in making the decision unless they have a solid understanding of the position.

      Peers can make an unfair assessment due to perceived competition with a candidate. Additionally, if a peer doesn’t want a candidate to be hired and the direct supervisor does hire the candidate, the peer may hold resentment against that candidate and set the team up for conflict.

      The decision should rest on those who will interact with the candidate on a daily basis and who manage the team or department that the candidate will be joining.

      The decisions being made can include whether or not to move a candidate onto the next phase of the hiring process or a final hiring decision. Deciding decision rights in advance defines accountability for an effective interview process.

      Create your interview team, assessments, and objective anchor scale

      1. Download the Behavioral Interview Question Library as a reference.
      2. On tab 9 of your workbook, document all the members of the team and their respective roles in the interview process. Fill in the decision-making authority section to ensure every team member is held accountable to their assigned tasks and understands how their input will be used.
      3. For each required attribute in the Ideal Candidate Scorecard, chose one to two questions from the library that can properly evaluate that attribute.
      4. Copy and paste the questions and probing questions into the Interview Guide Template.
      5. Create an objective anchor scale and clearly define what a poor, ok, and great answer to each question is.

      Download the Behavioral Interview Question Library

      Input Output
      • List of possible team members
      • Ideal Candidate Scorecard
      • Finalized hiring panel
      • Finalized interview and assessment process
      Materials Participants
      • IT Behavioral Interview Question Library
      • Workbook
      • Interview Guide Template
      • IT leadership team
      • IT staff members

      Conduct an effective, professional, and organized in-person interview

      Give candidates a warm, genuine greeting. Introduce them to other interviewers present. Offer a drink. Make small talk.

      “There are some real advantages to creating a comfortable climate for the candidate; the obvious respect for the individual, but people really let their guard down.”

      – HR Director, Financial Services

      Give the candidate an overview of the process, length, and what to expect of the interview. Indicate to the candidate that notes will be taken during the interview.

      If shorter than an hour, you probably aren’t probing enough or even asking the right questions. It also looks bad to candidates if the interview is over quickly.

      Start with the first question in the interview guide and make notes directly on the interview guide (written or typed) for each question.

      Take lots of notes! You think you’ll remember what was said, but you won’t. It also adds transparency and helps with documentation.

      Ask the questions in the order presented for interview consistency. Probe and clarify as needed (see next slide).

      Keep control of the interview by curtailing any irrelevant or long-winded responses.

      After all interview questions are complete, ask candidates if there was anything about their qualifications that was missed that they want to highlight.

      Lets you know they understand the job and gives them the feeling they’ve put everything on the table.

      Ask if the candidate has any questions. Respond to the questions asked.

      Answer candidate questions honestly because fit works both ways. Ensure candidates leave with a better sense of the job, expectations, and organizational culture.

      Review the compensation structure for the position and provide a realistic preview of the job and organization.

      Provide each candidate with a fair chance by maintaining a consistent interview process.

      Tell interviewees what happens next in the process, the expected time frame, and how they will be informed of the outcome. Escort them out and thank them for the interview.

      The subsequent slides provide additional detail on these eight steps to conducting an effective interview.

      Avoid these common biases and mistakes

      Common Biases

      Like-me effect: An often-unconscious preference for, and unfairly positive evaluation of, a candidate based on shared interests, personalities, and experiences, etc.

      Status effect: Overrating candidates based on the prestige of previously held positions, titles, or schools attended.

      Recency bias: Placing greater emphasis on interviews held closer to the decision-making date.

      Contrast effect: Rating candidates relative to those who precede or follow them during the interview process, rather than against previously determined data.

      Solution

      Assess candidates by using existing competency-based criteria.

      Common Mistakes

      Negative tone: Starting the interview on a negative or stressful note may derail an otherwise promising candidate.

      Poor interview management: Letting the candidate digress may leave some questions unanswered and reduce the interview value.

      Reliance of first impressions: Basing decisions on first impressions undermines the objectivity of competency-based selection.

      Failure to ask probing questions: Accepting general answers without asking follow-up questions reduces the evidentiary value of the interview.

      Solution

      Follow the structured interview process you designed and practiced.

      Ask the questions in the order presented in the interview guide, and probe and clarify as needed

      Do...

      Don’t…

      Take control of the interview by politely interrupting to clarify points or keep the interviewee on topic.

      Use probing to drill down on responses and ask for clarification. Ask who, what, when, why, and how.

      Be cognizant of confidentiality issues. Ask for a sample of work from a past position.

      Focus on knowledge or information gaps from previous interviews that need to be addressed in the interview.

      Ensure each member of a panel interview speaks in turn and the lead is given due respect to moderate.

      Be mean when probing. Intimidation actually works against you and is stressful for candidates. When you’re friendly, candidates will actually open up more.

      Interrupt or undermine other panel members. Their comments and questions are just as valid as yours are, and treating others unprofessionally gives a bad impression to the candidate.

      Ask illegal questions. Questions about things like religion, disability, and marital and family status are off limits.

      When listening to candidate responses, watch for tone, body language, and red flags

      Do...

      While listening to responses, also watch out for red and yellow flags.

      Listen to how candidates talk about their previous bosses – you want it to be mainly positive. If their discussion of past bosses reflects a strong sense of self-entitlement or a consistent theme of victimization, this could be a theme in their behavior and make them hard to work with.

      Red Flag

      A concern about something that would keep you from hiring the person.

      Yellow Flag

      A concern that needs to be addressed, but wouldn’t keep you from hiring the person.

      Pay attention to body language and tone. They can tell you a lot about candidate motivation and interest.

      Listen to what candidates want to improve. It’s an opportunity to talk about development and advancement opportunities in the organization.

      Not all candidates have red flags, but it is important to keep them in mind to identify potential issues with the candidate before they are hired.

      Don’t…

      Talk too much! You are there to listen. Candidates should do about 80% of the talking so you can adequately evaluate them. Be friendly, but ensure to spend the time allotted assessing, not chatting.

      If you talk too much, you may end up hiring a weak candidate because you didn’t perceive weaknesses or not hire a strong candidate because you didn’t identify strengths.

      What if you think you sense a red or yellow flag?

      Following the interview, immediately discuss the situation with others involved in the recruitment process or those familiar with the position, such as HR, another hiring manager, or a current employee in the role. They can help evaluate if it’s truly a matter of concern.

      Increase hiring success: Give candidates a positive perception of the organization in the interview

      Great candidates want to work at great organizations.

      When the interviewer makes a positive impression on a candidate and provides a positive impression of the organization it carries forward after they are hired.

      In addition, better candidates can be referred over the course of time due to higher quality networking.

      As much as choosing the right candidate is important to you, make sure the right candidate wants to choose you and work for your organization.

      The image contains a screenshot of a graph to demonstrate the percent of successful hires relates strongly to interviewers giving candidates a positive perception of the organization.

      Interview advice seems like common sense, but it’s often not heeded, resulting in poor interviews

      Don’t…

      Believe everything candidates say. Most candidates embellish and exaggerate to find the answers they think you want. Use probing to drill down to specifics and take them off their game.

      Ask gimmicky questions like “what color is your soul?” Responses to these questions won’t give you any information about the job. Candidates don’t like them either!

      Focus too much on the resume. If the candidate is smart, they’ve tailored it to match the job posting, so of course the person sounds perfect for the job. Read it in advance, highlight specific things you want to ask, then ignore it.

      Oversell the job or organization. Obviously you want to give candidates a positive impression, but don’t go overboard because this could lead to unhappy hires who don’t receive what you sold them. Candidates need to evaluate fit just as much as you.

      Get distracted by a candidate’s qualifications and focus only on their ability to do the job. Just because they are qualified does not mean they have the attitude or personality to fit the job or culture.

      Show emotion at any physical handicap. You can’t discriminate based on physical disability, so protect the organization by not drawing attention to it. Even if you don’t say anything, your facial expression may.

      Bring a bad day or excess baggage into the interview, or be abrupt, rushed, or uninterested in the interview. This is rude behavior and will leave a negative impression with candidates, which could impact your chances of hiring them.

      Submit to first impression bias because you’ll spend the rest of the interview trying to validate your first impression, wasting your time and the candidate’s. Remain as objective as possible and stick to the interview guide to stay focused on the task at hand.

      “To the candidate, if you are meeting person #3 and you’re hearing questions that person #1 and #2 asked, the company doesn’t look too hot or organized.” – President, Recruiting Firm

      Practice behavioral interviews

      1. In groups of at least three:
      • Assign one person to act as the manager conducting the interview, a second person to act as the candidate, and a third to observe.
      • The observer will provide feedback to the manager at the end of the role play based on the information you just learned.
      • Observers – please give feedback on the probing questions and body language.
    • Managers, select an interview question from the list your group put together during the previous exercise. Take a few minutes to think about potential probing questions you could follow up with to dig for more information.
    • Candidates, try to act like a real candidate. Please don’t make it super easy on the managers – but don’t make it impossible either!
    • Once the question has been asked and answered:
      • How did it go?
      • Were you able to get the candidate to speak in specifics rather than generalities? What tips do you have for others?
      • What didn’t go so well? Any surprises?
      • What would you do differently next time?
      • If this was a real hiring situation, would the information you got from just that one question help you make a hiring decision for the role?
    • Now switch roles and select a new interview question to use for this round. Repeat until everyone has had a chance to practice.
    • Input Output
      • Interview questions and scorecard
      • Practice interviews
      Materials Participants
      • IT Behavioral Interview Question Library
      • Workbook
      • Hiring Manager
      • Interview Panel Members

      Download the Behavioral Interview Question Library

      Record best practices, effective questions, and candidate insights for future use and current strategy

      Results and insights gained from evaluations need to be recorded and assessed to gain value from them going forward.

      • To optimize evaluation, all feedback should be forwarded to a central point so that the information can be shared with all stakeholders. HR can serve in this role.
      • Peer evaluations should be shared shortly after the interview. Immediate feedback that represents all the positive and negative responses is instructional for interviewers to consider right away.
      • HR can take a proactive approach to sharing information and analyzing and improving the interview process in order to collaborate with hiring departments for better talent management.
      • Collecting information about effective and ineffective interview questions will guide future interview revision and development efforts.

      Evaluations Can Inform Strategic Planning and Professional Development

      Strategic Planning

      • Survey data can be used to inform strategic planning initiatives in recruiting.
      • Use the information to build a case to the executive team for training, public relations initiatives, or better candidate management systems.

      Professional Development

      • Survey data from all evaluations should be used to inform future professional development initiatives.
      • Interview areas where all team members show weaknesses should be training priorities.
      • Individual weaknesses should be integrated into each professional development plan.

      Want to learn more?

      Recruit IT Talent

      • Improve candidate experience to hire top IT talent.

      Recruit and Retain More Women in IT

      • Gender diversity is directly correlated to IT performance.

      Recruit and Retain People of Color in IT

      • Good business, not just good philanthropy.

      Develop a Comprehensive Onboarding Plan

      Drive employee engagement and retention with a robust program that acclimates, guides, and develops new hires.

      Onboarding should pick up where candidate experience leaves off

      Do not confuse onboarding with orientation

      Onboarding ≠ Orientation

      Onboarding is more than just orientation. Orientation is typically a few days of completing paperwork, reading manuals, and learning about the company’s history, strategic goals, and culture. By contrast, onboarding is three to twelve months dedicated to welcoming, acclimating, guiding, and developing new employees – with the ideal duration reflecting the time to productivity for the role.

      A traditional orientation approach provides insufficient focus on the organizational identification, socialization, and job clarity that a new hire requires. This is a missed opportunity to build engagement, drive productivity, and increase organizational commitment. This can result in early disengagement and premature departure.

      Effective onboarding positively impacts the organization and bottom line

      Over the long term, effective onboarding has a positive impact on revenue and decreases costs.

      The benefits of onboarding:

      • Save money and frustration
        • Shorten processing time, reduce administrative costs, and improve compliance.
      • Boost revenue
        • Help new employees become productive faster – also reduce the strain on existing employees who would normally be overseeing them or covering a performance shortfall.
      • Drive engagement and reduce turnover
        • Quickly acclimate new hires to your organization’s environment, culture, and values.
      • Reinforce culture and employer brand
        • Ensure that new hires feel a connection to the organization’s culture.

      Onboarding drives new hire engagement from day one

      The image contains a graph to demonstrate the increase in overall engagement in relation to onboarding.

      When building an onboarding program, retain the core aims: acclimate, guide, and develop

      The image contains a picture of a circle with a smaller circle inside it, and a smaller circle inside that one. The smallest circle is labelled Acclimate, the medium sized circle is labelled Guide, and the biggest circle is labelled Develop.

      Help new hires feel connected to the organization by clearly articulating the mission, vision, values, and what the company does. Help them understand the business model, the industry, and who their competitors are. Help them feel connected to their new team members by providing opportunities for socialization and a support network.

      Help put new hires on the path to high performance by clearly outlining their role in the organization and how their performance will be evaluated.

      Help new hires receive the experience and training they require to become high performers by helping them build needed competencies.

      We recommend a three-to-twelve-month onboarding program, with the performance management aspect of onboarding extending out to meet the standard organizational performance management cycle.

      Info-Tech Insight

      The length of the onboarding program should align with the average time to productivity for the role(s). Consider the complexity of the role, the industry, and the level of the new hire when determining program length.

      For example, call center workers who are selling a straight-forward product may only require a three-month onboarding, while senior leaders may require a year-long program.

      Watch for signs that you aren’t effectively acclimating, guiding, and developing new hires

      Our primary and secondary research identified the following as the most commonly stated reasons why employees leave organizations prematurely. These issues will be addressed throughout the next section.

      Acclimate

      Guide

      Develop

      • Onboarding experience is misaligned from the employer’s brand.
      • Socialization and/or integration into the existing culture is left to the employee.
      • Key role expectations or role usefulness is not clearly communicated.
      • Company strategy is unclear.
      • Opportunities for advancement are unclear.
      • Coaching, counseling, and/or support from co-workers and/or management is lacking.
      • The organization fails to demonstrate that it cares about the new employee’s needs.

      “Onboarding is often seen as an entry-level HR function. It needs to rise in importance because it’s the first impression of the organization and can be much more powerful than we sometimes give it credit for. It should be a culture building and branding program.” – Doris Sims, SPHR, The Succession Consultant, and Author, Creative Onboarding Programs

      Use the onboarding tabs in the workbook to evaluate and redesign the onboarding program

      1. On tab 10, brainstorm challenges that face the organization's current onboarding program. Identify if they fall into the "acclimate," "guide," or "develop" category. Next, record the potential impact of this challenge on the overall effectiveness of the onboarding program.
      2. On tab 11, record each existing onboarding activity. Then, identify if that activity will be kept or if it should be retired. Next, document if the activity fell into the "acclimate," "guide," or "develop" category.
      3. On tab 12, document gaps that currently exist in the onboarding program. Modify the timeline along the side of the tab to ensure it reflects the timeline you have identified.
      4. On tab 13, document the activities that will occur in the new onboarding program. This should be a combination of current activities that you want to retain and new activities that will be added to address the gaps noted on tab 12. For each activity, identify if it will fall in the acclimate, guide, or develop section. Add any additional notes. Before moving on, make sure that there are no categories that have no activities (e.g. no guide activities).
      Input Output
      • Existing onboarding activities
      • Determine new onboarding activities
      • Map out onboarding responsibilities
      Materials Participants
      • Workbook
      • Hiring Managers
      • HR

      Review the administrative aspects of onboarding and determine how to address the challenges

      The image contains tabs, three main large tabs are labelled: Acclimate, Guide, and Develop. There are smaller tabs in between that are in relation to the three main ones.

      Sample challenges

      Potential solutions

      Some paperwork cannot be completed digitally (e.g. I-9 form in the US).

      Where possible, complete forms with digital signatures (e.g. DocuSign). Where not possible, begin the process earlier and mail required forms to employees to sign and return, or scan and email for the employee to print and return.

      Required compliance training material is not available virtually.

      Seek online training options where possible. Determine the most-critical training needs and prioritize the replication of materials in audio/video format (e.g. recorded lecture) and distribute virtually.

      Employees may not have access to their equipment immediately due to shipping or supply issues.

      Delay employee start dates until you can set them up with the proper equipment and access needed to do their job.

      New hires can’t get answers to their questions about benefits information and setup.

      Schedule a meeting with an HR representative or benefits vendor to explain how benefits will work and how to navigate employee self-service or other tools and resources related to their benefits.

      Info-Tech Insight

      One of the biggest challenges for remote new hires is the inability to casually ask questions or have conversations without feeling like they’re interrupting. Until they have a chance to get settled, providing formal opportunities for questions can help address this.

      Review how company information is shared during onboarding and how to address the challenges

      The image contains tabs, three main large tabs are labelled: Acclimate, Guide, and Develop. There are smaller tabs in between that are in relation to the three main ones.

      Sample challenges

      Potential solutions

      Key company information such as organizational history, charts, or the vision, mission, and values cannot be clearly learned by employees on their own.

      Have the new hire’s manager call to walk through the important company information to provide a personal touch and allow the new hire to ask questions and get to know their new manager.

      Keeping new hires up to date on crisis communications is important, but too much information may overwhelm them or cause unnecessary stress.

      Sharing the future of the organization is a critical part of the company information stage of onboarding and the ever-changing nature of the COVID-19 crisis is informing many organizations’ future right now. Be honest but avoid over-sharing plans that may change.

      New hires can’t get answers to their questions about benefits information and setup.

      Schedule a meeting with an HR representative or benefits vendor to explain how benefits will work and how to navigate employee self-service or other tools and resources related to their benefits.

      Review the socialization aspects of onboarding and determine how to address the challenges

      The image contains tabs, three main large tabs are labelled: Acclimate, Guide, and Develop. There are smaller tabs in between that are in relation to the three main ones.

      Sample challenges

      Potential solutions

      Team introductions via a team lunch or welcome event are typically done in person.

      Provide managers with a calendar of typical socialization events in the first few weeks of onboarding and provide instructions and ideas for how to schedule replacement events over videoconferencing.

      New hires may not have a point of contact for informal questions or needs if their peers aren’t around them to help.

      If it doesn’t already exist, create a virtual buddy program and provide instructions for managers to select a buddy from the new hire’s team. Explain that their role is to field informal questions about the company, team, and anything else and that they should book weekly meetings with the new hire to stay in touch.

      New hires will not have an opportunity to learn or become a part of the informal decision-making networks at the organization.

      Hiring managers should consider key network connections that new hires will need by going through their own internal network and asking other team members for recommendations.

      New hires will not be able to casually meet people around the office.

      Provide the employee with a list of key contacts for them to reach out to and book informal virtual coffee chats to introduce themselves.

      Adapt the Guide phase of onboarding to a virtual environment

      The image contains tabs, three main large tabs are labelled: Acclimate, Guide, and Develop. There are smaller tabs in between that are in relation to the three main ones.

      Sample challenges

      Potential solutions

      Performance management (PM) processes have been paused given the current crisis.

      Communicate to managers that new hires still need to be onboarded to the organization’s performance management process and that goals and feedback need to be introduced and the review process outlined even if it’s not currently happening.

      Goals and expectations differ or have been reprioritized during the crisis.

      Ask managers to explain the current situation at the organization and any temporary changes to goals and expectations as a result of new hires.

      Remote workers often require more-frequent feedback than is mandated in current PM processes.

      Revamp PM processes to include daily or bi-weekly touchpoints for managers to provide feedback and coaching for new hires for at least their first six months.

      Managers will not be able to monitor new hire work as effectively as usual.

      Ensure there is a formal approach for how employees will keep their managers updated on what they're working on and how it's going, for example, daily scrums or task-tracking software.

      For more information on adapting performance management to a virtual environment, see Info-Tech’s Performance Management for Emergency Work-From-Home research.

      Take an inventory of training and development in the onboarding process and select critical activities

      The image contains tabs, three main large tabs are labelled: Acclimate, Guide, and Develop. There are smaller tabs in between that are in relation to the three main ones.

      Categorize the different types of formal and informal training in the onboarding process into the following three categories. For departmental and individual training, speak to managers to understand what is required on a department and role basis:

      Organizational

      Departmental

      Individual

      For example:

      • Employee self-service overview
      • Health and safety/compliance training
      • Core competencies

      For example:

      • Software training (e.g. Salesforce)
      • Job shadowing to learn how to work equipment or to learn processes

      For example:

      • Mentoring
      • External courses
      • Support to work toward a certification

      In a crisis, not every training can be translated to a virtual environment in the short term. It’s also important to focus on critical learning activities versus the non-critical. Prioritize the training activities by examining the learning outcomes of each and asking:

      • What organizational training does every employee need to be a productive member of the organization?
      • What departmental or individual training do new hires need to be successful in their role?

      Lower priority or non-critical activities can be used to fill gaps in onboarding schedules or as extra activities to be completed if the new hire finds themselves with unexpected downtime to fill.

      Determine how onboarding training will be delivered virtually

      The image contains tabs, three main large tabs are labelled: Acclimate, Guide, and Develop. There are smaller tabs in between that are in relation to the three main ones.

      Who will facilitate virtual training sessions?

      • For large onboarding cohorts, consider live delivery via web conferencing where possible. This will create a more engaging training program and will allow new hires to interact with and ask questions of the presenter.
      • For individual new hires or small cohorts, have senior leaders or key personnel from across the organization record different trainings that are relevant for their role.
        • For example, training sessions about organizational culture can be delivered by the CEO or other senior leader, while sales training could be delivered by a sales executive.

        If there is a lack of resources, expertise, or time, outsource digital training to a content provider or through your LMS.

      What existing or free tools can be leveraged to immediately support digital training?

      • Laptops and PowerPoint to record training sessions that are typically delivered in-person
      • YouTube/Vimeo to host recorded lecture-format training
      • Company intranet to host links and files needed to complete training
      • Web conferencing software to host live training/orientation sessions (e.g. Webex)
      • LMS to host and track completion of learning content

      Want to learn more?

      Recruit IT Talent

      • Improve candidate experience to hire top IT talent.

      Recruit and Retain More Women in IT

      • Gender diversity is directly correlated to IT performance.

      Recruit and Retain People of Color in IT

      • Good business, not just good philanthropy.

      Adapt Your Onboarding Process to a Virtual Environment

      • Develop short-term solutions with a long-term outlook to quickly bring in new talent.

      Bibliography

      2021 Recruiter Nation Report. Survey Analysis, Jobvite, 2021. Web.

      “5 Global Stats Shaping Recruiting Trends.” The Undercover Recruiter, 2022. Web.

      Barr, Tavis, Raicho Bojilov, and Lalith Munasinghe. "Referrals and Search Efficiency: Who Learns What and When?" The University of Chicago Press, Journal of Labor Economics, vol. 37, no. 4, Oct. 2019. Web.

      “How to grow your team better, faster with an employee referral program.” Betterup, 10 Jan. 2022. Web.

      “Employee Value Proposition: How 25 Companies Define Their EVP.” Built In, 2021. Web.

      Global Leadership Forecast 2021. Survey Report, DDI World, 2021. Web.

      “Connecting Unemployed Youth with Organizations That Need Talent.” Harvard Business Review, 3 November 2016. Web.

      Ku, Daniel. “Social Recruiting: Everything You Need To Know for 2022.” PostBeyond, 26 November 2021. Web.

      Ladders Staff. “Shedding light on the job search.” Ladders, 20 May 2013. Web.

      Merin. “Campus Recruitment – Meaning, Benefits & Challenges.” HR Shelf, 1 February 2022. Web.

      Mobile Recruiting. Smart Recruiters, 2020. Accessed March 2022.

      Roddy, Seamus. “5 Employee Referral Program Strategies to Hire Top Talent.” Clutch, 22 April 2020. Web.

      Sinclair, James. “What The F*dge: That's Your Stranger Recruiting Budget?” LinkedIn, 11 November 2019. Web.

      “Ten Employer Examples of EVPs.” Workology, 2022. Web

      “The Higher Cost of a Bad Hire.” Robert Half, 15 March 2021. Accessed March 2022.

      Trost, Katy. “Hiring with a 90% Success Rate.” Katy Trost, Medium, 8 August 2022. Web.

      “Using Social Media for Talent Acquisition.” SHRM, 20 Sept. 2017. Web.

      Negotiate SaaS Agreements That Are Built to Last

      • Buy Link or Shortcode: {j2store}137|cart{/j2store}
      • member rating overall impact: 9.4/10 Overall Impact
      • member rating average dollars saved: $72,298 Average $ Saved
      • member rating average days saved: 10 Average Days Saved
      • Parent Category Name: Vendor Management
      • Parent Category Link: /vendor-management
      • Internal stakeholders usually have different – and often conflicting – needs and expectations that require careful facilitation and management.
      • SaaS solutions bring forth a unique form of “switching costs” that can make a decision to migrate solutions financially, technically, and politically painful.

      Our Advice

      Critical Insight

      • Conservatively, it’s possible to save 5% of the overall IT budget through comprehensive software and SaaS contract review.
      • Focus on the terms and conditions, not just the price.
      • Learning to negotiate is crucial.

      Impact and Result

      • Take control of your SaaS contract negotiations from the beginning.
      • Look at your contract holistically to find cost savings.
      • Guide communication between vendors and your organization for the duration of contract negotiations.
      • Redline the terms and conditions of your SaaS contract.
      • Prioritize crucial terms and conditions to negotiate.

      Negotiate SaaS Agreements That Are Built to Last Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out how to redline and negotiate a SaaS agreement, review Info-Tech’s methodology, and understand the different ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Gather requirements

      Build and manage the stakeholder team, and then document the business use case.

      • Negotiate SaaS Agreements That Are Built to Last – Phase 1: Gather Requirements
      • RASCI Chart
      • Vendor Communication Management Plan
      • Software Business Use Case Template
      • SaaS TCO Calculator

      2. Redline contract

      Redline the proposed SaaS contract.

      • Negotiate SaaS Agreements That Are Built to Last – Phase 2: Redline Contract
      • SaaS Terms and Conditions Evaluation Tool

      3. Negotiate contract

      Create a thorough negotiation plan.

      • Negotiate SaaS Agreements That Are Built to Last – Phase 3: Negotiate Contract
      • SaaS Contract Negotiation Terms Prioritization Checklist
      • Controlled Vendor Communications Letter
      • Key Vendor Fiscal Year End Calendar
      • Contract Negotiation Tactics Playbook
      [infographic]

      Workshop: Negotiate SaaS Agreements That Are Built to Last

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Collect and Review Data

      The Purpose

      Assemble documentation.

      Key Benefits Achieved

      Understand current position before going forward.

      Activities

      1.1 Assemble existing contracts.

      1.2 Document their strategic and tactical objectives.

      1.3 Identify current status of the vendor relationship and any historical context.

      1.4 Clarify goals for ideal future state.

      Outputs

      Business Use Case.

      2 Define the Business Use Case and Build a Stakeholder Team

      The Purpose

      Define the business use case and build a stakeholder team.

      Key Benefits Achieved

      Create a business use case to document functional and non-functional requirements.

      Build an internal cross-functional stakeholder team to negotiate the contract.

      Activities

      2.1 Establish a negotiation team and define roles.

      2.2 Write a communication plan.

      2.3 Complete a business use case.

      Outputs

      RASCI Matrix

      Communications Plan

      SaaS TCO Calculator

      Business Use Case

      3 Redline the Contract

      The Purpose

      Examine terms and conditions and prioritize for negotiation.

      Key Benefits Achieved

      Discover cost savings.

      Improve agreement terms.

      Prioritize terms for negotiation.

      Activities

      3.1 Review general terms and conditions.

      3.2 Review license and application specific terms and conditions.

      3.3 Match to business and technical requirements.

      3.4 Redline the agreement.

      Outputs

      SaaS Terms and Conditions Evaluation Tool

      SaaS Contract Negotiation Terms Prioritization Checklist

      4 Build a Negotiation Strategy

      The Purpose

      Create a negotiation strategy.

      Key Benefits Achieved

      Controlled communication established.

      Negotiation tactics chosen.

      Negotiation timeline plotted.

      Activities

      4.1 Review vendor and application specific negotiation tactics.

      4.2 Build negotiation strategy.

      Outputs

      Contract Negotiation Tactics Playbook

      Controlled Vendor Communications Letter

      Key Vendor Fiscal Year End Calendar

      Establish an Effective Data Protection Plan

      • Buy Link or Shortcode: {j2store}504|cart{/j2store}
      • member rating overall impact: 9.0/10 Overall Impact
      • member rating average dollars saved: $6,850 Average $ Saved
      • member rating average days saved: 9 Average Days Saved
      • Parent Category Name: Storage & Backup Optimization
      • Parent Category Link: /storage-and-backup-optimization
      • Business requirements can be vague. Not knowing the business needs often results in overspending and overexposure to liability through data hoarding.
      • Backup options are abundant. Disk, tape, or cloud? Each has drawbacks, efficiencies, and cost factors that should be considered.
      • Backup infrastructure is never greenfield. Any organization with a history has been doing backup. Existing software was likely determined by past choices and architecture.

      Our Advice

      Critical Insight

      • Don’t let failure be your metric.
        The past is not an indication of future performance! Quantify the cost of your data being unavailable to demonstrate value to the business.
      • Stop offloading backup to your most junior staff.
        Data protection should not exist in isolation. Get key leadership involved to ensure you can meet organizational requirements.
      • A lot of data is useless. Neglecting to properly tag and classify data will lead to a costly data protection solution that protects redundant, useless, or outdated data

      Impact and Result

      • Determine the current state of your data protection strategy by identifying the pains and gains of the solution and create a business-facing diagram to present to relevant stakeholders.
      • Quantify the value of data to the business to properly understand the requirements for data protection through a business impact analysis.
      • Identify the attributes and necessary requirements for your data tiers to procure a fit-for-purpose solution.

      Establish an Effective Data Protection Plan Research & Tools

      Start here – read the Executive Brief

      Read this Executive Brief to understand why the business should be involved in your data protection plan, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Define the current state of your data protection plan

      Define the current state of your data protection practices by documenting the backup process and identifying problems and opportunities for the desired state.

      • Establish an Effective Data Protection Plan – Phase 1: Define the Current State of Your Data Protection Plan
      • Data Protection Value Proposition Canvas Template

      2. Conduct a business impact analysis to understand requirements for restoring data

      Understand the business priorities.

      • Establish an Effective Data Protection Plan – Phase 2: Conduct a Business Impact Analysis to Understand Requirements for Restoring Data
      • DRP Business Impact Analysis Tool
      • Legacy DRP Business Impact Analysis Tool
      • Data Protection Recovery Workflow

      3. Propose the future state of your data protection plan

      Determine the desired state.

      • Establish an Effective Data Protection Plan – Phase 3: Propose the Future State of Your Data Protection Plan

      4. Establish proper governance for your data protection plan

      Explore the component of governance required.

      • Establish an Effective Data Protection Plan – Phase 4: Establish Proper Governance for Your Data Protection Plan
      • Data Protection Proposal Template
      [infographic]

      Domino – Maintain, Commit to, or Vacate?

      If you have a Domino/Notes footprint that is embedded within your business units and business processes and is taxing your support organization, you may have met resistance from the business and been asked to help the organization migrate away from the Lotus Notes platform. The Lotus Notes platform was long used by technology and businesses and a multipurpose solution that, over the years, became embedded within core business applications and processes.

      Our Advice

      Critical Insight

      For organizations that are struggling to understand their options for the Domino platform, the depth of business process usage is typically the biggest operational obstacle. Migrating off the Domino platform is a difficult option for most organizations due to business process and application complexity. In addition, migrating clients have to resolve the challenges with more than one replaceable solution.

      Impact and Result

      The most common tactic is for the organization to better understand their Domino migration options and adopt an application rationalization strategy for the Domino applications entrenched within the business. Options include retiring, replatforming, migrating, or staying with your Domino platform.

      Domino – Maintain, Commit to, or Vacate? Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Domino – Maintain, Commit to, or Vacate? – A brief deck that outlines key migration options for HCL Domino platforms.

      This blueprint will help you assess the fit, purpose, and price of Domino options; develop strategies for overcoming potential challenges; and determine the future of Domino for your organization.

      • Domino – Maintain, Commit to, or Vacate? Storyboard

      2. Application Rationalization Tool – A tool to understand your business-developed applications, their importance to business process, and the potential underlying financial impact.

      Use this tool to input the outcomes of your various application assessments.

      • Application Rationalization Tool

      Infographic

      Further reading

      Domino – Maintain, Commit to, or Vacate?

      Lotus Domino still lives, and you have options for migrating away from or remaining with the platform.

      Executive Summary

      Info-Tech Insight

      “HCL announced that they have somewhere in the region of 15,000 Domino customers worldwide, and also claimed that that number is growing. They also said that 42% of their customers are already on v11 of Domino, and that in the year or so since that version was released, it’s been downloaded 78,000 times. All of which suggests that the Domino platform is, in fact, alive and well.”
      – Nigel Cheshire in Team Studio

      Your Challenge

      You have a Domino/Notes footprint embedded within your business units and business processes. This is taxing your support organization; you are meeting resistance from the business, and you are now asked to help the organization migrate away from the Lotus Notes platform. The Lotus Notes platform was long used by technology and businesses as a multipurpose solution that, over the years, became embedded within core business applications and processes.

      Common Obstacles

      For organizations that are struggling to understand their options for the Domino platform, the depth of business process usage is typically the biggest operational obstacle. Migrating off the Domino platform is a difficult option for most organizations due to business process and application complexity. In addition, migrating clients have to resolve the challenges with more than one replaceable solution.

      Info-Tech Approach

      The most common tactic is for the organization to better understand their Domino migration options and adopt an application rationalization strategy for the Domino applications entrenched within the business. Options include retiring, replatforming, migrating, or staying with your Domino platform.

      Review

      Is “Lotus” Domino still alive?

      Problem statement

      The number of member engagements with customers regarding the Domino platform has, as you might imagine, dwindled in the past couple of years. While many members have exited the platform, there are still many members and organizations that have entered a long exit program, but with how embedded Domino is in business processes, the migration has slowed and been met with resistance. Some organizations had replatformed the applications but found that the replacement target state was inadequate and introduced friction because the new solution was not a low-code/business-user-driven environment. This resulted in returning the Domino platform to production and working through a strategy to maintain the environment.

      This research is designed for:

      • IT strategic direction decision-makers
      • IT managers responsible for an existing Domino platform
      • Organizations evaluating migration options for mission-critical applications running on Domino

      This research will help you:

      1. Evaluate migration options.
      2. Assess the fit and purpose.
      3. Consider strategies for overcoming potential challenges.
      4. Determine the future of this platform for your organization.

      The “everything may work” scenario

      Adopt and expand

      Believe it or not, Domino and Notes are still options to consider when determining a migration strategy. With HCL still committed to the platform, there are options organizations should seek to better understand rather than assuming SharePoint will solve all. In our research, we consider:

      Importance to current business processes

      • Importance of use
      • Complexity in migrations
      • Choosing a new platform

      Available tools to facilitate

      • Talent/access to skills
      • Economies of scale/lower cost at scale
      • Access to technology

      Info-Tech Insight

      With multiple options to consider, take the time to clearly understand the application rationalization process within your decision making.

      • Archive/retire
      • Application migration
      • Application replatform
      • Stay right where you are

      Eliminate your bias – consider the advantages

      “There is a lot of bias toward Domino; decisions are being made by individuals who know very little about Domino and more importantly, they do not know how it impacts business environment.”

      – Rob Salerno, Founder & CTO, Rivet Technology Partners

      Domino advantages include:

      Modern Cloud & Application

      • No-code/low-code technology

      Business-Managed Application

      • Business written and supported
      • Embrace the business support model
      • Enterprise class application

      Leverage the Application Taxonomy & Build

      • A rapid application development platform
      • Develop skill with HCL training

      HCL Domino is a supported and developed platform

      Why consider HCL?

      • Consider scheduling a Roadmap Session with HCL. This is an opportunity to leverage any value in the mission and brand of your organization to gain insights or support from HCL.
      • Existing Domino customers are not the only entities seeking certainty with the platform. Software solution providers that support enterprise IT infrastructure ecosystems (backup, for example) will also be seeking clarity for the future of the platform. HCL will be managing these relationships through the channel/partner management programs, but our observations indicate that Domino integrations are scarce.
      • HCL Domino should be well positioned feature-wise to support low-code/NoSQL demands for enterprises and citizen developers.

      Visualize Your Application Roadmap

      1. Focus on the application portfolio and crafting a roadmap for rationalization.
        • The process is intended to help you determine each application’s functional and technical adequacy for the business process that it supports.
      2. Document your findings on respective application capability heatmaps.
        • This drives your organization to a determination of application dispositions and provides a tool to output various dispositions for you as a roadmap.
      3. Sort the application portfolio into a disposition status (keep, replatform, retire, consolidate, etc.)
        • This information will be an input into any cloud migration or modernization as well as consolidation of the infrastructure, licenses, and support for them.

      Our external support perspective

      by Darin Stahl

      Member Feedback

      • Some members who have remaining Domino applications in production – while the retire, replatform, consolidate, or stay strategy is playing out – have concerns about the challenges with ongoing support and resources required for the platform. In those cases, some have engaged external services providers to augment staff or take over as managed services.
      • While there could be existing support resources (in house or on retainer), the member might consider approaching an external provider who could help backstop the single resource or even provide some help with the exit strategies. At this point, the conversation would be helpful in any case. One of our members engaged an external provider in a Statement of Work for IBM Domino Administration focused on one-time events, Tier 1/Tier 2 support, and custom ad hoc requests.
      • The augmentation with the managed services enabled the member to shift key internal resources to a focus on executing the exit strategies (replatform, retire, consolidate), since the business knowledge was key to that success.
      • The member also very aggressively governed the Domino environment support needs to truly technical issues/maintenance of known and supported functionality rather than coding new features (and increasing risk and cost in a migration down the road) – in short, freezing new features and functionality unless required for legal compliance or health and safety.
      • There obviously are other providers, but at this point Info-Tech no longer maintains a market view or scan of those related to Domino due to low member demand.

      Domino database assessments

      Consider the database.

      • Domino database assessments should be informed through the lens of a multi-value database, like jBase, or an object system.
      • The assessment of the databases, often led by relational database subject matter experts grounded in normalized databases, can be a struggle since Notes databases must be denormalized.
      Key/Value Column

      Use case: Heavily accessed, rarely updated, large amounts of data
      Data Model: Values are stored in a hash table of keys.
      Fast access to small data values, but querying is slow
      Processor friendly
      Based on amazon's Dynamo paper
      Example: Project Voldemort used by LinkedIn

      this is a Key/Value example

      Use case: High availability, multiple data centers
      Data Model: Storage blocks of data are contained in columns
      Handles size well
      Based on Google's BigTable
      Example: Hadoop/Hbase used by Facebook and Yahoo

      This is a Column Example
      Document Graph

      Use case: Rapid development, Web and programmer friendly
      Data Model: Stores documents made up of tagged elements. Uses Key/Value collections
      Better query abilities than Key/Value databases.
      Inspired by Lotus Notes.
      Example: CouchDB used by BBC

      This is a Document Example

      Use case: Best at dealing with complexity and relationships/networks
      Data model: Nodes and relationships.
      Data is processed quickly
      Inspired by Euler and graph theory
      Can easily evolve schemas
      Example: Neo4j

      This is a Graph Example

      Understand your options

      Archive/Retire

      Store the application data in a long-term repository with the means to locate and read it for regulatory and compliance purposes.

      Migrate

      Migrate to a new version of the application, facilitating the process of moving software applications from one computing environment to another.

      Replatform

      Replatforming is an option for transitioning an existing Domino application to a new modern platform (i.e. cloud) to leverage the benefits of a modern deployment model.

      Stay

      Review the current Domino platform roadmap and understand HCL’s support model. Keep the application within the Domino platform.

      Archive/retire

      Retire the application, storing the application data in a long-term repository.

      Abstract

      The most common approach is to build the required functionality in whatever new application/solution is selected, then archive the old data in PDFs and documents.

      Typically this involves archiving the data and leveraging Microsoft SharePoint and the new collaborative solutions, likely in conjunction with other software-as-a-service (SaaS) solutions.

      Advantages

      • Reduce support cost.
      • Consolidate applications.
      • Reduce risk.
      • Reduce compliance and security concerns.
      • Improve business processes.

      Considerations

      • Application transformation
      • eDiscovery costs
      • Legal implications
      • Compliance implications
      • Business process dependencies

      Info-Tech Insights

      Be aware of the costs associated with archiving. The more you archive, the more it will cost you.

      Application migration

      Migrate to a new version of the application

      Abstract

      An application migration is the managed process of migrating or moving applications (software) from one infrastructure environment to another.

      This can include migrating applications from one data center to another data center, from a data center to a cloud provider, or from a company’s on-premises system to a cloud provider’s infrastructure.

      Advantages

      • Reduce hardware costs.
      • Leverage cloud technologies.
      • Improve scalability.
      • Improve disaster recovery.
      • Improve application security.

      Considerations

      • Data extraction, starting from the document databases in NSF format and including security settings about users and groups granted to read and write single documents, which is a powerful feature of Lotus Domino documents.
      • File extraction, starting from the document databases in NSF format, which can contain attachments and RTF documents and embedded files.
      • Design of the final relational database structure; this activity should be carried out without taking into account the original structure of the data in Domino files or the data conversion and loading, from the extracted format to the final model.
      • Design and development of the target-state custom applications based on the new data model and the new selected development platform.

      Application replatform

      Transition an existing Domino application to a new modern platform

      Abstract

      This type of arrangement is typically part of an application migration or transformation. In this model, client can “replatform” the application into an off-premises hosted provider platform. This would yield many benefits of cloud but in a different scaling capacity as experienced with commodity workloads (e.g. Windows, Linux) and the associated application.

      Two challenges are particularly significant when migrating or replatforming Domino applications:

      • The application functionality/value must be reproduced/replaced with not one but many applications, either through custom coding or a commercial-off-the-shelf/SaaS solution.
      • Notes “databases” are not relational databases and will not migrate simply to an SQL database while retaining the same business value. Notes databases are essentially NoSQL repositories and are difficult to normalize.

      Advantages

      • Leverage cloud technologies.
      • Improve scalability.
      • Align to a SharePoint platform.
      • Improve disaster recovery.
      • Improve application security.

      Considerations

      • Application replatform resource effort
      • Network bandwidth
      • New platform terms and conditions
      • Secure connectivity and communication
      • New platform security and compliance
      • Degree of complexity

      Info-Tech Insights

      There is a difference between a migration and a replatform application strategy. Determine which solution aligns to the application requirements.

      Stay with HCL

      Stay with HCL, understanding its future commitment to the platform.

      Abstract

      Following the announced acquisition of IBM Domino and up until around December 2019, HCL had published no future roadmap for the platform. The public-facing information/website at the time stated that HCL acquired “the product family and key lab services to deliver professional services.” Again, there was no mention or emphasis on upcoming new features for the platform. The product offering on their website at the time stated that HCL would leverage its services expertise to advise clients and push applications into four buckets:

      1. Replatform
      2. Retire
      3. Move to cloud
      4. Modernize

      That public-facing messaging changed with release 11.0, which had references to IBM rebranded to HCL for the Notes and Domino product – along with fixes already inflight. More information can be found on HCL’s FAQ page.

      Advantages

      • Known environment
      • Domino is a supported platform
      • Domino is a developed platform
      • No-code/low-code optimization
      • Business developed applications
      • Rapid application framework

      This is the HCL Domino Logo

      Understand your tools

      Many tools are available to help evaluate or migrate your Domino Platform. Here are a few common tools for you to consider.

      Notes Archiving & Notes to SharePoint

      Summary of Vendor

      “SWING Software delivers content transformation and archiving software to over 1,000 organizations worldwide. Our solutions uniquely combine key collaborative platforms and standard document formats, making document production, publishing, and archiving processes more efficient.”*

      Tools

      Lotus Notes Data Migration and Archiving: Preserve historical data outside of Notes and Domino

      Lotus Note Migration: Replacing Lotus Notes. Boost your migration by detaching historical data from Lotus Notes and Domino.

      Headquarters

      Croatia

      Best fit

      • Application archive and retire
      • Migration to SharePoint

      This is an image of the SwingSoftware Logo

      * swingsoftware.com

      Domino Migration to SharePoint

      Summary of Vendor

      “Providing leading solutions, resources, and expertise to help your organization transform its collaborative environment.”*

      Tools

      Notes Domino Migration Solutions: Rivit’s industry-leading solutions and hardened migration practice will help you eliminate Notes Domino once and for all.

      Rivive Me: Migrate Notes Domino applications to an enterprise web application

      Headquarters

      Canada

      Best fit

      • Application Archive & Retire
      • Migration to SharePoint

      This is an image of the RiVit Logo

      * rivit.ca

      Lotus Notes to M365

      Summary of Vendor

      “More than 300 organizations across 40+ countries trust skybow to build no-code/no-compromise business applications & processes, and skybow’s community of customers, partners, and experts grows every day.”*

      Tools

      SkyBow Studio: The low-code platform fully integrated into Microsoft 365

      Headquarters:

      Switzerland

      Best fit

      • Application Archive & Retire
      • Migration to SharePoint

      This is an image of the SkyBow Logo

      * skybow.com | About skybow

      Notes to SharePoint Migration

      Summary of Vendor

      “CIMtrek is a global software company headquartered in the UK. Our mission is to develop user-friendly, cost-effective technology solutions and services to help companies modernize their HCL Domino/Notes® application landscape and support their legacy COBOL applications.”*

      Tools

      CIMtrek SharePoint Migrator: Reduce the time and cost of migrating your IBM® Lotus Notes® applications to Office 365, SharePoint online, and SharePoint on premises.

      Headquarters

      United Kingdom

      Best fit

      • Application replatform
      • Migration to SharePoint

      This is an image of the CIMtrek Logo

      * cimtrek.com | About CIMtrek

      Domino replatform/Rapid application selection framework

      Summary of Vendor

      “4WS.Platform is a rapid application development tool used to quickly create multi-channel applications including web and mobile applications.”*

      Tools

      4WS.Platform is available in two editions: Community and Enterprise.
      The Platform Enterprise Edition, allows access with an optional support pack.

      4WS.Platform’s technical support provides support services to the users through support contracts and agreements.

      The platform is a subscription support services for companies using the product which will allow customers to benefit from the knowledge of 4WS.Platform’s technical experts.

      Headquarters

      Italy

      Best fit

      • Application replatform

      This is an image of the 4WS PLATFORM Logo

      * 4wsplatform.org

      Activity

      Understand your Domino options

      Application Rationalization Exercise

      Info-Tech Insight

      Application rationalization is the perfect exercise to fully understand your business-developed applications, their importance to business process, and the potential underlying financial impact.

      This activity involves the following participants:

      • IT strategic direction decision-makers.
      • IT managers responsible for an existing Domino platform
      • Organizations evaluating platforms for mission-critical applications.

      Outcomes of this step:

      • Completed Application Rationalization Tool

      Application rationalization exercise

      Use this Application Rationalization Tool to input the outcomes of your various application assessments

      In the Application Entry tab:

      • Input your application inventory or subset of apps you intend to rationalize, along with some basic information for your apps.

      In the Business Value & TCO Comparison tab, determine rationalization priorities.

      • Input your business value scores and total cost of ownership (TCO) of applications.
      • Review the results of this analysis to determine which apps should require additional analysis and which dispositions should be prioritized.

      In the Disposition Selection tab:

      • Add to or adapt our list of dispositions as appropriate.

      In the Rationalization Inputs tab:

      • Add or adapt the disposition criteria of your application rationalization framework as appropriate.
      • Input the results of your various assessments for each application.

      In the Disposition Settings tab:

      • Add or adapt settings that generate recommended dispositions based on your rationalization inputs.

      In the Disposition Recommendations tab:

      • Review and compare the rationalization results and confirm if dispositions are appropriate for your strategy.

      In the Timeline Considerations tab:

      • Enter the estimated timeline for when you execute your dispositions.

      In the Portfolio Roadmap tab:

      • Review and present your roadmap and rationalization results.

      Follow the instructions to generate recommended dispositions and populate an application portfolio roadmap.

      This image depicts a scatter plot graph where the X axis is labeled Business Value, and the Y Axis is labeled Cost. On the graph, the following datapoints are displayed: SF; HRIS; ERP; ALM; B; A; C; ODP; SAS

      Info-Tech Insight

      Watch out for misleading scores that result from poorly designed criteria weightings.

      Related Info-Tech Research

      Build an Application Rationalization Framework

      Manage your application portfolio to minimize risk and maximize value.

      Embrace Business-Managed Applications

      Empower the business to implement their own applications with a trusted business-IT relationship.

      Satisfy Digital End Users With Low- and No-Code

      Extend IT, automation, and digital capabilities to the business with the right tools, good governance, and trusted organizational relationships.

      Maximize the Benefits from Enterprise Applications with a Center of Excellence

      Optimize your organization’s enterprise application capabilities with a refined and scalable methodology.

      Drive Successful Sourcing Outcomes With a Robust RFP Process

      Leverage your vendor sourcing process to get better results.

      Research Authors

      Darin Stahl, Principal Research Advisor, Info-Tech Research Group

      Darin Stahl, Principal Research Advisor,
      Info-Tech Research Group

      Darin is a Principal Research Advisor within the Infrastructure practice, leveraging 38+ years of experience. His areas of focus include IT operations management, service desk, infrastructure outsourcing, managed services, cloud infrastructure, DRP/BCP, printer management, managed print services, application performance monitoring, managed FTP, and non-commodity servers (zSeries, mainframe, IBM i, AIX, Power PC).

      Troy Cheeseman, Practice Lead, Info-Tech Research Group

      Troy Cheeseman, Practice Lead,
      Info-Tech Research Group

      Troy has over 24 years of experience and has championed large enterprise-wide technology transformation programs, remote/home office collaboration and remote work strategies, BCP, IT DRP, IT operations and expense management programs, international right placement initiatives, and large technology transformation initiatives (M&A). Additionally, he has deep experience working with IT solution providers and technology (cloud) startups.

      Research Contributors

      Rob Salerno, Founder & CTO, Rivit Technology Partners

      Rob Salerno, Founder & CTO, Rivit Technology Partners

      Rob is the Founder and Chief Technology Strategist for Rivit Technology Partners. Rivit is a system integrator that delivers unique IT solutions. Rivit is known for its REVIVE migration strategy which helps companies leave legacy platforms (such as Domino) or move between versions of software. Rivit is the developer of the DCOM Application Archiving solution.

      Bibliography

      Cheshire, Nigel. “Domino v12 Launch Keeps HCL Product Strategy On Track.” Team Studio, 19 July 2021. Web.

      “Is LowCode/NoCode the best platform for you?” Rivit Technology Partners, 15 July 2021. Web.

      McCracken, Harry. “Lotus: Farewell to a Once-Great Tech Brand.” TIME, 20 Nov. 2012. Web.

      Sharwood, Simon. “Lotus Notes refuses to die, again, as HCL debuts Domino 12.” The Register, 8 June 2021. Web.

      Woodie, Alex. “Domino 12 Comes to IBM i.” IT Jungle, 16 Aug. 2021. Web.

      Implement and Mature Your User Experience Design Practice

      • Buy Link or Shortcode: {j2store}430|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Requirements & Design
      • Parent Category Link: /requirements-and-design

      Many organizations want to get to market quickly and on budget but don’t know the steps to get the right product/service to satisfy the users and business. This may be made apparent through uninformed decisions leading to lack of adoption of your product or service, rework due to post-implementation user feedback, or the competition discovering new approaches that outshine yours.

      Our Advice

      Critical Insight

      Ensure your practice has a clear understanding of the design problem space – not just the solution. An understanding of the user is critical to this.

      Impact and Result

      • Create a practice that is focused on human outcomes; it starts and ends with the people you are designing for. This includes:
        • Establishing a practice with a common vision.
        • Enhancing the practice through four design factors.
        • Communicating a roadmap to improve your business through design.
      • Create a practice that develops solutions specific to the needs of users, customers, and stakeholders.

      Implement and Mature Your User Experience Design Practice Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you should implement an experience design practice, review Info-Tech’s methodology, and understand the four dimensions we recommend using to mature your practice.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Build the foundation

      Motivate your team with a common vision, mission, and goals.

      • Design Roadmap Workbook
      • User Experience Practice Roadmap

      2. Review the design dimensions

      Examine your practice – from the perspectives of organizational alignment, business outcomes, design perspective, and design integration – to determine what it takes to improve your maturity.

      3. Build your roadmap and communications

      Bring it all together – determine your team structure, the roadmap for the practice maturity, and communication plan.

      [infographic]

      Workshop: Implement and Mature Your User Experience Design Practice

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Answer “So What?”

      The Purpose

      Make the case for UX. Bring the team together with a common mission, vision, and goals.

      Key Benefits Achieved

      Mission, vision, and goals for design

      Activities

      1.1 Define design practice goals.

      1.2 Generate the vision statement.

      1.3 Develop the mission statement.

      Outputs

      Design vision statement

      Design mission statement

      Design goals

      2 Examine Design Dimensions

      The Purpose

      Review the dimensions that help organizations to mature, and assess what next steps make sense for your organization.

      Key Benefits Achieved

      Develop initiatives that are right-sized for your organization.

      Activities

      2.1 Examine organizational alignment.

      2.2 Establish priorities for initiatives.

      2.3 Identify business value sources.

      2.4 Identify design perspective.

      2.5 Brainstorm design integration.

      2.6 Complete UCD-Canvas.

      Outputs

      Documented initiatives for design maturity

      Design canvas framework

      3 Create Structure and Initiatives

      The Purpose

      Make your design practice structure right for you.

      Key Benefits Achieved

      Examine patterns and roles for your organization.

      Activities

      3.1 Structure your design practice.

      Outputs

      Design practice structure with patterns

      4 Roadmap and Communications

      The Purpose

      Define the communications objectives and audience for your roadmap.

      Develop your communication plan.

      Sponsor check-in.

      Key Benefits Achieved

      Complete in-progress deliverables from previous four days.

      Set up review time for workshop deliverables and to discuss next steps.

      Activities

      4.1 Define the communications objectives and audience for your roadmap.

      4.2 Develop your communication plan.

      Outputs

      Communication Plan and Roadmap

      Business Value

      • Buy Link or Shortcode: {j2store}7|cart{/j2store}
      • Related Products: {j2store}7|crosssells{/j2store}
      • Up-Sell: {j2store}7|upsells{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Financial Management
      • Parent Category Link: /financial-management
      Maximize your ROI on IT through benefits realization

      Staff the Service Desk to Meet Demand

      • Buy Link or Shortcode: {j2store}490|cart{/j2store}
      • member rating overall impact: 10.0/10 Overall Impact
      • member rating average dollars saved: $1,900 Average $ Saved
      • member rating average days saved: 2 Average Days Saved
      • Parent Category Name: Service Desk
      • Parent Category Link: /service-desk
      • With increasing complexity of support and demand on service desks, staff are often left feeling overwhelmed and struggling to keep up with ticket volume, resulting in long resolution times and frustrated end users.
      • However, it’s not as simple as hiring more staff to keep up with ticket volume. IT managers must have the data to support their case for increasing resources or even maintaining their current resources in an environment where many executives are looking to reduce headcount.
      • Without changing resources to match demand, IT managers will need to determine how to maximize the use of their resources to deliver better service.

      Our Advice

      Critical Insight

      • IT managers are stuck with the difficult task of determining the right number of service desk resources to meet demand to executives who perceive the service desk to be already effective.
      • Service desk managers often don’t have accurate historical data and metrics to justify their headcount, or don’t know where to start to find the data they need.
      • They often then fall prey to the common misperception that there is an industry standard ratio of the ideal number of service desk analysts to users. IT leaders who rely on staffing ratios or industry benchmarks fail to take into account the complexity of their own organization and may make inaccurate resourcing decisions.

      Impact and Result

      • There’s no magic, one-size-fits-all ratio to tell you how many service desk staff you need based on your user base alone. There are many factors that come into play, including the complexity of your environment, user profiles, ticket volume and trends, and maturity and efficiency of your processes.
      • If you don’t have historical data to help inform resourcing needs, start tracking ticket volume trends now so that you can forecast future needs.
      • If your data suggests you don’t need more staff, look to other ways to maximize your time and resources to deliver more efficient service.

      Staff the Service Desk to Meet Demand Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you should optimize service desk staffing, review Info-Tech’s methodology, and understand the ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Determine environment and operating model

      Define your business and IT environment, service desk operating model, and existing challenges to inform objectives.

      • Service Desk Staffing Stakeholder Presentation

      2. Determine staffing needs

      Understand why service desk staffing estimates should be based on your unique workload, then complete the Staffing Calculator to estimate your needs.

      • Service Desk Staffing Calculator

      3. Interpret data to plan approach

      Review workload over time to analyze trends and better inform your overall resourcing needs, then plan your next steps to optimize staffing.

      [infographic]

      Design Your Cloud Operations

      • Buy Link or Shortcode: {j2store}462|cart{/j2store}
      • member rating overall impact: 10.0/10 Overall Impact
      • member rating average dollars saved: 20 Average Days Saved
      • member rating average days saved: After each Info-Tech experience, we ask our members to quantify the real-time savings, monetary impact, and project improvements our research helped them achieve.
      • Parent Category Name: Operations Management
      • Parent Category Link: /i-and-o-process-management
      • Traditional IT capabilities, activities, organizational structures, and culture need to adjust to leverage the value of cloud, optimize spend, and manage risk.
      • Different stakeholders across previously separate teams rely on one another more than ever, but rules of engagement do not yet exist.

      Our Advice

      Critical Insight

      Define your target cloud operations state first, then plan how to get there. If you begin by trying to reconstruct on-prem operations in the cloud, you will build an operations model that is the worst of both worlds.

      Impact and Result

      • Assess your key workflows’ maturity for life in the cloud and evaluate your readiness and need for new ways of working
      • Identify the work that must be done to deliver value in cloud services
      • Design your cloud operations framework and communicate it clearly and succinctly to secure buy-in

      Design Your Cloud Operations Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Design Your Cloud Operations Deck – A step-by-step storyboard to help guide you through the activities and tools in this project.

      This storyboard will help you assess your cloud maturity, understand relevant ways of working, and create a meaningful design of your cloud operations that helps align team members and stakeholders.

      • Design Your Cloud Operations – Storyboard
      • Cloud Operations Design Sketchbook
      • Roadmap Tool

      2. Planning and design tools.

      Use these templates and tools to assess your current state, design the cloud operations organizing framework, and create a roadmap.

      • Cloud Maturity Assessment

      3. Communication tools.

      Use these templates and tools to plan how you will communicate changes to key stakeholders and communicate the new cloud operations organizing framework in an executive presentation.

      • Cloud Operations Communication Plan
      • Cloud Operations Organizing Framework: Executive Brief

      Infographic

      Workshop: Design Your Cloud Operations

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Day 1

      The Purpose

      Establish Context

      Key Benefits Achieved

      Alignment on target state

      Activities

      1.1 Assess current cloud maturity and areas in need of improvement

      1.2 Identify the drivers for organizational redesign

      1.3 Review cloud objectives and obstacles

      1.4 Develop organization design principles

      Outputs

      Cloud maturity assessment

      Project drivers

      Cloud challenges and objectives

      Organization design principles

      2 Day 2

      The Purpose

      Establish Context

      Key Benefits Achieved

      Understanding of cloud workstreams

      Activities

      2.1 Evaluate new ways of working

      2.2 Develop a workstream target statement

      2.3 Identify cloud work

      Outputs

      Workstream target statement

      Cloud operations workflow diagrams

      3 Day 3

      The Purpose

      Design the Organization

      Key Benefits Achieved

      Visualization of the cloud operations future state

      Activities

      3.1 Design a future-state cloud operations diagram

      3.2 Create a current-state cloud operations diagram

      3.3 Define success indicators

      Outputs

      Future-state cloud operations diagram

      Current-state cloud operations diagram

      Success indicators

      4 Day 4

      The Purpose

      Communicate the Changes

      Key Benefits Achieved

      Alignment and buy-in from stakeholders

      Activities

      4.1 Create a roadmap

      4.2 Create a communication plan

      Outputs

      Roadmap

      Communication plan

      Further reading

      It’s “day two” in the cloud. Now what?

      EXECUTIVE BRIEF

      Analysts’ Perspective

      The image contains a picture of Andrew Sharp.

      Andrew Sharp

      Research Director

      Infrastructure & Operations Practice

      It’s “day two” in the cloud. Now what?

      Just because you’re in the cloud doesn’t mean everyone is on the same page about how cloud operations work – or should work.

      You have an opportunity to implement new ways of working. But if people can’t see the bigger picture – the organizing framework of your cloud operations – it will be harder to get buy-in to realize value from your cloud services.

      Use Info-Tech’s methodology to build out and visualize a cloud operations organizing framework that defines cloud work and aligns it to the right areas.

      The image contains a picture of Nabeel Sherif.

      Nabeel Sherif

      Principal Research Director

      Infrastructure & Operations Practice

      The image contains a picture of Emily Sugerman.

      Emily Sugerman

      Research Analyst

      Infrastructure & Operations Practice

      Scott Young

      Principal Research Director

      Infrastructure & Operations Practice

      Executive Summary

      Your Challenge

      Common Obstacles

      Info-Tech’s Approach

      Widespread cloud adoption has created new opportunities and challenges:

      • Traditional IT capabilities, activities, organizational structures, and culture need to adjust to leverage the value of cloud, optimize spend, and manage risk.
      • Different stakeholders across previously separate teams rely on one another more than ever, but rules of engagement do not yet exist, leading to a lack of direction, employee frustration, missed work, inefficiency, and unacceptable risk.
      • Many organizations have bought their way into a SaaS portfolio. Now, as key applications leave their network, I&O leaders still have accountability for these apps, but little visibility and control over them.
      • Few organizations are, or will ever be, cloud only. Your operations will be both on-prem and in-cloud for the foreseeable future and you must be able to accommodate both.
      • Traditional infrastructure siloes no longer work for cloud operations, but key stakeholders are wary of significant change.

      Clearly communicate the need for operations changes:

      • Identify current challenges with cloud operations. Assess your readiness and fit for new ways of working involved in cloud operations: DevOps, SRE, Platform Engineering, and more.
      • Use Info-Tech’s templates to design a cloud operations organizing framework. Define cloud work, and align work to the right work areas.
      • Communicate the design. Gain buy-in from your key stakeholders for the considerable organizational change management required to achieve durable change.

      Info-Tech Insight

      Define your target cloud operations state first, then plan how to get there. If you begin by trying to reconstruct on-prem operations in the cloud, you will build an operations model that is the worst of both worlds.

      Your Challenge

      Traditional IT capabilities, activities, organizational structures, and culture need to adjust to leverage the value of cloud, optimize spend, and manage risk.

      • As key applications leave for the cloud, I&O teams are still expected to manage access, spend, and security but may have little or no visibility or control over the applications themselves.
      • The automation and self-service capabilities of cloud aren’t delivering the speed the business expected because teams don’t work together effectively.
      • Business leaders purchase their own cloud solutions because, from their point of view, IT’s processes are cumbersome and ineffective.
      • Accounting practices and governance mechanisms haven’t adjusted to enable new development practices and technologies.
      • Security and cost management requirements may not be accounted for by teams acquiring or developing solutions.
      • All of this contributes to frustration, missed work, wasteful spending, and unacceptable risk.

      Obstacles, by the numbers:

      85% of respondents reported security in the cloud was a serious concern.

      73% reported balancing responsibilities between a central cloud team and business units was a top concern.

      The average organization spent 13% more than they’d budgeted on cloud – even when budgets were expected to increase by 29% in the next year.

      32% of all cloud spend was estimated to be wasted spend.

      56% of operations professionals said their primary focus is cloud services.

      81% of security professionals thought it was difficult to get developers to prioritize bug fixes.

      42% of security professionals felt bugs were being caught too late in the development process.

      1. Flexera 2022 State of the Cloud Report. 2. GitLab DevSecOps 2021 Survey

      Cloud operations are different, but IT departments struggle to change

      • There’s no sense of urgency in the organization that change is needed, particularly from teams that aren’t directly involved in operations. It can be challenging to make the case that change is needed.
      • Beware “analysis paralysis”! With so many options, philosophies, approaches, and methodologies, it’s easy to be overwhelmed by choice and fail to make needed changes.
      • The solution to the problem requires organizational changes beyond the operations team, but you don’t have the authority to make those changes directly. Operations can influence the solution, but they likely can’t direct it.
      • Behavior, culture, and organizations take time and work to change. Progress is usually evolutionary – but this can also mean it feels like it’s happening too slowly.
      • It’s not just cloud, and it probably never will be. You’ll need to account for operating both on-premises and cloud technologies for the foreseeable future.

      Follow Info-Tech’s Methodology

      1. Ensure alignment with the risks and drivers of the business and understand your organization’s strengths and gaps for a cloud operations world.

      2. Understand the balance of different types of deliveries you’re responsible for in the cloud.

      3. Reduce risk by reinforcing the key operational pillars of cloud operations to your workstreams.

      4. Identify “work areas,” decide which area is responsible for what tasks and how work areas should interact in order to best facilitate desired business outcomes.

      The image contains a screenshot of a diagram demonstrating Info-Tech's Methodology, as described in the text above.

      Info-Tech Insight

      Start by designing operations around the main workflow you have for cloud services; i.e. If you mostly build or host in cloud, build the diagram to maximize value for that workflow.

      Operating Framework Elements

      Proper design of roles and responsibilities for each cloud workflow category will help reduce risk by reinforcing the key operational pillars of cloud operations.

      We base this on a composite of the well-architected frameworks established by the top global cloud providers today.

      Workflow Categories

      • Build
      • Host
      • Consume

      Key Pillars

      • Performance
      • Reliability
      • Cost Effectiveness
      • Security
      • Operational Excellence

      Risks to Mitigate

      • Changes to Support Model
      • Changes to Security & Governance
      • Changes to Skills & Roles
      • Replicating Old Habits
      • Misaligned Stakeholders

      Cloud Operations Design

      Info-Tech’s Methodology

      Assess Maturity and Ways of Working

      Define Cloud Work

      Design Cloud Operations

      Communicate and Secure Buy-in

      Assess your key workflows’ maturity for “life in the cloud,” related to Key Operational Pillars. Evaluate your readiness and need for new ways of working.

      Identify the work that must be done to deliver value in cloud services.

      Define key cloud work areas, the work they do, and how they should share information and interact.

      Outline the change you recommend to a range of stakeholders. Gain buy-in for the plan.

      Blueprint deliverables

      Each step of this blueprint is accompanied by supporting deliverables to help you accomplish your goals.

      Cloud Maturity Assessment

      Assess the intensity and cloud maturity of your IT operations for each of the key cloud workstreams: Consume, Host, and Build

      The image contains screenshots of the Cloud Maturity Assessment.

      Communication Plan

      Identify stakeholders, what’s in it for them, what the impact will be, and how you will communicate over the course of the change.

      The image contains a screenshot of the Communcation Plan.

      Cloud Operations Design Sketchbook

      Capture the diagram as you build it.

      The image contains a screenshot of the Cloud Operations Design Sketchbook.

      Roadmap Tool

      Build a roadmap to put the design into action.

      The image contains a screenshot of the Roadmap Tool.

      Key deliverable:

      Cloud Operations Organizing Framework

      The Cloud Operations Organizing Framework is a communication tool that introduces the cloud operations diagram and establishes its context and justification.

      The image contains a screenshot of the Cloud Operations Organizing Framework.

      Project Outline

      Phase 1: Establish Context

      1.1: Identify challenges, opportunities, and cloud maturity

      1.2: Evaluate new ways of working

      1.3: Define cloud work

      Phase 2: Design the organization and communicate changes

      2.1: Design a draft cloud operations diagram

      2.2: Communicate changes

      Outputs

      Cloud Services Objectives and Obstacles

      Cloud Operations Workflow Diagrams

      Cloud Maturity Assessment

      Draft Cloud Operations Diagram

      Communication Plan

      Roadmap Tool

      Cloud Operations Organizing Framework

      Project benefits

      Benefits for IT

      Benefits for the business

      • Define the work required to effectively deliver cloud services to deliver business value.
      • Define key roles for operating cloud services.
      • Outline an operations diagram that visually communicates what key work areas do and how they interact.
      • Communicate needed changes to key stakeholders.
      • Receive more value from cloud services when the organization is structured to deliver value including:
        • Avoiding cost overruns
        • Securing services
        • Providing faster, more effective delivery
        • Increasing predictability
        • Reducing error rates

      Calculate the value of Info-Tech’s Methodology

      The value of the project is the delivery of organizational change that improves the way you manage cloud services

      Example Goal

      How this blueprint can help

      How you might measure success/value

      Streamline Responsibilities

      The operations team is spending too much time fighting applications fires, which is distracting it from needed platform improvements.

      • Identify shared and separate responsibilities for development and platform operations teams.
      • Focus the operations team on securing and automating cloud platform(s).
      • Reduce time wasted on back and forth between development and operations teams (20 hrs. per employee per year x 50 staff = 1000 hrs.).
      • Deliver automation features that reduces development lead time by one hour per sprint (40 devs x 20 sprints per yr. x 1 hr. = 800 hrs.).

      Improve Cost Visibility

      The teams responsible for cost management today don’t have the authority, visibility, or time to effectively find wasted spend.

      The teams responsible for cost management today don’t have the authority, visibility, or time to effectively find wasted spend.

      • Ensure operations contributes to visibility and execution of cost governance.
      • $1,000,000 annual spend on cloud services.
      • Of this, assume 32% is wasted spend ($320k).1
      • New cost management function has a target to cut waste by half next year saving ~$160k.
      • Cost visibility and capture metrics (e.g. accurate tagging metrics, right-sizing execution).
      1. Average wasted cloud spend across all organizations, from the 2022 Flexera State of the Cloud Report

      Understand your cloud vision and strategy before you redesign operations

      Guide your operations redesign with an overarching cloud vision and strategy that aligns to and enables the business’s goals.

      Cloud Vision

      The image contains a screenshot of the Define Your Cloud Vision.

      Cloud Strategy

      It is difficult to get or maintain buy-in for changes to operations without everyone on the same page about the basic value proposition cloud offers your organization.

      Do the workload and risk analysis to create a defensible cloud vision statement that boils down into a single statement: “This is how we want to use the cloud.”

      Once you have your basic cloud vision, take the next step by documenting a cloud strategy.

      Establish your steering committee with stakeholders from IT, business, and leadership to work through the essential decisions around vision and alignment, people, governance, and technology.

      Your cloud operations design should align to a cloud strategy document that provides guidelines on establishing a cloud council, preparing staff for changing skills, mitigating risks through proper governance, and setting a direction for migration, provisioning, and monitoring decisions.

      Key Insights

      Focus on the future, not the present

      Define your target cloud operations state first, then plan how to get there. If you begin by trying to reconstruct on-prem operations in the cloud, you will build an operations model that is the worst of both worlds.

      Responsibilities change in the cloud

      Understand what you mean by cloud work

      Focus where it matters

      Cloud is a different way of consuming IT resources and applications and it requires a different operational approach than traditional IT.

      In most cases, cloud operations involves less direct execution and more service validation and monitoring

      Work that is invisible to the customer can still be essential to delivering customer value. A lot of operations work is invisible to your organization’s customers but is required to deliver stability, security, efficiency, and more.

      Cloud work is not just applications that have been approved by IT. Consider how unsanctioned software purchased by the business will be integrated and managed.

      Start by designing operations around the main workflow you have for cloud services. If you mostly build or host in the cloud, build the diagram to maximize value for that workflow.

      Design principles will often change over time as the organization’s strategy evolves.

      Identify skills requirements and gaps as early as possible to avoid skills gaps later. Whether you plan to acquire skills via training or cross-training, hiring, contracting, or outsourcing, effectively building skills takes time.

      Info-Tech offers various levels of support to best suit your needs

      DIY Toolkit

      Guided Implementation

      Workshop

      Consulting

      “Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful.”“Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track.”“We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place.”“Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project.”

      Diagnostics and consistent frameworks used throughout all four options

      Guided Implementation

      What does a typical GI on this topic look like?

      Phase 1

      Phase 2

      Call #1: Scope requirements, objectives, and your specific challenges

      Calls #2&3: Assess cloud maturity and drivers for org. redesign

      Call #4: Review cloud objectives and obstacles

      Call #5: Evaluate new ways of working and identify cloud work

      Calls #6&7: Create your Cloud Operations diagram

      Call #8: Create your communication plan and build roadmap

      A Guided Implementation (GI) is a series of calls with an Info-Tech analyst to help implement our best practices in your organization.

      Workshop Overview

      Contact your account representative for more information.
      workshops@infotech.com 1-888-670-8889

      Day 1

      Day 2

      Day 3

      Day 4

      Day 5

      Establish Context

      Design the Organization and Communicate Changes

      Next Steps and
      Wrap-Up (offsite)

      Activities

      1.1 Assess current cloud maturity and areas in need of improvement

      1.2 Identify the drivers for organizational redesign

      1.3 Review cloud objectives and obstacles

      1.4 Develop organization design principles

      2.1 Evaluate new ways of working

      2.2 Develop a workstream target statement

      2.3 Identify cloud work

      3.1 Design a future-state cloud operations diagram

      3.2 Create a current state cloud operations diagram

      3.3 Define success indicators

      4.1 Create a roadmap

      4.2 Create a communication plan

      5.1 Complete in-progress deliverables from previous four days.

      5.2 Set up review time for workshop deliverables and to discuss next steps.

      Deliverables

      1. Cloud Maturity Assessment
      2. Cloud Challenges and Objectives
      1. Workstream target statement
      2. Cloud Operations Workflow Diagrams
      1. Future and current state cloud operations diagrams
      1. Roadmap
      2. Communication Plan

      Cloud Operations Organizing Framework.

      Phase 1:

      Establish context

      Phase 1

      Phase 2

      1.1 Establish operating model design principals by identifying goals & challenges, workstreams, and cloud maturity

      1.2 Evaluate new ways of working

      1.3 Identify cloud work

      2.1 Draft an operating model

      2.2 Communicate proposed changes

      Phase Outcomes:

      Define current maturity and which workstreams are important to your organization.

      Understand new operating approaches and which apply to your workstream balance.

      Identify a new target state for IT operations.

      Before you get started

      Set yourself up for success with these three steps:

      • This methodology and the related slides are intended to be executed via intensive, collaborative working sessions using the rest of this slide deck.
      • Ensure the working sessions are successful by working through these steps before you start work on defining your cloud operations.

      1. Identify an operations design working group

      2. Review cloud vision and strategy

      3. Create a working folder

      This should be a group with insight into current cloud challenges, and with the authority to drive change. This group is the main audience for the activities in this blueprint.

      Review your established planning work and documentation.

      Create a repository to house your notes and any work in progress.

      Create a working folder

      15 minutes

      Create a central repository to support transparency and collaboration. It’s an obvious step, but one that’s often forgotten.

      1. Download all the documents associated with this blueprint to a shared repository accessible to all participants. Keep separate folders for templates and work-in-progress.
      2. Share the link to the repository with all attendees. Include links to the repository in any meeting invites you set up as working sessions for the project.
      3. Use the repository for all the work you do in the activities listed in this blueprint.

      Step 1.1: Identify goals and challenges, workstreams, and cloud maturity

      Participants

      • Operations Design Working Group, which may include:
        • Cloud owners
        • Platform/Applications Team leads
        • Infra & Ops managers

      Outcomes

      • Identify your current cloud maturity and areas in need of improvement.
      • Define the advantages you expect to realize from cloud services and any obstacles you have to overcome to meet those objectives.
      • Identify the reasons why redesigning cloud operations is necessary.
      • Develop organization design principles.

      “Start small: Begin with a couple services. Then, based on the feedback you receive from Operations and the business, modify your approach and keep increasing your footprint.” – Nenad Begovic

      Cloud changes operational activities, tactics, and goals

      As you adopt cloud services, the operations core mission remains . . .

      • IT operations are expected to deliver stable, efficient, and secure IT services.

      . . . but operational activities are evolving.

      • Core IT operational processes remain relevant, such as incident or capacity management, but opportunities to automate or outsource operations tasks will change how that work is done.
      • As you rely more on automation and outsourcing, the team may see less direct execution in its day-to-day work and more solution design and validation.
      • Outsourcing frees the team from operational toil but reduces the direct control over your end-to-end solution and increases your reliance on your vendor.
      • Pay-as-you-go pricing models present opportunities for streamlined delivery and cost rationalization but require you to rethink how you do cost and asset management.
      • It’s very easy for the business to buy a SaaS solution without consulting IT, which can lead to duplicated functionality, integration challenges, security threats, and more.

      Design a model for cloud operations that helps you achieve value from your cloud environment.

      “As operating models shift to the cloud, you still need the same people and processes. However, the shift is focused on a higher level of operations. If your people no longer focus on server uptime, then their success metrics will change. When security is no longer protected by the four walls of a datacenter, your threat profile changes.

      (Microsoft, “Understand Cloud Operating Models,” 2022)

      Operational responsibilities are shared with a range of stakeholders

      When using a vendor-operated public cloud, IT exists in a shared responsibility model with the cloud service provider, one that is further differentiated by the type of cloud service model in use: broadly, software-as a service (SaaS), platform-as-a-service (PaaS), or infrastructure-as-a-service (IaaS).

      Your IT operations organization may still reflect a structure where IT retains control over the entire infrastructure stack from facilities to application and defines their operational roles and processes accordingly.

      If the organization chooses a co-location facility, they outsource facility responsibility to a third-party provider, but much of the rest of the traditional IT operating model remains the same. The operations model that worked for an entirely premises-based environment is very different from one that is made up of, for instance, a portfolio of SaaS applications, where your control is limited to the top of the infrastructure stack at the application layer.

      Once an organization migrates workloads to the cloud, IT gives up an increasing amount of control to the vendor, and its traditional operational roles & responsibilities necessarily change.

      The image contains a screenshot that demonstrates what the cloud service models are.

      Align operations with customer value

      • Decisions about operational design should be made with customer value in mind. Remember that cloud adoption should be an enabler of adaptability in the face of changing business needs!
      • Think about how the operations team is indispensable to the value received by your customer. Think about the types of changes that can add to the value your customers receive.
      • A focus on value will help you establish and explain the rationale and urgency required to deliver on needed changes. If you can’t explain how the changes you propose will help deliver value, your proposal will come across as change for the sake of change.
      The image contains a screenshot of a diagram to demonstrate how operational design decisions need to be made with customer value in mind.

      Info-Tech Insight

      Work that is invisible to the customer can still be essential to delivering customer value. A lot of operations work is invisible to your organization’s customers but required to deliver stability, security, efficiency, and more.

      A new consumption model means a different mix of activities

      Evolving to cloud-optimal operations also means re-assessing and adapting your team’s approach to achieving cloud maturity, especially with respect to how automation and standardization can be leveraged to best achieve optimization in cloud.

      Traditional ITDesignExecuteValidateSupportMonitor
      CloudDesignExecuteValidateSupportMonitor

      Info-Tech Insight

      Cloud is a different way of consuming IT resources and applications and requires a different operational approach than traditional IT.

      In most cases, cloud operations involves less direct execution and more service validation and monitoring.

      The Service Models in cloud correspond to the way your organization delivers IT

      Service Model

      Example

      Function

      Software-as-a-Service (SaaS)

      Salesforce.com

      Office 365

      Workday

      Consume

      Platform-as-a-Service (PaaS)

      Azure Stack

      AWS SageMaker

      WordPress

      Build

      Infrastructure-as-a-Service (IaaS)

      Microsoft Azure

      Amazon EC2

      Google Cloud Platform

      Host

      Define how you plan to use cloud services

      Your cloud operations will include different tasks, teams, and workflows, depending on whether you consume cloud services, build them, or host on them.

      Function

      Business Need

      Service Model

      Example Tasks

      Consume

      “I need a commodity, off-the-shelf service that we can configure to our organization’s needs.

      Software-as-a-Service (SaaS)

      Onboard and add users to a new SaaS offering. Vendor management of SaaS providers. Configure/integrate the SaaS offering to meet business needs.

      Build

      “I need to create significantly customized or net-new products and services.”

      Platform-as-a-Service (PaaS) & Infrastructure as-a-Service (IaaS)

      Create custom applications. Build and maintain a container platform. Manage CI/CD pipelines and tools. Share infrastructure and applications patterns.

      Host

      “I need compute, storage, and networking components that reflect key cloud characteristics (on-demand self-service, metered usage, etc.).”

      Infrastructure-as-a-Service (IaaS)

      Stand up compute, networking, and storage resources to host a COTS application. Plan to increase storage capacity to support future demand.

      Align to the well-architected framework

      • Each cloud provider has defined a well-architected framework (WAF) that defines effective deployment and operations for their services.
      • WAFs embody a set of best practices and design principles to leverage the cloud in a more efficient, secure, and cost-effective manner.
      • While each vendor’s WAF has its own definitions and nuances, they collectively share a set of key principles, or “pillars,” that define the desired outcome of any cloud deployment.
      • These pillars address the key areas of risk when migrating to a public cloud platform.

      “In order to accelerate public cloud adoption, you need to focus on infrastructure-as-code and script everything you can. Unlike traditional operations, CloudOps focuses on creating scripts: a script for task A, a script for task B, etc.”

      – Nenad Begovic

      Pillars

      • Reliability
      • Security
      • Cost Optimization
      • Operational Excellence
      • Performance Efficiency

      General Best Practice Capability Areas

      • Host
      • Network
      • Data
      • Identity Management
      • Cost/Subscription Management

      Assess cloud maturity

      2 hours

      1. Download a copy of the Cloud Maturity Assessment Tool.
      2. As a group, work through:
        • The balance of your operations activities from a Host/Build/Consume perspective. What are you responsible for delivering now? How do you expect things will change in the future?
        • Which workstreams to focus on. Are there activity categories that are critical or non-critical or that don’t represent a significant portion of overall work? Conversely, are there workstreams that you feel are subject to particular risk when moving to cloud?
      3. Fill out the Maturity Quiz tab in the Cloud Maturity Assessment Tool for the workstreams you have chosen to focus on.
      InputOutput
      • Insight into and experience with your current cloud environment.
      • Maturity scoring for key workload streams as they align to the pillars of a general well-architected cloud framework
      MaterialsParticipants
      • Whiteboard/Flip chart
      • Operating model template
      • Cloud platform SMEs

      Download theCloud Maturity Assessment Tool

      Identify the drivers for organizational redesign

      Whiteboard Activity

      An absolute must-have in any successful redesign is a shared understanding and commitment to changing the status quo.

      Without a clear and urgent call to action, the design changes will be seen as change for the sake of change and therefore entirely safe to ignore.

      Take up the following questions as a group:

      1. What kind of organizational change is needed?
      2. Why do we think the need for this change is urgent?
      3. What do we think will happen if no change occurs? What’s the worst-case scenario?

      Record your answers so you can reference and use them in the communication materials you’ll create in Phase 2.

      InputOutput
      • Cloud maturity assessment
      • Objectives and obstacles
      • Insight into existing challenges stemming from organizational design challenges
      • A list of reasons that form a compelling argument for organizational change
      MaterialsParticipants
      • Whiteboard/Flip chart
      • Cloud Operations Design Working Group

      “We know, for example, that 70 percent of change programs fail to achieve their goals, largely due to employee resistance and lack of management support. We also know that when people are truly invested in change it is 30 percent more likely to stick.”

      – Ewenstein, Smith, Sologar

      McKinsey (2015)

      Consider the value of change from advantage and obstacle perspectives

      Consider what you intend to achieve and the obstacles to overcome to help identify the changes required to achieve your desired future state.

      Advantage Perspective

      Ideas for Change

      Obstacle Perspective

      What advantages do cloud services offer us as an organization?

      For example:

      • Enhance service features.
      • Enhance user experience.
      • Provide ubiquitous access.
      • Scalability to align with demand.
      • Automate or outsource routine tasks.

      What obstacles prevent us from realizing value in cloud services?

      For example:

      • Inadequate stability and reliability
      • Difficult to observe or monitor workloads
      • Challenges ensuring cloud security
      • Insufficient access to relevant skills

      Review risks and challenges

      Changes to Support Model

      • Have we identified who is on the cloud ops team?
      • Do we know where we are procuring skills (internal IT vs. third party) and for how long?
      • Do we know where we are in the migration process?

      Changes to security & governance

      • Have we identified how our attack surface changes in the cloud?
      • Do we have guardrails in place to govern self-provisioning users?
      • Are we managing cost overage risks?

      Replicating old habits

      • Have we made concrete plans to leverage cloud capabilities to standardize and automate outputs?
      • Are we simply reproducing existing systems in the cloud?

      Changes to Skills & Roles

      • Is our staff excited to learn new skills and technologies? Are our specialists prepared to acquire generalist skills to support cloud services?
      • Do we have training plans created and aligned to our technology roadmap?
      • Do we know what head count we need?

      Misaligned stakeholders

      • Have we identified our key stakeholders and teams? Have we considered what changes will impact them and how?
      • Are we meeting regularly and collaborating effectively with our peers, or are we siloed?

      Review cloud objectives and obstacles

      Whiteboard Activity

      1 hour

      1. With your working group, review why you’re using cloud in the first place. What advantages do you expect to realize by adopting cloud services? If we achieve what we’ve set out to do, what should that look and feel like to us, our organization, and our organization’s customers?
        • You should have identified cloud drivers and objectives in your cloud vision and strategy – leverage and validate what you already have!
      2. Next, identify obstacles that are preventing you from fully realizing the value of cloud services.
      3. Finally, brainstorm initial ideas for change. What could we start doing that could help us better use cloud in the future? Are there changes to how we need to organize ourselves to collaborate more effectively?
      InputOutput
      • Insight into and experience with your current cloud environment
      • Identified key business outcomes you expect to realize by adopting cloud services
      • Identified challenges and obstacles that are preventing you from realizing key outcomes
      MaterialsParticipants
      • Whiteboard/Flip chart
      • Cloud operations design working group.

      Commonly cited advantages and obstacles

      Cloud Advantages/Objectives

      • Deliver faster on commitments to the business by removing infrastructure provisioning as a bottleneck.
      • Simplify capacity management on flexible cloud-based infrastructure.
      • Reduce capital spending on IT infrastructure.
      • Create sandboxes/innovation practices to experiment with and develop new functionality on cloud platforms.
      • Easily enable ubiquitous access to key corporate services.
      • Minimize the expense and effort required to maintain a data center – power & cooling, cabling, or physical hardware.
      • Leverage existing automation tools from cloud vendors to speed up integration and deployment.
      • Direct costs for specific services can improve transparency and cost allocation, allowing IT to directly “show-back” or charge-back cloud costs to specific cost centers.

      Obstacles

      Need to speed up provisioning of PaaS/IaaS/data resources to development and project teams.

      No time to develop and improve platform services and standards due to other responsibilities.

      We constantly run up unexpected cloud costs.

      Not enough time for continuous learning and development.

      The business will buy SaaS apps and only let us know after they’ve been purchased, leading to overlapping functionality; gaps in compliance, security, or data protection requirements; integration challenges; cost inefficiencies; and more.

      Role descriptions haven’t kept up with tech changes.

      Obvious opportunities to rationalize costs aren’t surfaced (e.g. failing to make use of existing volume licensing agreements).

      Skills needed to properly operate cloud solutions aren’t identified until breakdowns happen.

      Establish organization design principles

      You’ve established a need for organizational change. What will that change look like?

      Design principles are concise, direct statements that describe how you will design your organization to achieve key objectives and address key challenges.

      This is a critically important step for several reasons:

      • A set of clear, concise statements that describe what the design should achieve provides parameters that will help you create and evaluate different design options.
      • A focused, facilitated discussion to create those statements will help uncover conflicting assumptions between key stakeholders.
      • A comprehensive description of the various ways the organization should change makes it easier to identify misaligned or incompatible objectives.
      • A description of what your organization should look like in the future will help you identify where changes will be required .

      Examples of design principles:

      1. We will create a path to review and publish effective application/platform patterns.
      2. A single governing body should have oversight into all cloud costs.
      3. Development must happen only on approved cloud platforms.
      4. Application teams must address operational issues that derive from the applications they’ve created.
      5. Security practices should be embedded into approved cloud platforms and be automatically applied wherever possible.
      6. Focus is on improving developer experience on cloud platforms.

      Info-Tech Insight

      Design principles will often change as the organization’s strategy evolves.

      Align design principles to your objectives

      Developing design principles starts with your key objectives. What do we absolutely have to get right to deliver value through cloud services?

      Once you have your direction set, work through the points in the star model to establish how you will meet your objectives and deliver value. Each point in the star is an important element in your design – taken together, it paints a holistic picture of your future-state organization.

      The changes you choose to implement that affect capabilities, structure, processes, rewards, and people should be self-reinforcing. Each point in the star is connected to, and should support, the other points.

      “There is no one-size-fits-all organization design that all companies – regardless of their particular strategy needs – should subscribe to.”

      – Jay Galbraith, “The Star Model”

      The image contains a screenshot of a modified versio of Jay Galbraith's Star Model of Organizational Design.

      Establish design principles

      Track your findings in the table on the next slide.

      1. Review the cloud objectives and challenges from the previous activity. As a group, decide from that list: what are the key objectives you are trying to achieve? What are the things you absolutely must get right to get value from cloud services?
      2. Work through the following questions as a group:
        • What capabilities or technologies do we need to adopt or leverage differently?
        • How must our structure change? How will power shift in the new structure?
        • Will our new structure require changes to processes or information sharing?
        • How must we change how we motivate or reward employees?
        • What new skills or knowledge is required? How will we acquire those skills or knowledge?
      InputOutput
      • Cloud objectives and challenges
      • Different viewpoints into how your organization must change to realize objectives and overcome challenges
      • Organizational design principles for cloud operations
      MaterialsParticipants
      • Whiteboard/Flip charts
      • Cloud operations design working group

      Design principles (example)

      What is our key objective?

      • Rapidly develop innovative cloud services aligned to business value.

      What capabilities or technologies do we need to adopt or leverage differently?

      • We will adopt more agile development techniques to make smaller changes, faster.
      • We will standardize and automate tasks that are routine and repeatable.

      How must our structure change? How will power shift in the new structure?

      • Embed development teams within business units to better align to business unit needs.
      • Create a focused cloud platform team to develop infrastructure services.

      Will our new structure require changes to processes or information sharing?

      • Development teams will take on responsibility for application support.
      • Platform teams will be deeply embedded with development teams on new projects to build new infrastructure functionality.

      How must we change how we motivate or reward employees?

      • We will highlight innovative work across the company.
      • We will encourage experimentation and risk-taking.

      What new skills or knowledge is required, and how will we acquire it?

      • We will focus on acquiring skills most closely aligned to our technology roadmap.
      • We will ensure budget is available for training employees who ask for it.
      • We will contract to find skills we cannot develop in-house and use engagements as an opportunity to learn internally.

      Step 1.2: Evaluate new ways of working

      Participants

      Cloud Operations Design Working Group

      Outcomes

      Shared understanding of the horizon of work possibilities:

      • Ways to work
      • Ways to govern and learn

      Consider the different approaches on the following slides, how they change operational work, and decide which approaches are the right fit for you.

      Evaluate new ways of working

      Cut through the hype

      • There are new approaches/ways of working that deal head on with the persistent breakdowns and headaches that come with operations management – work thrown over the wall from development, manual and repetitive work, siloed teams, and more.
      • Many of these approaches emphasize an operations-aware approach to solutions development and apply techniques traditionally associated with AppDev to Operations.
      • Cloud services present opportunities to outsource/automate away routine tasks.

      “DevOps is a set of practices, tools, and a cultural philosophy that automates and integrates the processes between software development and IT teams. It emphasizes team empowerment, cross-team communication and collaboration, and technology automation.”

      – Atlassian, “DevOps”

      “ITIL 4 brings ITIL up to date by…embracing new ways of working, such as Lean, Agile, and DevOps.”

      – ITIL Foundation: ITIL 4 Edition

      “Over time, left to their own devices, the SRE team should end up with very little operational load and almost entirely engage in development tasks, because the service basically runs and repairs itself.”

      – Ben Treynor Sloss, “Site Reliability Engineering”

      The more things change, the more they stay the same:

      • Core processes remain, but they may be done differently, and new technologies and services create new challenges.
      • Not all approaches are right for all organizations, and what’s right for you depends on how you use cloud services.
      • The best solution draws from these management ideas to build an approach to operations that is right for you.

      Leverage patterns to think about new ways of approaching operations work

      Patterns are strategies, approaches, and philosophies that can help you imagine new ways of working in your own organization.

      • The following slides provide an overview of organizing patterns that are applicable to cloud operations.
      • These are strategies that have been applied successfully elsewhere. Review what they can and cannot do and decide whether they are something you can use in your own organizational design.
      • Not every pattern will apply to every organization. For example, an organization which typically consumes SaaS applications will likely have very little need for SRE approaches and techniques.

      Ways to work

      • What work do we do? What skills do we need?
      • How do we create and support systems?

      Ways to govern and learn

      • How do we set and enforce rules?
      • How do we create and share knowledge?

      Explore Applicable Patterns

      Ways to work

      Ways to govern and learn

      1. DevOps

      2. Site Reliability Engineering

      3. Platform Engineering

      4. Cloud Centre of Excellence

      5. Cloud Community of Practice

      What is DevOps?

      “Look for obstacles constantly and treat them as opportunities to experiment and learn.” – Jez Humble, et al. Lean Enterprise: How High Performance Organizations Innovate at Scale

      What it is NOT

      What it IS

      Why Use It

      • Another word for automation or CI/CD tools.
      • A specific role.
      • A fix-all to address friction between existing siloed application and development teams.
      • An approach that will be successful without getting the basics right first.
      • The right fit for every IT organization or every team.

      An operational philosophy that seeks to:

      • Converge accountability for development and operations to align all teams to the goal of delivering customer value.
      • Improve the relationship between Development and Operations teams.
      • Increase the rate of deployment of valuable functionality into production.
      • “A cultural shift giving development teams more control over shipping code to production.” 1
      • You’re doing a lot of custom development.
      • There are opportunities for operations and development teams to work more closely.
      • You want to improve coding quality and throughput.
      • You want to shift the culture of the team to focus on customer value rather than exclusively uptime or new features.
      1 DevOps, SRE, and Platform Engineering

      What is Site Reliability Engineering (SRE)?

      “Hope is not a strategy” – Benjamin Treynor Sloss, Site Reliability Engineering: How Google Runs Production Systems

      What it is NOT

      What it IS

      Why Use It

      • Deeply focussed on a specific technical domain; SRE work “does not discriminate between infrastructure, software, networking, or platforms.” 2
      • A different name for a team of sysadmins.
      • A programming framework or a specific set of technologies.
      • A way to manage COTS software. SRE is less useful when you’re using applications out-of-the-box with minimal customization, integration, or development.
      • An application of skills and approaches from software engineering to improve system reliability.
      • A team responsible for “availability, latency, performance, efficiency, change management, monitoring, emergency response, and capacity planning.”3
      • A team responsible for building systems that become “a platform and workflow that encompasses monitoring, incident management, eliminating single points of failure, [and] failure mitigation.”1
      • You are building services and providing them at scale.
      • You want to improve reliability and reduce “the frequency and impact of failures that can impact the overall reliability of a cloud application.”1
      • You need to define related service metrics and SLOs.
      • To increase the use of automation in operations to avoid mistakes and minimize toil. 3
      1 SRE vs Platform Engineering
      2. Lakhani, Usman. “ISite Reliability Engineering: What Is It? Why Is It Important for Online Businesses?,” 2020.
      3. Sloss, “Introduction,” 2017

      What4 is Platform Engineering?

      “Platform engineers can act as a shield between developers and the infrastructure”

      – Carlos Schults, “What is Platform Engineering? The Concept Behind the Term”

      What it is NOT

      What it IS

      Why Use It

      • A team that manages every aspect of each application on a particular platform.
      • Focussed solely on platform reliability and availability.
      • A different name for a team of sysadmins.
      • Needed for all cloud service deployments. Platform engineers are most useful when you’re building extensively on a particular platform (e.g. AWS, Azure, or your internal cloud).
      • Platform engineers design, build, and manage the infrastructure that supports and hosts work done by developers.
      • The work done by platform engineering allows developers to avoid the repetitive work of setting everything up anew each time.
      • Requires engineers with a deep understanding of cloud services and other platform technologies (e.g. Kubernetes).
      • The big public cloud platforms are built for everyone. You need platform engineering when you need to extensively adapt or manage standard cloud services to support your own requirements.
      • Platform engineers are responsible for creating a secure, stable, maintainable environment that enables developers to do their work faster and without having to manage the underlying technology infrastructure.
      1 DevOps, SRE, and Platform Engineering

      What is a Cloud Center of Excellence?

      You need a strong core to grow a cloud culture.

      What it is NOT

      What it IS

      Why Use It

      • A project management office (PMO) for cloud services.
      • An easy, quick, or temporary fix to cloud governance problems. The CCoE requires champions who provide ongoing support to realize value over time.
      • An approach that’s only for enterprise-sized IT organizations.
      • A standing meeting – members of the CCoE may meet regularly to review progress on their mandate, but work and collaboration need to happen outside of meetings.
      • A cross-functional team responsible for oversight of all cloud initiatives, including architectural, technical, security, financial, contractual, and operational aspects of planned and deployed solutions.
      • The CCoE’s responsibilities typically include governance and continuous improvement; alignment between technical and accounting practices; documentation, training, best practices and standards development; and vendor management.
      • CCoE duties are often part of an existing role rather than a full-time responsibility.
      • You want to enable a core group of cloud experts to promote collaboration and accelerate adoption of cloud services, including members from infrastructure, applications, and security.
      • You need to manage cloud risks, set guidelines and policies, and govern costs across cloud environments.
      • There is an unmet need for training, knowledge sharing, and best practice development across the organization.

      What is a Cloud Community of Practice?

      “We have to stop optimizing for programmers and start optimizing for users”

      – Jeff Atwood

      What it is NOT

      What it IS

      Why Use It

      • A replacement for effective oversight and governance practices, though they may help users navigate and understand governance requirements.
      • A way to advertise cloud to potential new practitioners – engaged members of a CoP are typically already using a particular service.
      • Always exclusively composed of internal staff; in certain cases, a CoP could have external members as well.
      • A network of engaged users and experts who share knowledge and best practices for related technologies, crowdsource solutions to problems, and suggest improvements.
      • Often supported by communication and collaboration tools (e.g. chat channels, knowledge base, forums). May use a range of techniques (e.g. drop-ins, vendor-led training, lunch and learns).
      • Communities of practice may be deliberately created by the organization or develop organically.
      • Communities of practice are an effective way for practitioners to support one another and share ideas and solutions.
      • A CoP can help “shift left” work and help practitioners help themselves.
      • An engaged CoP can help IT to identify improvement opportunities and can also be a channel to communicate updates or changes to practitioners.

      Reinforce what we mean by patterns

      Patterns are . . .

      Ways of Working

      • Sets of habits, processes, and methodologies you want to adopt as part of your operational guidelines and commonly agreed upon definitions.

      Patterns are also . . .

      Ways to Govern and Learn

      • The formal and informal practices and groups that focus on enabling governance, risk management, and adoption.

      Review the implications of each pattern for organizational design

      Ways of Working

      DevOps

      Development teams take on operational work to support the services they create after they are launched to production.

      Some DevOps teams may be aligned around a particular function or product rather than a technology – there are individuals with skills on a number of technologies that are part of the same team.

      Site Reliability Engineering (SRE)

      In the beginning, you can start to adopt SRE practices within existing teams. As demand grows for SRE skills and services, you may decide to create focused SRE roles or teams.

      SRE teams may work across applications or be aligned to just infrastructure services or a particular application, or they may focus on tools that help developers manage reliability. SREs may also be embedded long-term with other teams or take on an internal consulting roles with multiple teams.1

      Platform Engineering

      Platform engineering will often, though not always, be the responsibility of a dedicated team. This team must work very closely with, and tuned into the needs of, its internal customers. There is a constant need to find ways to add value that aren’t already part and parcel of the platform – or its external roadmap.

      This team will take on responsibility for the platform, in terms of feature development, automation, availability and reliability, security, and more. They may also be internal consultants or advisors on the platform to developers.

      1. Gustavo Franco and Matt Brown, “How SRE teams are organized and how to get started.”

      Review the implications of each pattern for organizational design

      Ways to Govern and Learn

      Cloud Center of Excellence

      • A CCoE is a cross-functional group with technical experts from security, infrastructure, applications, and more.
      • There should, ideally, be someone focused on leading the CCoE full-time – often someone with an architecture background. Team members may work on the CCoE part-time alongside their main role, and dedicate more of their time to the CCoE as needed.
      • As the CCoE is a governance function, it will typically bridge and sit above teams working on cloud services, reporting to the CIO, CTO, or to an architecture function.

      Cloud Community of Practice

      • Participation in a community of practice is often above and beyond a core role – it’s a leadership activity taken on by technologically adept experts with a drive to help others.
      • Some organizations will create a role to foster community collaboration, run events, raise opportunities and issues identified by the community with product or technology teams, manage collaboration tools, and more.

      Evolve your organization to meet the needs of increased adoption

      Your operating model should evolve as you increase adoption of cloud services.

      Least Adoption Greatest Adoption

      Initial Adoption

      Early Centralization

      Scaling Up

      Full Steam Ahead

      • One or more small agile teams design, build, manage, and operate individual solutions on cloud resources. Solutions provide early value, and identify new opportunities using small, safe-to-fail experiments.
      • Governance is likely done locally to each team. Knowledge sharing, guidelines, and standards are likely informal.
      • Early experience with cloud services help the organization identify where to invest in cloud services to best meet business demands.
      • Accountability and governance over the platform are more clearly defined, possibly still separate from core IT governance processes. Best practices may be shared across teams through a Community of Practice.
      • Operations may be centralized, where valuable, to support monitoring and incident response.
      • Additional product/service-aligned development teams are created to keep up with demand.
      • There is a focused effort to consolidate best practices and platform knowledge, which can be supported through a culture of learning, effective automation, and appropriate tools.
      • The CCoE takes on additional roles in cloud governance, security, operations, and administration.
      • The organization has reached a relatively steady-state for cloud adoption. Innovation and new service development takes place on a stable platform.
      • A Cloud Center of Excellence is accountable for cloud governance across the organization.
      Adapted from Microsoft, “Get Started: Align your organization,” 2021

      Choose new ways of working that make sense for your team

      1 hour

      Consider if, and how, the approaches to management and governance you’ve just reviewed can offer value to your organization.

      1. List the organizing/managing ideas listed in the previous slides in the table below.
      2. Define why it’s for you. What benefits do you expect to realize? What challenges do you expect this will help you overcome? How does this align with your key benefits and drivers for moving to cloud?
      3. List risks or challenges to adoption. Why will it be hard to do? What could get in the way of adoption? Why might it not be a good fit?
      4. Identify next steps to adopt proposed practices.

      Why it’s for us (drivers)

      Risks or challenges to adoption

      Next steps to build/adopt it

      CCoE

      DevOps

      InputOutput
      • Related Info-Tech slides on new ways of working.
      • Opportunities and challenges in your own cloud deployment that may be addressed through new ways of working.
      • Identify new ways of working aligned to your goals.
      MaterialsParticipants
      • Whiteboard/Flip chart
      • Cloud Operations Design Working Group

      Step 1.3: Identify cloud work

      Participants

      • Operations Design Working Group

      Outcomes

      • Identify core work required to deliver value in key cloud workstreams.

      “At first, for many people, the cloud seems vast. But what you actually do is carve out space.”

      –DevOps Manager

      Identify work

      Before you can identify roles and responsibilities, you have to confirm what work you do as an organization and how that work enables you to meet your goals.

      • A comprehensive approach that connects the work you do to your organizational goals will help you identify work that’s falling through the cracks.
      • Identifying work is an opportunity to look at the tasks you regularly execute and ensure they actually drive value.
      • Working through the exercise as a group will help you develop a common language around the work you do.
      • To make the evident obvious: you can’t decide who should be responsible for something if you don’t know about it in the first place.

      Defining work can be a lot of … work! We recommend you start by identifying work for the workstream you do most – Build, Consume, or Host – to focus your efforts. You can repeat the exercise as needed.

      Map work in workstream diagrams

      The image contains a screenshot of the map work in workstream diagrams.

      The five Well-Architected Framework pillars. These are principles/directions/guideposts that should inform all cloud work.

      The work being done to achieve the workstream target. These are roughly aligned with the three streams on the right.

      Workstream Target: A concise statement of the value you aim to achieve through this workstream. All work should help deliver value (directly or indirectly).

      Define the scope of the exercise

      Whiteboard Activity

      20 minutes

      Over the next few exercises, you’ll do a deep dive into the work you do in one specific workstream. In this exercise, we’ll decide on a workstream to focus on first.

      1. Are you primarily building, hosting on, or consuming cloud services? Start with the workstream where you’re doing the most work.
      2. If this isn’t sufficient to narrow your focus, look at the workstream that is most closely tied to mission critical applications, or that is most in need of review in terms of what work is done and who does it.
      3. You can narrow the scope further if there’s a very specific sub-area that differs from the rest (e.g. managing your O365 environment vs. managing all SaaS applications).
      InputOutput
      • Insight into and experience with your current cloud environment.
      • Your completed cloud maturity assessment.
      • Identify one workstream where you’ll define work first.
      MaterialsParticipants
      • None
      • Cloud Operations Design Working Group

      Create a workstream target statement

      Whiteboard Activity

      30 minutes

      In this activity, come up with a short sentence to describe what all this work you do is building toward. The target statement helps align participants on why work is being done and helps focus the activity on work that is most important to achieving the target statement.

      Start with this common workstream target statement:

      “Deliver valuable, secure, available, reliable, and efficient cloud services.”

      Now, review and adjust the target statement by working through the questions below:

      1. Return to the earlier exercises in Phase 1.1 where you reviewed your key objectives for cloud services. Does the target statement align with what you’d identified previously?
      2. Who is the customer for the work you do? Would they see the target differently than you’ve described it?
      3. Can you be more specific? Are there value drivers that are more specific to your industry, organization, business functions, or products that are key to the value your customers receive from this workstream?
      InputOutput
      • Previous exercises.
      • Workstream target statement.
      MaterialsParticipants
      • Whiteboard/Flip chart
      • Cloud Operations Design Sketchbook
      • Cloud Operations Design Working Group

      Identify cloud work

      1-2 hours

      1. Use the workstream diagram template in the Cloud Operations Design Sketchbook, or draw the template out on a whiteboard and use sticky notes to identify work.
      2. Identify the workstream at the top of the slide. Update the template value statement on the right with the value statement you created in the previous exercise.
      3. Review one or more of the examples in the Cloud Operations Design Sketchbook to get a sense of the level of detail required for this exercise.

      Activity instructions continue on the next slide.

      Some notes to the facilitator:

      • Working directly from the Cloud Operations Design Sketchbook will save you time with transcription. Sharing the document with participants (e.g. via OneDrive) will allow you to collaborate and edit the document together in real-time.
      • Don’t worry about being too tidy for the moment, just get the information written down and you can clean up the diagram later.
      InputOutput
      • Previously identified design principles.
      • An understanding of the work done, and that needs to be done, in your cloud environment.
      • Identify the work that needs to be done to support your key cloud services workstream in the future.
      MaterialsParticipants
      • Cloud Operations Design Sketchbook
      • Whiteboard and sticky notes (optional)
      • Cloud Operations Design Working Group

      Identify cloud work (cont’d)

      4. Work together to identify work, documenting one work item per box. This should focus on future state, so record work whether it’s actually done today or not. Your space is limited on the sheet, so focus on work that is indispensable to delivering the value statement. Use the lists on the right as a reminder of key IT practice areas.

      5. As much as possible, align the work items to the appropriate row (Govern & Align, Design & Execute, or Validate, Support & Monitor). You can overlap boxes between rows if needed.

      Have you captured work related to:

      ITIL practices, such as:

      • Request management
      • Incident & problem management
      • Service catalog
      • Service level management
      • Configuration management

      Security-aligned practices, such as:

      • Identity & access management
      • Vulnerability management
      • Security incident management

      Financial practices, such as:

      • IT asset management
      • Cost management & budgeting
      • Vendor management
      • Portfolio management

      Data-aligned practices, such as:

      • Data integrations
      • Data governance

      Technology-specific tasks, such as:

      • Network, Server & Storage
      • Structured/unstructured DBs
      • Composite services
      • IDEs and compilers

      Other key practices:

      • Monitoring & observability
      • Continuous improvement
      • Testing & quality assurance
      • Training and knowledge management
      • Manage shadow IT

      Info-Tech Insight

      Cloud work is not just applications that have been approved by IT. Consider how unsanctioned software purchased by the business will be integrated and managed.

      Identify cloud work (cont’d)

      6. If you have decided to adopt any of the new ways of working outlined in Step 1.2 (e.g. DevOps, SRE, etc.) review the next slide for examples of the type of work that frequently needs to be done in each of those work models. Add any additional work items as needed.

      7. Consolidate boxes and clean up the diagram (e.g. remove duplicate work items, align boxes, clarify language).

      8. Do a final review. Is all the work in the diagram truly aligned with the value statement? Is the work identified aligned with the design principles from Step 1.1?

      If you used a whiteboard for this exercise, transcribe the output to a copy of the Cloud Operations Design Sketchbook, and repeat the exercise for other key workstreams. You will use this diagram in Phase 2.

      Examples of work

      Examples of work in the "Host" workstream:

      • Bulk patch servers
      • Add a server
      • Add capacity
      • Develop a new server template
      • Incident management

      Examples of work in the "Build" workstream:

      • Provision a production server
      • Provision a test environment
      • Test recovery procedures
      • Add capacity for a service
      • Publish a new pattern
      • Manage capacity/performance for a service
      • Identify wasted spend across services
      • Identify performance bottlenecks
      • Review and shut down idle/unneeded services

      Examples of work in the "Consume" workstream:

      • Conduct vendor risk assessments
      • Develop a standard evaluation matrix to compare solutions to existing or potential in-house offerings
      • Onboard a solution
      • Offboard a solution
      • Conduct a renewal
      • Review and negotiate a contract
      • Rationalize software titles

      Phase 2:

      Design the organization and communicate changes

      Phase 1

      Phase 2

      1.1 Establish operating model design principals by identifying goals & challenges, workstreams, and cloud maturity

      1.2 Evaluate new ways of working

      1.3 Identify cloud work

      2.1 Draft an operating model

      2.2 Communicate proposed changes

      Phase Outcomes:

      Draft your cloud operations diagram, identify key messages and impacts to communicate to your stakeholders, and build out the Cloud Operations Organizing Framework communication deck.

      Step 2.1: Identify groups and responsibilities

      Participants

      • Operations Design Working Group

      Outcomes

      • Cloud Operations Diagram
      • Success Indicators
      • Roadmap

      “No-one ever solved a problem by restructuring.”

      – Anonymous

      Visualize your cloud operations

      Create a visual to help you abstract, analyze, and clarify your vision for the future state of your organization in order to align and instruct stakeholders.

      Create a visual, high-level view of your organization to help you answer questions such as:

      • “What work do we do? What are the roles and responsibilities of different teams?”
      • “How do we interact between work areas?”
      • “How has our organization changed already, and what additional changes may be needed?”
      • “How do we make technology decisions?”
      • “How do we provide services?”
      • “How might this change be received by people on the ground?”
      The image contains a screenshot of the Cloud Operations Diagram Example.

      Decide whether to centralize or decentralize

      Specialization & Focus: A group or work unit developing a focused concentration of skills, expertise, and activities aligned with an area of focus (such as the ones at right).

      Decentralization: Operational teams that report to a decentralized IT or business function, either directly or via a “dotted line” relationship.

      Decentralization and Specialization can:

      • Duplicate work.
      • Localize decision-making authority, which can increase agility and responsiveness.
      • Transfer authority and accountability to local and typically smaller teams, clarifying responsibilities and encouraging staff to take ownership for service delivery.
      • Enable the team to focus on complex and rapidly changing technologies or processes.
      • Create islands of expertise, which can get in the way of collaboration, innovation, and decision making across groups and work units and make oversight difficult.
      • Complicate the transfer of resources and knowledge between groups.

      Examples: Areas of Focus

      Business unit

      • Manufacturing
      • R&D
      • Sales & Marketing

      Region

      • Americas
      • EMEA
      • APAC

      Service

      • ERP
      • Commercial website

      Technology

      • On-premises servers/storage
      • Network
      • Cloud services

      Operational process focus

      • Capacity management & planning
      • Incident management
      • Problem management

      “The concept of organization design is simple in theory but highly complex in practice. Like any strategic decision, it involves making multiple trade-offs before choosing what is best suited to a business context.”

      – Nitin Razdan & Arvind Pandit

      Identify key work areas

      Balance specialization with effective collaboration

      • Much is said about breaking down organizational silos. But at some level, silos are inevitable – any company with more than one employee will have to divide work up somehow.
      • Dividing up work is a delicate balancing act – ensuring individuals and groups are able to do work that is related, meaningful, and that allows autonomy while allowing for effective collaboration between groups that need to work together to achieve business goals.

      Why “work areas”?

      Why don’t we just use teams, groups, squads, or departments, or some other more common term for groups of people working together?

      • We are not yet at the point of deciding who in the organization should be aligned to which areas in the design.
      • Describing work areas as teams can shift the conversation to the organizational chart – to who does the work, rather than what needs to be done.

      That’s not the goal of this exercise. If the conversation gets stuck on what you do today, it can get in the way of thinking about what you need to do in the future.

      Create a future-state cloud operations diagram

      1-3 hours

      1. Review the example cloud operations diagram example in your copy of the Cloud Operations Design Sketchbook.
      2. Identify key work areas (e.g. applications, infrastructure, platform engineering, DevOps, security). Add the name of each work area in one of the larger boxes.
        • Go back to your design principles. Did you define any work areas in your design principles that should be represented here?
        • If you have several groups or teams with similar responsibilities, consider lumping them together in one box (e.g. applications teams, 3x DevOps teams).
      3. Copy the tasks from any workstream diagrams you’ve created to the same slide as the organization design diagram. Keep the workstream diagram intact, as you’ll want to be able to refer back to it later.

      Activity instructions continue on the next slide.

      InputOutput
      • Insight into and experience with your current cloud environment.
      • Cloud Operations Diagram
      MaterialsParticipants
      • Whiteboard/Flip charts
      • Cloud Operations
      • Cloud Operations Design Working Group

      Cloud operations diagram (cont’d)

      1-3 hours

      4. As a group, move the work boxes from the workstream diagram into the appropriate work area.

      • Don’t worry about being too tidy for the moment – clean up the diagram when the exercise is done.
      • Make adjustments to the wording of the work boxes if needed.

      5. Use the space between work areas to describe how work areas must interact to achieve organizational goals. For example:

      • What information should be shared between groups?
      • What information sharing channels may be used?
      • What processes will be handed-off between groups and how?
      • How often will teams interact?
      • Will interactions be formal or informal?

      Create a current-state operations diagram

      1 -2 hours

      This exercise can be done by one person, then reviewed with the working group at a later time.

      This current state diagram helps clarify the changes that may need to happen to get to your future state.

      1. Color code the work boxes for each work area. For example, if you have a “DevOps” work area, make all the work boxes assigned to “DevOps” the same color.
      2. On a separate slide, sketch your existing organization indicating your current teams.
      3. Copy the tasks from the future-state diagram to this current-state chart. Align the tasks to the appropriate groups.
      4. Review the chart with the working group. Discuss: are there teams that are doing work today that will also be done by different teams? Are there groups that may merge into one team? What types of changes may be required?
      InputOutput
      • Future-state cloud operations diagram
      • Current-state cloud operations diagram
      MaterialsParticipants
      • Cloud Operations Design Sketchbook
      • Projector/screen/virtual meeting
      • Project lead
      • Cloud Operations Design Working Group

      Check for biases to make better choices

      Use the strategies below to spot and address flaws in your team’s thinking about your future-state design.

      Biases

      What’s the risk?

      Mitigation strategies

      Is the team making mistakes due to self-interest, love of a single idea, or groupthink?

      Important information may be ignored or left unspoken.

      Rigorously check for the other biases, below. Tactfully seek dissenting opinions.

      Do recommendations use unreasonable analogies to other successes or failures?

      Opportunities or challenges in the current situation may not be sufficiently understood.

      Ask for other examples, and check whether the analogies are still valid.

      Is the team blinkered by the weight of past decisions?

      Doubling-down on bad decisions (sunk costs) or ignoring new opportunities.

      Ask yourself what you'd do if you were new to the position or organization.

      Does the data support the recommendations?

      Data used to make the case isn't a good fit for the challenge, is based on faulty assumptions, or is incomplete.

      If you had a year to make the decision, what data would you want? How much can you get?

      Are there realistic alternative recommendations?

      Alternatives don't exist or are "strawman" options.

      Ask for additional options.

      Is the recommendation too risk averse or cautious?

      Recommendations that may be too risky are ignored, leading to missed opportunities.

      Review options to accept, transfer, distribute, or mitigate the risk of the decision.

      Framework above adapted from Kahneman, Lovallo, and Sibony (2011)

      Be specific with metrics

      Thinking of ways you could measure success can help uncover what success actually means to you.

      Work collectively to generate success indicators for each key cloud initiative. Success indicators are metrics, with targets, aligned to goals, and if you are able to measure them accurately, they should help you report your progress toward your objectives.

      For example, if your driver is “faster access to resources” you might consider indicators like developer satisfaction, project completion time, average time to provision, etc.

      There are several reasons you may not publicize these metrics. They may be difficult to calculate or misconstrued as targets, warping behavior in unexpected ways. But managed properly, they have value in measuring operational success!

      Examples: Operations redesign project metrics

      Key stakeholder satisfaction scores

      IT staff engagement scores

      Support Delivery of New Functionality

      Double number of accepted releases per cycle

      80% of key cloud initiatives completed on time, on budget, and in scope

      Improve Operational Effectiveness

      <1% of servers have more than two major versions out of date

      No more than one capacity-related incident per Q

      Define success indicators

      Whiteboard Activity

      45 minutes

      1. On a whiteboard, draw a table with key objectives for the design across the top.
        • What cloud objectives should the redesign help you achieve? Refer back to the design principles from Phase 1.
        • Think about the redesign itself. How will you measure whether the project itself is proceeding according to plan? Consider metrics such as employee engagement scores and satisfaction scores from key stakeholders.
      2. Consider whether the metrics are feasible to track. Record your decisions in your copy of the Cloud Operations Organizing Framework deck.
      InputOutput
      • Key design goals
      • Success indicators for your design
      MaterialsParticipants
      • Whiteboard
      • Markers
      • Cloud Operations Design Working Group

      Populate a roadmap

      Tool Activity

      45 minutes

      1. In the Roadmap Tool, populate the data entry tab with the initiatives you will take to support changes toward the new cloud operations organizing framework.
      2. Input each of the tasks in the data entry tab and provide a description and rationale behind the task (as needed).
      3. Assign an effort, priority, and cost level to each task (high, medium, low).
      4. Assign an owner to each task – someone who can take points and shepherd the task to completion.
      5. Identify the timeline for each task based on the priority, effort, and cost (short, medium, and long term).
      6. Highlight risk for each task if it will be deferred.
      7. Track the progress of each task with the status column.
      InputOutput
      • Cloud Operations Organizing Framework
      • Roadmap/ implementation plan
      MaterialsParticipants
      • Roadmap Tool
      • Cloud Operations Design Working Group

      Download the Roadmap Tool

      Step 2.2: Communicate changes

      Participants

      • Operations Design Working Group

      Outcomes

      • Build a communication plan for key stakeholders
      • Complete the communication deck Cloud Operations Organizing Framework
      • Build a roadmap

      “Words, words, words.”

      – Shakespeare

      Communicate changes

      Which stakeholders will be affected by the changes?

      Decision makers: Who do you ultimately need to convince to proceed with any changes you’ve outlined?

      Peers: How will managers of other areas be affected by the changes you’re proposing? If you are you suggesting changes to the way that they, or their teams, do their work, you will have to present a compelling case that there’s value in it for them.

      Staff: Are you dictating changes or looking for feedback on the path forward?

      The image contains a screenshot of the Five Elements of Change that is displayed in a cycle. The five elements are: What is the change? Why are we doing it? How are we going to go about it? How long will it take us? What is the role of each team and individual.

      Source: The Qualities of Leadership: Leading Change

      Follow these guidelines for good communication

      Be relevant

      • Talk about what matters to each stakeholder group.
      • Talk about what matters to the initiative.
      • IT thinks in processes but stakeholders only care about results: talk in terms of results.
      • IT wants to be “understood” but this does not matter to stakeholders; think “what’s in it for them?”
      • Communicate truthfully; do not make false promises or hide bad news.
      • If you expect objections, create a plan to handle them.

      Be clear

      • Lead with the point you’re trying to make.
      • Don’t use jargon.
      • Avoid idiomatic language and clichés.
      • Have a third party review draft communications and ask them to tell you the key messages in their own words. If they’re missing the main points, there’s a good chance the draft isn’t clear.

      Be consistent

      • Ensure the core message is consistent regardless of audience, channel, or medium.
      • Changing the core message from one group to another can be interpreted as incompetence or an attempt at deception. This will damage your credibility and can lead to a loss of trust.

      Be concise

      • Get to the point.
      • Minimize word count wherever possible.

      “We tend to use a lot of jargon in our discussions, and that is a sure fire way to turn people away. We realized the message wasn’t getting out because the audience wasn’t speaking the same language. You have to take it down to the next level and help them understand where the needs are.”

      – Jeremy Clement, Director of Finance, College of Charleston

      Create a communication plan

      1 hour

      Fill out the table below.

      Stakeholder group: Identify key stakeholders who may be impacted by changes to the operations team. This might include IT leadership, management, and staff.

      Benefits: What’s in it for them?

      Impact: What are we asking in return?

      How: What mechanisms or channels will you use to communicate?

      When: When (and how often) will you get the message out?

      Benefits

      Impact

      How

      When

      IT Mgrs.

      • Improve agility, stability
      • Deliver faster against business goals
      • Respond to identified needs
      • Improve confidence in IT
      • Must support the process
      • Change and engagement issues during restructuring may affect staff engagement and productivity
      • Training budget required
      • Present at leadership meeting
      • Kick-off email
      • Sept. leadership meeting
      • Weekly touchpoints
      • Informally throughout project

      Ops Staff

      • Clearer direction and clear priorities (Operations mission statement and RACI)
      • Higher-value work – address problems, contribute to plans
      • New skills and training
      • More personal accountability
      • Push toward process consistency
      • Must make time and plan for training during work hours
      • Present at operations team’s offsite meeting
      • AMA channel on Slack
      • 1:1 meetings
      • Add RACI, org. sketch to shared folder
      • Operations offsite
      • Sept. all-hands meeting
      • Ongoing coaching and informal conversations
      InputOutput
      • Discussion
      • Communication Plan
      MaterialsParticipants
      • Whiteboard/Flip Chart
      • Cloud Operations Design Working Group

      Download the Communication Plan Template

      Support the transition with a plan to acquire skills

      Identify the preferred way to acquire needed skill sets: contracting, outsourcing, training, or hiring.

      • Some cloud projects will change the demand for some skills in the organization, and not all skills should be cultivated internally. Uncertainty about future skills and jobs will cause anxiety for your team and can lead to employee exit.
      • Use Info-Tech’s research to conduct a demand analysis to identify which new and critical skills should be acquired via training or hiring (rather than outsourcing or contracting).
      • Create a roadmap to clarify when training needs to be completed, a budget plan that accounts for training costs, and role descriptions that paint a picture of future work.
      • Within the confines of a collective agreement, managers may be required to retrain staff into new roles before those staff are required to do work in their new jobs. Failing to plan can be more consequential.
      • Remember that in cloud, a wealth of automation opportunities present a great option for offloading tasks as well!

      Info-Tech Insight

      Identify skills requirements and gaps as early as possible to avoid skills gaps later. Whether you plan to acquire skills via training or cross-training, hiring, contracting, or outsourcing, effectively building skills takes time. Use Info-Tech’s methodology to address skills gaps in a prioritized and rational way.

      Involve HR for implementation

      Your HR team should help you work through:

      • Which staff and managers will move to which roles, and any headcount changes.
      • Job descriptions, performance metrics, career paths, compensation, and succession planning.
      • Organizational change management and implementation plans.

      When do you need to involve HR?

      Role changes will result in job description changes.

      • New or changed job descriptions need to be evaluated for impact on pay, title, exempt status, career pathing, and more.
      • This is especially true in more traditional or unionized organizations that require specific and granular job descriptions of responsibilities.
      • Changed jobs will likely require union review and approval.

      You anticipate changes to the reporting structure.

      • Work with HR to develop a transition plan including communications, training to new managers, and support to new teams.

      You anticipate redundancies.

      • Your HR department can prepare you for difficult discussions, help you navigate labor laws, and support the offboarding process.

      You anticipate new positions.

      • Recruitment and hiring takes time. Give HR advance notice to support recruitment, hiring, and onboarding to ensure you hire the right people, with the right skills, at the right time.

      Training and development budget is required.

      • If training is a critical part of the onboarding process, don’t just assume funding is available. Work with HR to build your case.

      Related Info-Tech Research

      Define Your Cloud Vision

      Define your cloud vision before it defines you.

      Document Your Cloud Strategy

      Drive consensus by outlining how your organization will use the cloud.

      Map Technical Skills for a Changing Infrastructure & Operations Organization

      Be practical and proactive – identify needed technical skills for your future-state environment and the most efficient way to acquire them.

      Bibliography

      “2021 GitLab DevSecOps Survey.” Gitlab, 2021.
      “2022 State of the Cloud Report.” Flexera, 2022.
      “DevOps.” Atlassian, ND. Web. 21 July 2022.
      Atwood, Jeff. “The 2030 Self-Driving Car Bet.” Coding Horror, 4 Mar 2022. Web. 5 Aug 2022.
      Campbell, Andrew. “What is an operating model?” Operational Excellence Society, 12 May 2016. Web. 13 July 2022.
      “DevOps.” Atlassian, ND. Web. 21 July 2022.
      Ewenstein, Boris, Wesley Smith, Ashvin Sologar. “Changing change management” McKinsey, 1 July 2015. Web. 8 April 2022.
      Franco, Gustavo and Matt Brown. “How SRE teams are organized, and how to get started.” Google Cloud Blog, 26 June 2019. Web. July 13 2022.
      “Get started: Build a cloud operations team.” Microsoft, 10 May 2021.
      ITIL Foundation: ITIL 4 Edition. Axelos, 2019.
      Humble, Jez, Joanne Molesky, and Barry O’Reilly. Lean Enterprise: How High Performance Organizations Innovate at Scale. O’Reilly Media, 2015.
      Franco, Gustavo and Matt Brown. “How SRE teams are organized and how to get started.” 26 June 2019. Web. 21 July 2022.
      Galbraith, Jay. “The Star Model”. ND. Web. 21 July 2022.
      Kahnemanm Daniel, Dan Lovallo, and Olivier Sibony. “Before you make that big decision.” Harv Bus Rev. 2011 Jun; 89(6): 50-60, 137. PMID: 21714386.
      Kesler, Greg. “Star Model of Organizational Design.” YouTube, 1 Oct 2018. Web Video. 21 Jul 2022.
      Lakhani, Usman. “Site Reliability Engineering: What Is It? Why Is It Important for Online Businesses?” Info-Tech. Web. 25 May 2020.
      Mansour, Sherif. “Product Management: The role and best practices for beginners.” Atlassian Agile Coach, n.d.
      Murphy, Annie, Jamie Kirwin, Khalid Abdul Razak. “Operating Models: Delivering on strategy and optimizing processes.” EY, 2016.
      Shults, Carlos. “What is Platform Engineering? The Concept Behind the Term.” liatrio, 3 Aug 2021. Web. 5 Aug 2022.
      Sloss, Benjamin Treynor. Site Reliability Engineering Part I: Introduction. O’Reilly Media, 2017.
      “SRE vs. Platform Engineering.” Ambassador Labs, 8 Feb 2021.
      “The Qualities of Leadership: Leading Change.” Cornelius & Associates, n.d. Web.
      “Understand cloud operating models.” Microsoft, 02 Sept. 2022.
      Velichko, Ivan. “DevOps, SRE, and Platform Engineering.” 15 Mar 2022.

      Research Contributors and Experts

      Nenad Begovic

      Executive Director, Head of IT Operations

      MUFG Investor Services

      Desmond Durham

      Manager, ICT Planning & Infrastructure

      Trinidad & Tobago Unit Trust Corporation

      Virginia Roberts

      Director, Enterprise IT

      Denver Water

      Denis Sharp

      IT/LEAN Consultant

      Three anonymous contributors

      Create an Architecture for AI

      • Buy Link or Shortcode: {j2store}344|cart{/j2store}
      • member rating overall impact: 9.0/10 Overall Impact
      • member rating average dollars saved: $604,999 Average $ Saved
      • member rating average days saved: 49 Average Days Saved
      • Parent Category Name: Data Management
      • Parent Category Link: /data-management

      This research is designed to help organizations who are facing these challenges:

      • Deliver on the AI promise within the organization.
      • Prioritize the demand for AI projects and govern the projects to prevent overloading resources.
      • Have sufficient data management capability.
      • Have clear metrics in place to measure progress and for decision making.

      AI requires a high level of maturity in all data management capabilities, and the greatest challenge the CIO or CDO faces is to mature these capabilities sufficiently to ensure AI success.

      Our Advice

      Critical Insight

      • Build your target state architecture from predefined best-practice building blocks.
      • Not all business use cases require AI to increase business capabilities.
      • Not all organizations are ready to embark on the AI journey.
      • Knowing the AI pattern that you will use will simplify architecture considerations.

      Impact and Result

      • This blueprint will assist organizations with the assessment, planning, building, and rollout of their AI initiatives.
        • Do not embark on an AI project with an immature data management practice. Embark on initiatives to fix problems before they cripple your AI projects.
        • Using architecture building blocks will speed up the architecture decision phase.
      • The success rate of AI initiatives is tightly coupled with data management capabilities and a sound architecture.

      Create an Architecture for AI Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to understand why you need an underlying architecture for AI, review Info-Tech's methodology, and understand the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Assess business use cases for AI readiness

      Define business use cases where AI may bring value. Evaluate each use case to determine the company’s AI maturity in people, tools, and operations for delivering the correct data, model development, model deployment, and the management of models in the operational areas.

      • Create an Architecture for AI – Phase 1: Assess Business Use Cases for AI Readiness
      • AI Architecture Assessment and Project Planning Tool
      • AI Architecture Assessment and Project Planning Tool – Sample

      2. Design your target state

      Develop a target state architecture to allow the organization to effectively deliver in the promise of AI using architecture building blocks.

      • Create an Architecture for AI – Phase 2: Design Your Target State
      • AI Architecture Templates

      3. Define the AI architecture roadmap

      Compare current state with the target state to define architecture plateaus and build a delivery roadmap.

      • Create an Architecture for AI – Phase 3: Define the AI Architecture Roadmap
      [infographic]

      Workshop: Create an Architecture for AI

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Answer “Where To?”

      The Purpose

      Define business use cases where AI may add value and assess use case readiness.

      Key Benefits Achieved

      Know upfront if all required data resources are available in the required velocity, veracity, and variety to service the use case.

      Activities

      1.1 Review the business vision.

      1.2 Identify and classify business use cases.

      1.3 Assess company readiness for each use case.

      1.4 Review architectural principles and download and install Archi.

      Outputs

      List of identified AI use cases

      Assessment of each use case

      Data sources needed for each use case

      Archi installed

      2 Define the Required Architecture Building Blocks

      The Purpose

      Define architecture building blocks that can be used across use cases and data pipeline.

      Key Benefits Achieved

      The architectural building blocks ensure reuse of resources and form the foundation of a stepwise rollout.

      Activities

      2.1 ArchiMate modelling language overview.

      2.2 Architecture building block overview

      2.3 Identify architecture building blocks by use case.

      2.4 Define the target state architecture.

      Outputs

      A set of building blocks created in Archi

      Defined target state architecture using architecture building blocks

      3 Assess the Current State Architecture

      The Purpose

      Assess your current state architecture in the areas identified by the target state.

      Key Benefits Achieved

      Only evaluating the current state architecture that will influence your AI implementation.

      Activities

      3.1 Identify the current state capabilities as required by the target state.

      3.2 Assess your current state architecture.

      3.3 Define a roadmap and design implementation plateaus.

      Outputs

      Current state architecture documented in Archi

      Assessed current state using assessment tool

      A roadmap defined using plateaus as milestones

      4 Bridge the Gap and Create the Roadmap

      The Purpose

      Assess your current state against the target state and create a plan to bridge the gaps.

      Key Benefits Achieved

      Develop a roadmap that will deliver immediate results and ensure long-term durability.

      Activities

      4.1 Assess the gaps between current- and target-state capabilities.

      4.2 Brainstorm initiatives to address the gaps in capabilities

      4.3 Define architecture delivery plateaus.

      4.4 Define a roadmap with milestones.

      4.5 Sponsor check-in.

      Outputs

      Current to target state gap assessment

      Architecture roadmap divided into plateaus

      Enable Omnichannel Commerce That Delights Your Customers

      • Buy Link or Shortcode: {j2store}534|cart{/j2store}
      • member rating overall impact: 9.5/10 Overall Impact
      • member rating average dollars saved: $17,249 Average $ Saved
      • member rating average days saved: 7 Average Days Saved
      • Parent Category Name: Customer Relationship Management
      • Parent Category Link: /customer-relationship-management
      • Today’s customers expect to be able to transact with you in the channels of their choice. The proliferation of e-commerce, innovations in brick-and-mortar retail, and developments in mobile commerce and social media selling mean that IT organizations are managing added complexity in drafting a strategy for commerce enablement.
      • The right technology stack is critical in order to support world-class e-commerce and brick-and-mortar interactions with customers.

      Our Advice

      Critical Insight

      • Support the right transactional channels for the right customers: there is no “one-size-fits-all” approach to commerce enablement – understand your customers to drive selection of the right transactional channels.
      • Don’t assume that “traditional” commerce channels have stagnated: IoT, customer analytics, and blended retail are reinvigorating brick-and-mortar selling.
      • Don’t buy best-of-breed; buy best-for-you. Base commerce vendor selection on your requirements and use cases, not on the vendor’s overall performance.

      Impact and Result

      • Leverage Info-Tech’s proven, road-tested approach to using personas and scenarios to build strong business drivers for your commerce strategy.
      • Before selecting and deploying technology solutions, create a cohesive channel matrix outlining which channels your organization will support with transactional capabilities.
      • Understand evolving trends in the commerce solution space, such as AI-driven product recommendations and integration with other essential enterprise applications (i.e. CRM and marketing automation platforms).
      • Understand and apply operational best practices such as content optimization and dynamic personalization to improve the conversion rate via your e-commerce channels.

      Enable Omnichannel Commerce That Delights Your Customers Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Enable Omnichannel Commerce Deck – A deck outlining the importance of creating a cohesive omnichannel framework to improve your customer experience.

      E-commerce channels have proliferated, and traditional brick-and-mortar commerce is undergoing reinvention. In order to provide your customers with a strong experience, it's imperative to create a strategy – and to deploy the right enabling technologies – that allow for robust multi-channel commerce. This storyboard provides a concise overview of how to do just that.

      • Enable Omnichannel Commerce That Delights Your Customers – Phases 1-2

      2. Create Personas to Drive Omnichannel Requirements Template – A template to identify key customer personas for e-commerce and other channels.

      Customer personas are archetypal representations of your key audience segments. This template (and populated examples) will help you construct personas for your omnichannel commerce project.

      • Create Personas to Drive Omnichannel Requirements Template
      [infographic]

      Further reading

      Enable Omnichannel Commerce That Delights Your Customers

      Create a cohesive, omnichannel framework that supports the right transactions through the right channels for the right customers.

      Analyst Perspective

      A clearly outlined commerce strategy is a necessary component of a broader customer experience strategy.

      This is a picture of Ben Dickie, Research Lead, Research – Applications at Info-Tech Research Group

      Ben Dickie
      Research Lead, Research – Applications
      Info-Tech Research Group

      “Your commerce strategy is where the rubber hits the road, converting your prospects into paying customers. To maximize revenue (and provide a great customer experience), it’s essential to have a clearly defined commerce strategy in place.

      A strong commerce strategy seeks to understand your target customer personas and commerce journey maps and pair these with the right channels and enabling technologies. There is not a “one-size-fits-all” approach to selecting the right commerce channels: while many organizations are making a heavy push into e-commerce and mobile commerce, others are seeking to differentiate themselves by innovating in traditional brick-and-mortar sales. Hybrid channel design now dominates many commerce strategies – using a blend of e-commerce and other channels to deliver the best-possible customer experience.

      IT leaders must work with the business to create a succinct commerce strategy that defines personas and scenarios, outlines the right channel matrix, and puts in place the right enabling technologies (for example, point-of-sale and e-commerce platforms).”

      Stop! Are you ready for this project?

      This Research Is Designed For:

      • IT leaders and business analysts supporting their commercial and marketing organizations in developing and executing a technology enablement strategy for e-commerce or brick-and-mortar commerce.
      • Any organization looking to develop a persona-based approach to identifying the right channels for their commerce strategy.

      This Research Will Help You:

      • Identify key personas and customer journeys for a brick-and-mortar and/or e-commerce strategy.
      • Select the right channels for your commerce strategy and build a commerce channel matrix to codify the results.
      • Review the “art of the possible” and new developments in brick-and-mortar and e-commerce execution.

      This Research Will Also Assist:

      • Sales managers, brand managers, and any marketing professional looking to build a cohesive commerce strategy.
      • E-commerce or POS project teams or working groups tasked with managing an RFP process for vendor selection.

      This Research Will Help Them:

      • Build a persona-centric commerce strategy.
      • Understand key technology trends in the brick-and-mortar and e-commerce space.

      Executive Summary

      Your Challenge

      Today’s customers expect to be able to transact with you in the channels of their choice.

      The proliferation of e-commerce, innovations in brick-and-mortar retail, and developments in mobile commerce and social media selling mean that IT organizations are managing added complexity in drafting a strategy for commerce enablement.

      The right technology stack is critical to support world-class e-commerce and brick-and-mortar interactions with customers.

      Common Obstacles

      Many organizations do not define strong, customer-centric drivers for dictating which channels they should be investing in for transactional capabilities.

      As many retailers look to move shopping experiences online during the pandemic, the impetus for having a strong e-commerce suite has markedly increased. The proliferation of commerce vendors has made it difficult to identify and shortlist the right solution, while the pandemic has also highlighted the importance of adopting new vendors quickly and efficiently: companies need to understand the top players in different commerce market landscapes.

      IT is receiving a growing number of commerce platform requests and must be prepared to speak intelligently about requirements and the “art of the possible.”

      Info-Tech’s Approach

      • Leverage Info-Tech’s proven, road-tested approach to using personas and scenarios to build strong business drivers for your commerce strategy.
      • Before selecting and deploying technology solutions, create a cohesive channel matrix outlining which channels your organization will support with transactional capabilities.
      • Understand evolving trends in the commerce solution space, such as AI-driven product recommendations and integration with other essential enterprise applications (i.e. customer relationship management [CRM] and marketing automation platforms).
      • Understand and apply operational best practices such as content optimization and dynamic personalization to improve the conversion rate via your e-commerce channels.

      Info-Tech Insight

      • Support the right transactional channels for the right customers: there is no “one-size-fits-all” approach to commerce enablement – understand your customers to drive selection of the right transactional channels.
      • Don’t assume that “traditional” commerce channels have stagnated: IoT, customer analytics, and blended retail are reinvigorating brick-and-mortar selling.
      • Don’t buy best-of-breed; buy best-for-you: base commerce vendor selection on your requirements and use cases, not on the vendor’s overall performance.

      A strong commerce strategy is an essential component of a savvy approach to customer experience management

      A commerce strategy outlines an organization’s approach to selling its products and services. A strong commerce strategy identifies target customers’ personas, commerce journeys that the organization wants to support, and the channels that the organization will use to transact with customers.

      Many commerce strategies encompass two distinct but complementary branches: a commerce strategy for transacting through traditional channels and an e-commerce strategy. While the latter often receives more attention from IT, it still falls on IT leaders to provide the appropriate enabling technologies to support traditional brick-and-mortar channels as well. Traditional channels have also undergone a digital renaissance in recent years, with forward-looking companies capitalizing on new technology to enhance customer experiences in their stores.

      Traditional Channels

      • Physical Stores (Brick and Mortar)
      • Kiosks or Pop-Up Stores
      • Telesales
      • Mail Orders
      • EDI Transactions

      E-Commerce Channels

      • E-Commerce Websites
      • Mobile Commerce Apps
      • Embedded Social Shopping
      • Customer Portals
      • Configure Price Quote Tool Sets (CPQ)
      • Hybrid Retail

      Info-Tech Insight

      To better serve their customers, many companies position themselves as “click-and-mortar” shops – allowing customers to transact at a store or online.

      Customers’ expectations are on the rise: meet them!

      Today’s consumers expect speed, convenience, and tailored experiences at every stage of the customer lifecycle. Successful organizations strive to support these expectations.

      58%
      of retail customers admitted that their expectations now are higher than they were a year ago (FinancesOnline).

      70%
      of consumers between the ages of 18 and 34 have increasing customer expectations year after year (FinancesOnline).

      69%
      of consumers now expect store associates to be armed with a mobile device to deliver value-added services, such as looking up product information and checking inventory (V12).

      73%
      of support leaders agree that customer expectations are increasing, but only…

      42%
      of support leaders are confident that they’re actually meeting those expectations.

      How can you be sure that you are meeting your customers’ expectations?

      1. Offer more personalization throughout the entire customer journey
      2. Practice quality customer service – ensure staff have up-to-date knowledge and offer quick resolution time for complaints
      3. Focus on offering low-effort experiences and easy-to-use platforms (i.e. “one-click buying”)
      4. Ensure your products and services perform well and do what they’re meant to do
      5. Ensure omnichannel availability – 9 in 10 consumers want a seamless omnichannel experience

      Info-Tech Insight

      Customers expect to interact with organizations through the channels of their choice. Now more than ever, you must enable your organization to provide tailored commerce and transactional experiences.

      Omnichannel commerce is the way of the future

      Create a strategy that embraces this reality with the right tools!

      Get ahead of the competition by doing omnichannel right! Devise a strategy that allows you to create and maintain a consistent, seamless commerce experience by optimizing operations with an omnichannel framework. Customers want to interact with you on their own terms, and it falls to IT to ensure that applications are in place to support and manage both traditional and e-commerce channels. There must also be consistency of copy, collateral, offers, and pricing between commerce channels.

      71%
      of consumers want a consistent experience across all channels, but only…

      29%
      say that they actually get it.

      (Source: Business 2 Community, 2020)

      Omnichannel is a “multichannel approach that aims to provide customers with a personalized, integrated, and seamless shopping experience across diverse touchpoints and devices.”
      Source: RingCentral, 2021

      IT is responsible for providing technology enablement of the commerce strategy: e-commerce platforms are a cornerstone

      An e-commerce platform is an enterprise application that provides end-to-end capabilities for allowing customers to purchase products or services from your company via an online channel (e.g. a traditional website, a mobile application, or an embedded link in a social media post). Modern e-commerce platforms are essential for delivering a frictionless customer journey when it comes to purchasing online.

      $6.388
      trillion dollars worth of sales will be conducted online by 2024 (eMarketer, 14 Jan. 2021).

      44%
      of all e-commerce transactions are expected to be completed via a mobile device by 2024 (Insider).

      21.8%
      of all sales will be made from online purchases by 2024 (eMarketer, 14 Jan. 2021).

      Strong E-Commerce Platforms Enable a Wide Range of Functional Areas:

      • Product Catalog Management
      • Web Content Delivery
      • Product Search Engine
      • Inventory Management
      • Shopping Cart Management
      • Discount and Coupon Management
      • Return Management and Reverse Logistics
      • Dynamic Personalization
      • Dynamic Promotions
      • Predictive Re-Targeting
      • Predictive Product Recommendations
      • Transaction Processing
      • Compliance Management
      • Commerce Workflow Management
      • Loyalty Program Management
      • Reporting and Analytics

      An e-commerce solution boosts the effectiveness and efficiency of your operations and drives top-line growth

      Take time to learn the capabilities of modern e-commerce applications. Understanding the “art of the possible” will help you to get the most out of your e-commerce platform.

      An e-commerce platform helps marketers and sales staff in three primary ways:

      1. It allows the organization to effectively and efficiently operate e-commerce operations at scale.
      2. It allows commercial staff to have a single system for managing and monitoring all commercial activity through online channels.
      3. It allows the organization to improve the customer-facing e-commerce experience, boosting conversions and top-line sales.

      A dedicated e-commerce platform improves the efficiency of customer-commerce operations

      • Workflow automation reduces the amount of time spent executing dynamic e-commerce campaigns.
      • The use of internal or third-party data increases conversion effectiveness from customer databases across the organization.

      Info-Tech Insight

      A strong e-commerce provides marketers with the data they need to produce actionable insights about their customers.

      Case Study

      INDUSTRY - Retail
      SOURCE - Salesforce (a)

      PetSmart improves customer experience by leveraging a new commerce platform in the Salesforce ecosystem

      PetSmart

      PetSmart is a leading retailer of pet products, with a heavy footprint across North America. Historically, PetSmart was a brick-and-mortar retailer, but it has placed a heavy emphasis on being a true multi-channel “click-and-mortar” retailer to ensure it maintains relevance against competitors like Amazon.

      E-Commerce Overhaul Initiative

      To improve its e-commerce capabilities, PetSmart recognized that it needed to consolidate to a single, unified e-commerce platform to realize a 360-degree view of its customers. A new platform was also required to power dynamic and engaging experiences, with appropriate product recommendations and tailored content. To pursue this initiative, the company settled on Salesforce.com’s Commerce Cloud product after an exhaustive requirements definition effort and rigorous vendor selection approach.

      Results

      After platform implementation, PetSmart was able to effortlessly handle the massive transaction volumes associated with Black Friday and Cyber Monday and deliver 1:1 experiences that boosted conversion rates.

      PetSmart standardized on the Commerce Cloud from Salesforce to great effect.

      This is an image of the journey from Discover & Engage to Retain & Advocate.

      Case Study

      Icebreaker exceeds customer expectations by using AI to power product recommendations

      INDUSTRY - Retail
      SOURCE - Salesforce (b)

      Icebreaker

      Icebreaker is a leading outerwear and lifestyle clothing company, operating six global websites and owning over 5,000 stores across 50 countries. Icebreaker is focused on providing its shoppers with accurate, real-time product suggestions to ensure it remains relevant in an increasingly competitive online market.

      E-Commerce Overhaul Initiative

      To improve its e-commerce capabilities, Icebreaker recognized that it needed to adopt a predictive recommendation engine that would offer its customers a more personalized shopping experience. This new system would need to leverage relevant data to provide both known and anonymous shoppers with product suggestions that are of interest to them. To pursue this initiative, Icebreaker settled on using Salesforce.com’s Commerce Cloud Einstein, a fully integrated AI.

      Results

      After integrating Commerce Cloud Einstein on all its global sites, Icebreaker was able to cross-sell and up-sell its merchandise more effectively by providing its shoppers with accurate product recommendations, ultimately increasing average order value.

      IT must also provide technology enablement for other channels, such as point-of-sale systems for brick-and-mortar

      Point-of-sale systems are the “real world” complement to e-commerce platforms. They provide functional capabilities for selling products in a physical store, including basic inventory management, cash register management, payment processing, and retail analytics. Many firms struggle with legacy POS environments that inhibit a modern customer experience.

      $27.338
      trillion dollars in retail sales are expected to be made globally in 2022 (eMarketer, 2022).

      84%
      of consumers believe that retailers should be doing more to integrate their online and offline channels (Invoca).

      39%
      of consumers are unlikely or very unlikely to visit a retailer’s store if the online store doesn’t provide physical store inventory information (V12).

      Strong Point-of-Sale Platforms Enable a Wide Range of Functional Areas:

      • Product Catalog Management
      • Discount Management
      • Coupon Management and Administration
      • Cash Management
      • Cash Register Reconciliation
      • Product Identification (Barcode Management)
      • Payment Processing
      • Compliance Management
      • Basic Inventory Management
      • Commerce Workflow Management
      • Exception Reporting and Overrides
      • Loyalty Program Management
      • Reporting and Analytics

      E-commerce and POS don’t live in isolation

      They’re key components of a well-oiled customer experience ecosystem!

      Integrate commerce solutions with other customer experience applications – and with ERP or logistics systems – to handoff transactions for order fulfilment.

      Having a customer master database – the central place where all up-to-the-minute data on a customer profile is stored – is essential for traditional and e-commerce success. Typically, the POS or e-commerce platform is not the system of record for the master customer profile: this information lives in a CRM platform or customer data warehouse. Conceptually, this system is at the center of the customer-experience ecosystem.

      Strong POS and e-commerce solutions orchestrate transactions but typically do not do the heavy lifting in terms of order fulfilment, shipping logistics, economic inventory management, and reverse logistics (returns). In an enterprise-grade environment, these activities are executed by an enterprise resource planning (ERP) solution – integrating your commerce systems with a back-end ERP solution is a crucial step from an application architecture point of view.

      This is an example of a customer experience ecosystem.  Core Apps (CRM, ERP): MMS Suite; E-Commerce; POS; Web CMS; Data Marts/BI Tools; Social Media Platforms

      Case Study

      INDUSTRY - Retail
      SOURCES - Amazon, n.d. CNET, 2020

      Amazon is creating a hybrid omnichannel experience for retail by introducing innovative brick-and-mortar stores

      Amazon

      Amazon began as an online retailer of books in the mid-1990s, and rapidly expanded its product portfolio to nearly every category imaginable. Often hailed as the foremost success story in online commerce, the firm has driven customer loyalty via consistently strong product recommendations and a well-designed site.

      Bringing Physical Retail Into the Digital Age

      Beginning in 2016 (and expanding in 2018), Amazon introduced Amazon Go, a next-generation grocery retailer, to the Seattle market. While most firms that pursue an e-commerce strategy traditionally come from a brick-and-mortar background, Amazon upended the usual narrative: the world’s largest online retailer opening physical stores to become a true omnichannel, “click-and-mortar” vendor. From the get-go, Amazon Go focused on innovating the physical retail experience – using cameras, IoT capabilities, and mobile technologies to offer “checkout-free” virtual shopping carts that automatically know what products customers take off the shelves and bill their Amazon accounts accordingly.

      Results

      Amazon received a variety of industry and press accolades for re-inventing the physical store experience and it now owns and operates seven separate store brands, with more still on the horizon.

      Case Study

      INDUSTRY - Retail
      SOURCES - Glossy, 2020

      Old Navy

      Old Navy is a clothing and accessories retail company that owns and operates over 1,200 stores across North America and China. Typically, Old Navy has relied on using traditional marketing approaches, but recently it has shifted to producing more digitally focused campaigns to drive revenue.

      Bringing Physical Retail Into the Digital Age

      To overcome pandemic-related difficulties, including temporary store closures, Old Navy knew that it had to have strong holiday sales in 2020. With the goal of stimulating retail sales growth and maximizing its pre-existing omnichannel capabilities, Old Navy decided to focus more of its holiday campaign efforts online than in years past. With this campaign centered on connected TV platforms, such as Hulu, and social media channels including Facebook, Instagram, and TikTok, Old Navy was able to take a more unique, fun, and good-humored approach to marketing.

      Results

      Old Navy’s digitally focused campaign was a success. When compared with third quarter sales figures from 2019, third quarter net sales for 2020 increased by 15% and comparable sales increased by 17%.

      Info-Tech offers various levels of support to best suit your needs

      DIY Toolkit

      “Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful.”

      Guided Implementation

      “Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track.”

      Workshop

      “We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place.”

      Consulting

      “Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project.”

      Diagnostics and consistent frameworks used throughout all four options

      Guided Implementation

      What does a typical GI on this topic look like?

      Phase 1 Phase 2 Phase 3 Phase 4 Phase 5

      Call #1: Scope requirements, objectives, and your specific challenges.

      Call #2: Assess current maturity.

      Call #4: Identify relationship between current initiatives and capabilities.

      Call #6: Identify strategy risks.

      Call #8: Identify and prioritize improvements.

      Call #3: Identify target-state capabilities.

      Call #5: Create initiative profiles.

      Call #7: Identify required budget.

      Call #9: Summarize results and plan next steps.

      A Guided Implementation (GI) is a series of calls with an Info-Tech analyst to help implement our best practices in your organization.

      A typical GI is between 8 to 12 calls over the course of 4 to 6 months.

      Enable Omnichannel Commerce That Delights Your Customers – Project Overview

      1. Identify Critical Drivers for Your Omnichannel Commerce Strategy 2. Map Drivers to the Right Channels and Technologies
      Best Practice Toolkit

      1.1 Assess Personas and Scenarios

      1.2 Create Key Drivers and Metrics

      2.1 Build the Commerce Channel Matrix

      2.2 Review Technology and Trends Primer

      Guided Implementations
      • Validate customer personas.
      • Validate commerce scenarios.
      • Review key drivers and metrics.
      • Build the channel matrix.
      • Discuss technology and trends.
      Onsite Workshop

      Module 1:

      Module 2:

      Identify Critical Drivers for Your Omnichannel Commerce Strategy

      Map Drivers to the Right Channels and Technologies

      Phase 1 Outcome:

      Phase 2 Outcome:

      An initial shortlist of customer-centric drivers for your channel strategy and supporting metrics.

      A completed commerce channel matrix tailored to your organization, and a snapshot of enabling technologies and trends.

      Phase 1

      Identify Critical Drivers for Your Omnichannel Commerce Strategy

      1.1 Assess Personas and Scenarios

      1.2 Create Key Drivers and Metrics

      Enable Omnichannel Commerce That Delights Your Customers

      Step 1.1

      Assess Personas and Scenarios

      This step will walk you through the following activities:

      1.1.1 Build key customer personas for your commerce strategy.

      1.1.2 Create commerce scenarios (journey maps) that you need to enable.

      Identify Critical Drivers for Your Omnichannel Commerce Strategy

      This step involves the following participants:

      • Business stakeholders (Sales, Marketing)
      • IT project team

      Outcomes of this step:

      • Critical customer personas
      • Key traditional and e-commerce scenarios

      Use customer personas to picture who will be using your commerce channels and guide scenario design and key drivers

      What Are Personas?

      Personas are detailed descriptions of the targeted audience of your e-commerce presence. Effective personas:

      • Express and focus on the major needs and expectations of the most important user groups.
      • Give a clear picture of the typical user’s behavior.
      • Aid in uncovering universal features and functionality.
      • Describe real people with backgrounds, goals, and values.

      Source: Usability.gov, n.d.

      Why Are Personas Important?

      Personas help:

      • Focus the development of commerce platform features on the immediate needs of the intended audience.
      • Detail the level of customization needed to ensure content is valuable to the user.
      • Describe how users may behave when certain audio and visual stimulus are triggered from the website.
      • Outline the special design considerations required to meet user accessibility needs.

      Key Elements of a Persona:

      • Persona Group (e.g. executives)
      • Demographics (e.g. nationality, age, language spoken)
      • Purpose of Using Commerce Channels (e.g. product search versus ready to transact)
      • Typical Behaviors and Tendencies (e.g. goes to different websites when cannot find products in 20 seconds)
      • Technological Environment of User (e.g. devices, browsers, network connection)
      • Professional and Technical Skills and Experiences (e.g. knowledge of websites, area of expertise)

      Use Info-Tech’s guidelines to assist in the creation of personas

      How many personas should I create?

      The number of personas that should be created is based on the organizational coverage of your commerce strategy. Here are some questions you should ask:

      • Do the personas cover a majority of your revenues or product lines?
      • Is the number manageable for your project team to map out?

      How do I prioritize which personas to create?

      The identified personas should generate the most revenue – or provide a significant opportunity – for your business. Here are some questions that you should ask:

      • Are the personas prioritized based on the revenue they generate for the business?
      • Is the persona prioritization process considering both the present and future revenues the persona is generating?

      Sample: persona for e-commerce platform

      Example

      Persona quote: “After I call the company about the widget, I would usually go onto the company’s website and look at further details about the product. How am I supposed to do so when it is so hard to find the company’s website on everyday search engines, such as Google, Yahoo, or Bing?”

      Michael is a middle-aged manager working in the financial district. He wants to buy the company’s widgets for use in his home, but since he is distrusting of online shopping, he prefers to call the company’s call center first. Afterwards, if Michael is convinced by the call center representative, he will look at the company’s website for further research before making his purchase.

      Michael does not have a lot of free time on his hands, and tries to make his free time as relaxing as possible. Due to most of his work being client-facing, he is not in front of a computer most of the time during his work. As such, Michael does not consider himself to be skilled with technology. Once he makes the decision to purchase, Michael will conduct online transactions and pay most delivery costs due to his shortage of time.

      Needs:

      • Easy-to-find website and widget information.
      • Online purchasing and delivery services.
      • Answer to his questions about the widget.
      • To maintain contact post-purchase for easy future transactions.

      Info-Tech Tip

      The quote attached to a persona should be from actual quotes that your customers have used when you reviewed your voice of the customer (VoC) surveys or focus groups to drive home the impact of their issues with your company.

      1.1.1 Activity: Build personas for your key customers that you’ll need to support via traditional and e-commerce channels

      1 hour

      1. In two to four groups, list all the major, target customer personas that need to be built. In doing so, consider the people who interact with your e-commerce site (or other channels) most often.
      2. Build a demographic profile for each customer persona. Include information such as age, geographic location, occupation, and annual income.
      3. Augment the persona with a psychographic profile. Consider the goals and objectives of each customer persona and how these might inform buyer behaviors.
      4. Introduce your group’s personas to the entire group, in a round-robin fashion, as if you are introducing your persona at a party.
      5. Summarize the personas in a persona map. Rank your personas according to importance and remove any duplicates.
      6. Use Info-Tech’s Create Personas to Drive Omnichannel Requirements Template to assist.

      Info-Tech Insight

      Persona building is typically used for understanding the external customer; however, if you need to gain a better understanding of the organization’s internal customers (those who will be interacting with the e-commerce platform), personas can also be built for this purpose. Examples of useful internal personas are sales managers, brand managers, and customer service directors.

      1.1.1 Activity: Build personas for your key customers that you’ll need to support via traditional and e-commerce channels (continued)

      Input

      • Customer demographics and psychographics

      Output

      • List of prioritized customer personas

      Materials

      • Whiteboard
      • Markers

      Participants

      • Project team

      Build use-case scenarios to model the transactional customer journey and inform drivers for your commerce strategy

      A use-case scenario is a story or narrative that helps explore the set of interactions that a customer has with an organization. Scenario mapping will help identify key business and technology drivers as well as more granular functional requirements for POS or e-commerce platform selection.

      A GOOD SCENARIO…

      • Describes specific task(s) that need to be accomplished.
      • Describes user goals and motivations.
      • Describes interactions with a compelling but not overwhelming amount of detail.
      • Can be rough, as long as it provokes ideas and discussion.

      SCENARIOS ARE USED TO...

      • Provide a shared understanding about what a user might want to do and how they might want to do it.
      • Help construct the sequence of events that are necessary to address in your user interface(s).

      TO CREATE GOOD SCENARIOS…

      • Keep scenarios high level, not granular, in nature.
      • Identify as many scenarios as possible. If you’re time constrained, try to develop two to three key scenarios per persona.
      • Sketch each scenario out so that stakeholders understand the goal of the scenario.

      1.1.2 Exercise: Build commerce user scenarios to understand what you want your customers to do from a transactional viewpoint

      1 hour

      Example

      Simplified E-Commerce Workflow Purchase Products

      This image contains an example of a Simplified E-Commerce Workflow Purchase Products

      Step 1.2

      Create Key Drivers and Metrics

      This step will walk you through the following activities:

      • Create the business drivers you need to enable with your commerce strategy.
      • Enumerate metrics to track the efficacy of your commerce strategy.

      Identify Critical Drivers for Your Omnichannel Commerce Strategy

      This step involves the following participants:

      • Business stakeholders (Sales, Marketing)
      • IT project team

      Outcomes of this step:

      • Business drivers for the commerce strategy
      • Metrics and key performance indicators for the commerce strategy

      1.2 Finish elaboration of your scenarios and map them to your personas: identify core business drivers for commerce

      1.5 hours

      1. List all commerce scenarios required to satisfy the immediate needs of your personas.
        1. Does the use-case scenario address commonly felt user challenges?
        2. Can the scenario be used by those with changing behaviors and tendencies?
      2. Look for recurring themes in use-case scenarios (for example, increasing average transaction cost through better product recommendations) and identify business drivers: drivers are common thematic elements that can be found across multiple scenarios. These are the key principles for your commerce strategy.
      3. Prioritize your use cases by leveraging the priorities of your business drivers.

      Example

      This is an example of how step 1.2 can help you identify business drivers

      1.2 Finish elaboration of your scenarios and map them to your personas: identify core business drivers for commerce (continuation)

      Input

      • User personas

      Output

      • List of use cases
      • Alignment of use cases to business objectives

      Materials

      • Whiteboard
      • Markers

      Participants

      • Business Analyst
      • Developer
      • Designer

      Show the benefits of commerce solution deployment with metrics aimed at both overall efficacy and platform adoption

      The ROI and perceived value of the organization’s e-commerce and POS solutions will be a critical indication of the success of the suite’s selection and implementation.

      Commerce Strategy and Technology Adoption Metrics

      EXAMPLE METRICS

      Commerce Performance Metrics

      Average revenue per unique transaction

      Quantity and quality of commerce insights

      Aggregate revenue by channel

      Unique customers per channel

      Savings from automated processes

      Repeat customers per channel

      User Adoption and Business Feedback Metrics

      User satisfaction feedback

      User satisfaction survey with technology

      Business adoption rates

      Application overhead cost reduction

      Info-Tech Insight

      Even if e-commerce metrics are difficult to track right now, the implementation of a dedicated e-commerce platform brings access to valuable customer intelligence from data that was once kept in silos.

      Phase 2

      Map Drivers to the Right Channels and Technologies

      2.1 Build the Commerce Channel Matrix

      2.2 Review Technology and Trends Primer

      Enable Omnichannel Commerce That Delights Your Customers

      Step 2.1

      Build the Commerce Channel Matrix

      This step will walk you through the following activities:

      • Based on your business drivers, create a blended mix of e-commerce channels that will suit your organization’s and customers’ needs.

      Map Drivers to the Right Channels and Technologies

      This step involves the following participants:

      • Business stakeholders (Sales, Marketing)
      • IT project team

      Outcomes of this step:

      • Commerce channel map

      Pick the transactional channels that align with your customer personas and enable your target scenarios and drivers

      Traditional Channels

      E-Commerce Channels

      Hybrid Channels

      Physical stores (brick and mortar) are the mainstay of retailers selling tangible goods – some now also offer intangible service delivery.

      E-commerce websites as exemplified by services like Amazon are accessible by a browser and deliver both goods and services.

      Online ordering/in-store fulfilment is a model whereby customers can place orders online but pick the product up in store.

      Telesales allows customers to place orders over the phone. This channel has declined in favor of mobile commerce via smartphone apps.

      Mobile commerce allows customers to shop through a dedicated, native mobile application on a smartphone or tablet.

      IoT-enabled smart carts/bags allow customers to shop in store, but check-out payments are handled by a mobile application.

      Mail order allows customers to send (”snail”) mail orders. A related channel is fax orders. Both have diminished in favor of e-commerce.

      Social media embedded shopping allows customers to order products directly through services such as Facebook.

      Info-Tech Insight

      Your channel selections should be driven by customer personas and scenarios. For example, social media may be extensively employed by some persona types (i.e. millennials) but see limited adoption in other demographics or use cases (i.e. B2B).

      2.1 Activity: Build your commerce channel matrix

      30 minutes

      1. Inventory which transactional channels are currently used by your firm (segment by product lines if variation exists).
      2. Interview product leaders, sales leaders, and marketing managers to determine if channels support transactional capabilities or are used for marketing and service delivery.
      3. Review your customer personas, scenarios, and drivers and assess which of the channels you will use in the future to sell products and services. Document below.

      Example: Commerce Channel Map

      Product Line A Product Line B Product Line C
      Currently Used? Future Use? Currently Used? Future Use? Currently Used? Future Use?
      Store Yes Yes No No No No
      Kiosk Yes No No No No No
      E-Commerce Site/Portal No Yes Yes Yes Yes Yes
      Mobile App No No Yes Yes No Yes
      Embedded Social Yes Yes Yes Yes Yes Yes

      Input

      • Personas, scenarios, and driver

      Output

      • Channel map

      Materials

      • Whiteboard
      • Markers

      Participants

      • Project team

      Step 2.2

      Review Technology and Trends Primer

      This step will walk you through the following activities:

      • Review the scope of e-commerce and POS solutions and understand key drivers impacting e-commerce and traditional commerce.

      Map Drivers to the Right Channels and Technologies

      This step involves the following participants:

      • Business stakeholders (Sales, Marketing)
      • IT project team

      Outcomes of this step:

      • Understanding of key technologies
      • Understanding of key trends

      Application spotlight: e-commerce platforms

      How It Enables Your Strategy

      • Modern e-commerce platforms provide capabilities for end-to-end orchestration of online commerce experiences, from product site deployment to payment processing.
      • Some e-commerce platforms are purpose-built for business-to-business (B2B) commerce, emphasizing customer portals and EDI features. Other e-commerce vendors place more emphasis on business-to-consumer (B2C) capabilities, such as product catalog management and executing transactions at scale.
      • There has been an increasing degree of overlap between traditional web experience management solutions and the e-commerce market; for example, in 2018, Adobe acquired Magento to augment its overall web experience offering within Adobe Experience Manager.
      • E-commerce platforms typically fall short when it comes to order fulfilment and logistics; this piece of the puzzle is typically orchestrated via an ERP system or logistics management module.
      • This research provides a starting place for defining e-commerce requirements and selection artefacts.

      Key Trends

      • E-commerce vendors are rapidly supporting a variety of form factors and integration with other channels such as social media. Mobile is sufficiently popular that some vendors and industry commentators refer to it as “m-commerce” to differentiate app-based shopping experiences from those accessed through a traditional browser.
      • Hybrid commerce is driving more interplay between e-commerce solutions and POS.

      E-Commerce KPIs

      Strong e-commerce applications can improve:

      • Bounce Rates
      • Exit Rates
      • Lead Conversion Rates
      • Cart Abandonment Rates
      • Re-Targeting Efficacy
      • Average Cart Size
      • Average Cart Value
      • Customer Lifetime Value
      • Aggregate Reach/Impressions

      Familiarize yourself with the e-commerce market

      How it got here

      Initial Traction as the Dot-Com Era Came to Fruition

      Unlike some enterprise application markets, such as CRM, the e-commerce market appeared almost overnight during the mid-to-late nineties as the dot-com explosion fueled the need to have reliable solutions for executing transactions online.

      Early e-commerce solutions were less full-fledged suites than they were mediums for payment processing and basic product list management. PayPal and other services like Digital River were pioneers in the space, but their functionality was limited vis-à-vis tools such as web content management platforms, and their ability to amalgamate and analyze the data necessary for dynamic personalization and re-targeting was virtually non-existent.

      Rapidly Expanding Scope of Functional Capabilities as the Market Matured

      As marketers became more sophisticated and companies put an increased focus on customer experience and omnichannel interaction, the need arose for platforms that were significantly more feature rich than their early contemporaries. In this context, vendors such as Shopify and Demandware stepped into the limelight, offering far richer functionality and analytics than previous offerings, such as asset management, dynamic personalization, and the ability to re-target customers who abandoned their carts.

      As the market has matured, there has also been a series of acquisitions of some players (for example, Demandware by Salesforce) and IPOs of others (i.e. Shopify). Traditional payment-oriented services like PayPal still fill an important niche, while newer entrants like Square seek to disrupt both the e-commerce market and point-of-sale solutions to boot.

      Familiarize yourself with the e-commerce market

      Where it’s going

      Support for a Proliferation of Form Factors and Channels

      Modern e-commerce solutions are expanding the number of form factors (smartphones, tablets) they support via both responsive design and in-app capabilities. Many platforms now also support embedded purchasing options in non-owned channels (for example, social media). With the pandemic leading to a heightened affinity for online shopping, the importance of fully using these capabilities has been further emphasized.

      AI and Machine Learning

      E-commerce is another customer experience domain ripe for transformation via the potential of artificial intelligence. Machine learning algorithms are being used to enhance the effectiveness of dynamic personalization of product collateral, improve the accuracy of product recommendations, and allow for more effective re-targeting campaigns of customers who did not make a purchase.

      Merger of Online Commerce and Traditional Point-of-Sale

      Many e-commerce vendors – particularly the large players – are now going beyond traditional e-commerce and making plays into brick-and-mortar environments, offering point-of-sale capabilities and the ability to display product assets and customizations via augmented reality – truly blending the physical and virtual shopping experience.

      Emphasis on Integration with the Broader Customer Experience Ecosystem

      The big names in e-commerce recognize they don’t live on an island: out-of-the-box integrations with popular CRM, web experience, and marketing automation platforms have been increasing at a breakneck pace. Support for digital wallets has also become increasingly popular, with many vendors integrating contactless payment technology (i.e. Apple Pay) directly into their applications.

      E-Commerce Vendor Snapshot: Part 1

      Mid-Market E-Commerce Solutions

      This image contains the logos for the following Companies: Magento; Spryker; Bigcommerce; Woo Commerce; Shopify

      E-Commerce Vendor Snapshot: Part 2

      Large Enterprise and Full-Suite E-Commerce Platforms

      This image contains the logos for the following Companies: Salesforce commerce cloud; Oracle Commerce Cloud; Adobe Commerce Cloud; Sitecore; Sap Hybris Commerce

      Speak with category experts to dive deeper into the vendor landscape

      • Fact-based reviews of business software from IT professionals.
      • Product and category reports with state-of-the-art data visualization.
      • Top-tier data quality backed by a rigorous quality assurance process.
      • User-experience insight that reveals the intangibles of working with a vendor.

      Software Reviews is powered by Info-Tech

      Technology coverage is a priority for Info-Tech, and SoftwareReviews provides the most comprehensive unbiased data on today’s technology. The insights of our expert analysts provide unparalleled support to our members at every step of their buying journey.

      CLICK HERE to access SoftwareReviews Comprehensive software reviews to make better IT decisions.

      We collect and analyze the most detailed reviews on enterprise software from real users to give you an unprecedented view into the product and vendor before you buy.

      Evaluate software category leaders through vendor rankings and awards

      SoftwareReviews

      This is an image of the data quarant report

      The Data Quadrant is a thorough evaluation and ranking of all software in an individual category to compare platforms across multiple dimensions.

      This is an image of the data quarant report chart

      Vendors are ranked by their Composite Score, based on individual feature evaluations, user satisfaction rankings, vendor capability comparisons, and likeliness to recommend the platform.

      This is a image of the Emotional Footprint Report

      The Emotional Footprint is a powerful indicator of overall user sentiment toward the relationship with the vendor, capturing data across five dimensions.

      This is a image of the Emotional Footprint Report chart

      Vendors are ranked by their Customer Experience (CX) Score, which combines the overall Emotional Footprint rating with a measure of the value delivered by the solution.

      Leading B2B E-Commerce Platforms

      As of February 2022

      Data Quadrant

      This image contains a screenshot of the Data Quadrant chart for B2B E-commerce

      Emotional Footprint

      This image contains a screenshot of the Emotional Footprint chart for B2B E-commerce

      Leading B2C E-Commerce Platforms

      As of February 2022

      Data Quadrant

      This image contains a screenshot of the Data Quadrant chart for B2C E-commerce

      Emotional Footprint

      This image contains a screenshot of the Emotional Footprint chart for B2C E-commerce

      Application spotlight: point-of-sale solutions

      How It Enables Your Strategy

      • Point-of-sale solutions provide capabilities for cash register/terminal management, transaction processing, and lightweight inventory management.
      • Many POS vendors also offer products that have the ability to create orders from EDI, phone, or fax channels.
      • An increasing emphasis has been placed on retail analytics by POS vendors – providing reporting and analysis tools to help with inventory planning, promotion management, and product recommendations.
      • Integration of POS systems with a central customer data warehouse or other system of record for customer information allows for the ability to build richer customer profiles and compare shopping habits in physical stores against other transactional channels that are offered.
      • POS vendors often offer (or integrate with) loyalty management solutions to track, manage, and redeem loyalty points. See this note on loyalty management systems.
      • Legacy and/or homegrown POS systems tend to be an area of frustration for customer experience management modernization.

      Key Trends

      • POS solutions are moving from “cash-register-only” solutions to encompass mobile POS form factors like smartphones and tablets. Vendors such as Square have experienced tremendous growth in opening up the market via “mPOS” platforms that have lower costs to entry than the traditional hardware needed to support full-fledged POS solutions.
      • This development puts robust POS toolsets in the hands of small and medium businesses that otherwise would be priced out of the market.

      POS KPIs

      Strong POS applications can improve:

      • Customer Data Collection
      • Inventory or Cash Shrinkage
      • Cost per Transaction
      • Loyalty Program Administration Costs
      • Cycle Time for Transaction Execution

      Point-of-Sales Vendor Snapshot: Part 1

      Mid-Market POS Solutions

      This image contains the following company Logos: Square; Shopify; Vend; Heartland|Retail

      Point-of-Sales Vendor Snapshot: Part 2

      Large Enterprise POS Platforms

      This image contains the following Logos: Clover; Oracle Netsuite; RQ Retail Management; Salesforce Commerce Cloud; Korona

      Leading Retail POS Systems

      As of February 2022

      Data Quadrant

      This is an image of the Data Quadrant Chart for the Leading Retail Pos Systems

      Emotional Footprint

      This is an image of the Emotional Footprint chart for the Leading Retail POS Systems

      Summary of Accomplishment

      Knowledge Gained

      • Commerce channel framework
      • Customer affinities
      • Commerce channel overview
      • Commerce-enabling technologies

      Processes Optimized

      • Persona definition for commerce strategy
      • Persona channel shortlist

      Deliverables Completed

      • Customer personas
      • Commerce user scenarios
      • Business drivers for traditional commerce and e-commerce
      • Channel matrix for omnichannel commerce

      Bibliography

      “25 Amazing Omnichannel Statistics Every Marketer Should Know (Updated for 2021).” V12, 29 June 2021. Accessed 12 Jan. 2022.

      “Amazon Go.” Amazon, n.d. Web.

      Andersen, Derek. “33 Statistics Retail Marketers Need to Know in 2021.” Invoca, 19 July 2021. Accessed 12 Jan. 2022.

      Andre, Louie. “115 Critical Customer Support Software Statistics: 2022 Market Share Analysis & Data.” FinancesOnline, 14 Jan. 2022. Accessed 25 Jan. 2022.

      Chuang, Courtney. “The future of support: 5 key trends that will shape customer care in 2022.” Intercom, 10 Jan. 2022. Accessed 11 Jan. 2022.

      Cramer-Flood, Ethan. “Global Ecommerce Update 2021.” eMarketer, 13 Jan. 2021. Accessed 12 Jan. 2022.

      Cramer-Flood, Ethan. “Spotlight on total global retail: Brick-and-mortar returns with a vengeance.” eMarketer, 3 Feb. 2022. Accessed 12 Apr. 2022.

      Fox Rubin, Ben. “Amazon now operates seven different kinds of physical stores. Here's why.” CNET, 28 Feb. 2020. Accessed 12 Jan. 2022.

      Krajewski, Laura. “16 Statistics on Why Omnichannel is the Future of Your Contact Center and the Foundation for a Top-Notch Competitive Customer Experience.” Business 2 Community, 10 July 2020. Accessed 11 Jan. 2022.

      Manoff, Jill. “Fun and convenience: CEO Nany Green on Old Navy’s priorities for holiday.” Glossy, 8 Dec. 2020. Accessed 12 Jan. 2022.

      Meola, Andrew. “Rise of M-Commerce: Mobile Ecommerce Shopping Stats & Trends in 2021.” Insider, 30 Dec. 2020. Accessed 12 Jan. 2022.

      “Outdoor apparel retailer Icebreaker uses AI to exceed shopper expectations.” Salesforce, n.d.(a). Accessed 20 Jan. 2022.

      “Personas.” Usability.gov., n.d. Web. 28 Aug. 2018.

      “PetSmart – Why Commerce Cloud?” Salesforce, n.d.(b). Web. 30 April 2018.

      Toor, Meena. “Customer expectations: 7 Types all exceptional researchers must understand.” Qualtrics, 3 Dec. 2020. Accessed 11 Jan. 2022.

      Westfall, Leigh. “Omnichannel vs. multichannel: What's the difference?” RingCentral, 10 Sept. 2021. Accessed 11 Jan. 2022.

      “Worldwide ecommerce will approach $5 trillion this year.” eMarketer, 14 Jan. 2021. Accessed 12 Jan. 2022.

      Data and Analytics Trends 2023

      • Buy Link or Shortcode: {j2store}208|cart{/j2store}
      • member rating overall impact: 9.0/10 Overall Impact
      • member rating average dollars saved: After each Info-Tech experience, we ask our members to quantify the real-time savings, monetary impact, and project improvements our research helped them achieve.
      • member rating average days saved: Read what our members are saying
      • Parent Category Name: Business Intelligence Strategy
      • Parent Category Link: /business-intelligence-strategy

      Data is a unique resource that keeps growing, presenting opportunities along the way. CIOs and IT leaders can use rapidly evolving technologies and capabilities to harness this data and its value for the organization.

      IT leaders must prepare their teams and operations with the right knowledge, capabilities, and strategies to make sure they remain competitive in 2023 and beyond. Nine trends that expand on the three common Vs of data – volume, velocity, and variety – can help guide the way.

      Focus on trends that align with your opportunities and challenges

      The path to becoming more competitive in a data-driven economy differs from one company to the next. IT leaders should use the data and analytics trends that align most with their organizational goals and can lead to positive business outcomes.

      1. Prioritize your investments: Conduct market analysis and prioritize the data and analytics investments that will be critical to your business.
      2. Build a robust strategy: Identify a clear path between your data vision and business outcomes to build a strategy that’s a good fit for your organization.
      3. Inspire practical innovation: Follow a pragmatic approach to implementing trends that range from data gravity and democratization to data monetization and augmented analytics.

      Data and Analytics Trends 2023 Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Data and Analytics Trends Report 2023 – A report that explores nine data use cases for emerging technologies that can improve on capabilities needed to compete in the data-driven economy.

      Data technologies are rapidly evolving. Understanding data's art of the possible is critical. However, to adapt to these upcoming data trends, a solid data management foundation is required. This report explores nine data trends based on the proven framework of data V's: Volume, Velocity, Variety, Veracity, Value, Virtue, Visualization, Virality, and Viscosity.

      • Data and Analytics Trends Report 2023
      [infographic]

      Further reading

      Data and Analytics Trends Report 2023

      SOONER OR LATER, YOU WILL BE IN THE DATA BUSINESS!

      Nine Data Trends for 2023

      In this report, we explore nine data use cases for emerging technologies that can improve on capabilities needed to compete in the data-driven economy. Use cases combine emerging data trends and modernization of existing capabilities.

      1. VOLUME
        • Data Gravity
      2. VELOCITY
      • Democratizing Real-Time Data
    • VARIETY
      • Augmented Data Management
    • VERACITY
      • Identity Authenticity
    • VALUE
      • Data Monetization
    • VIRTUE
      • Adaptive Data Governance
    • VISUALIZATION
      • AI-Driven Storytelling & Augmented Analytics
    • VIRALITY
      • Data Marketplace
    • VISCOSITY
      • DevOps – DataOps – XOps

      VOLUME

      Data Gravity

      Trend 01 Demand for storage and bandwidth continues to grow

      When organizations begin to prioritize data, they first consider the sheer volume of data, which will influence data system design. Your data systems must consider the existing and growing volume of data by assessing industry initiatives such as digital transformation, Industry 4.0, IoT, consumer digital footprint, etc.

      The largest data center in the world is a citadel in Reno, Nevada, that stretches over 7.2 million square feet!

      Source: Cloudwards, 2022

      IoT devices will generate 79.4 zettabytes of data
      by 2025.

      Source: IDC, 2019

      There were about 97
      zettabytes of data generated worldwide in 2022.

      Source: “Volume of Data,” Statista, 2022

      VOLUME

      Data Gravity

      Data attracts more data and an ecosystem of applications and services

      SharePoint, OneDrive, Google Drive, and Dropbox offer APIs and integration opportunities for developers to enhance their products.

      Social media platforms thought about this early by allowing for an ecosystem of filters, apps, games, and effects that engage their users with little to no additional effort from internal resources.

      The image contains four logos. SharePoint, OneDrive, Google Drive, and Dropbox.

      VOLUME

      Data Gravity

      Focus on data gravity and avoid cloud repatriation

      Data gravity is the tendency of data to attract applications, services, and other data. A growing number of cloud migration decisions will be made based on the data gravity concept. It will become increasingly important in data strategies, with failure potentially resulting in costly cloud repatriations.

      Emerging technologies and capabilities:

      Data Lakehouse, Data Mesh, Data Fabric, Hybrid Data, Cloud Data, Edge Computing

      47%

      Centralized cloud storage going down in 2 years

      22%
      25%

      Hybrid storage (centralized + edge) going up in 2 years

      47%

      Source: CIO, 2022

      VOLUME

      Data Gravity

      What worked for terabytes is ineffective for petabytes

      When compared to on-premises infrastructure, cloud computing is less expensive and easier to implement. However, poor data replication and data gravity can significantly increase cloud costs to the point of failure. Data gravity will help organizations make better cloud migration decisions.

      It is also critical to recognize changes in the industry landscape. The goal of data processing and analytics is to generate the right data for users to act on. In most cases, the user is a human being, but in the case of autonomous driving (AD), the car takes on the role of the user (DXC Technology).

      To avoid cloud repatriation, it will become prudent for all organizations to consider data gravity and the timing of cloud migration.

      The image contains a diagram on data gravity.

      VELOCITY

      Democratizing Real-Time Data

      Trend 02 Real-time analytics presents an important differentiator

      The velocity element of data can be assessed from two standpoints: the speed at which data is being generated and how fast the organization needs to respond to the incoming information through capture, analysis, and use. Traditionally data was processed in a batch format (all at once or in incremental nightly data loads). There is a growing demand to process data continuously using streaming data-processing techniques.

      Emerging technologies and capabilities:

      Edge Computing

      Google announced it has a quantum computer that is 100 million times faster than any classical computer in its lab.

      Source: Science Alert, 2015

      The number of qubits in quantum computers has been increasing dramatically, from 2 qubits in 1998 to 128 qubits in 2019.

      Source: Statista, 2019

      IBM released a 433-qubit quantum chip named Osprey in 2022 and expects to surpass 1,000 qubits with its next chip, Condor, in 2023.

      Source: Nature, 2023

      VELOCITY

      Democratizing Real-Time Data

      Make data accessible to everyone in real time

      • 90% of an organization’s data is replicated or redundant.
      • Build API and web services that allow for live access to data.
      • Most social media platforms, like Twitter and Facebook, have APIs that offer access to incredible amounts of data and insights.

      VELOCITY

      Democratizing Real-Time Data

      Trend in Data Velocity

      Data democratization means data is widely accessible to all stakeholders without bottlenecks or barriers. Success in data democratization comes with ubiquitous real-time analytics. Google highlights a need to address democratization in two different frames:

      1. Democratizing stream analytics for all businesses to ensure real-time data at the company level.
      2. Democratizing stream analytics for all personas and the ability of all users to generate real-time insights.

      Emerging technologies and capabilities:

      Data Lakehouse, Streaming API Ecosystem, Industry 4.0, Zero-Copy Cloning

      Nearly 70% of all new vehicles globally will be connected to the internet by 2023.

      Source: “Connected light-duty vehicles,” Statista, 2022

      VELOCITY

      Democratizing Real-Time Data

      Enable real-time processing with API

      In the past, data democratization has largely translated into a free data set and open data portals. This has allowed the government to freely share data with the public. Also, the data science community has embraced the availability of large data sets such as weather data, stock data, etc. In the future, more focus will be on the combination of IoT and steaming analytics, which will provide better responsiveness and agility.

      Many researchers, media companies, and organizations now have easy access to the Twitter/Facebook API platform to study various aspects of human behavior and sentiments. Large technology companies have already democratized their data using real-time APIs.

      Thousands of sources for open data are available at your local municipalities alone.

      6G will push Wi-Fi connectivity to 1 terabyte per second! This is expected to become commercially available by 2030.

      VARIETY

      Augmented Data Management

      Trend 03 Need to manage unstructured data

      The variety of data types is increasingly diverse. Structured data often comes from relational databases, while unstructured data comes from several sources such as photos, video, text documents, cell phones, etc. The variety of data is where technology can drive business value. However, unstructured data also poses a risk, especially for external data.

      The number of IoT devices could rise to 30.9 billion by 2025.

      Source: “IoT and Non-IoT Connections Worldwide,” Statista, 2022

      The global edge computing market is expected to reach $250.6 billion by 2024.

      Source: “Edge Computing,” Statista, 2022

      Genomics research is expected to generate between 2 and 40 exabytes of data within the next decade.

      Source: NIH, 2022

      VARIETY

      Augmented Data Management

      Employ AI to automate data management

      New tools will enhance many aspects of data management:

      • Data preparation, integration, cataloging, and quality
      • Metadata management
      • Master data management

      Enabling AI-assisted decision-making tools

      The image contains logos of the AI-assisted decision-making tools. Informatica, collibra, OCTOPAI.

      VARIETY

      Augmented Data Management

      Trend in Data Variety

      Augmented data management will enhance or automate data management capabilities by leveraging AI and related advanced techniques. It is quite possible to leverage existing data management tools and techniques, but most experts have recognized that more work and advanced patterns are needed to solve many complex data problems.

      Emerging technologies and capabilities:

      Data Factory, Data Mesh, Data Fabric, Artificial Intelligence, Machine Learning

      VARIETY

      Augmented Data Management

      Data Fabric vs. Data Mesh: The Data Journey continues at an accelerated pace

      Data Fabric

      Data Mesh

      Data fabric is an architecture that facilitates the end-to-end integration of various data pipelines and cloud environments using intelligent and automated systems. It’s a data integration pattern to unify disparate data systems, embed governance, strengthen security and privacy measures, and provide more data accessibility to workers and particularly to business users.

      The data mesh architecture is an approach that aligns data sources by business domains, or functions, with data owners. With data ownership decentralization, data owners can create data products for their respective domains, meaning data consumers, both data scientists and business users, can use a combination of these data products for data analytics and data science.

      More Unstructured Data

      95% of businesses cite the need to manage unstructured data as a problem for their business.

      VERACITY

      Identity Authenticity

      Trend 04 Veracity of data is a true test of your data capabilities

      Data veracity is defined as the accuracy or truthfulness of a data set. More and more data is created in semi-structured and unstructured formats and originates from largely uncontrolled sources (e.g. social media platforms, external sources). The reliability and quality of the data being integrated should be a top concern. The veracity of data is imperative when looking to use data for predictive purposes. For example, energy companies rely heavily on weather patterns to optimize their service outputs, but weather patterns have an element of unpredictability.

      Data quality affects overall labor productivity by as much as 20%, and 30% of operating expenses are due to insufficient data.

      Source: Pragmatic Works, 2017

      Bad data costs up to
      15% to 25% of revenue.

      Source: MIT Sloan Management Review, 2017

      VERACITY

      Identity Authenticity

      Veracity of data is a true test of your data capabilities

      • Stop creating your own identity architectures and instead integrate a tried-and-true platform.
      • Aim for a single source of truth for digital identity.
      • Establish data governance that can withstand scrutiny.
      • Imagine a day in the future where verified accounts on social media platforms are available.
      • Zero-trust architecture should be used.

      VERACITY

      Identity Authenticity

      Trend in Data Veracity

      Veracity is a concept deeply linked to identity. As the value of the data increases, a greater degree of veracity is required: We must provide more proof to open a bank account than to make friends on Facebook. As a result, there is more trust in bank data than in Facebook data. There is also a growing need to protect marginalized communities.

      Emerging technologies and capabilities:

      Zero Trust, Blockchain, Data Governance, IoT, Cybersecurity

      The image contains a screenshot of Info-Tech's blueprint slide on Zero Trust.

      VERACITY

      Identity Authenticity

      The identity discussion is no longer limited to people or organizations. The development of new technologies, such as the IoT phenomenon, will lead to an explosion of objects, from refrigerators to shipping containers, coming online as well. If all these entities start communicating with each other, standards will be needed to establish who or what they are.

      IDENTITY
      IS

      Age

      Gender

      Address

      Fingerprint

      Face

      Voice

      Irises

      IDENTITY
      KNOWS

      Password

      Passphrase

      PIN

      Sequence

      IDENTITY
      HAS

      Access badge

      Smartcard

      Security token

      Mobile phone

      ID document

      IDENTITY
      DOES

      Motor skills

      Handwriting

      Gestures

      Keystrokes

      Applications use

      The IoT market is expected to grow 18% to 14.4 billion in 2022 and 27 billion by 2025.

      Source: IoT Analytics, 2022

      VALUE

      Data Monetization

      Trend 05 Not Many organization know the true value of their data

      Data can be valuable if used effectively or dangerous if mishandled. The rise of the data economy has created significant opportunities but also has its challenges. It has become urgent to understand the value of data, which may vary for stakeholders based on their business model and strategy. Organizations first need to understand ownership of their data by establishing a data strategy, then they must improve data maturity by developing a deeper understanding of data value.

      94% of enterprises say data is essential to business growth.

      Source: Find stack, 2021

      VALUE

      Data Monetization

      Start developing your data business

      • Blockbuster ran its business well, but Netflix transformed the video rental industry overnight!
      • Big players with data are catching up fast.
      • You don’t have to be a giant to monetize data.
      • Data monetization is probably closer than you think.
      • You simply need to find it, catalog it, and deliver it.

      The image contains logos of companies related to data monetization as described in the text above. The companies are Amazon Prime, Netflix, Disney Plus, Blockbuster, and Apple TV.

      VALUE

      Data Monetization

      Trend in Data Value

      Data monetization is the transformation of data into financial value. However, this does not imply selling data alone. Monetary value is produced by using data to improve and upgrade existing and new products and services. Data monetization demands an organization-wide strategy for value development.

      Emerging technologies and capabilities:

      Data Strategy, Data Monetization Strategy, Data Products

      Netflix uses big data to save $1 billion per year on customer retention.

      Source: Logidots, 2021

      VALUE

      Data Monetization

      Data is a strategic asset

      Data is beyond currency, assets, or commodities and needs to be a category
      of its own.

      • Data always outlives people, processes, and technology. They all come and go while data remains.
      • Oil is a limited resource. Data is not. Unlike oil, data is likely to grow over time.
      • Data is likely to outlast all other current popular financial instruments, including currency, assets, or commodities.
      • Data is used internally and externally and can easily be replicated or combined.

      Data monetization is currently in the speculative territory, which is unacceptable. It should instead be guided by sound data management theory.

      VIRTUE

      Adaptive Data Governance

      Trend 06 Five Core Virtues: Resilience, Humility, Grit, Liberal Education, Empathy (Forbes, 2020)

      We have become more and more dependent on data, analytics, and organizational protection policies. Data virtue is about leveraging data securely and ethically. This topic has become more critical with the advent of GDPR, the right to be forgotten, and related regulations. Data governance, which seeks to establish an oversight framework that manages the creation, acquisition, integrity, security, compliance, and quality of data, is essential for any organization that makes decisions about data.

      Cultural obstacles are the greatest barrier to becoming data-driven, according to 91.9% of executives.

      Source: Harvard Business Review, 2022

      Fifty million Facebook profiles were harvested for Cambridge Analytica in a major data breach.

      Source: The Guardian, 2018

      VIRTUE

      Adaptive Data Governance

      Encourage noninvasive and automated data governance

      • Data governance affects the entire organization, not just data.
      • The old model for data governance was slow and clumsy.
      • Adaptive data governance encourages faster decision making and a more collaborative approach to governance.
      • Agile data governance allows for faster and more flexible decision making.
      • Automated data governance will simplify execution across the organization.
      • It is great for compliance, quality, impact tracking, and cross-referencing and offers independence to data users.

      VIRTUE

      Adaptive Data Governance

      Trend in Data Virtue

      Adaptive data governance encourages a flexible approach that allows an organization to employ multiple data governance strategies depending on changing business situations. The other aspect of adaptive data governance is moving away from manual (and often slow) data governance and toward aggressive automation.

      Emerging technologies and capabilities:

      AI-Powered Data Catalog and Metadata Management,
      Automated Data Policy Enforcement

      “To effectively meet the needs and velocity of digital organizations and modern practices, IT governance must be embedded and automated where possible to drive success and value.”

      Source: Valence Howden, Info-Tech Research Group

      “Research reveals that the combination of AI and big data technologies can automate almost 80% of all physical work, 70% of data processing, and 64% of data collection tasks.”

      Source: Forbes, 2021

      VIRTUE

      Data Governance Automation

      Simple and easy Data Governance

      Tools are not the ultimate answer to implementing data governance. You will still need to secure stakeholders' buy-in and engagement in the data process. Data governance automation should be about simplifying the execution of roles and responsibilities.

      “When you can see where your data governance strategy can be improved, it’s time to put in place automation that help to streamline processes.”

      Source: Nintex, 2021

      VISUALIZATION

      AI-Driven Storytelling & Augmented Analytics

      Trend 07 Automated and augmented data storytelling is not that far away

      Today, data storytelling is led by the user. It’s the manual practice of combining narrative with data to deliver insights in a compelling form to assist decision makers in engaging with data and analytics. A story backed by data is more easily consumed and understood than a dashboard, which can be overwhelming. However, manual data storytelling has some major shortcomings.

      Problem # 1: Telling stories on more than just the insights noticed by people

      Problem # 2: Poor data literacy and the limitations of manual self-service

      Problem # 3: Scaling data storytelling across the business

      VISUALIZATION

      AI-Driven Storytelling & Augmented Analytics

      Use AI to enhance data storytelling

      • Tableau, Power BI, and many other applications already use
        AI-driven analytics.
      • Power BI and SharePoint can use AI to generate visuals for any SharePoint list in a matter of seconds.

      VISUALIZATION

      AI-Driven Storytelling & Augmented Analytics

      Trend in Data Visualization

      AI and natural language processing will drive future visualization and data storytelling. These tools and techniques are improving rapidly and are now designed in a streamlined way to guide people in understanding what their data means and how to act on it instead of expecting them to do self-service analysis with dashboards and charts and know what to do next. Ultimately, being able to understand how to translate emotion, tropes, personal interpretation, and experience and how to tell what’s most relevant to each user is the next frontier for augmented and automated analytics

      Emerging technologies and capabilities:

      AI-Powered Data Catalog and Metadata Management,
      Automated Data Policy Enforcement

      VISUALIZATION

      Data Storytelling

      Augmented data storytelling is not that far away

      Emotions are a cornerstone of human intelligence and decision making. Mastering the art of storytelling is not easy.

      Industry experts predict the combination of data storytelling with augmented and automated techniques; these capabilities are more than capable of generating and automating parts of a data story’s creation for end users.

      The next challenge for AI is translating emotion, tropes, personal interpretation, and experience into what is most essential to end users.

      Source: Yellowfin, 2021

      VIRALITY

      Data Marketplace

      Trend 08 Missing data marketplace

      Data virality measures data spread and popularity. However, for data virality to occur, an ecosystem comparable to that of traditional or modern digital marketplaces is required. Organizations must reevaluate their data strategies to ensure investment in appropriate data domains by understanding data virality. Data virality is the exact opposite of dark data.

      Dark data is “all the information companies collect in their regular business processes, don’t use, have no plans to use, but will never throw out.”

      Source: Forbes, 2019

      VIRALITY

      Data Marketplace

      Make data easily accessible

      • Making data accessible to a broader audience is the key to successful virality.
      • Data marketplaces provide a location for you to make your data public.
      • Why do this? Contributing to public data marketplaces builds credibility, just like contributing to public GitHub projects.
      • Big players like Microsoft, Amazon, and Snowflake already do this!
      • Snowflake introduced zero-copy cloning, which allows users to interact with source data without compromising the integrity of the original source.

      The image contains the logos of Microsoft, Amazon, and Snowflake.

      VIRALITY

      Data Marketplace

      Trend in Data Virality

      The data marketplace can be defined as a dynamic marketplace where users decide what has the most value. Companies can gauge which data is most popular based on usage and decide where to invest. Users can shop for data products within the marketplace and then join these products with other ones they’ve created to launch truly powerful data-driven projects.

      Emerging technologies and capabilities:

      AI-Powered Data Catalog and Metadata Management,
      Automated Data Policy Enforcement

      The image contains a screenshot of Info-Tech's Data-as-a-Service (DaaS) Framework.

      “Data is like garbage. You’d better know what you are going to do with it before you collect it.”

      – Mark Twain

      VIRALITY

      Data Marketplace

      Journey from siloed data platforms to dynamic data marketplaces

      Data remains a complex topic due to many missing foundational components and infrastructure. Interoperability, security, quality, discoverability, speed, and ease are some of those missing foundational components that most organizations face daily.

      Data lacks an ecosystem that is comparable to those of traditional assets or commodities. Data must be available in open or closed data marketplaces to measure its value. These data marketplaces are still in their infancy.

      “Data markets are an important component of the data economy that could unleash the full potential of data generated by the digital economy and human activity in general.”

      Source: ITU Journal, 2018

      VISCOSITY

      DevOps – DataOps – XOps

      Trend 09 Increase efficiency by removing bottlenecks

      Compared to water, a fluid with a high viscosity flows more slowly, like honey. Data viscosity measures the resistance to flow in a volume of data. The data resistance may come from other Vs (variety, velocity, etc.).

      VISCOSITY

      DevOps – DataOps – XOps

      Increase efficiency by removing bottlenecks

      Consider XOps for a second. It makes no difference what X is. What's important is matching operational requirements to enterprise capabilities.

      • For example, Operations must meet the demands of Sales – hence SalesOps
        or S&Op.
      • Development resources must meet the demands of Operations – hence DevOps.
      • Finally, Data must also meet the demand of Operations.

      These Operations guys are demanding!!

      VISCOSITY

      DevOps – DataOps – XOps

      Trend in Data Viscosity

      The merger of development (Dev) and IT Operations (Ops) started in software development with the concept of DevOps. Since then, new Ops terms have formed rapidly (AIOps, MLOps, ModelOps, PlatformOps, SalesOps, SecOps, etc.). All these methodologies come from Lean manufacturing principles, which seek to identify waste by focusing on eliminating errors, cycle time, collaboration, and measurement. Buzzwords are distractions, and the focus must be on the underlying goals and principles. XOps goals should include the elimination of errors and improving efficiencies.

      Emerging technologies and capabilities:

      Collaborative Data Management, Automation Tools

      VISCOSITY

      DataOps → Data Observability

      Data observability, a subcomponent of DataOps, is a set of technical practices, cultural norms, and architecture that enables low error rates. Data observability focuses on error rates instead of only measuring data quality at a single point in time.

      Data Quality Dimensions

      • Uniqueness
      • Timeliness
      • Validity
      • Accuracy
      • Consistency

      ERROR RATES

      Lateness: Missing Your SLA

      System Processing Issues

      Code Change That Broke Something

      Data Quality

      What’s next? Go beyond the buzzwords.

      Avoid following trends solely for the sake of following them. It is critical to comprehend the concept and apply it to your industry. Every industry has its own set of problems and opportunities.

      Highlight the data trends (or lack thereof) that have been most beneficial to you in your organizations. Follow Info-Tech’s approach to building a data practice and platform to develop your data capabilities through the establishment of data goals.

      The image contains a screenshot of Info-Tech's Build Your Data Pracrice and Platform.

      Research Authors

      Rajesh Parab Chris Dyck

      Rajesh Parab

      Director, Research & Advisory

      Data and Analytics

      Chris Dyck

      Research Lead

      Data and Analytics

      “Data technologies are rapidly evolving. Understanding what’s possible is critical. Adapting to these upcoming data trends requires a solid data management foundation.”

      – Rajesh Parab

      Contributing Experts

      Carlos Thomas John Walsh

      Carlos Thomas

      Executive Counselor

      Info-Tech Research Group

      John Walsh

      Executive Counselor

      Info-Tech Research Group

      Bibliography

      Bean, Randy. “Why Becoming a Data-Driven Organization Is So Hard.” Harvard Business Review, 24 Feb. 2022. Accessed Oct. 2022.
      Brown, Annie. “Utilizing AI And Big Data To Reduce Costs And Increase Profits In Departments Across An Organization.” Forbes, 13 April 2021.
      Accessed Oct. 2022.
      Burciaga, Aaron. “Five Core Virtues For Data Science And Artificial Intelligence.” Forbes, 27 Feb. 2020. Accessed Aug. 2022.
      Cadwalladr, Carole, and Emma Graham-Harrison. “Revealed: 50 million Facebook profiles harvested for Cambridge Analytica in major data breach.”
      The Guardian, 17 March 2018. Accessed Aug. 2022.
      Carlier, Mathilde. “Connected light-duty vehicles as a share of total vehicles in 2023.” Statista, 31 Mar. 2021. Accessed Oct. 2022.
      Carter, Rebekah. “The Ultimate List of Big Data Statistics for 2022.” Findstack, 22 May 2021. Accessed Oct. 2022.
      Castelvecchi, Davide. “Underdog technologies gain ground in quantum-computing race.” Nature, 6 Nov. 2023. Accessed Feb. 2023.
      Clark-Jones, Anthony, et al. “Digital Identity:” UBS, 2016. Accessed Aug 2022.
      “The Cost of Bad Data Infographic.” Pragmatic Works, 25 May 2017. Accessed Oct. 2022.
      Demchenko, Yuri, et al. “Data as Economic Goods: Definitions, Properties, Challenges, Enabling Technologies for Future Data Markets.“ ITU Journal: ICT Discoveries, Special Issue, no. 2, vol. 23, Nov. 2018. Accessed Aug 2022.
      Feldman, Sarah. ”20 Years of Quantum Computing Growth.” Statista, 6 May 2019. Accessed Oct. 2022.
      “Genomic Data Science.” NIH, National Human Genome Research Institute, 5 April 2022. Accessed Oct. 2022.

      Bibliography

      Hasbe, Sudhir, and Ryan Lippert. “The democratization of data and insights: making real-time analytics ubiquitous.” Google Cloud, 15 Jan. 2021.
      Accessed Aug. 2022.
      Helmenstine, Anne. “Viscosity Definition and Examples.” Science Notes, 3 Aug. 2021. Accessed Aug. 2022.
      “How data storytelling and augmented analytics are shaping the future of BI together.” Yellowfin, 19 Aug. 2021. Accessed Aug. 2022.
      “How Netflix Saves $1B Annually using AI?” Logidots, 24 Sept. 2021. Accessed Oct. 2022
      Hui, Kenneth. “The AWS Love/Hate Relationship with Data Gravity.” Cloud Architect Musings, 30 Jan. 2017. Accessed Aug 2022.
      ICD. “The Growth in Connected IoT Devices Is Expected to Generate 79.4ZB of Data in 2025, According to a New IDC Forecast.” Business Wire, 18 June 2019. Accessed Oct 2022.
      Internet of Things (IoT) and non-IoT active device connections worldwide from 2010 to 2025” Statista, 27 Nov. 2022. Accessed Nov. 2022.
      Koch, Gunter. “The critical role of data management for autonomous driving development.” DXC Technology, 2021. Accessed Aug. 2022.
      Morris, John. “The Pull of Data Gravity.” CIO, 23 Feb. 2022. Accessed Aug. 2022.
      Nield, David. “Google's Quantum Computer Is 100 Million Times Faster Than Your Laptop.” ScienceAlert, 9 Dec. 2015. Accessed Oct. 2022.
      Redman, Thomas C. “Seizing Opportunity in Data Quality.” MIT Sloan Management Review, 27 Nov. 2017. Accessed Oct. 2022.
      Segovia Domingo, Ana I., and Álvaro Martín Enríquez. “Digital Identity: the current state of affairs.” BBVA Research, 2018. Accessed Aug. 2022.

      Bibliography

      “State of IoT 2022: Number of connected IoT devices growing 18% to 14.4 billion globally.” IOT Analytics, 18 May 2022. Accessed. 14 Nov. 2022.
      Strod, Eran. “Data Observability and Monitoring with DataOps.” DataKitchen, 10 May 2021. Accessed Aug. 2022.
      Sujay Vailshery, Lionel. “Edge computing market value worldwide 2019-2025.” Statista, 25 Feb. 2022. Accessed Oct 2022.
      Sujay Vailshery, Lionel. “IoT and non-IoT connections worldwide 2010-2025.” Statista, 6 Sept. 2022. Accessed Oct. 2022.
      Sumina, Vladimir. “26 Cloud Computing Statistics, Facts & Trends for 2022.” Cloudwards, 7 June 2022. Accessed Oct. 2022.
      Taulli, Tom. “What You Need To Know About Dark Data.” Forbes, 27 Oct. 2019. Accessed Oct. 2022.
      Taylor, Linnet. “What is data justice? The case for connecting digital rights and freedoms globally.“ Big Data & Society, July-Dec 2017. Accessed Aug 2022.
      “Twitter: Data Collection With API Research Paper.” IvyPanda, 28 April 2022. Accessed Aug. 2022.
      “Using governance automation to reduce data risk.” Nintex, 15 Nov. 2021. Accessed Oct. 2022
      “Volume of data/information created, captured, copied, and consumed worldwide from 2010 to 2020, with forecasts from 2021 to 2025.” Statista, 8 Sept. 2022. Accessed Oct 2022.
      Wang, R. “Monday's Musings: Beyond The Three V's of Big Data – Viscosity and Virality.” Forbes, 27 Feb. 2012. Accessed Aug 2022.
      “What is a data fabric?” IBM, n.d. Accessed Aug 2022.
      Yego, Kip. “Augmented data management: Data fabric versus data mesh.” IBM, 27 April 2022. Accessed Aug 2022.

      Build an IT Employee Engagement Program

      • Buy Link or Shortcode: {j2store}544|cart{/j2store}
      • member rating overall impact: 9.2/10 Overall Impact
      • member rating average dollars saved: $5,734 Average $ Saved
      • member rating average days saved: 8 Average Days Saved
      • Parent Category Name: Engage
      • Parent Category Link: /engage
      • IT’s performance and stakeholder satisfaction with IT services hinge on IT’s ability to attract and retain top talent and to motivate teams to go above and beyond.
      • With the growing IT job market, turnover is a serious threat to IT’s ability to deliver seamless value and continuously drive innovation.
      • Engagement initiatives are often seen as being HR’s responsibility; however, IT leadership needs to take accountability for the retention and productivity of their employees in order to drive business value.

      Our Advice

      Critical Insight

      • Engagement is a two-way street. Initiatives must address a known need and be actively sought by employees – not handed down from management.
      • Engagement initiatives are useless unless they target the right issues. It can be tempting to focus on the latest perks and gadgets and ignore difficult issues. Use a systematic approach to uncover and tackle the real problems.
      • It’s time for IT leadership to step up. IT leaders have a much bigger impact on IT staff engagement than HR ever can. Leverage this power to lead your team to peak performance.

      Impact and Result

      • Info-Tech engagement diagnostics and accompanying tools will help you perform a deep dive into the root causes of disengagement on your team.
      • The guidance that accompanies Info-Tech’s tools will help you avoid common engagement program pitfalls and empower IT leaders to take charge of their own team’s engagement.

      Build an IT Employee Engagement Program Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to discover why engagement is critical to IT performance, review Info-Tech’s methodology, and understand how our tools will help you construct an effective employee engagement program.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Measure employee engagement

      Use Info-Tech's Pulse or Full Engagement Surveys to measure employee engagement.

      • Improve Employee Engagement to Drive IT Performance – Phase 1: Measure Employee Engagement
      • Engagement Strategy Record
      • Engagement Communication Template

      2. Analyze results and ideate solutions

      Understand the drivers of engagement that are important for your team, and involve your staff in brainstorming engagement initiatives.

      • Improve Employee Engagement to Drive IT Performance – Phase 2: Analyze Results and Ideate Solutions
      • Engagement Survey Results Interpretation Guide
      • Full Engagement Survey Focus Group Facilitation Guide
      • Pulse Engagement Survey Focus Group Facilitation Guide
      • Focus Group Facilitation Guide Driver Definitions
      • One-on-One Manager Meeting Worksheet

      3. Select and implement engagement initiatives

      Select engagement initiatives for maximal impact, create an action plan, and establish open and ongoing communication about engagement with your team.

      • Improve Employee Engagement to Drive IT Performance – Phase 3: Select and Implement Engagement Initiatives
      • Summary of Interdepartmental Engagement Initiatives
      • Engagement Progress One-Pager
      [infographic]

      Workshop: Build an IT Employee Engagement Program

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 (Preparation) Run Engagement Survey

      The Purpose

      Select and run your engagement survey prior to the workshop.

      Key Benefits Achieved

      Receive an in-depth report on your team’s engagement drivers to form the basis of your engagement strategy.

      Activities

      1.1 Select engagement survey.

      1.2 Identify engagement program goals and metrics.

      1.3 Run engagement survey.

      Outputs

      Full or Pulse engagement survey report

      Engagement survey results interpretation guide

      2 Explore Engagement

      The Purpose

      To understand the current state of engagement and prepare to discuss the drivers behind it with your staff.

      Key Benefits Achieved

      Empower your leadership team to take charge of their own teams’ engagement.

      Activities

      2.1 Review engagement survey results.

      2.2 Finalize focus group agendas.

      2.3 Train managers.

      Outputs

      Customized focus group agendas

      3 Hold Focus Groups

      The Purpose

      Establish an open dialogue with your staff to understand what would improve their engagement.

      Key Benefits Achieved

      Employee-generated initiatives have the greatest chance at success.

      Activities

      3.1 Identify priority drivers.

      3.2 Identify engagement KPIs.

      3.3 Brainstorm engagement initiatives.

      3.4 Vote on initiatives within teams.

      Outputs

      Summary of focus groups results

      Identified engagement initiatives

      Identified engagement initiatives

      4 Select and Plan Initiatives

      The Purpose

      Learn the characteristics of successful engagement initiatives and build execution plans for each.

      Key Benefits Achieved

      Choose initiatives with the greatest impact on your team’s engagement, and ensure you have the necessary resources for success.

      Activities

      4.1 Select engagement initiatives with IT leadership.

      4.2 Create initiative project plans.

      4.3 Present project plans.

      4.4 Define implementation checkpoints.

      4.5 Develop communications plan.

      4.6 Define strategy for ongoing engagement monitoring.

      Outputs

      Engagement project plans

      Implementation and communication checkpoints

      Further surveys planned (optional)

      5 Additional Leadership Training

      The Purpose

      Select training modules that best address your team’s needs from Info-Tech’s modular leadership training program.

      Key Benefits Achieved

      Arm your IT leadership team with the key skills of effective leadership, tailored to their existing experience level.

      Activities

      5.1 Adopting an Integrated Leadership Mindset

      5.2 Optimizing Talent Leadership Practices

      5.3 Driving Diversity & Inclusion

      5.4 Fortifying Internal Stakeholder Relations

      5.5 Engaging Executives and the Board

      5.6 Crafting Your Leadership Brand

      5.7 Crafting and Delivering Compelling Presentations

      5.8 Communication & Difficult Conversations

      5.9 Conflict Management

      5.10 Performance Management

      5.11 Feedback & Coaching

      5.12 Creating a Culture of Personal Accountability

      Outputs

      Develop the skills to lead resourcefully in times of uncertainty

      Apply leadership behaviors across enterprise initiatives to deploy and develop talent successfully

      Develop diversity and inclusion practices that turn the IT function and leaders into transformative champions of inclusion

      Identify elements of effective partnering to maximize the impact of internal interactions

      Understand the major obstacles to CEO and board relevance and uncover the keys to elevating your internal executive profile

      Develop a leadership brand statement that demonstrates leadership competency and is aligned with the brand, mission, vision, and goals of the organization

      Identify the components of effective presentations and hone your presentation skills

      Gain the skills to confront and drive solutions from difficult situations

      Develop strategies to engage in conflict constructively and reach a resolution that benefits the team or organization

      Learn to identify the root causes of low performance and develop the skills to guide employees through the process of improvement

      Adopt a behavior-focused coaching model to help managers sustain and apply effective coaching principles

      Understand how and when to encourage autonomy and how to empower employees to take success into their own hands

      Info-Tech Quarterly Research Agenda Outcomes Q2-Q3 2023

      • Buy Link or Shortcode: {j2store}297|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: IT Strategy
      • Parent Category Link: /it-strategy

      At Info-Tech, we take pride in our research and have established the most rigorous publication standards in the industry. However, we understand that engaging with all our analysts to gauge the future may not always be possible. Hence, we have curated some compelling recently published research along with forthcoming research insights to assist you in navigating the next quarter.

      Our Advice

      Critical Insight

      We offer a quarterly Research Agenda Outcomes deck that thoroughly summarizes our recently published research, supplying decision makers with valuable insights and best practices to make informed and effective decisions. Our research is supported by our team of seasoned analysts with decades of experience in the IT industry.

      By leveraging our research, you can stay updated with the latest trends and technologies, giving you an edge over the competition and ensuring the optimal performance of your IT department. This way, you can make confident decisions that lead to remarkable success and improved outcomes.

      Impact and Result

      • Enhance preparedness for future market trends and developments: Keep up to date with the newest trends and advancements in the IT sector to be better prepared for the future.
      • Enhance your decision making: Acquire valuable information and insights to make better-informed, confident decisions.
      • Promote innovation: Foster creativity, explore novel perspectives, drive innovation, and create new products or services.

      Info-Tech Quarterly Research Agenda Outcomes Q2/Q3 2023 Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Info-Tech Quarterly Research Agenda Q3 2023 Deck – An overview of our Research Agenda Outcome for Q2 and Q3 of 2023.

      A guide to our top research published to date for 2023 (Q2/Q3).

      • Info-Tech Quarterly Research Agenda Outcomes for Q2/Q3 2023
      [infographic]

      Further reading

      Featured Research Projects 2023 (Q2/Q3)

      “Here are my selections for the top research projects of the last quarter.”

      Photo of Gord Harrison, Head of Research & Advisory, Info-Tech Research Group.

      Gord Harrison
      Head of Research & Advisory
      Info-Tech Research Group

      CIO

      01
      Build Your Generative AI Roadmap

      Generative AI is here, and it's time to find its best uses – systematically and responsibly.

      02
      CIO Priorities 2023

      Engage cross-functional leadership to seize opportunity while protecting the organization from volatility.

      03
      Build an IT Risk Taxonomy

      If integrated risk is your destination, your IT risk taxonomy is the road to get you there.

      04
      Navigate the Digital ID Ecosystem to Enhance Customer Experience

      Beyond the hype: How it can help you become more customer-focused?

      05
      Effective IT Communications

      Generative AI is here, and it's time to find its best uses – systematically and responsibly.

      06
      Develop a Targeted Flexible Work Program for IT

      Select flexible work options that balance organizational and employee needs to drive engagement and improve attraction and retention.

      07
      Effectively Manage CxO Relations

      Make relationship management a daily habit with a personalized action plan.

      08
      Establish High-Value IT Performance Dashboards and Metrics

      Spend less time struggling with visuals and more time communicating about what matters to your executives.

      Applications

      09
      Build Your Enterprise Application Implementation Playbook

      Your implementation doesn't start with technology but with an effective plan that the team can align on.

      10
      Develop Your Value-First Business Process Automation Strategy

      As you scale your business automations, focus on what matters most.

      11
      Manage Requirements in an Agile Environment

      Agile and requirements management are complementary, not competitors.

      Security

      12
      Assess Your Cybersecurity Insurance Policy

      Adapt to changes in the cyber insurance market.

      13
      Design and Implement a Business-Aligned Security Program

      Focus first on business value.

      Infrastructure & Operations

      14
      Automate IT Asset Data Collection

      Acquire and use discovery tools wisely to populate, update, and validate the data in your ITAM database.

      Industry | Retail

      15
      Leveraging AI to Create Meaningful Insights and Visibility in Retail

      AI prominence across the enterprise value chain.

      Industry | Education

      16
      Understand the Implications of Generative AI in Education

      Bans aren't the answer, but what is?

      Industry | Wholesale

      17
      Wholesale Industry Business Reference Architecture

      Business capability maps, value streams, and strategy maps for the wholesale industry.

      Industry | Retail Banking

      18
      Mainframe Modernization for Retail Banking

      A strategy for modernizing mainframe systems to meet the needs of modern retail banking.

      Industry | Utilities

      19
      Data Analytics Use Cases for Utilities

      Building upon the collective wisdom for the art of the possible.

      Build Your Generative AI Roadmap

      Generative AI is here, and it's time to find its best uses – systematically and responsibly.

      CIO
      Strategy & Governance

      Photo of Bill Wong, Principal Research Director, Info-Tech Research Group.

      Bill Wong
      Principal Research Director

      Download this research or book an analyst call on this topic

      Sample of the 'Build Your Generative AI Roadmap' research.

      Sample of the 'Build Your Generative AI Roadmap' research.

      Logo for Info-Tech.

      CIO Priorities 2023

      Engage cross-functional leadership to seize opportunity while protecting the organization from volatility.

      CIO
      Strategy & Governance

      Photo of Brian Jackson, Principal Research Director, Info-Tech Research Group.

      Brian Jackson
      Principal Research Director

      Download this report or book an analyst call on this topic

      Sample of the 'CIO Priorities 2023' report.

      Sample of the 'CIO Priorities 2023' report.

      Logo for Info-Tech.

      Build an IT Risk Taxonomy

      If integrated risk is your destination, your IT risk taxonomy is the road to get you there.

      CIO
      Strategy & Governance

      Photo of Donna Bales, Principal Research Director, Info-Tech Research Group.

      Donna Bales
      Principal Research Director

      Download this research or book an analyst call on this topic

      Sample of the 'Build an IT Risk Taxonomy' research.

      Sample of the 'Build an IT Risk Taxonomy' research.

      Logo for Info-Tech.

      Navigate the Digital ID Ecosystem to Enhance Customer Experience

      Beyond the hype: How it can help you become more customer-focused?

      CIO
      Strategy & Governance

      Photo of Manish Jain, Principal Research Director, Info-Tech Research Group.

      Manish Jain
      Principal Research Director

      Download this research or book an analyst call on this topic

      Sample of the 'Navigate the Digital ID Ecosystem to Enhance Customer Experience' research.

      Sample of the 'Navigate the Digital ID Ecosystem to Enhance Customer Experience' research.

      Logo for Info-Tech.

      Effective IT Communications

      Empower IT employees to communicate well with any stakeholder across the organization.

      CIO
      People & Leadership

      Photo of Brittany Lutes, Research Director, Info-Tech Research Group.

      Brittany Lutes
      Research Director

      Photo of Diana MacPherson, Senior Research Analyst, Info-Tech Research Group.

      Diana MacPherson
      Senior Research Analyst

      Download this research or book an analyst call on this topic

      Effective IT Communications' research.

      Sample of the 'Effective IT Communications' research.

      Logo for Info-Tech.

      Develop a Targeted Flexible Work Program for IT

      Select flexible work options that balance organizational and employee needs to drive engagement and improve attraction and retention.

      CIO
      People & Leadership

      Photo of Jane Kouptsova, Research Director, Info-Tech Research Group.

      Jane Kouptsova
      Research Director

      Download this research or book an analyst call on this topic

      Sample of the 'Develop a Targeted Flexible Work Program for IT' research.

      Sample of the 'Develop a Targeted Flexible Work Program for IT' research.

      Logo for Info-Tech.

      Effectively Manage CxO Relations

      Make relationship management a daily habit with a personalized action plan.

      CIO
      Value & Performance

      Photo of Mike Tweedle, Practice Lead, Info-Tech Research Group.

      Mike Tweedle
      Practice Lead

      Download this research or book an analyst call on this topic

      Sample of the 'Effectively Manage CxO Relations' research.

      Sample of the 'Effectively Manage CxO Relations' research.

      Logo for Info-Tech.

      Establish High-Value IT Performance Dashboards and Metrics

      Spend less time struggling with visuals and more time communicating about what matters to your executives.

      CIO
      Value & Performance

      Photo of Diana MacPherson, Senior Research Analyst, Info-Tech Research Group.

      Diana MacPherson
      Senior Research Analyst

      Download this research or book an analyst call on this topic

      Sample of the 'Establish High-Value IT Performance Dashboards and Metrics' research.

      Sample of the 'Establish High-Value IT Performance Dashboards and Metrics' research.

      Logo for Info-Tech.

      Build Your Enterprise Application Implementation Playbook

      Your implementation doesn't start with technology but with an effective plan that the team can align on.

      Applications
      Business Processes

      Photo of Ricardo de Oliveira, Research Director, Info-Tech Research Group.

      Ricardo de Oliveira
      Research Director

      Download this research or book an analyst call on this topic

      Sample of the 'Build Your Enterprise Application Implementation Playbook' research.

      Sample of the 'Build Your Enterprise Application Implementation Playbook' research.

      Logo for Info-Tech.

      Develop Your Value-First Business Process Automation Strategy

      As you scale your business automations, focus on what matters most.

      Applications
      Business Processes

      Photo of Andrew Kum-Seun, Research Director, Info-Tech Research Group.

      Andrew Kum-Seun
      Research Director

      Download this research or book an analyst call on this topic

      Sample of the 'Develop Your Value-First Business Process Automation Strategy' research.

      Sample of the 'Develop Your Value-First Business Process Automation Strategy' research.

      Logo for Info-Tech.

      Manage Requirements in an Agile Environment

      Agile and requirements management are complementary, not competitors.

      Applications
      Application Development

      Photo of Vincent Mirabelli, Principal Research Director, Info-Tech Research Group.

      Vincent Mirabelli
      Principal Research Director

      Download this research or book an analyst call on this topic

      Sample of the 'Manage Requirements in an Agile Environment' research.

      Sample of the 'Manage Requirements in an Agile Environment' research.

      Logo for Info-Tech.

      Assess Your Cybersecurity Insurance Policy

      Adapt to changes in the cyber insurance market.

      Security
      Security Risk, Strategy & Governance

      Photo of Logan Rohde, Senior Research Analyst, Info-Tech Research Group.

      Logan Rohde
      Senior Research Analyst

      Download this research or book an analyst call on this topic

      Sample of the 'Assess Your Cybersecurity Insurance Policy' research.

      Sample of the 'Assess Your Cybersecurity Insurance Policy' research.

      Logo for Info-Tech.

      Design and Implement a Business-Aligned Security Program

      Focus first on business value.

      Security
      Security Risk, Strategy & Governance

      Photo of Michel Hébert, Research Director, Info-Tech Research Group.

      Michel Hébert
      Research Director

      Download this research or book an analyst call on this topic

      Sample of the 'Design and Implement a Business-Aligned Security Program' research.

      Sample of the 'Design and Implement a Business-Aligned Security Program' research.

      Logo for Info-Tech.

      Automate IT Asset Data Collection

      Acquire and use discovery tools wisely to populate, update, and validate the data in your ITAM database.

      Infrastructure & Operations
      I&O Process Management

      Photo of Andrew Sharp, Research Director, Info-Tech Research Group.

      Andrew Sharp
      Research Director

      Download this research or book an analyst call on this topic

      Sample of the 'Automate IT Asset Data Collection' research.

      Sample of the 'Automate IT Asset Data Collection' research.

      Logo for Info-Tech.

      Leveraging AI to Create Meaningful Insights and Visibility in Retail

      AI prominence across the enterprise value chain.

      Industry Coverage
      Retail

      Photo of Rahul Jaiswal, Principal Research Director, Info-Tech Research Group.

      Rahul Jaiswal
      Principal Research Director

      Download this research or book an analyst call on this topic

      Sample of the 'Leveraging AI to Create Meaningful Insights and Visibility in Retail' research.

      Sample of the 'Leveraging AI to Create Meaningful Insights and Visibility in Retail' research.

      Logo for Info-Tech.

      Understand the Implications of Generative AI in Education

      Bans aren't the answer, but what is?

      Industry Coverage
      Education

      Photo of Mark Maby, Research Director, Info-Tech Research Group.

      Mark Maby
      Research Director

      Download this research or book an analyst call on this topic

      Sample of the 'Understand the Implications of Generative AI in Education' research.

      Sample of the 'Understand the Implications of Generative AI in Education' research.

      Logo for Info-Tech.

      Wholesale Industry Business Reference Architecture

      Business capability maps, value streams, and strategy maps for the wholesale industry.

      Industry Coverage
      Wholesale

      Photo of Rahul Jaiswal, Principal Research Director, Info-Tech Research Group.

      Rahul Jaiswal
      Principal Research Director

      Download this research or book an analyst call on this topic

      Sample of the 'Wholesale Industry Business Reference Architecture' research.

      Sample of the 'Wholesale Industry Business Reference Architecture' research.

      Logo for Info-Tech.

      Mainframe Modernization for Retail Banking

      A strategy for modernizing mainframe systems to meet the needs of modern retail banking.

      Industry Coverage
      Retail Banking

      Photo of David Tomljenovic, Principal Research Director, Info-Tech Research Group.

      David Tomljenovic
      Principal Research Director

      Download this research or book an analyst call on this topic

      Sample of the 'Mainframe Modernization for Retail Banking' research.

      Sample of the 'Mainframe Modernization for Retail Banking' research.

      Logo for Info-Tech.

      Data Analytics Use Cases for Utilities

      Building upon the collective wisdom for the art of the possible.

      Industry Coverage
      Utilities

      Photo of Jing Wu, Principal Research Director, Info-Tech Research Group.

      Jing Wu
      Principal Research Director

      Download this research or book an analyst call on this topic

      Sample of the 'Data Analytics Use Cases for Utilities' research.

      Sample of the 'Data Analytics Use Cases for Utilities' research.

      Sneak Peaks: Research coming in next quarter!

      “Next quarter we have a big lineup of reports and some great new research!”

      Photo of Gord Harrison, Head of Research & Advisory, Info-Tech Research Group.

      Gord Harrison
      Head of Research & Advisory
      Info-Tech Research Group

      1. Build MLOps and Engineering for AI and ML

        Enabling you to develop your Engineering and ML Operations to support your current & planned use cases for AI and ML.
      2. Leverage Gen AI to Improve Your Test Automation Strategy

        Enabling you to embed Gen AI to assist your team during testing broader than Gen AI compiling code.
      3. Make Your IT Financial Data Accessible, Reliable, and Usable

        This project will provide a recipe for bringing IT's financial data to a usable state through a series of discovery, standardization, and policy-setting actions.
      4. Implement Integrated AI Governance

        Enabling you to implement best-practice governance principles when implementing Gen AI.
      5. Develop Exponential IT Capabilities

        Enabling you to understand and develop your strategic Exponential IT capabilities.
      6. Build Your AI Strategy and Roadmap

        This project will provide step-by-step guidance in development of your AI strategy with an AI strategy exemplar.
      7. Priorities for Data Leaders in 2024 and Beyond

        This report will detail the top five challenges expected in the upcoming year and how you as the CDAO can tackle them.
      8. Deploy AIOps More Effectively

        This research is designed to assess the process maturity of your IT operations and help identify pain pains and opportunities for AI deployment within your IT operations.
      9. Design Your Edge Computing Architecture

        This research will provide deployment guidelines and roadmap to address your edge computing needs.
      10. Manage Change in the AI-Enabled Enterprise

        Managing change is complex with the disruptive nature of emerging tech like AI. This research will assist you from an organizational change perspective.
      11. Assess the Security and Privacy Impacts of Your AI Vendors

        This research will allow you to enhance transparency, improve risk management, and ensure the security and privacy of data when working with AI vendors.
      12. Prepare Your Board for AI Disruption

        This research will arm you with tools to educate your board on the impact of Gen AI, addressing the potential risks and the potential benefits.

      Info-Tech Research Leadership Team

      “We have a world-class team of experts focused on providing practical, cutting-edge IT research and advice.”

      Photo of Gord Harrison, Head of Research & Advisory, Info-Tech Research Group.

      Gord Harrison
      Head of Research & Advisory
      Info-Tech Research Group

      Photo of Jack Hakimian, Senior Vice President, Research Development, Info-Tech Research Group.

      Jack Hakimian
      Senior Vice President
      Research Development

      Photo of Aaron Shum, Vice President, Security & Privacy Research, Info-Tech Research Group.

      Aaron Shum
      Vice President
      Security & Privacy Research

      Photo of Larry Fretz, Vice President, Industry Research, Info-Tech Research Group.

      Larry Fretz
      Vice President
      Industry Research

      Photo of Mark Tauschek, Vice President, Research Fellowships, Info-Tech Research Group.

      Mark Tauschek
      Vice President
      Research Fellowships

      Photo of Tom Zehren, Chief Product Officer, Info-Tech Research Group.

      Tom Zehren
      Chief Product Officer

      Photo of Rick Pittman, Vice President, Advisory Quality & Delivery, Info-Tech Research Group.

      Rick Pittman
      Vice President
      Advisory Quality & Delivery

      Photo of Nora Fisher, Vice President, Shared Services, Info-Tech Research Group.

      Nora Fisher
      Vice President
      Shared Services

      Photo of Becca Mackey, Vice President, Workshops, Info-Tech Research Group.

      Becca Mackey
      Vice President
      Workshops

      Photo of Geoff Nielson, Senior Vice President, Global Services & Delivery, Info-Tech Research Group.

      Geoff Nielson
      Senior Vice President
      Global Services & Delivery

      Photo of Brett Rugroden, Senior Vice President, Global Market Programs, Info-Tech Research Group.

      Brett Rugroden
      Senior Vice President
      Global Market Programs

      Photo of Hannes Scheidegger, Senior Vice President, Global Public Sector, Info-Tech Research Group.

      Hannes Scheidegger
      Senior Vice President
      Global Public Sector

      About Info-Tech Research Group

      Info-Tech Research Group produces unbiased and highly relevant research to help leaders make strategic, timely, and well-informed decisions. We partner closely with your teams to provide everything they need, from actionable tools to analyst guidance, ensuring they deliver measurable results for the organization.

      Sample of the IT Management & Governance Framework.

      Drive Measurable Results

      Our world-class leadership team is continually focused on building disruptive research and products that drive measurable results and save money.

      Info-Tech logo.

      Better Research Than Anyone

      Our team of experts is composed of the optimal mix of former CIOs, CISOs, PMOs, and other IT leaders and IT and management consultants as well as academic researchers and statisticians.

      Dramatically Outperform Your Peers

      Leverage Industry Best Practices

      We enable over 30,000 members to share their insights and best practices that you can use by having direct access to over 100 analysts as an extension of your team.

      Become an Info-Tech influencer:

      • Help shape our research by talking with our analysts.
      • Discuss the challenges, insights, and opportunities in your chosen areas.
      • Suggest new topic ideas for upcoming research cycles.

      Contact
      Jack Hakimian
      jhakimian@infotech.com

      We interview hundreds of experts and practitioners to help ensure our research is practical and focused on key member challenges.

      Why participate in expert interviews?

      • Discuss market trends and stay up to date.
      • Influence Info-Tech's research direction with your practical experience.
      • Preview our analysts' perspectives and preliminary research.
      • Build on your reputation as a thought leader and research contributor.
      • See your topic idea transformed into practical research.

      Thank you!

      Join us at our webinars to discuss more topics.

      For information on Info-Tech's products and services and to participate in our research process, please contact:

      Jack Hakimian
      jhakimian@infotech.com

      Application Development Throughput

      • Buy Link or Shortcode: {j2store}27|cart{/j2store}
      • Related Products: {j2store}27|crosssells{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Applications
      • Parent Category Link: /applications

      The challenge

      • As we work more and more using agile techniques, teams tend to optimize their areas of responsibility.
      • IT will still release lower-quality applications when there is a lack of clarity around the core SDLC processes.
      • Software development teams continue to struggle with budget and time constraints within their releases.
      • Typically each group claims to be optimized, yet the final deliverable falls short of the expected quality.

      Our advice

      Insight

      • Database administrators know this all too well: Optimizing can you perform worse. The software development lifecycle (SDLC) must be optimized holistically, not per area or team.
      • Separate how you work from your framework. You do not need "agile" or "extreme" or "agifall" or "safe" to optimize your SDLC.
      • SDLC optimization is a continuous effort. Start from your team's current capabilities and improve over time.

      Impact and results 

      • You can assume proper accountability for the implementation and avoid over-reliance on the systems integrator.
      • Leverage the collective knowledge and advice of additional IT professionals
      • Review the pitfalls and lessons learned from failed integrations.
      • Manage risk at every stage.
      • Perform a self-assessment at various stages of the integration path.

      The roadmap

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      Get started.

      Read our executive brief to understand our approach to SDLC optimization and why we advocate a holistic approach for your company.

      Document your current state

      This phase helps you understand your business goals and priorities. You will document your current SDLC process and find where the challenges are.

      • Create a Horizontally Optimized SDLC to Better Meet Business Demands – Phase 1: Document the Current State of the SDLC (ppt)
      • SDLC Optimization Playbook (xls)

      Find out the root causes, define how to move forward, and set your target state

      • Create a Horizontally Optimized SDLC to Better Meet Business Demands – Phase 2: Define Root Causes, Determine Optimization Initiatives, and Define Target State (ppt)

      Develop the roll-out strategy for SDLC optimization

      Prioritize your initiatives and formalize them in a roll-out strategy and roadmap. Communicate your plan to all your stakeholders.

      • Create a Horizontally Optimized SDLC to Better Meet Business Demands – Phase 3: Develop a Rollout Strategy for SDLC Optimization (ppt)
      • SDLC Communication Template (ppt)

       

      Modernize the Network

      • Buy Link or Shortcode: {j2store}501|cart{/j2store}
      • member rating overall impact: 10.0/10 Overall Impact
      • member rating average dollars saved: $16,499 Average $ Saved
      • member rating average days saved: 8 Average Days Saved
      • Parent Category Name: Network Management
      • Parent Category Link: /network-management
      • Business units, functions, and processes are inextricably intertwined with less and less tolerance for downtime.
      • Business demands change rapidly but the refresh horizon for infrastructure remains 5-7 years.
      • The number of endpoint devices the network is expected to support is growing geometrically but historic capacity planning grew linearly.
      • The business is unable to clearly define requirements, paralyzing planning.

      Our Advice

      Critical Insight

      • Build for your needs. Don’t fall into the trap of assuming what works for your neighbor, your peer, or your competitor will work for you.
      • Deliver on what your business knows it needs as well as what it doesn’t yet know it needs. Business leaders have business vision, but this vision won’t directly demand the required network capabilities to enable the business. This is where you come in.
      • Modern technologies are hampered by vintage processes. New technologies demand new ways of accomplishing old tasks.

      Impact and Result

      • Use a systematic approach to document all stakeholder needs and rely on the network technical staff to translate those needs into design constraints, use cases, features, and management practices.
      • Spend only on those emerging technologies that deliver features offering direct benefits to specific business goals and IT needs.
      • Solidify the business case for your network modernization project by demonstrating and quantifying the hard dollar value it provides to the business.

      Modernize the Network Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you should modernize the enterprise network, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Assess the network

      Identify and prioritize stakeholder and IT/networking concerns.

      • Modernize the Network – Phase 1: Assess the Network
      • Network Modernization Workbook

      2. Envision the network of the future

      Learn about emerging technologies and identify essential features of a modernized network solution.

      • Modernize the Network – Phase 2: Envision Your Future Network
      • Network Modernization Technology Assessment Tool

      3. Communicate and execute the plan

      Compose a presentation for stakeholders and prepare the RFP for vendors.

      • Modernize the Network – Phase 3: Communicate and Execute the Plan
      • Network Modernization Roadmap
      • Network Modernization Executive Presentation Template
      • Network Modernization RFP Template
      [infographic]

      Workshop: Modernize the Network

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Assess the Network

      The Purpose

      Understand current stakeholder and IT needs pertaining to the network.

      Key Benefits Achieved

      Prioritized lists of stakeholder and IT needs.

      Activities

      1.1 Assess and prioritize stakeholder concerns.

      1.2 Assess and prioritize design considerations.

      1.3 Assess and prioritize use cases.

      1.4 Assess and prioritize network infrastructure concerns.

      1.5 Assess and prioritize care and control concerns.

      Outputs

      Current State Register

      2 Analyze Emerging Technologies and Identify Features

      The Purpose

      Analyze emerging technologies to determine whether or not to include them in the network modernization.

      Identify and shortlist networking features that will be part of the network modernization.

      Key Benefits Achieved

      An understanding of what emerging technologies are suitable for including in your network modernization.

      A prioritized list of features, aligned with business needs, that your modernized network must or should have.

      Activities

      2.1 Analyze emerging technologies.

      2.2 Identify features to support drivers, practices, and pain points.

      Outputs

      Emerging technology assessment

      Prioritize lists of modernized network features

      3 Plan for Future Capacity

      The Purpose

      Estimate future port, bandwidth, and latency requirements for all sites on the network.

      Key Benefits Achieved

      Planning for capacity ensures the network is capable of delivering until the next refresh cycle and beyond.

      Activities

      3.1 Estimate port, bandwidth, and latency requirements.

      3.2 Group sites according to capacity requirements.

      3.3 Create standardized capacity plans for each group.

      Outputs

      A summary of capacity requirements for each site in the network

      4 Communicate and Execute the Plan

      The Purpose

      Create a presentation to pitch the project to executives.

      Compose key elements of RFP.

      Key Benefits Achieved

      Communication to executives, summarizing the elements of the modernization project that business decision makers will want to know, in order to gain approval.

      Communication to vendors detailing the network solution requirements so that proposed solutions are aligned to business and IT needs.

      Activities

      4.1 Build the executive presentation.

      4.2 Compose the scope of work.

      4.3 Compose technical requirements.

      Outputs

      Executive Presentation

      Request for Proposal/Quotation

      Create a Right-Sized Disaster Recovery Plan

      • Buy Link or Shortcode: {j2store}410|cart{/j2store}
      • member rating overall impact: 9.6/10 Overall Impact
      • member rating average dollars saved: $83,037 Average $ Saved
      • member rating average days saved: 32 Average Days Saved
      • Parent Category Name: DR and Business Continuity
      • Parent Category Link: /business-continuity
      • Any time a natural disaster or major IT outage occurs, it increases executive awareness and internal pressure to create a disaster recovery plan (DRP).
      • Traditional DRP templates are onerous and result in a lengthy, dense plan that might satisfy auditors but will not be effective in a crisis.
      • The myth that a DRP is only for major disasters leaves organizations vulnerable to more common incidents.
      • The growing use of outsourced infrastructure services has increased reliance on vendors to meet recovery timeline objectives.

      Our Advice

      Critical Insight

      • At its core, disaster recovery (DR) is about ensuring service continuity. Create a plan that can be leveraged for both isolated and catastrophic events.
      • Remember Murphy’s Law. Failure happens. Focus on improving overall resiliency and recovery, rather than basing DR on risk probability analysis.
      • Cost-effective DR and service continuity starts with identifying what is truly mission critical so you can focus resources accordingly. Not all services require fast failover.

      Impact and Result

      • Define appropriate objectives for service downtime and data loss based on business impact.
      • Document an incident response plan that captures all of the steps from event detection to data center recovery.
      • Create a DR roadmap to close gaps between current DR capabilities and recovery objectives.

      Create a Right-Sized Disaster Recovery Plan Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Disaster Recovery Plan (DRP) Research – A step-by-step document that helps streamline your DR planning process and build a plan that's concise, usable, and maintainable.

      Any time a major IT outage occurs, it increases executive awareness and internal pressure to create an IT DRP. This blueprint will help you develop an actionable DRP by following our four-phase methodology to define scope, current status, and dependencies; conduct a business impact analysis; identify and address gaps in the recovery workflow; and complete, extend, and maintain your DRP.

      • Create a Right-Sized Disaster Recovery Plan – Phases 1-4

      2. DRP Case Studies – Examples to help you understand the governance and incident response components of a DRP and to show that your DRP project does not need to be as onerous as imagined.

      These examples include a client who leveraged the DRP blueprint to create practical, concise, and easy-to-maintain DRP governance and incident response plans and a case study based on a hospital providing a wide range of healthcare services.

      • Case Study: Practical, Right-Sized DRP
      • Case Study: Practical, Right-Sized DRP – Healthcare Example

      3. DRP Maturity Scorecard – An assessment tool to evaluate the current state of your DRP.

      Use this tool to measure your current DRP maturity and identify gaps to address. It includes a comprehensive list of requirements for your DRP program, including core and industry requirements.

      • DRP Maturity Scorecard

      4. DRP Project Charter Template – A template to communicate important details on the project purpose, scope, and parameters.

      The project charter template includes details on the project overview (description, background, drivers, and objectives); governance and management (project stakeholders/roles, budget, and dependencies); and risks, assumptions, and constraints (known and potential risks and mitigation strategy).

      • DRP Project Charter Template

      5. DRP Business Impact Analysis Tool – An evaluation tool to estimate the impact of downtime to determine appropriate, acceptable recovery time objectives (RTOs) and recovery point objectives (RPOs) and to review gaps between objectives and actuals.

      This tool enables you to identify critical applications/systems; identify dependencies; define objective scoring criteria to evaluate the impact of application/system downtime; determine the impact of downtime and establish criticality tiers; set recovery objectives (RTO/RPO) based on the impact of downtime; record recovery actuals (RTA/RPA) and identify any gaps between objectives and actuals; and identify dependencies that regularly fail (and have a significant impact when they fail) to prioritize efforts to improve resiliency.

      • DRP Business Impact Analysis Tool
      • Legacy DRP Business Impact Analysis Tool

      6. DRP BIA Scoring Context Example – A tool to record assumptions you made in the DRP Business Impact Analysis Tool to explain the results and drive business engagement and feedback.

      Use this tool to specifically record assumptions made about who and what are impacted by system downtime and record assumptions made about impact severity.

      • DRP BIA Scoring Context Example

      7. DRP Recovery Workflow Template – A flowchart template to provide an at-a-glance view of the recovery workflow.

      This simple format is ideal during crisis situations, easier to maintain, and often quicker to create. Use this template to document the Notify - Assess - Declare disaster workflow, document current and planned future state recovery workflows, including gaps and risks, and review an example recovery workflow.

      • DRP Recovery Workflow Template (PDF)
      • DRP Recovery Workflow Template (Visio)

      8. DRP Roadmap Tool – A visual roadmapping tool that will help you plan, communicate, and track progress for your DRP initiatives.

      Improving DR capabilities is a marathon, not a sprint. You likely can't fund and resource all the measures for risk mitigation at once. Instead, use this tool to create a roadmap for actions, tasks, projects, and initiatives to complete in the short, medium, and long term. Prioritize high-benefit, low-cost mitigations.

      • DRP Roadmap Tool

      9. DRP Recap and Results Template – A template to summarize and present key findings from your DR planning exercises and documents.

      Use this template to present your results from the DRP Maturity Scorecard, BCP-DRP Fitness Assessment, DRP Business Impact Analysis Tool, tabletop planning exercises, DRP Recovery Workflow Template, and DRP Roadmap Tool.

      • DRP Recap and Results Template

      10. DRP Workbook – A comprehensive tool that enables you to organize information to support DR planning.

      Leverage this tool to document information regarding DRP resources (list the documents/information sources that support DR planning and where they are located) and DR teams and contacts (list the DR teams, SMEs critical to DR, and key contacts, including business continuity management team leads that would be involved in declaring a disaster and coordinating response at an organizational level).

      • DRP Workbook

      11. Appendix

      The following tools and templates are also included as part of this blueprint to use as needed to supplement the core steps above:

      • DRP Incident Response Management Tool
      • DRP Vendor Evaluation Questionnaire
      • DRP Vendor Evaluation Tool
      • Severity Definitions and Escalation Rules Template
      • BCP-DRP Fitness Assessment
      [infographic]

      Workshop: Create a Right-Sized Disaster Recovery Plan

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Define Parameters for Your DRP

      The Purpose

      Identify key applications and dependencies based on business needs.

      Key Benefits Achieved

      Understand the entire IT “footprint” that needs to be recovered for key applications. 

      Activities

      1.1 Assess current DR maturity.

      1.2 Determine critical business operations.

      1.3 Identify key applications and dependencies.

      Outputs

      Current challenges identified through a DRP Maturity Scorecard.

      Key applications and dependencies documented in the Business Impact Analysis (BIA) Tool.

      2 Determine the Desired Recovery Timeline

      The Purpose

      Quantify application criticality based on business impact.

      Key Benefits Achieved

      Appropriate recovery time and recovery point objectives defined (RTOs/RPOs).

      Activities

      2.1 Define an objective scoring scale to indicate different levels of impact.

      2.2 Estimate the impact of downtime.

      2.3 Determine desired RTO/RPO targets for applications based on business impact.

      Outputs

      Business impact analysis scoring criteria defined.

      Application criticality validated.

      RTOs/RPOs defined for applications and dependencies.

      3 Determine the Current Recovery Timeline and DR Gaps

      The Purpose

      Determine your baseline DR capabilities (your current state).

      Key Benefits Achieved

      Gaps between current and desired DR capability are quantified.

      Activities

      3.1 Conduct a tabletop exercise to determine current recovery procedures.

      3.2 Identify gaps between current and desired capabilities.

      3.3 Estimate likelihood and impact of failure of individual dependencies.

      Outputs

      Current achievable recovery timeline defined (i.e. the current state).

      RTO/RPO gaps identified.

      Critical single points of failure identified.

      4 Create a Project Roadmap to Close DR Gaps

      The Purpose

      Identify and prioritize projects to close DR gaps.

      Key Benefits Achieved

      DRP project roadmap defined that will reduce downtime and data loss to acceptable levels.

      Activities

      4.1 Determine what projects are required to close the gap between current and desired DR capability.

      4.2 Prioritize projects based on cost, effort, and impact on RTO/RPO reduction.

      4.3 Validate that the suggested projects will achieve the desired DR capability.

      Outputs

      Potential DR projects identified.

      DRP project roadmap defined.

      Desired-state incident response plan defined, and project roadmap validated.

      5 Establish a Framework for Documenting Your DRP, and Summarize Next Steps

      The Purpose

      Outline how to create concise, usable DRP documentation.

      Summarize workshop results. 

      Key Benefits Achieved

      A realistic and practical approach to documenting your DRP.

      Next steps documented. 

      Activities

      5.1 Outline a strategy for using flowcharts and checklists to create concise, usable documentation.

      5.2 Review Info-Tech’s DRP templates for creating system recovery procedures and a DRP summary document.

      5.3 Summarize the workshop results, including current potential downtime and action items to close gaps.

      Outputs

      Current-state and desired-state incident response plan flowcharts.

      Templates to create more detailed documentation where necessary.

      Executive communication deck that outlines current DR gaps, how to close those gaps, and recommended next steps.

      Further reading

      Create a Right-Sized Disaster Recovery Plan

      Close the gap between your DR capabilities and service continuity requirements.

      ANALYST PERSPECTIVE

      An effective disaster recovery plan (DRP) is not just an insurance policy.

      "An effective DRP addresses common outages such as hardware and software failures, as well as regional events, to provide day-to-day service continuity. It’s not just insurance you might never cash in. Customers are also demanding evidence of an effective DRP, so organizations without a DRP risk business impact not only from extended outages but also from lost sales. If you are fortunate enough to have executive buy-in, whether it’s due to customer pressure or concern over potential downtime, you still have the challenge of limited time to dedicate to disaster recovery (DR) planning. Organizations need a practical but structured approach that enables IT leaders to create a DRP without it becoming their full-time job."

      Frank Trovato,

      Research Director, Infrastructure

      Info-Tech Research Group

      Is this research for you?

      This Research Is Designed For:

      • Senior IT management responsible for executing DR.
      • Organizations seeking to formalize, optimize, or validate an existing DRP.
      • Business continuity management (BCM) professionals leading DRP development.

      This Research Will Help You:

      • Create a DRP that is aligned with business requirements.
      • Prioritize technology enhancements based on DR requirements and risk-impact analysis.
      • Identify and address process and technology gaps that impact DR capabilities and day-to-day service continuity.

      This Research Will Also Assist:

      • Executives who want to understand the time and resource commitment required for DRP.
      • Members of BCM and crisis management teams who need to understand the key elements of an IT DRP.

      This Research Will Help Them:

      • Scope the time and effort required to develop a DRP.
      • Align business continuity, DR, and crisis management plans.

      Executive summary

      Situation

      • Any time a natural disaster or major IT outage occurs, it increases executive awareness and internal pressure to create a DRP.
      • Industry standards and government regulations are driving external pressure to develop business continuity and IT DR plans.
      • Customers are asking suppliers and partners to provide evidence that they have a workable DRP before agreeing to do business.

      Complication

      • Traditional DRP templates are onerous and result in a lengthy, dense plan that might satisfy auditors, but will not be effective in a crisis.
      • The myth that a DRP is only for major disasters leaves organizations vulnerable to more common incidents.
      • The growing use of outsourced infrastructure services has increased reliance on vendors to meet recovery timeline objectives.

      Resolution

      • Create an effective DRP by following a structured process to discover current capabilities and define business requirements for continuity:
        • Define appropriate objectives for service downtime and data loss based on business impact.
        • Document an incident response plan that captures all of the steps from event detection to data center recovery.
        • Create a DR roadmap to close gaps between current DR capabilities and recovery objectives.

      Info-Tech Insight

      1. At its core, DR is about ensuring service continuity. Create a plan that can be leveraged for both isolated and catastrophic events.
      2. Remember Murphy’s Law. Failure happens. Focus on improving overall resiliency and recovery, rather than basing DR on risk probability analysis.
      3. Cost-effective DR and service continuity starts with identifying what is truly mission critical so you can focus resources accordingly. Not all services require fast failover.

      An effective DRP is critical to reducing the cost of downtime

      If you don’t have an effective DRP when failure occurs, expect to face extended downtime and exponentially rising costs due to confusion and lack of documented processes.

      Image displayed is a graph that shows that delay in recovery causes exponential revenue loss.

      Potential Lost Revenue

      The impact of downtime tends to increase exponentially as systems remain unavailable (graph at left). A current, tested DRP will significantly improve your ability to execute systems recovery, minimizing downtime and business impact. Without a DRP, IT is gambling on its ability to define and implement a recovery strategy during a time of crisis. At the very least, this means extended downtime – potentially weeks or months – and substantial business impact.

      Adapted from: Philip Jan Rothstein, 2007

      Cost of Downtime for the Fortune 1000

      Cost of unplanned apps downtime per year: $1.25B to $2.5B.

      Cost of critical apps failure per hour: $500,000 to $1M.

      Cost of infrastructure failure per hour: $100,000.

      35% reported to have recovered within 12 hours.

      17% of infrastructure failures took more than 24 hours to recover.

      13% of application failures took more than 24 hours to recover.

      Source: Stephen Elliot, 2015

      Info-Tech Insight

      The cost of downtime is rising across the board, and not just for organizations that traditionally depend on IT (e.g. e-commerce). Downtime cost increase since 2010:

      Hospitality: 129% increase

      Transportation: 108% increase

      Media organizations: 104% increase

      An effective DRP also sets clear recovery objectives that align with system criticality to optimize spend

      The image displays a disaster recovery plan example, where different tiers are in place to support recovery in relation to time.

      Take a practical approach that creates a more concise and actionable DRP

      DR planning is not your full-time job, so it can’t be a resource- and time-intensive process.

      The Traditional Approach Info-Tech’s Approach

      Start with extensive risk and probability analysis.

      Challenge: You can’t predict every event that can occur, and this delays work on your actual recovery procedures.

      Focus on how to recover regardless of the incident.

      We know failure will happen. Focus on improving your ability to failover to a DR environment so you are protected regardless of what causes primary site failure.

      Build a plan for major events such as natural disasters.

      Challenge: Major destructive events only account for 12% of incidents while software/hardware issues account for 45%. The vast majority of incidents are isolated local events.

      An effective DRP improves day-to-day service continuity, and is not just for major events.

      Leverage DR planning to address both common (e.g. power/network outage or hardware failure) as well as major events. It must be documentation you can use, not shelfware.

      Create a DRP manual that provides step-by-step instructions that anyone could follow.

      Challenge: The result is lengthy, dense manuals that are difficult to maintain and hard to use in a crisis. The usability of DR documents has a direct impact on DR success.

      Create concise documentation written for technical experts.

      Use flowcharts, checklists, and diagrams. They are more usable in a crisis and easier to maintain. You aren’t going to ask a business user to recover your SQL Server databases, so you can afford to be concise.

      DR must be integrated with day-to-day incident management to ensure service continuity

      When a tornado takes out your data center, it’s an obvious DR scenario and the escalation towards declaring a disaster is straightforward.

      The challenge is to be just as decisive in less-obvious (and more common) DR scenarios such as a critical system hardware/software failure, and knowing when to move from incident management to DR. Don’t get stuck troubleshooting for days when you could have failed over in hours.

      Bridge the gap with clearly-defined escalation rules and criteria for when to treat an incident as a disaster.

      Image displays two graphs. The graph on the left measures the extent that service management processes account for disasters by the success meeting RTO and RPO. The graph on the right is a double bar graph that shows DRP being integrated and not integrated in the following categories: Incident Classifications, Severity Definitions, Incident Models, Escalation Procedures. These are measured based on the success meeting RTO and RPO.

      Source: Info-Tech Research Group; N=92

      Myth busted: The DRP is separate from day-to-day ops and incident management.

      The most common threats to service continuity are hardware and software failures, network outages, and power outages

      The image displayed is a bar graph that shows the common threats to service continuity. There are two areas of interest that have labels. The first is: 45% of service interruptions that went beyond maximum downtime guidelines set by the business were caused by software and hardware issues. The second label is: Only 12% of incidents were caused by major destructive events.

      Source: Info-Tech Research Group; N=87

      Info-Tech Insight

      Does this mean I don’t need to worry about natural disasters? No. It means DR planning needs to focus on overall service continuity, not just major disasters. If you ignore the more common but less dramatic causes of service interruptions, you are diminishing the business value of a DRP.

      Myth busted: DRPs are just for destructive events – fires, floods, and natural disasters.

      DR isn’t about identifying risks; it’s about ensuring service continuity

      The traditional approach to DR starts with an in-depth exercise to identify risks to IT service continuity and the probability that those risks will occur.

      Here’s why starting with a risk register is ineffective:

      • Odds are, you won’t think of every incident that might occur. If you think of twenty risks, it’ll be the twenty-first that gets you. If you try to guard against that twenty-first risk, you can quickly get into cartoonish scenarios and much more costly solutions.
      • The ability to failover to another site mitigates the risk of most (if not all) incidents (fire, flood, hardware failure, tornado, etc.). A risk and probability analysis doesn’t change the need for a plan that includes a failover procedure.

      Where risk is incorporated in this methodology:

      • Use known risks to further refine your strategy (e.g. if you are prone to hurricanes, plan for greater geographic separation between sites; ensure you have backups, in addition to replication, to mitigate the risk of ransomware).
      • Identify risks to your ability to execute DR (e.g. lack of cross-training, backups that are not tested) and take steps to mitigate those risks.

      Myth busted: A risk register is the critical first step to creating an effective DR plan.

      You can’t outsource accountability and you can’t assume your vendor’s DR capabilities meet your needs

      Outsourcing infrastructure services – to a cloud provider, co-location provider, or managed service provider (MSP) – can improve your DR and service continuity capabilities. For example, a large public cloud provider will generally have:

      • Redundant telecoms service providers, network infrastructure, power feeds, and standby power.
      • Round-the-clock infrastructure and security monitoring.
      • Multiple data centers in a given region, and options to replicate data and services across regions.

      Still, failure is inevitable – it’s been demonstrated multiple times1 through high-profile outages. When you surrender direct control of the systems themselves, it’s your responsibility to ensure the vendor can meet your DR requirements, including:

      • A DR site and acceptable recovery times for systems at that site.
      • An acceptable replication/backup schedule.

      Sources: Kyle York, 2016; Shaun Nichols, 2017; Stephen Burke, 2017

      Myth busted: I outsource infrastructure services so I don’t have to worry about DR. That’s my vendor’s responsibility.

      Choose flowcharts over process guides, checklists over procedures, and diagrams over descriptions

      IT DR is not an airplane disaster movie. You aren’t going to ask a business user to execute a system recovery, just like you wouldn’t really want a passenger with no flying experience to land a plane.

      In reality, you write a DR plan for knowledgeable technical staff, which allows you to summarize key details your staff already know. Concise, visual documentation is:

      • Quicker to create.
      • Easier to use.
      • Simpler to maintain.

      "Without question, 300-page DRPs are not effective. I mean, auditors love them because of the detail, but give me a 10-page DRP with contact lists, process flows, diagrams, and recovery checklists that are easy to follow."

      – Bernard Jones, MBCI, CBCP, CORP, Manager Disaster Recovery/BCP, ActiveHealth Management

      A graph is displayed. It shows a line graph where the DR success is higher by using flowcharts, checklists, and diagrams.

      Source: Info-Tech Research Group; N=95

      *DR Success is based on stated ability to meet recovery time objectives (RTOs) and recovery point objectives (RPOs), and reported confidence in ability to consistently meet targets.

      Myth busted: A DRP must include every detail so anyone can execute recovery.

      A DRP is part of an overall business continuity plan

      A DRP is the set of procedures and supporting documentation that enables an organization to restore its core IT services (i.e. applications and infrastructure) as part of an overall business continuity plan (BCP), as described below. Use the templates, tools, and activities in this blueprint to create your DRP.

      Overall BCP
      IT DRP BCP for Each Business Unit Crisis Management Plan
      A plan to restore IT services (e.g. applications and infrastructure) following a disruption. This includes:
      • Identifying critical applications and dependencies.
      • Defining an appropriate (desired) recovery timeline based on a business impact analysis (BIA).
      • Creating a step-by-step incident response plan.
      A set of plans to resume business processes for each business unit. Info-Tech’s Develop a Business Continuity Plan blueprint provides a methodology for creating business unit BCPs as part of an overall BCP for the organization. A set of processes to manage a wide range of crises, from health and safety incidents to business disruptions to reputational damage. This includes emergency response plans, crisis communication plans, and the steps to invoke BC/DR plans when applicable. Info-Tech’s Implement Crisis Management Best Practices blueprint provides a structured approach to develop a crisis management process.

      Note: For DRP, we focus on business-facing IT services (as opposed to the underlying infrastructure), and then identify required infrastructure as dependencies (e.g. servers, databases, network).

      Take a practical but structured approach to creating a concise and effective DRP

      Image displayed shows the structure of this blueprint. It shows the structure of phases 1-4 and the related tools and templates for each phase.

      Info-Tech offers various levels of support to best suit your needs

      DIY Toolkit

      "Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful."

      Guided Implementation

      “Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track.”

      Workshop

      “We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place.”

      Consulting

      “Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project.”

      Diagnostics and consistent frameworks used throughout all four options

      Info-Tech advisory services deliver measurable value

      Info-Tech members save an average of $22,983 and 22 days by working with an Info-Tech analyst on DRP (based on client response data from Info-Tech Research Group’s Measured Value Survey, following analyst advisory on this blueprint).

      Why do members report value from analyst engagement?

      1. Expert advice on your specific situation to overcome obstacles and speed bumps.
      2. Structured project and guidance to stay on track.
      3. Project deliverables review to ensure the process is applied properly.

      Guided implementation overview

      Your trusted advisor is just a call away.

      Define DRP scope (Call 1)

      Scope requirements, objectives, and your specific challenges. Identify applications/ systems to focus on first.

      Define current status and system dependencies (Calls 2-3)

      Assess current DRP maturity. Identify system dependencies.

      Conduct a BIA (Calls 4-6)

      Create an impact scoring scale and conduct a BIA. Identify RTO and RPO for each system.

      Recovery workflow (Calls 7-8)

      Create a recovery workflow based on tabletop planning. Identify gaps in recovery capabilities.

      Projects and action items (Calls 9-10)

      Identify and prioritize improvements. Summarize results and plan next steps.

      Your guided implementations will pair you with an advisor from our analyst team for the duration of your DRP project.

      Workshop overview

      Contact your account representative or email Workshops@InfoTech.com for more information.

      Image displays the workshop overview for this blueprint. It is a workshop that runs for 4 days and covers various activities and produces many deliverables.

      End-user complaints distract from serious IT-based risks to business continuity

      Case Study

      Industry: Manufacturing
      Source: Info-Tech Research Group Client Engagement

      A global manufacturer with annual sales over $1B worked with Info-Tech to improve DR capabilities.

      DRP BIA

      Conversations with the IT team and business units identified the following impact of downtime over 24 hours:

      • Email: Direct Cost: $100k; Goodwill Impact Score: 8.5/16
      • ERP: Direct Cost: $1.35mm; Goodwill Impact Score: 12.5/16

      Tabletop Testing and Recovery Capabilities

      Reviewing the organization’s current systems recovery workflow identified the following capabilities:

      • Email: RTO: minutes, RPO: minutes
      • ERP: RTO: 14 hours, RPO: 24 hours

      Findings

      Because of end-user complaints, IT had invested heavily in email resiliency though email downtime had a relatively minimal impact on the business. After working through the methodology, it was clear that the business needed to provide additional support for critical systems.

      Insights at each step:

      Identify DR Maturity and System Dependencies

      Conduct a BIA

      Outline Incident Response and Recovery Workflow With Tabletop Exercises

      Mitigate Gaps and Risks

      Create a Right-Sized Disaster Recovery Plan

      Phase 1

      Define DRP Scope, Current Status, and Dependencies

      Step 1.1: Set Scope, Kick-Off the DRP Project, and Create a Charter

      This step will walk you through the following activities:

      • Establish a team for DR planning.
      • Retrieve and review existing, relevant documentation.
      • Create a project charter.

      This step involves the following participants:

      • DRP Coordinator
      • DRP Team (Key IT SMEs)
      • IT Managers

      Results and Insights

      • Set scope for the first iteration of the DRP methodology.
      • Don’t try to complete your DR and BCPs all at once.
      • Don’t bite off too much at once.

      Kick-off your DRP project

      You’re ready to start your DR project.

      This could be an annual review – but more likely, this is the first time you’ve reviewed the DR plan in years.* Maybe a failed audit might have provided a mandate for DR planning, or a real disaster might have highlighted gaps in DR capabilities. First, set appropriate expectations for what the project is and isn’t, in terms of scope, outputs, and resource commitments. Very few organizations can afford to hire a full-time DR planner, so it’s likely this won’t be your full-time job. Set objectives and timelines accordingly.

      Gather a team

      • Often, DR efforts are led by the infrastructure and operations leader. This person can act as the DRP coordinator or may delegate this role.
      • Key infrastructure subject-matter experts (SMEs) are usually part of the team and involved through the project.

      Find and review existing documentation

      • An existing DRP may have information you can re-purpose rather than re-create.
      • High-level architecture diagrams and network diagrams can help set scope (and will become part of your DR kit).
      • Current business-centric continuity of operations plans (COOPs) or BCPs are important to understand.

      Set specific, realistic objectives

      • Create a project charter (see next slide) to record objectives, timelines, and assumptions.
      *Only 20% of respondents to an Info-Tech Research Group survey (N=165) had a complete DRP; only 38% of respondents with a complete or mostly complete DRP felt it would be effective in a crisis.

      List DRP drivers and challenges

      1(a) Drivers and roadblocks

      Estimated Time: 30 minutes

      Identify the drivers and challenges to completing a functional DRP plan with the core DR team.

      DRP Drivers

      • Past outages (be specific):
        • Hardware and software failures
        • External network and power outages
        • Building damage
        • Natural disaster(s)
      • Audit findings
      • Events in the news
      • Other?

      DRP Challenges

      • Lack of time
      • Insufficient DR budget
      • Lack of executive support
      • No internal DRP expertise
      • Challenges making the case for DRP
      • Other?

      Write down insights from the meeting on flip-chart paper or a whiteboard and use the findings to inform your DRP project (e.g. challenges to address).

      Clarify expectations with a project charter

      1(b) DRP Project Charter Template

      DRP Project Charter Template components:

      Define project parameters, roles, and objectives, and clarify expectations with the executive team. Specific subsections are listed below and described in more detail in the remainder of this phase.

      • Project Overview: Includes objectives, deliverables, and scope. Leverage relevant notes from the “Project Drivers” brainstorming exercise (e.g. past outages and near misses which help make the case).
      • Governance and Management: Includes roles, responsibilities, and resource requirements.
      • Project Risks, Assumptions, and Constraints: Includes risks and mitigation strategies, as well as any assumptions and constraints.
      • Project Sign-Off: Includes IT and executive sign-off (if required).

      Note: Identify the initial team roles and responsibilities first so they can assist in defining the project charter.

      The image is a screenshot of the first page of the DRP Project Charter Template.

      Step 1.2: Assess Current State DRP Maturity

      This step will walk you through the following activities:

      • Complete Info-Tech’s DRP Maturity Scorecard.

      This step involves the following participants:

      • DRP Coordinator
      • IT SMEs

      Results and Insights

      • Identify the current state of the organization’s DRP and continuity management. Set a baseline for improvement.
      • Discover where improvement is most needed to create an effective plan.

      Only 38% of IT departments believe their DRPs would be effective in a real crisis

      Even organizations with documented DRPs struggle to make them actionable.

      • Even when a DRP does become a priority (e.g. due to regulatory or customer drivers), the challenge is knowing where to start and having a methodical step-by-step process for doing the work. With no guide to plan and resource the project, it becomes work that you complete piecemeal when you aren’t working on other projects, or at night after the kids go to bed.
      • Far too many organizations create a document to satisfy auditors rather than creating a usable plan. People in this group often just want a fill-in-the-blanks template. What they will typically find is a template for the traditional 300-page manual that goes in a binder that sits on a shelf, is difficult to maintain, and is not effective in a crisis.
      Two bar graphs are displayed. The graph on the left shows that only 20% of survey respondents indicate they have a complete DRP. The graph on the right shows that 38% of those who have a mostly completed or full DRP actually feel it would be effective in a crisis.

      Use the DRP Maturity Scorecard to assess the current state of your DRP and identify areas to improve

      1(c) DRP Maturity Scorecard

      Info-Tech’s DRP Maturity Scorecard evaluates completion status and process maturity for a comprehensive yet practical assessment across three aspects of an effective DRP program – Defining Requirements, Implementation, and Maintenance.

      Image has three boxes. One is labelled Completion status, another below it is labelled Process Maturity. There is an addition sign in between them. With an arrow leading from both boxes is another box that is labelled DRP Maturity Assessment

      Completion Status: Reflects the progress made with each component of your DRP Program.

      Process Maturity: Reflects the consistency and quality of the steps executed to achieve your completion status.

      DRP Maturity Assessment: Each component (e.g. BIA) of your DRP Program is evaluated based on completion status and process maturity to provide an accurate holistic assessment. For example, if your BIA completion status is 4 out of 5, but process maturity is a 2, then requirements were not derived from a consistent defined process. The risk is inconsistent application prioritization and misalignment with actual business requirements.

      Step 1.3: Identify Applications, Systems, and Dependencies

      This step will walk you through the following activities:

      • Identify systems, applications, and services, and the business units that use them.
      • Document applications, systems, and their dependencies in the DRP Business Impact Analysis Tool.

      This step involves the following participants:

      • DRP Coordinator
      • DRP Team

      Results and Insights

      • Identify core services and the applications that depend on them.
      • Add applications and dependencies to the DRP Business Impact Analysis Tool.

      Select 5-10 services to get started on the DRP methodology

      1(d) High-level prioritization

      Estimated Time: 30 minutes

      Working through the planning process the first time can be challenging. If losing momentum is a concern, limit the BIA to a few critical systems to start.

      Run this exercise if you need a structured exercise to decide where to focus first and identify the business users you should ask for input on the impact of system downtime.

      1. On a whiteboard or flip-chart paper, list business units in a column on the left. List key applications/systems in a row at the top. Draw a grid.
      2. At a high level, review how applications are used by each unit. Take notes to keep track of any assumptions you make.
        • Add a ✓ if members of the unit use the application or system.
        • Add an ✱ if members of the unit are heavy users of the application or system and/or use it for time sensitive tasks.
        • Leave the box blank if the app isn’t used by this unit.
      3. Use the chart to prioritize systems to include in the BIA (e.g. systems marked with an *) but also include a few less-critical systems to illustrate DRP requirements for a range of systems.

      Image is an example of what one could complete from step 1(d). There is a table shown. In the column on the left lists sales, marketing, R&D, and Finance. In the top row, there is listed: dialer, ERP. CRM, Internet, analytics, intranet

      Application Notes
      CRM
      • Supports time-critical sales and billing processes.
      Dialer
      • Used for driving the sales-call queue, integration with CRM.

      Draw a high-level sketch of your environment

      1(e) Sketch your environment

      Estimated Time: 1-2 hours

      A high-level topology or architectural diagram is an effective way to identify dependencies, application ownership, outsourced services, hardware redundancies, and more.

      Note:

      • Network diagrams or high-level architecture diagrams help to identify dependencies and redundancies. Even a rough sketch is a useful reference tool for participants, and will be valuable documentation in the final DR plan.
      • Keep the drawings tidy. Visualize the final diagram before you start to draw on the whiteboard to help with spacing and placement.
      • Collaborate with relevant SMEs to identify dependencies. Keep the drawing high-level.
      • Illustrate connections between applications or components with lines. Use color coding to illustrate where applications are hosted (e.g. in-house, at a co-lo, in a cloud or MSP environment).
      Example of a high-level topology or architectural diagram

      Document systems and dependencies

      Collaborate with system SMEs to identify dependencies for each application or system. Document the dependencies in the DRP Business Impact Analysis Tool (see image below)

      • When listing applications, focus on business-facing systems or services that business users will recognize and use terminology they’ll understand.
      • Group infrastructure components that support all other services as a single core infrastructure service to simplify dependency mapping (e.g. core router, virtual hosts, ID management, and DNS).
      • In general, each data center will have its own core infrastructure components. List each data center separately – especially if different services are hosted at each data center.
      • Be specific when documenting dependencies. Use existing asset tracking tables, discovery tools, asset management records, or configuration management tools to identify specific server names.
      • Core infrastructure dependencies, such as the network infrastructure, power supply, and centralized storage, will be a common set of dependencies for most applications, so group these into a separate category called “Core Infrastructure” to minimize repetition in your DR planning.
      • Document production components in the BIA tool. Capture in-production, redundant components performing the same work on a single dependency line. List standby systems in the notes.

      Info-Tech Best Practice

      In general, visual documentation is easier to use in a crisis and easier to maintain over time. Use Info-Tech’s research to help build your own visual SOPs.

      Document systems and dependencies

      1(f) DRP Business Impact Analysis Tool – Record systems and dependencies

      A screenshot of Info-Tech's DRP Business Impact Analysis Tool.

      Stories from the field: Info-Tech clients find value in Phase 1 in the following ways

      An organization uncovers a key dependency that needed to be treated as a Tier 1 system

      Reviewing the entire ecosystem for applications identified key dependencies that were previously considered non-critical. For example, a system used to facilitate secure data transfers was identified as a key dependency for payroll and other critical business processes, and elevated to Tier 1.

      A picture’s worth a thousand words (and 1600 servers)

      Drawing a simple architectural diagram was an invaluable tool to identify key dependencies and critical systems, and to understand how systems and dependencies were interconnected. The drawing was an aha moment for IT and business stakeholders trying to make sense of their 1600-server environment.

      Make the case for DRP

      A member of the S&P 500 used Info-Tech’s DRP Maturity Scorecard to provide a reliable objective assessment and make the case for improvements to the board of directors.

      State government agency initiates a DRP project to complement an existing COOP

      Info-Tech's DRP Project Charter enabled the CIO to clarify their DRP project scope and where it fit into their overall COOP. The project charter example provided much of the standard copy – objectives, scope, project roles, methodology, etc. – required to outline the project.

      Phase 1: Insights and accomplishments

      Image has two screenshots from Info-Tech's Phase 1 tools and templates.

      Created a charter and identified current maturity

      Image has two screenshots. One is from Info-Tech's DRP Business Impact Analysis Tool and the other is from the example in step 1(d).

      Identified systems and dependencies for the BIA

      Summary of Accomplishments:

      • Created a DRP project charter.
      • Completed the DRP Maturity Scorecard and identified current DRP maturity.
      • Prioritized applications/systems for a first pass through DR planning.
      • Identified dependencies for each application and system.

      Up Next: Conduct a BIA to establish recovery requirements

      Create a Right-Sized Disaster Recovery Plan

      Phase 2

      Conduct a BIA to Determine Acceptable RTOs and RPOs

      Step 2.1: Define an Objective Impact Scoring Scale

      This step will walk you through the following activities:

      • Create a scoring scale to measure the business impact of application and system downtime.

      This step involves the following participants:

      • DRP Coordinator
      • DRP Team

      Results and Insights

      • Use a scoring scale tied to multiple categories of real business impact to develop a more objective assessment of application and system criticality.

      Align capabilities to appropriate and acceptable RTOs and RPOs with a BIA

      Too many organizations avoid a BIA because they perceive it as onerous or unneeded. A well-managed BIA is straightforward and the benefits are tangible.

      A BIA enables you to identify appropriate spend levels, maintain executive support, and prioritize DR planning for a more successful outcome. Info-Tech has found that a BIA has a measurable impact on the organization’s ability to set appropriate objectives and investment goals.

      Two bar graphs are depicted. The one on the left shows 93% BIA impact on appropriate RTOs. The graph on the right shows that with BIA, there is 86% on BIA impact on appropriate spending.

      Info-Tech Insight

      Business input is important, but don’t let a lack of it delay a draft BIA. Complete a draft based on your knowledge of the business. Create a draft within IT, and use it to get input from business leaders. It’s easier to edit estimates than to start from scratch; even weak estimates are far better than a blank sheet.

      Pick impact categories that are relevant to your business to develop a holistic view of business impact

      Direct Cost Impact Categories

      • Revenue: permanently lost revenue.
        • Example: one third of daily sales are lost due to a website failure.
      • Productivity: lost productivity.
        • Example: finance staff can’t work without the accounting system.
      • Operating costs: additional operating costs.
        • Example: temporary staff are needed to re-key data.
      • Financial penalties: fines/penalties that could be incurred due to downtime.
        • Example: failure to meet contractual service-level agreements (SLAs) for uptime results in financial penalties.

      Goodwill, Compliance, and Health and Safety Categories

      • Stakeholder goodwill: lost customer, staff, or business partner goodwill due to harm, frustration, etc.
        • Example: customers can’t access needed services because the website is down.
        • Example: a payroll system outage delays paychecks for all staff.
        • Example: suppliers are paid late because the purchasing system is down.
      • Compliance, health, and safety:
        • Example: financial system downtime results in a missed tax filing.
        • Example: network downtime disconnects security cameras.

      Info-Tech Insight

      You don’t have to include every impact category in your BIA. Include categories that could affect your business. Defer or exclude other categories. For example, the bulk of revenue for governmental organizations comes from taxes, which won’t be permanently lost if IT systems fail.

      Modify scoring criteria to help you measure the impact of downtime

      The scoring scales define different types of business impact (e.g. costs, lost goodwill) using a common four-point scale and 24-hour timeframe to simplify BIA exercises and documentation.

      Use the suggestions below as a guide as you modify scoring criteria in the DRP Business Impact Analysis Tool:

      • All the direct cost categories (revenue, productivity, operating costs, financial penalties) require the user to define only a maximum value; the tool will populate the rest of the criteria for that category. Use the suggestions below to find the maximum scores for each of the direct cost categories:
        • Revenue: Divide total revenue for the previous year by 365 to estimate daily revenue. Assume this is the most revenue you could lose in a day, and use this number as the top score.
        • Loss of Productivity: Divide fully-loaded labor costs for the organization by 365 to estimate daily productivity costs. Use this as a proxy measure for the work lost if all business stopped for one day.
        • Increased Operating Costs: Isolate this to known additional costs that result from a disruption (e.g. costs for overtime or temporary staff). Estimate the maximum cost for the organization.
        • Financial Penalties: Isolate this to known financial penalties (e.g. due to failure to meet SLAs or compliance requirements). Use the estimated maximum penalty as the highest value on the scale.
      • Impact on Goodwill: Use an estimate of the percentage of all stakeholders impacted to assess goodwill impact.
      • Impact on Compliance; Impact on Health and Safety: The BIA tool contains default scoring criteria that account for the severity of the impact, the likelihood of occurrence, and in the case of compliance, whether a grace period is available. Use this scale as-is, or adapt this scale to suit your needs.

      Modify the default scoring scale in the DRP Business Impact Analysis Tool to reflect your organization

      2(a) DRP Business Impact Analysis Tool – Scoring criteria


      A screenshot of Info-Tech's DRP Business Impact Analysis Tool's scoring criteria

      Step 2.2: Estimate the Impact of Downtime

      This step will walk you through the following activities:

      • Identify the business impact of service/system/application downtime.

      This step involves the following participants:

      • DRP Coordinator
      • DRP Team
      • IT Service SMEs
      • Business-Side Technology Owners (optional)

      Results and Insights

      • Apply the scoring scale to develop a more objective assessment of the business impact of downtime.
      • Create criticality tiers based on the business impact of downtime.

      Estimate the impact of downtime for each system and application

      2(b) Estimate the impact of systems downtime

      Estimated Time: 3 hours

      On tab 3 of the DRP Business Impact Analysis Tool indicate the costs of downtime, as described below:

      1. Have a copy of the “Scoring Criteria” tab available to use as a reference (e.g. printed or on a second display). In tab 3 use the drop-down menu to assign a score of 0 to 4 based on levels of impact defined in the “Scoring Criteria” tab.
      2. Work horizontally across all categories for a single system or application. This will familiarize you with your scoring scales for all impact categories, and allow you to modify the scoring scales if needed before you proceed much further.
      3. For example, if a core call center phone system was down:

      • Loss of Revenue would be the portion of sales revenue generated through the call center. This might score a 1 or 2 depending on the percent of sales that are processed by the call center.
      • The Impact on Customers might be a 2 or 3 depending on the extent that some customers might be using the call center to receive support or purchase new products or services.
      • The Legal/Regulatory Compliance and Health or Safety Risk might be a 0, as the call center has no impact in either area.
    • Next, work vertically across all applications or systems within a single impact category. This will allow you to compare scores within the category as you create them to ensure internal consistency.
    • Add impact scores to the DRP Business Impact Analysis Tool

      2(c) DRP Business Impact Analysis Tool

      Screenshot of Info-Tech's DRP Business Impact Analysis Tool

      Record business reasons and assumptions that drive BIA scores

      2(d) DRP BIA Scoring Context Example

      Info-Tech suggests that IT leadership and staff identify the impact of downtime first to create a version that you can then validate with relevant business owners. As you work through the BIA as a team, have a notetaker record assumptions you make to help you explain the results and drive business engagement and feedback.

      Some common assumptions:

      • You can’t schedule a disaster, so Info-Tech suggests you assume the worst possible timing for downtime. Base the impact of downtime on the worst day for a disaster (e.g. year-end close, payroll run).
      • Record assumptions made about who and what are impacted by system downtime.
      • Record assumptions made about impact severity.
      • If you deviate from the scoring scale, or if a particular impact doesn’t fit well into the defined scoring scale, document the exception.

      Screenshot of Info-Tech's DRP BIA Scoring Context Example

      Use Info-Tech’s DRP BIA Scoring Context Example as a note-taking template.

      Info-Tech Insight

      You can’t build a perfect scoring scale. It’s fine to make reasonable assumptions based on your judgment and knowledge of the business. Just write down your assumptions. If you don’t write them down, you’ll forget how you arrived at that conclusion.

      Assign a criticality rating based on total direct and indirect costs of downtime

      2(e) DRP Business Impact Analysis Tool – Assign criticality tiers

      Once you’ve finished estimating the impact of downtime, use the following rough guideline to create an initial sort of applications into Tiers 1, 2, and 3.

      1. In general, sort applications based on the Total Impact on Goodwill, Compliance, and Safety first.
        • An effective tactic for a quick sort: assign a Tier 1 rating where scores are 50% or more of the highest total score, Tier 2 where scores are between 25% and 50%, and Tier 3 where scores are below 25%. Some organizations will also include a Tier 0 for the highest-scoring systems.
        • Then review and validate these scores and assignments.
      2. Next, consider the Total Cost of Downtime.
        • The Total Cost is calculated by the tool based on the Scoring Criteria in tab 2 and the impact scores on tab 3.
        • Decide if the total cost impact justifies increasing the criticality rating (e.g. from Tier 2 to Tier 1 due to high cost impact).
      3. Review the assigned impact scores and tiers to check that they’re in alignment. If you need to make an exception, document why. Keep exceptions to a minimum.

      Example: Highest total score is 12

      Screenshot of Info-Tech's DRP Business Impact Analysis Tool

      Step 2.3: Determine Acceptable RTO/RPO Targets

      This step will walk you through the following activities:

      • Review the “Debate Space” approach to setting RTO and RPO (recovery targets).
      • Set preliminary RTOs and RPOs by criticality tier.

      This step involves the following participants:

      • DRP Coordinator
      • DRP Team

      Results and Insights

      • Align recovery targets with the business impact of downtime and data loss.

      Use the “Debate Space” approach to align RTOs and RPOs with the impact of downtime

      The business must validate acceptable and appropriate RTOs and RPOs, but IT can use the guidelines below to set an initial estimate.

      Right-size recovery.

      A shorter RTO typically requires higher investment. If a short period of downtime has minimal impact, setting a low RTO may not be justifiable. As downtime continues, impact begins to increase exponentially to a point where downtime is intolerable – an acceptable RTO must be shorter than this. Apply the same thinking to RPOs – how much data loss is unnoticeable? How much is intolerable?

      A diagram to show the debate space in relation to RTOs and RPOs

      The “Debate Space” is between minimal impact and maximum tolerance for downtime.

      Estimate appropriate, acceptable RTOs and RPOs for each tier

      2(f) Set recovery targets

      Estimated Time: 30 minutes

      RTO and RPO tiers simplify management by setting similar recovery goals for systems and applications with similar criticality.

      Use the “Debate Space” approach to set appropriate and acceptable targets.

      1. For RTO, establish a recovery time range that is appropriate based on impact.
        • Overall, the RTO tiers might be 0-4 hours for gold, 4-24 hours for silver, and 24-48 hours for bronze.
      2. RPOs reflect target data protection measures.
        • Identify the lowest RPO within a tier and make that the standard.
        • For example, RPO for gold data might be five minutes, silver might be four hours, and bronze might be one day.
        • Use this as a guideline. RPO doesn’t always align perfectly with RTO tiers.
      3. Review RTOs and RPOs and make sure they accurately reflect criticality.

      Info-Tech Insight

      In general, the more critical the system, the shorter the RPO. But that’s not always the case. For example, a service bus might be Tier 1, but if it doesn’t store any data, RPO might be longer than other Tier 1 systems. Some systems may have a different RPO than most other systems in that tier. As long as the targets are acceptable to the business and appropriate given the impact, that’s okay.

      Add recovery targets to the DRP Business Impact Analysis Tool

      2(g) DRP Business Impact Analysis Tool – Document recovery objectives

      A screenshot of Info-Tech's DRP Business Impact Analysis Tool – Document recovery objectives

      Stories from the field: Info-Tech clients find value in Phase 2 in the following ways

      Most organizations discover something new about key applications, or the way stakeholders use them, when they work through the BIA and review the results with stakeholders. For example:

      Why complete a BIA? There could be a million reasons

      • A global manufacturer completed the DRP BIA exercise. When email went down, Service Desk phones lit up until it was resolved. That grief led to a high availability implementation for email. However, the BIA illustrated that ERP downtime was far more impactful.
      • ERP downtime would stop production lines, delay customer orders, and ultimately cost the business a million dollars a day.
      • The BIA results clearly showed that the ERP needed to be prioritized higher, and required business support for investment.

      Move from airing grievances to making informed decisions

      The DRP Business Impact Analysis Tool helped structure stakeholder consultations on DR requirements for a large university IT department. Past consultations had become an airing of grievances. Using objective impact scores helped stakeholders stay focused and make informed decisions around appropriate RTOs and RPOs.

      Phase 2: Insights and accomplishments

      Screenshots of the tools and templates from this phase.

      Estimated the business impact of downtime

      Screenshot of a tools from this phase

      Set recovery targets

      Summary of Accomplishments

      • Created a scoring scale tied to different categories of business impact.
      • Applied the scoring scale to estimate the business impact of system downtime.
      • Identified appropriate, acceptable RTOs and RPOs.

      Up Next:Conduct a tabletop planning exercise to establish current recovery capabilities

      Create a Right-Sized Disaster Recovery Plan

      Phase 3

      Identify and Address Gaps in the Recovery Workflow

      Step 3.1: Determine Current Recovery Workflow

      This step will walk you through the following activities:

      • Run a tabletop exercise.
      • Outline the steps for the initial response (notification, assessment, disaster declaration) and systems recovery (i.e. document your recovery workflow).
      • Identify any gaps and risks in your initial response and systems recovery.

      This step involves the following participants:

      • DRP Coordinator
      • IT Infrastructure SMEs (for systems in scope)
      • Application SMEs (for systems in scope)

      Results and Insights

      • Use a repeatable practical exercise to outline and document the steps you would use to recover systems in the event of a disaster, as well as identify gaps and risks to address.
      • This is also a knowledge-sharing opportunity for your team, and a practical means to get their insights, suggestions, and recovery knowledge down on paper.

      Tabletop planning: an effective way to test and document your recovery workflow

      In a tabletop planning exercise, the DRP team walks through a disaster scenario to map out what should happen at each stage, and effectively defines a high-level incident response plan (i.e. recovery workflow).

      Tabletop planning had the greatest impact on meeting recovery objectives (RTOs/RPOs) among survey respondents.

      A bar graph is displayed that shows that tabletop planning has the greatest impact on meeting recovery objectives (RTOs/RPOs) among survey respondents.

      *Note: Relative importance indicates the contribution an individual testing methodology, conducted at least annually, had on predicting success meeting recovery objectives, when controlling for all other types of tests in a regression model. The relative-importance values have been standardized to sum to 100%.

      Success was based on the following items:

      • RTOs are consistently met.
      • IT has confidence in the ongoing ability to meet RTOs.
      • RPOs are consistently met.
      • IT has confidence in the ongoing ability to meet RPOs.

      Why is tabletop planning so effective?

      • It enables you to play out a wider range of scenarios than technology-based testing (e.g. full-scale, parallel) due to cost and complexity factors.
      • It is non-intrusive, so it can be executed more frequently than other testing methodologies.
      • It easily translates into the backbone of your recovery documentation, as it allows you to review all aspects of your recovery plan.

      Focus first on IT DR

      Your DRP is IT contingency planning. It is not crisis management or BCP.

      The goal is to define a plan to restore applications and systems following a disruption. For your first tabletop exercise, Info-Tech recommends you use a non-life-threatening scenario that requires at least a temporary relocation of your data center (i.e. failing over to a DR site/environment). Assume a gas leak or burst water pipe renders the data center inaccessible. Power is shut off and IT must failover systems to another location. Once you create the master procedure, review the plan to ensure it addresses other scenarios.

      Info-Tech Insight

      When systems fail, you are faced with two high-level options: failover or recover in place. If you document the plan to failover systems to another location, you’ll have documented the core of your DR procedures. This differs from traditional scenario planning where you define separate plans for different what-if scenarios. The goal is one plan that can be adapted to different scenarios, which reduces the effort to build and maintain your DRP.

      Conduct a tabletop planning exercise to outline DR procedures in your current environment

      3(a) Tabletop planning

      Estimated Time: 2-3 hours

      For each high-level recovery step, do the following:

      1. On white cue cards:
        • Record the step.
        • Indicate the task owner (if required for clarity).
        • Note time required to complete the step. After the exercise, use this to build a running recovery time where 00:00 is when the incident occurred.
      2. On yellow cue cards, document gaps in people, process, and technology requirements to complete the step.
      3. On red cue cards, indicate risks (e.g. no backup person for a key staff member).
      An example is shown on what can be done during step 3(a). Three cue cards are showing in white, yellow, and red.

      Do:

      • Review the complete workflow from notification all the way to user acceptance testing.
      • Keep focused; stay on task and on time.
      • Revisit each step and record gaps and risks (and known solutions, but don’t dwell on this).
      • Revise and improve the plan with task owners.

      Don't:

      • Get weighed down by tools.
      • Document the details right away – stick to the high-level plan for the first exercise.
      • Try to find solutions to every gap/risk as you go. Save in-depth research/discussion for later.

      Flowchart the current-state incident response plan (i.e. document the recovery workflow)

      3(b) DRP Recovery Workflow Template and Case Study: Practical, Right-Sized DRP

      Why use flowcharts?

      • Flowcharts provide an at-a-glance view, ideal for disaster scenarios where pressure is high and quick upward communication is necessary.
      • For experienced staff, a high-level reminder of key steps is sufficient.

      Use the completed tabletop planning exercise results to build this workflow.

      "We use flowcharts for our declaration procedures. Flowcharts are more effective when you have to explain status and next steps to upper management." – Assistant Director, IT Operations, Healthcare Industry

      Source: Info-Tech Research Group Interview

      Screenshot of Info-Tech's DRP Recovery Workflow Template

      For a formatted template you can use to capture your plan, see Info-Tech’s DRP Recovery Workflow Template.

      For a completed example of tabletop planning results, review Info-Tech’s Case Study: Practical, Right-Sized DRP.

      Identify RPA

      What’s my RPA? Consider the following case:

      • Once a week, a full backup is taken of the complete ERP system and is transferred over the WAN to a secondary site 250 miles away, where it is stored on disk.
      • Overnight, an incremental backup is taken of the day’s changes, and is transferred to the same secondary site, and also stored on disk.
      • During office hours, the SAN takes a snapshot of changes which are kept on local storage (information on the accounting system usually only changes during office hours).
      • So what’s the RPA? One hour (snapshots), one day (incrementals), or one week (full backups)?

      When identifying RPA, remember the following:

      You are planning for a disaster scenario, where on-site systems may be inaccessible and any copies of data taken during the disaster may fail, be corrupt, or never make it out of the data center (e.g. if the network fails before the backup file ships). In the scenario above, it seems likely that off-site incremental backups could be restored, leading to a 24-hour RPA. However, if there were serious concerns about the reliability of the daily incrementals, the RPA could arguably be based on the weekly full backups.

      Info-Tech Best Practice

      The RPA is a commitment to the maximum data you would lose in a DR scenario with current capabilities (people, process, and technology). Pick a number you can likely achieve. List any situations where you couldn’t meet this RPA, and identify those for a risk tolerance discussion. In the example above, complete loss of the primary SAN would also mean losing the snapshots, so the last good copy of the data could be up to 24-hours old.

      Add recovery actuals (RTA/RPA) to your copy of the BIA

      3(c) DRP Business Impact Analysis Tool– Recovery actuals

      On the “Impact Analysis” tab in the DRP Business Impact Analysis Tool, enter the estimated maximum downtime and data loss in the RTA and RPA columns.

      1. Estimate the RTA based on the required time for complete recovery. Review your recovery workflow to identify this timeline. For example, if the notification, assessment, and declaration process takes two hours, and systems recovery requires most of a day, the estimated RTA could be 24 hours.
      2. Estimate the RPA based on the longest interval between copies of the data being shipped offsite. For example, if data on a particular system is backed up offsite once per day, and the onsite system was destroyed just before that backup began, the entire day’s data could be lost and estimated RPA could be 24 hours. Note: Enter 9999 to indicate that data is unrecoverable.

      A screenshot of Info-Tech's DRP Business Impact Analysis Tool – Recovery actuals

      Info-Tech Best Practice

      It’s okay to round numbers to the nearest shift, day, or week for simplicity (e.g. 24 hours rather than 22.5 hours, or 8 hours rather than 7.25 hours).

      Test the recovery workflow against additional scenarios

      3(d) Workflow review

      Estimated Time: 1 hour

      Review your recovery workflow with a different scenario in mind.

      • Work from and update the soft copy of your recovery workflow.
      • Would any steps be different if the scenario changes? If yes, capture the different flow with a decision diamond. Identify any new gaps or risks you encounter with red and yellow cards. Use as few decision diamonds as possible.

      Screenshot of testing the workflow against the additional scenarios

      Info-Tech Best Practice

      As you start to consider scenarios where injuries or loss of life are a possibility, remember that health and safety risks are the top priority in a crisis. If there’s a fire in the data center, evacuating the building is the first priority, even if that means foregoing a graceful shut down. For more details on emergency response and crisis management, see Implement Crisis Management Best Practices.

      Consider additional IT disaster scenarios

      3(e) Thought experiment – Review additional scenarios

      Walk through your recovery workflow in the context of additional, different scenarios to ensure there are no gaps. Collaborate with your DR team to identify changes that might be required, and incorporate these changes in the plan.

      Scenario Type Considerations
      Isolated hardware/software failure
      • Failover to the DR site may not be necessary (or only for affected systems).
      Power outage or network outage
      • Do you have standby power? Do you have network redundancy?
      Local hazard (e.g. chemical leak, police incident)
      • Systems might be accessible remotely, but hands-on maintenance will be required eventually.
      • An alternate site is required for service continuity.
      Equipment/building damage (e.g. fire, roof collapse)
      • Staff injuries or loss of life are a possibility.
      • Equipment may need repair or replacement (vendor involvement).
      • An alternate site is required for service continuity.
      Regional natural disasters
      • Staff injuries or loss of life are a possibility.
      • Utilities may be affected (power, running water, etc.).
      • Expect staff to take care of their families first before work.
      • A geographically distant alternate site may be required for service continuity.

      Step 3.2: Identify and Prioritize Projects to Close Gaps

      This step will walk you through the following activities:

      • Analyze the gaps that were identified from the maturity scorecard, tabletop planning exercise, and the RTO/RPO gaps analysis.
      • Brainstorm solutions to close gaps and mitigate risks.
      • Determine a course of action to close these gaps. Prioritize each project. Create a project implementation timeline.

      This step involves the following participants:

      • DRP Coordinator
      • IT Infrastructure SMEs

      Results and Insights

      • Prioritized list of projects and action items that can improve DR capabilities.
      • Often low-cost, low-effort quick wins are identified to mitigate at least some gaps/risks. Higher-cost, higher-effort projects can be part of a longer-term IT strategy. Improving service continuity is an ongoing commitment.

      Brainstorm solutions to address gaps and risk

      3(f) Solutioning

      Estimated Time: 1.5 hours

      1. Review each of the risk and gap cards from the tabletop exercise.
      2. As a group, brainstorm ideas to address gaps, mitigate risks, and improve resiliency. Write the list of ideas on a whiteboard or flip-chart paper. The solutions can range from quick-wins and action items to major capital investments.
      3. Try to avoid debates about feasibility at this point – that should happen later. The goal is to get all ideas on the board.

      An example of how to complete Activity 3(f). Three cue cards showing various steps are attached by arrows to steps on a whiteboard.

      Info-Tech Best Practice

      It’s about finding ways to solve the problem, not about solving the problem. When you’re brainstorming solutions to problems, don’t stop with the first idea, even if the solution seems obvious. The first idea isn’t always the best or only solution; other ideas can expand on and improve that first idea.

      Select an optimal DR deployment model from a world of choice

      There are many options for a DR deployment. What makes sense for you?

      • Sifting through the options for a DR site can be overwhelming. Simplify by eliminating deployment models that aren’t a good fit for your requirements or organization using Info-Tech’s research.
      • Someone will ask you about DR in the cloud. Cut to the chase and evaluate cloud for fit with your organization’s current capabilities and requirements. Read about the 10 Secrets for Successful DR in the Cloud.
      • Selecting and deploying a DR site is an exercise in risk mitigation. IT’s role is to advise the business on options to address the risk of not having a DR site, including cost and effort estimates. The business must then decide how to manage risk. Build total cost of ownership (TCO) estimates and evaluate possible challenges and risks for each option.

      Is it practical to invest in greater geo-redundancy that meets RTOs and RPOs during a widespread event?

      Info-Tech suggests you consider events that impact both sites, and your risk tolerance for that impact. Outline the impact of downtime at a high level if both the primary and secondary site were affected. Research how often events severe enough to have impacted both your primary and secondary sites have occurred in the past. What’s the business tolerance for this type of event?

      A common strategy: have a primary and DR site that are close enough to support low RPO/RTO, but far enough away to mitigate the impact of known regional events. Back up data to a remote third location as protection against a catastrophic event.

      Info-Tech Insight

      Approach site selection as a project. Leverage Select an Optimal Disaster Recovery Deployment Model to structure your own site-selection project.

      Set up the DRP Roadmap Tool

      3(g) DRP Roadmap Tool – Set up tool

      Use the DRP Roadmap Tool to create a high-level roadmap to plan and communicate DR action items and initiatives. Determine the data you’ll use to define roadmap items.

      Screenshot of Info-Tech's DRP Roadmap Tool

      Plan next steps by estimating timeline, effort, priority, and more

      3(h) DRP Roadmap Tool – Describe roadmap items

      A screenshot of Info-Tech's DRP Roadmap Tool to show how to describe roadmap items

      Review and communicate the DRP Roadmap Tool

      3(i) DRP Roadmap Tool – View roadmap chart

      A screenshot of Info-Tech's DRP Roadmap Tool's Roadmap tab

      Step 3.3: Review the Future State Recovery Process

      This step will walk you through the following activities:

      • Update the recovery workflow to outline your future recovery procedure.
      • Summarize findings from DR exercises and present the results to the project sponsor and other interested executives.

      This step involves the following participants:

      • DRP Coordinator
      • IT SMEs (Future State Recovery Flow)
      • DR Project Sponsor

      Results and Insights

      • Summarize results from DR planning exercises to make the case for needed DR investment.

      Outline your future state recovery flow

      3(j) Update the recovery workflow to outline response and recovery in the future

      Estimated Time: 30 minutes

      Outline your expected future state recovery flow to demonstrate improvements once projects and action items have been completed.

      1. Create a copy of your DRP recovery workflow in a new tab in Visio.
      2. Delete gap and risk cards that are addressed by proposed projects. Consolidate or eliminate steps that would be simplified or streamlined in the future if projects are implemented.
      3. Create a short-, medium-, and long-term review of changes to illustrate improvements over time to the project roadmap.
      4. Update this workflow as you implement and improve DR capabilities.

      Screenshot of the recovery workflow

      Validate recovery targets and communicate actual recovery capabilities

      3(k) Validate findings, present recommendations, secure budget

      Estimated Time: time required will vary

      1. Interview managers or process owners to validate RTO, RPO, and business impact scores.Use your assessment of “heavy users” of particular applications (picture at right) to remind you which business users you should include in the interview process.
      2. Present an overview of your findings to the management team.Use Info-Tech’s DRP Recap and Results Template to summarize your findings.
      3. Take projects into the budget process.With the management team aware of the rationale for investment in DRP, build the business case and secure budget where needed.

      Present DRP findings and make the case for needed investment

      3(I) DRP Recap and Results Template

      Create a communication deck to recap key findings for stakeholders.

      • Write a clear problem statement. Identify why you did this project (what problem you’re solving).
      • Clearly state key findings, insights, and recommendations.
      • Leverage the completed tools and templates to populate the deck. Callouts throughout the template presentation will direct you to take and populate screenshots throughout the document.
      • Use the presentation to communicate key findings to, and gather feedback from, business unit managers, executives, and IT staff.
      Screenshots of Info-Tech's DRP Recap and Results Template

      Stories from the field: Info-Tech clients find value in Phase 3 in the following ways

      Tabletop planning is an effective way to discover gaps in recovery capabilities. Identify issues in the tabletop exercise so you can manage them before disaster strikes. For example:

      Back up a second…

      A client started to back up application data offsite. To minimize data transfer and storage costs, the systems themselves weren’t backed up. Working through the restore process at the DR site, the DBA realized 30 years of COBOL and SQR code – critical business functionality – wasn’t backed up offsite.

      Net… work?

      A 500-employee professional services firm realized its internet connection could be a significant roadblock to recovery. Without internet, no one at head office could access critical cloud systems. The tabletop exercise identified this recovery bottleneck and helped prioritize the fix on the roadmap.

      Someone call a doctor!

      Hospitals rely on their phone systems for system downtime procedures. A tabletop exercise with a hospital client highlighted that if the data center were damaged, the phone system would likely be damaged as well. Identifying this provided more urgency to the ongoing VOIP migration.

      The test of time

      A small municipality relied on a local MSP to perform systems restore, but realized it had never tested the restore procedure to identify RTA. Contacting the MSP to review capabilities became a roadmap item to address this risk.

      Phase 3: Insights and accomplishments

      Screenshot of Info-Tech's DRP recovery workflow template

      Outlined the DRP response and risks to recovery

      Screenshots of activities completed related to brainstorming risk mitigation measures.

      Brainstormed risk mitigation measures

      Summary of Accomplishments

      • Planned and documented your DR incident response and systems recovery workflow.
      • Identified gaps and risks to recovery and incident management.
      • Brainstormed and identified projects and action items to mitigate risks and close gaps.

      Up Next: Leverage the core deliverables to complete, extend, and maintain your DRP

      Create a Right-Sized Disaster Recovery Plan

      Phase 4

      Complete, Extend, and Maintain Your DRP

      Phase 4: Complete, Extend, and Maintain Your DRP

      This phase will walk you through the following activities:

      • Identify progress made on your DRP by reassessing your DRP maturity.
      • Prioritize the highest value major initiatives to complete, extend, and maintain your DRP.

      This phase involves the following participants:

      • DRP Coordinator
      • Executive Sponsor

      Results and Insights

      • Communicate the value of your DRP by demonstrating progress against items in the DRP Maturity Scorecard.
      • Identify and prioritize future major initiatives to support the DRP, and the larger BCP.

      Celebrate accomplishments, plan for the future

      Congratulations! You’ve completed the core DRP deliverables and made the case for investment in DR capabilities. Take a moment to celebrate your accomplishments.

      This milestone is an opportunity to look back and look forward.

      • Look back: measure your progress since you started to build your DRP. Revisit the assessments completed in phase 1, and assess the change in your overall DRP maturity.
      • Look forward: prioritize future initiatives to complete, extend, and maintain your DRP. Prioritize initiatives that are the highest impact for the least requirement of effort and resources.

      We have completed the core DRP methodology for key systems:

      • BIA, recovery objectives, high-level recovery workflow, and recovery actuals.
      • Identify key tasks to meet recovery objectives.

      What could we do next?

      • Repeat the core methodology for additional systems.
      • Identify a DR site to meet recovery requirements, and review vendor DR capabilities.
      • Create a summary DRP document including requirements, capabilities, and change procedures.
      • Create a test plan and detailed recovery documentation.
      • Coordinate the creation of BCPs.
      • Integrate DR in other key operational processes.

      Revisit the DRP Maturity Scorecard to measure progress and identify remaining areas to improve

      4(a) DRP Maturity Scorecard – Reassess your DRP program maturity

      1. Find the copy of the DRP Maturity Scorecard you completed previously. Save a second copy of the completed scorecard in the same folder.
      2. Update scoring where you have improved your DRP documentation or capabilities.
      3. Review the new scores on tab 3. Compare the new scores to the original scores.

      Screenshot of DRP Maturity Assessment Results

      Info-Tech Best Practice

      Use the completed, updated DRP Maturity Scorecard to demonstrate the value of your continuity program, and to help you decide where to focus next.

      Prioritize major initiatives to complete, extend, and maintain the DRP

      4(b) Prioritize major initiatives

      Estimated Time: 2 hours

      Prioritize major initiatives that mitigate significant risk with the least cost and effort.

      1. Use the scoring criteria below to evaluate risk, effort, and cost for potential initiatives. Modify the criteria if required for your organization. Write this out on a whiteboard or flip-chart paper.
      2. Assign a score from 1 to 3. Multiply the scores for each initiative together for an aggregate score. In general, prioritize initiatives with higher scores.
      Score A: How significant are the risks this initiative will mitigate? B: How easily can we complete this initiative? C: How cost-effective is this initiative?
      3: High Critical impact on +50% of stakeholders, or major impact to compliance posture, or significant health/safety risk. One sprint, can be completed by a few individuals with minor supervision. Within the IT discretionary budget.
      2: Medium Impacts <50% of stakeholders, or minor impact on compliance, or degradation to health or safety controls. One quarter, and/or some increased effort required, some risk to completion. Requires budget approval from finance.
      1: Low Impacts limited to <25% of stakeholders, no impact on compliance posture or health/safety. One year, and/or major vendor or organizational challenges. Requires budget approval from the board of directors.

      Info-Tech Best Practice

      You can use a similar scoring exercise to prioritize and schedule high-benefit, low-effort, low-cost items identified in the roadmap in phase 3.

      Example: Prioritize major initiatives

      4(b) Prioritize major initiatives continued

      Write out the table on a whiteboard (record the results in a spreadsheet for reference). In the case below, IT might decide to work on repeating the core methodology first as they create the active testing plans, and tackle process changes later.

      Initiative A: How significant are the risks this initiative will mitigate? B: How easily can we complete this initiative? C: How cost-effective is this initiative? Aggregate score (A x B x C)
      Repeat the core methodology for all systems 2 – will impact some stakeholders, no compliance or safety impact. 2 – will require about 3 months, no significant complications. 3 – No cost. 12
      Add DR to project mgmt. and change mgmt. 1 – Mitigates some recovery risks over the long term. 1 – Requires extensive consultation and process review. 3 – No cost. 3
      Active failover testing on plan 2 – Mitigates some risks; documentation and cross training is already in place. 2 – Requires 3-4 months of occasional effort to prepare for test. 2 – May need to purchase some equipment before testing. 8

      Info-Tech Best Practice

      Find a pace that allows you to keep momentum going, but also leaves enough time to act on the initial findings, projects, and action items identified in the DRP Roadmap Tool. Include these initiatives in the Roadmap tool to visualize how identified initiatives fit with other tasks identified to improve your recovery capabilities.

      Repeat the core DR methodology for additional systems and applications


      You have created a DR plan for your most critical systems. Now, add the rest:

      • Build on the work you’ve already done. Re-use the BIA scoring scale. Update your existing recovery workflows, rather than creating and formatting an entirely new document. A number of steps in the recovery will be shared with, or similar to, the recovery procedures for your Tier 1 systems.

      Risks and Challenges Mitigated

      • DR requirements and capabilities for less-critical systems have not been evaluated.
      • Gaps in the recovery process for less critical systems have not been evaluated or addressed.
      • DR capabilities for less critical systems may not meet business requirements.
      Sample Outputs
      Add Tier 2 & 3 systems to the BIA.
      Complete another tabletop exercise for Tier 2 & 3 systems recovery, and add the results to the recovery workflow.
      Identify projects to close additional gaps in the recovery process. Add projects to the project roadmap.

      Info-Tech Best Practice

      Use this example of a complete, practical, right-size DR plan to drive and guide your efforts.

      Extend your core DRP deliverables

      You’ve completed the core DRP deliverables. Continue to create DRP documentation to support recovery procedures and governance processes:

      • DR documentation efforts fail when organizations try to boil the ocean with an all-in-one plan aimed at auditors, business leaders, and IT. It’s long, hard to maintain, and ends up as shelfware.
      • Create documentation in layers to keep it manageable. Build supporting documentation over time to support your high-level recovery workflow.

      Risks and Challenges Mitigated

      • Key contact information, escalation, and disaster declaration responsibilities are not identified or formalized.
      • DRP requirements and capabilities aren’t centralized. Key DRP findings are in multiple documents, complicating governance and oversight by auditors, executives, and board members.
      • Detailed recovery procedures and peripheral information (e.g. network diagrams) are not documented.
      Sample Outputs
      Three to five detailed systems recovery flowcharts/checklists.
      Documented team roles, succession plans, and contact information.
      Notification, assessment, and disaster declaration plan.
      DRP summary.
      Layer 1, 2 & 3 network diagrams.

      Info-Tech Best Practice

      Use this example of a complete, practical, right-size DR plan to drive and guide your efforts.

      Select an optimal DR deployment model and deployment site

      Your DR site has been identified as inadequate:

      • Begin with the end in mind. Commit to mastering the selected model and leverage your vendor relationship for effective DR.
      • Cut to the chase and evaluate the feasibility of cloud first. Gauge your organization’s current capabilities for DR in the cloud before becoming infatuated with the idea.
      • A mixed model gives you the best of both worlds. Diversify your strategy by identifying fit for purpose and balancing the work required to maintain various models.

      Risks and Challenges Mitigated

      • Without an identified DR site, you’ll be scrambling when a disaster hits to find and contract for a location to restore IT services.
      • Without systems and application data backed up offsite, you stand to lose critical business data and logic if all copies of the data at your primary site were lost.
      Sample Outputs
      Application assessment for cloud DR.
      TCO tool for different environments.
      Solution decision and executive presentation.

      Info-Tech Best Practice

      Use Info-Tech’s blueprint, Select the Optimal Disaster Recovery Deployment Model, to help you make sense of a world of choice for your DR site.

      Extend DRP findings to business process resiliency with a BCP pilot

      Integrate your findings from DRP into the overall BCP:

      • As an IT leader you have the skillset and organizational knowledge to lead a BCP project, but ultimately business leaders need to own the BCP – they know their processes and requirements to resume business operations better than anyone else.
      • The traditional approach to BCP is a massive project that most organizations can’t execute without hiring a consultant. To execute BCP in-house, carve up the task into manageable pieces.

      Risks and Challenges Mitigated

      • No formal plan exists to recover from a disruption to critical business processes.
      • Business requirements for IT systems recovery may change following a comprehensive review of business continuity requirements.
      • Outside of core systems recovery, IT could be involved in relocating staff, imaging and issuing new end-user equipment, etc. Identifying these requirements is part of BCP.
      Sample Outputs
      Business process-focused BIA for one business unit.
      Recovery workflows for one business unit.
      Provisioning list for one business unit.
      BCP project roadmap.

      Info-Tech Best Practice

      Use Info-Tech’s blueprint, Develop a Business Continuity Plan, to develop and deploy a repeatable BCP methodology.

      Test the plan to validate capabilities and cross-train staff on recovery procedures

      You don’t have a program to regularly test the DR plan:

      • Most DR tests are focused solely on the technology and not the DR management process – which is where most plans fail.
      • Be proactive – establish an annual test cycle and identify and coordinate resources well in advance.
      • Update DRP documentation with findings from the plan, and track the changes you make over time.

      Risks and Challenges Mitigated

      • Gaps likely still exist in the plan that are hard to find without some form of testing.
      • Customers and auditors may ask for some form of DR testing.
      • Staff may not be familiar with DR documentation or how they can use it.
      • No formal cycle to validate and update the DRP.
      Sample Outputs
      DR testing readiness assessment.
      Testing handbooks.
      Test plan summary template.
      DR test issue log and analysis tool.

      Info-Tech Best Practice

      Uncover deficiencies in your recovery procedures by using Info-Tech’s blueprint Reduce Costly Downtime Through DR Testing.

      “Operationalize” DRP management

      Inject DR planning in key operational processes to support plan maintenance:

      • Major changes, or multiple routine changes, can materially alter DR capabilities and requirements. It’s not feasible to update the DR plan after every routine change, so leverage criticality tiers in the BIA to focus your change management efforts. Critical systems require more rigorous change procedures.
      • Likewise, you can build criticality tiers into more focused project management and performance measurement processes.
      • Schedule regular tasks in your ticketing system to verify capabilities and cross-train staff on key recovery procedures (e.g. backup and restore).

      Risks and Challenges Mitigated

      • DRP is not updated “as needed” – as requirements and capabilities change due to business and technology changes.
      • The DRP is disconnected from day-to-day operations.
      Sample Outputs
      Reviewed and updated change, project, and performance management processes.
      Reviewed and updated internal SLAs.
      Reviewed and updated data protection and backup procedures.

      Review infrastructure service provider DR capabilities

      Insert DR planning in key operational processes to support plan maintenance:

      • Reviewing vendor DR capabilities is a core IT vendor management competency.
      • As your DR requirements change year-to-year, ensure your vendors’ service commitments still meet your DR requirements.
      • Identify changes in the vendor’s service offerings and DR capabilities, e.g. higher costs for additional DR support, new offerings to reduce potential downtime, or conversely, a degradation in DR capabilities.

      Risks and Challenges Mitigated

      • Vendor capabilities haven’t been measured against business requirements.
      • No internal capability exists currently to assess vendor ability to meet promised SLAs.
      • No internal capability exists to track vendor performance on recoverability.
      Sample Outputs
      A customized vendor DRP questionnaire.
      Reviewed vendor SLAs.
      Choose to keep or change service levels or vendor offerings based on findings.

      Phase 4: Insights and accomplishments

      Screenshot of DRP Maturity Assessment Results

      Identified progress against targets

      Screenshot of prioritized further initiatives.

      Prioritized further initiatives

      Screenshot of DRP Planning Roadmap

      Added initiatives to the roadmap

      Summary of Accomplishments

      • Developed a list of high-priority initiatives that can support the extension and maintenance of the DR plan over the long term.
      • Reviewed and update maturity assessments to establish progress and communicate the value of the DR program.

      Summary of accomplishment

      Knowledge Gained

      • Conduct a BIA to determine appropriate targets for RTOs and RPOs.
      • Identify DR projects required to close RTO/RPO gaps and mitigate risks.
      • Use tabletop planning to create and validate an incident response plan.

      Processes Optimized

      • Your DRP process was optimized, from BIA to documenting an incident response plan.
      • Your vendor evaluation process was optimized to identify and assess a vendor’s ability to meet your DR requirements, and to repeat this evaluation on an annual basis.

      Deliverables Completed

      • DRP Maturity Scorecard
      • DRP Business Impact Analysis Tool
      • DRP Roadmap Tool
      • Incident response plan and systems recovery workflow
      • Executive presentation

      Info-Tech’s insights bust the most obstinate myths of DRP

      Myth #1: DRPs need to focus on major events such as natural disasters and other highly destructive incidents such as fire and flood.

      Reality: The most common threats to service continuity are hardware and software failures, network outages, and power outages.

      Myth #2: Effective DRPs start with identifying and evaluating potential risks.

      Reality: DR isn’t about identifying risks; it’s about ensuring service continuity.

      Myth #3: DRPs are separate from day-to-day operations and incident management.

      Reality: DR must be integrated with service management to ensure service continuity.

      Myth #4: I use a co-lo or cloud services so I don’t have to worry about DR. That’s my vendor’s responsibility.

      Reality: You can’t outsource accountability. You can’t just assume your vendor’s DR capabilities will meet your needs.

      Myth #5: A DRP must include every detail so anyone can execute the recovery.

      Reality: IT DR is not an airplane disaster movie. You aren’t going to ask a business user to execute a system recovery, just like you wouldn’t really want a passenger with no flying experience to land a plane.

      Supplement the core documentation with these tools and templates

      • An Excel workbook workbook to track key roles on DR, business continuity, and emergency response teams. Can also track DR documentation location and any hardware purchases required for DR.
      • A questionnaire template and a response tracking tool to structure your investigation of vendor DR capabilities.
      • Integrate escalation with your DR plan by defining incident severity and escalation rules . Use this example as a template or integrate ideas into your own severity definitions and escalation rules in your incident management procedures.
      • A minute-by-minute time-tracking tool to capture progress in a DR or testing scenario. Monitor progress against objectives in real time as recovery tasks are started and completed.

      Next steps: Related Info-Tech research

      Select the Optimal Disaster Recovery Deployment Model Evaluate cloud, co-lo, and on-premises disaster recovery deployment models.

      Develop a Business Continuity Plan Streamline the traditional approach to make BCP development manageable and repeatable.

      Prepare for a DRP Audit Assess your current DRP maturity, identify required improvements, and complete an audit-ready DRP summary document.

      Document and Maintain Your Disaster Recovery Plan Put your DRP on a diet: keep it fit, trim, and ready for action.

      Reduce Costly Downtime Through DR Testing Improve your DR plan and your team’s ability to execute on it.

      Implement Crisis Management Best Practices An effective crisis response minimizes the impact of a crisis on reputation, profitability, and continuity.

      Research contributors and experts

      • Alan Byrum, Director of Business Continuity, Intellitech
      • Bernard Jones (MBCI, CBCP, CORP, ITILv3), Owner/Principal, B Jones BCP Consulting, LLC
      • Paul Beaudry, Assistant Vice-President, Technical Services, MIS, Richardson International Limited
      • Yogi Schulz, President, Corvelle Consulting

      Glossary

      • Business Continuity Management (BCM) Program: Ongoing management and governance process supported by top management and appropriately resourced to implement and maintain business continuity management. (Source: ISO 22301:2012)
      • Business Continuity Plan (BCP): Documented procedures that guide organizations to respond, recover, resume, and restore to a pre-defined level of operation following disruption. The BCP is not necessarily one document, but a collection of procedures and information.
      • Crisis: A situation with a high level of uncertainty that disrupts the core activities and/or credibility of an organization and requires urgent action. (Source: ISO 22300)
      • Crisis Management Team (CMT): A group of individuals responsible for developing and implementing a comprehensive plan for responding to a disruptive incident. The team consists of a core group of decision makers trained in incident management and prepared to respond to any situation.
      • Disaster Recovery Planning (DRP): The activities associated with the continuing availability and restoration of the IT infrastructure.
      • Incident: An event that has the capacity to lead to loss of, or a disruption to, an organization’s operations, services, or functions – which, if not managed, can escalate into an emergency, crisis, or disaster.
      • BCI Editor’s Note: In most countries “incident” and “crisis” are used interchangeably, but in the UK the term “crisis” has been generally reserved for dealing with wide-area incidents involving Emergency Services. The BCI prefers the use of “incident” for normal BCM purposes. (Source: The Business Continuity Institute)

      • Incident Management Plan: A clearly defined and documented plan of action for use at the time of an incident, typically covering the key personnel, resources, services, and actions needed to implement the incident management process.
      • IT Disaster: A service interruption requiring IT to rebuild a service, restore from backups, or activate redundancy at the backup site.
      • Recovery Point: Time elapsed between the last good copy of the data being taken and failure/corruption on the production environment; think of this as data loss.
      • Recovery Point Actual (RPA): The currently achievable recovery point after a disaster event, given existing people, processes, and technology. This reflects expected maximum data loss that could actually occur in a disaster scenario.
      • Recovery Point Objective (RPO): The target recovery point after a disaster event, usually calculated in hours, on a given system, application, or service. Think of this as acceptable and appropriate data loss. RPO should be based on a business impact analysis (BIA) to identify an acceptable and appropriate recovery target.
      • Recovery Time: Time required to restore a system, application, or service to a functional state; think of this as downtime.
      • Recovery Time Actual (RTA): The currently achievable recovery time after a disaster event, given existing people, processes, and technology. This reflects expected maximum downtime that could actually occur in a disaster scenario.
      • Recovery Time Objective (RTO): The target recovery time after a disaster event for a given system, application, or service. RTO should be based on a business impact analysis (BIA) to identify acceptable and appropriate downtime.

      Bibliography

      BCMpedia. “Recovery Objectives: RTO, RPO, and MTPD.” BCMpedia, n.d. Web.

      Burke, Stephen. “Public Cloud Pitfalls: Microsoft Azure Storage Cluster Loses Power, Puts Spotlight On Private, Hybrid Cloud Advantages.” CRN, 16 Mar. 2017. Web.

      Elliot, Stephen. “DevOps and the Cost of Downtime: Fortune 1000 Best Practice Metrics Quantified.” IDC, 2015. Web.

      FEMA. Planning & Templates. FEMA, 2015. Web.

      FINRA. “Business Continuity Plans and Emergency Contact Information.” FINRA, 2015. Web.

      FINRA. “FINRA, the SEC and CFTC Issue Joint Advisory on Business Continuity Planning.” FINRA, 2013. Web.

      Gosling, Mel, and Andrew Hiles. “Business Continuity Statistics: Where Myth Meets Fact.” Continuity Central, 2009. Web.

      Hanwacker, Linda. “COOP Templates for Success Workbook.” The LSH Group, n.d. Web.

      Homeland Security. Federal Information Security Management Act (FISMA). Homeland Security, 2015. Web.

      Nichols, Shaun. “AWS's S3 Outage Was So Bad Amazon Couldn't Get Into Its Own Dashboard to Warn the World.” The Register, 1 Mar. 2017. Web.

      Potter, Patrick. “BCM Regulatory Alphabet Soup.” RSA Archer Organization, 2012. Web.

      Rothstein, Philip Jan. “Disaster Recovery Testing: Exercising Your Contingency Plan.” Rothstein Associates Inc., 2007. Web.

      The Business Continuity Institute. “The Good Practice Guidelines.” The Business Continuity Institute, 2013. Web.

      The Disaster Recovery Journal. “Disaster Resource Guide.” The Disaster Recovery Journal, 2015. Web.

      The Disaster Recovery Journal. “DR Rules & Regulations.” The Disaster Recovery Journal, 2015. Web.

      The Federal Financial Institution Examination Council (FFIEC). Business Continuity Planning. IT Examination Handbook InfoBase, 2015. Web.

      York, Kyle. “Read Dyn’s Statement on the 10/21/2016 DNS DDoS Attack.” Oracle, 22 Oct. 2016. Web.

      Prepare Your Application for PaaS

      • Buy Link or Shortcode: {j2store}181|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Architecture & Strategy
      • Parent Category Link: /architecture-and-strategy
      • The application may have been written a long time ago, and have source code, knowledge base, or design principles misplaced or lacking, which makes it difficult to understand the design and build.
      • The development team does not have a standardized practice for assessing cloud benefits and architecture, design principles for redesigning an application, or performing capacity for planning activities.

      Our Advice

      Critical Insight

      • An infrastructure-driven cloud strategy overlooks application specific complexities. Ensure that an application portfolio strategy is a precursor to determining the business value gained from an application perspective, not just an infrastructure perspective.
      • Business value assessment must be the core of your decision to migrate and justify the development effort.
      • Right-size your application to predict future usage and minimize unplanned expenses. This ensures that you are truly benefiting from the tier costing model that vendors offer.

      Impact and Result

      • Identify and evaluate what cloud benefits your application can leverage and the business value generated as a result of migrating your application to the cloud.
      • Use Info-Tech’s approach to building a robust application that can leverage scalability, availability, and performance benefits while maintaining the functions and features that the application currently supports for the business.
      • Standardize and strengthen your performance testing practices and capacity planning activities to build a strong current state assessment.
      • Use Info-Tech’s elaboration of the 12-factor app to build a clear and robust cloud profile and target state for your application.
      • Leverage Info-Tech’s cloud requirements model to assess the impact of cloud on different requirements patterns.

      Prepare Your Application for PaaS Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you should build a right-sized, design-driven approach to moving your application to a PaaS platform, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      • Prepare Your Application for PaaS – Phases 1-2

      1. Create your cloud application profile

      Bring the business into the room, align your objectives for choosing certain cloud capabilities, and characterize your ideal PaaS environment as a result of your understanding of what the business is trying to achieve. Understand how to right-size your application in the cloud to maintain or improve its performance.

      • Prepare Your Application for PaaS – Phase 1: Create Your Cloud Application Profile
      • Cloud Profile Tool

      2. Evaluate design changes for your application

      Assess the application against Info-Tech’s design scorecard to evaluate the right design approach to migrating the application to PaaS. Pick the appropriate cloud path and begin the first step to migrating your app – gathering your requirements.

      • Prepare Your Application for PaaS – Phase 2: Evaluate Design Changes for Your Application
      • Cloud Design Scorecard Tool

      [infographic]

       
       

      Plan Your Digital Transformation on a Page

      • Buy Link or Shortcode: {j2store}81|cart{/j2store}
      • member rating overall impact: 8.0/10 Overall Impact
      • member rating average dollars saved: $34,649 Average $ Saved
      • member rating average days saved: 20 Average Days Saved
      • Parent Category Name: IT Strategy
      • Parent Category Link: /it-strategy
      • Digital investments often under deliver on expectations of return, and there is no cohesive approach to managing the flow of capital into digital.
      • The focus of the business has historically been to survive technological disruption rather than to thrive in it.
      • Strategy is based mostly on opinion rather than an objective analysis of the outcomes customers want from the organization.
      • Digital is considered a buzzword – nobody has a clear understanding of what it is and what it means in the organization’s context.

      Our Advice

      Critical Insight

      • The purpose of going digital is getting one step closer to the customer. The mark of a digital organization lies in how they answer the question, “How does what we’re doing contribute to what the customer wants from us?”
      • The goal of digital strategy is digital enablement. An organization that is digitally enabled no longer needs a digital strategy, it’s just “the strategy.”

      Impact and Result

      • Focus strategy making on delivering the digital outcomes that customers want.
        • Leverage the talent, expertise, and perspectives within the organization to build a customer-centric digital strategy.
      • Design a balanced digital strategy that creates value across the five digital value pools:
        • Digital marketing, digital channels, digital products, digital supporting capabilities, and business model innovation.
      • Ask how disruption can be leveraged, or even become the disruptor.
        • Manage disruption through quick-win approaches and empowering staff to innovate.
      • Use a Digital Strategy-on-a-Page to spark the digital transformation.
        • Drive awareness and alignment on the digital vision and spark your organization’s imagination around digital.

      Plan Your Digital Transformation on a Page Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to understand how digital disruption is driving the need for transformation, and how Info-Tech’s methodology can help.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Scope the digital transformation

      Learn how to apply the Digital Value Pools thought model and scope strategy around them.

      • Plan Your Digital Transformation on a Page – Phase 1: Scope the Digital Transformation

      2. Design the digital future state vision

      Identify business imperatives, define digital outcomes, and define the strategy’s guiding principles.

      • Plan Your Digital Transformation on a Page – Phase 2: Design the Digital Future State Vision
      • Digital Strategy on a Page

      3. Define the digital roadmap

      Define, prioritize, and roadmap digital initiatives and plan contingencies.

      • Plan Your Digital Transformation on a Page – Phase 3: Define the Digital Roadmap

      4. Sustain digital transformation

      Create, polish, and socialize the Digital Strategy-on-a-Page.

      • Plan Your Digital Transformation on a Page – Phase 4: Sustain Digital Transformation
      [infographic]

      Workshop: Plan Your Digital Transformation on a Page

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Scope the Digital Transformation

      The Purpose

      Identify the need for and use of digital strategy and determine a realistic scope for the digital strategy.

      Key Benefits Achieved

      The digital strategy project is planned and scoped around a subset of the five digital value pools.

      Activities

      1.1 Introduction to digital strategy.

      1.2 Establish motivation for digital.

      1.3 Discuss in-flight digital investments.

      1.4 Define the scope of digital.

      1.5 Identify stakeholders.

      1.6 Perform discovery interviews.

      1.7 Select two value pools to focus day 2, 3, and 4 activities.

      Outputs

      Business model canvas

      Stakeholder power map

      Discovery interview results

      Two value pools for focus throughout the workshop

      2 Design the Digital Future State Vision

      The Purpose

      Create guiding principles to help define future digital initiatives. Generate the target state with the help of strategic goals.

      Key Benefits Achieved

      Establish the basis for planning out the initiatives needed to achieve the target state from the current state.

      Activities

      2.1 Identify digital imperatives.

      2.2 Define key digital outcomes.

      2.3 Create a digital investment thesis.

      2.4 Define digital guiding principles.

      Outputs

      Corporate strategy analysis, PESTLE analysis, documented operational pain points (value streams)

      Customer needs assessment (journey maps)

      Digital investment thesis

      Digital guiding principles

      3 Define the Digital Roadmap

      The Purpose

      Understand the gap between the current and target state. Create transition options and assessment against qualitative and quantitative metrics to generate a list of initiatives the organization will pursue to reach the target state. Build a roadmap to plan out when each transition initiative will be implemented.

      Key Benefits Achieved

      Finalize the initiatives the organization will use to achieve the target digital state. Create a roadmap to plan out the timing of each initiative and generate an easy-to-present document for digital strategy approval.

      Activities

      3.1 Identify initiatives to achieve digital outcomes.

      3.2 Align in-flight initiatives to digital initiatives.

      3.3 Prioritize digital initiatives.

      3.4 Document architecturally significant requirements for high-priority initiatives.

      Outputs

      Digital outcomes and KPIs

      Investment/value pool matrix

      Digital initiative prioritization

      Architecturally significant requirements for high-priority initiatives

      4 Define the Digital Roadmap

      The Purpose

      Plan your approach to socializing the digital strategy to help facilitate the cultural changes necessary for digital transformation.

      Key Benefits Achieved

      Plant the seed of digital and innovation to start making digital a part of the organization’s DNA.

      Activities

      4.1 Review and refine Digital Strategy on a Page.

      4.2 Assess company culture.

      4.3 Define high-level cultural changes needed for successful transformation.

      4.4 Define the role of the digital transformation team.

      4.5 Establish digital transformation team membership and desired outcomes.

      Outputs

      Digital Strategy on a Page

      Strategyzer Culture Map

      Digital transformation team charter

      Reduce Time to Consensus With an Accelerated Business Case

      • Buy Link or Shortcode: {j2store}286|cart{/j2store}
      • member rating overall impact: 9.5/10 Overall Impact
      • member rating average dollars saved: $12,999 Average $ Saved
      • member rating average days saved: 5 Average Days Saved
      • Parent Category Name: Business Analysis
      • Parent Category Link: /business-analysis
      • Enterprise application initiatives are complex, expensive, and require a significant amount of planning before initiation.
      • A financial business case is sometimes used to justify these initiatives.
      • Once the business case (and benefits therein) are approved, the case is forgotten, eliminating a critical check and balance of benefit realization.

      Our Advice

      Critical Insight

      1. Frame the conversation.

      Understand the audience and forum for the business case to best frame the conversation.

      2. Time-box the process of building the case.

      More time should be spent on performing the action rather than building the case.

      3. The business case is a living document.

      The business case creates the basis for review of the realization of the proposed business benefits once the procurement is complete.

      Impact and Result

      • Understand the drivers for decision making in your organization, and the way initiatives are evaluated.
      • Compile a compelling business case that provides decision makers with sufficient information to make decisions confidently.
      • Evaluate proposed enterprise application initiatives “apples-to-apples” using a standardized and repeatable methodology.
      • Provide a mechanism for tracking initiative performance during and after implementation.

      Reduce Time to Consensus With an Accelerated Business Case Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you should build a business case for enterprise application investments, review Info-Tech’s methodology, and understand how we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Gather the required information

      Complete the necessary preceding tasks to building the business case. Rationalize the initiative under consideration, determine the organizational decision flow following a stakeholder assessment, and conduct market research to understand the options.

      • Reduce Time to Consensus With an Accelerated Business Case – Phase 1: Gather the Required Information
      • Business Case Readiness Checklist
      • Business Case Workbook
      • Request for Information Template
      • Request for Quotation Template

      2. Conduct the business case analysis

      Conduct a thorough assessment of the initiative in question. Define the alternatives under consideration, identify tangible and intangible benefits for each, aggregate the costs, and highlight any risks.

      • Reduce Time to Consensus With an Accelerated Business Case – Phase 2: Conduct the Business Case Analysis

      3. Make the case

      Finalize the recommendation based on the analysis and create a business case presentation to frame the conversation for key stakeholders.

      • Reduce Time to Consensus With an Accelerated Business Case – Phase 3: Make the Case
      • Full-Form Business Case Presentation Template
      • Summary Business Case Presentation Template
      • Business Case Change Log
      • Business Case Close-Out Form
      [infographic]

      Workshop: Reduce Time to Consensus With an Accelerated Business Case

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Plan for Business Case Development

      The Purpose

      Complete the necessary preceding tasks to building a strong business case.

      Key Benefits Achieved

      Alignment with business objectives.

      Stakeholder buy-in.

      Activities

      1.1 Map the decision flow in your organization.

      1.2 Define the proposed initiative.

      1.3 Define the problem/opportunity statement.

      1.4 Clarify goals and objectives expected from the initiative.

      Outputs

      Decision traceability

      Initiative summary

      Problem/opportunity statement

      Business objectives

      2 Build the Business Case Model

      The Purpose

      Put together the key elements of the business case including alternatives, benefits, and costs.

      Key Benefits Achieved

      Rationalize the business case.

      Activities

      2.1 Design viable alternatives.

      2.2 Identify the tangible and intangible benefits.

      2.3 Assess current and future costs.

      2.4 Create the financial business case model.

      Outputs

      Shortlisted alternatives

      Benefits tracking model

      Total cost of ownership

      Impact analysis

      3 Enhance the Business Case

      The Purpose

      Determine more integral factors in the business case such as ramp-up time for benefits realization as well as risk assessment.

      Key Benefits Achieved

      Complete a comprehensive case.

      Activities

      3.1 Determine ramp-up times for costs and benefits.

      3.2 Identify performance measures and tracking.

      3.3 Assess initiative risk.

      Outputs

      Benefits realization schedule

      Performance tracking framework

      Risk register

      4 Prepare the Business Case

      The Purpose

      Finalize the recommendation and formulate the business case summary and presentation.

      Key Benefits Achieved

      Prepare the business case presentation.

      Activities

      4.1 Choose the alternative to be recommended.

      4.2 Create the detailed and summary business case presentations.

      4.3 Present and incorporate feedback.

      4.4 Monitor and close out.

      Outputs

      Final recommendation

      Business case presentation

      Final sign-off

      The First 100 Days As CIO

      • Buy Link or Shortcode: {j2store}540|cart{/j2store}
      • member rating overall impact: 9.2/10 Overall Impact
      • member rating average dollars saved: $54,525 Average $ Saved
      • member rating average days saved: 26 Average Days Saved
      • Parent Category Name: High Impact Leadership
      • Parent Category Link: /lead
      • You’ve been promoted from within to the role of CIO.
      • You’ve been hired externally to take on the role of CIO.

      Our Advice

      Critical Insight

      • Foundational understanding must be achieved before you start. Hit the ground running before day one by using company documents and initial discussions to pin down the company’s type and mode.
      • Listen before you act (usually). In most situations, executives benefit from listening to peers and staff before taking action.
      • Identify quick wins early and often. Fix problems as soon as you recognize them to set the tone for your tenure.

      Impact and Result

      • Collaborate to collect the details needed to identify the right mode for your organization and determine how it will influence your plan.
      • Use Info-Tech’s diagnostic tools to align your vision with that of business executives and form a baseline for future reference.

      The First 100 Days As CIO Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why the first 100 days of being a new executive is a crucial time that requires the right balance of listening with taking action. See how seven calls with an executive advisor will guide you through this period.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Check in with your executive advisor over seven calls

      Organize your first 100 days as CIO into activities completed within two-week periods, aided by the guidance of an executive advisor.

      • The First 100 Days As CIO – Storyboard
      • Organizational Catalog
      • Cultural Archetype Calculator
      • IT Capability Assessment

      2. Communicate your plan to your manager

      Communicate your strategy with a presentation deck that you will complete in collaboration with Info-Tech advisors.

      • The First 100 Days As CIO – Presentation Deck

      3. View an example of the final presentation

      See an example of a completed presentation deck, from the new CIO of Gotham City.

      • The First 100 Days As CIO – Presentation Deck Example

      4. Listen to our podcast

      Check out The Business Leadership podcast in Info-Tech's special series, The First 100 Days.

      • "The First 100 Days" Podcast – Alan Fong, CTO, DealerFX
      • "The First 100 Days" Podcast – Denis Gaudreault, country manager for Intel’s Canada and Latin America region
      • "The First 100 Days" Podcast – Dave Penny & Andrew Wertkin, BlueCat
      • "The First 100 Days" Podcast – Susan Bowen, CEO, Aptum
      • "The First 100 Days" Podcast – Wayne Berger, CEO IWG Plc Canada and Latin America
      • "The First 100 Days" Podcast – Eric Wright, CEO, LexisNexis Canada
      • "The First 100 Days" Podcast – Erin Bury, CEO, Willful
      [infographic]

      Further reading

      The First 100 Days As CIO

      Partner with Info-Tech for success in this crucial period of transition.

      Analyst Perspective

      The first 100 days refers to the 10 days before you start and the first three months on the job.

      “The original concept of ‘the first 100 days’ was popularized by Franklin Delano Roosevelt, who passed a battery of new legislation after taking office as US president during the Great Depression. Now commonly extended to the business world, the first 100 days of any executive role is a critically important period for both the executive and the organization.

      But not every new leader should follow FDR’s example of an action-first approach. Instead, finding the right balance of listening and taking action is the key to success during this transitional period. The type of the organization and the mode that it’s in serves as the fulcrum that determines where the point of perfect balance lies. An executive facing a turnaround situation will want to focus on more action more quickly. One facing a sustaining success situation or a realignment situation will want to spend more time listening before taking action.” (Brian Jackson, Research Director, CIO, Info-Tech Research Group)

      Executive summary

      Situation

      • You’ve been promoted from within to the role of CIO.
      • You’ve been hired externally to take on the role of CIO.

      Complication

      Studies show that two years after a new executive transition, as many as half are regarded as failures or disappointments (McKinsey). First impressions are hard to overcome, and a CIO’s first 100 days are heavily weighted in terms of how others will assess their overall success. The best way to approach this period is determined by both the size and the mode of an organization.

      Resolution

      • Work with Info-Tech to prepare a 100-day plan that will position you for success.
      • Collaborate to collect the details needed to identify the right mode for your organization and determine how it will influence your plan.
      • Use Info-Tech’s diagnostic tools to align your vision with that of business executives and form a baseline for future reference.

      Info-Tech Insight

      1. Foundational understanding must be achieved before you start.
        Hit the ground running before day one by using company documents and initial discussions to pin down the company’s type and mode.
      2. Listen before you act (usually).
        In most situations, executives benefit from listening to peers and staff before taking action.
      3. Identify quick wins early and often.
        Fix problems as soon as you recognize them to set the tone for your tenure.

      The First 100 Days: Roadmap

      A roadmap timeline of 'The 100-Day Plan' for your first 100 days as CIO and related Info-Tech Diagnostics. Step A: 'Foundational Preparation' begins 10 days prior to your first day. Step B: 'Management's Expectations' is Days 0 to 30, with the diagnostic 'CIO-CEO Alignment'. Step C: 'Assessing the IT Team' is Days 10 to 75, with the diagnostics 'IT M&G Diagnostic' at Day 30 and 'IT Staffing Assessment' at Day 60. Step D: 'Assess the Key Stakeholders' is Days 40 to 85 with the diagnostic 'CIO Business Vision Survey'. Step E: 'Deliver First-Year Plan' is Days 80 to 100.

      Concierge service overview

      Organize a call with your executive advisor every two weeks during your first 100 days. Info-Tech recommends completing our diagnostics during this period. If you’re not able to do so, instead complete the alternative activities marked with (a).

      Call 1 Call 2 Call 3 Call 4 Call 5 Call 6 Call 7
      Activities
      Before you start: Day -10 to Day 1
      • 1.1 Interview your predecessor.
      • 1.2 Learn the corporate structure.
      • 1.3 Determine STARS mode.
      • 1.4 Create a one-page intro sheet.
      • 1.5 Update your boss.
      Day 0 to 15
      • 2.1 Introduce yourself to your team.
      • 2.2 Document your sphere of influence.
      • 2.3 Complete a competitor array.
      • 2.4 Complete the CEO-CIO Alignment Program.
      • 2.4(a) Agree on what success looks like with the boss.
      • 2.5 Inform team of IT M&G Framework.
      Day 16 to 30
      • 3.1 Determine the team’s cultural archetype.
      • 3.2 Create a cultural adjustment plan.
      • 3.3 Initiate IT M&G Diagnostic.
      • 3.4 Conduct a high-level analysis of current IT capabilities.
      • 3.4 Update your boss.
      Day 31 to 45
      • 4.1 Inform stakeholders about CIO Business Vision survey.
      • 4.2 Get feedback on initial assessments from your team.
      • 4.3 Initiate CIO Business Vision survey.
      • 4.3(a) Meet stakeholders and catalog details.
      Day 46 to 60
      • 5.1 Inform the team that you plan to conduct an IT staffing assessment.
      • 5.2 Initiate the IT Staffing Assessment.
      • 5.3 Quick wins: Make recommend-ations based on CIO Business Vision Diagnostic/IT M&G Framework.
      • 5.4 Update your boss.
      Day 61 to 75
      • 6.1 Run a start, stop, continue exercise with IT staff.
      • 6.2 Make a categorized vendor list.
      • 6.3 Determine the alignment of IT commitments with business objectives.
      Day 76 to 90
      • 7.1 Finalize your vision – mission – values statement.
      • 7.2 Quick Wins: Make recommend-ations based on IT Staffing Assessment.
      • 7.3 Create and communicate a post-100-day plan.
      • 7.4 Update your boss.
      Deliverables Presentation Deck Section A: Foundational Preparation Presentation Deck slides 9, 11-13, 19-20, 29 Presentation Deck slides 16, 17, 21 Presentation Deck slides 30, 34 Presentation Deck slides 24, 25, 2 Presentation Deck slides 27, 42

      Call 1

      Before you start: Day -10 to Day 1

      Interview your predecessor

      Interviewing your predecessor can help identify the organization’s mode and type.

      Before reaching out to your predecessor, get a sense of whether they were viewed as successful or not. Ask your manager. If the predecessor remains within the organization in a different role, understand your relationship with them and how you'll be working together.

      During the interview, make notes about follow-up questions you'll ask others at the organization.

      Ask these open-ended questions in the interview:

      • Tell me about the team.
      • Tell me about your challenges.
      • Tell me about a major project your team worked on. How did it go?
      • Who/what has been helpful during your tenure?
      • Who/what created barriers for you?
      • What do your engagement surveys reveal?
      • Tell me about your performance management programs and issues.
      • What mistakes would you avoid if you could lead again?
      • Why are you leaving?
      • Could I reach out to you again in the future?

      Learn the corporate structure

      Identify the organization’s corporate structure type based on your initial conversations with company leadership. The type of structure will dictate how much control you'll have as a functional head and help you understand which stakeholders you'll need to collaborate with.

      To Do:

      • Review the organization’s structure list and identify whether the structure is functional, prioritized, or a matrix. If it's a matrix organization, determine if it's a strong matrix (project manager holds more authority), weak matrix (functional manager holds more authority), or balanced matrix (managers hold equal authority).

      Functional

      • Most common structure.
      • Traditional departments such as sales, marketing, finance, etc.
      • Functional managers hold most authority.

      Projectized

      • Most programs are implemented through projects with focused outcomes.
      • Teams are cross-functional.
      • Project managers hold the most authority.

      Matrix

      • Combination of projectized and functional.
      • Organization is a dynamic environment.
      • Authority of functional manager flows down through division, while authority of project manager flows sideways through teams.

      This organization is a ___________________ type.

      (Source: Simplilearn)

      Presentation Deck, slide 6

      Determine the mode of the organization: STARS

      Based on your interview process and discussions with company leadership, and using Michael Watkins’ STARS assessment, determine which mode your organization is in: startup, turnaround, accelerated growth, realignment, or sustaining success.

      Knowing the mode of your organization will determine how you approach your 100-day plan. Depending on the mode, you'll rebalance your activities around the three categories of assess, listen, and deliver.

      To Do:

      • Review the STARS table on the right.

      Based on your situation, prioritize activities in this way:

      • Startup: assess, listen, deliver
      • Turnaround: deliver, listen, assess
      • Accelerated Growth: assess, listen, deliver
      • Realignment: listen, assess, deliver
      • Sustaining success: listen, assess, deliver

      This organization is a ___________________ type.

      (Source: Watkins, 2013.)

      Presentation Deck, slide 6

      Determine the mode of the organization: STARS

      STARS Startup Turnaround Accelerated Growth Realignment Sustaining Success
      Definition Assembling capabilities to start a project. Project is widely seen as being in serious trouble. Managing a rapidly expanding business. A previously successful organization is now facing problems. A vital organization is going to the next level.
      Challenges Must build strategy, structures, and systems from scratch. Must recruit and make do with limited resources. Stakeholders are demoralized; slash and burn required. Requires structure and systems to scale; hiring and onboarding. Employees need to be convinced change is needed; restructure at the top required. Risk of living in shadow of a successful former leader.
      Advantages No rigid preconceptions. High-energy environment and easy to pivot. A little change goes a long way when people recognize the need. Motivated employee base willing to stretch. Organization has clear strengths; people desire success. Likely a strong team; foundation for success likely in place.

      Satya Nadella's listen, lead, and launch approach

      CASE STUDY

      Industry Software
      Source Gregg Keizer, Computerworld, 2014

      When Satya Nadella was promoted to the CEO role at Microsoft in 2014, he received a Glassdoor approval rating of 85% and was given an "A" grade by industry analysts after his first 100 days. What did he do right?

      • Created a sense of urgency by shaking up the senior leadership team.
      • Already understood the culture as an insider.
      • Listened a lot and did many one-on-one meetings.
      • Established a vision communicated with a mantra that Microsoft would be "mobile-first, cloud-first."
      • Met his words with actions. He launched Office for iPad and made many announcements for cloud platform Azure.
      Photo of Satya Nadella, CEO, Microsoft Corp.
      Satya Nadella, CEO, Microsoft Corp. (Image source: Microsoft)

      Listen to 'The First 100 Days' podcast – Alan Fong

      Create a one-page introduction sheet to use in communications

      As a new CIO, you'll have to introduce yourself to many people in the organization. To save time on communicating who you are as a person outside of the office, create a brief one-pager that includes a photo of you, where you were born and raised, and what your hobbies are. This helps make a connection more quickly so your conversations can focus on the business at hand rather than personal topics.

      For your presentation deck, remove the personal details and just keep it professional. The personal aspects can be used as a one-pager for other communications. (Source: Personal interview with Denis Gaudreault, Country Lead, Intel.)

      Presentation Deck, slide 5

      Call 2

      Day 1 to Day 15

      Introduce yourself to your team

      Prepare a 20-second pitch about yourself that goes beyond your name and title. Touch on your experience that's relevant to your new role or the industry you're in. Be straightforward about your own perceived strengths and weaknesses so that people know what to expect from you. Focus on the value you believe you'll offer the group and use humor and humility where you're comfortable. For example:

      “Hi everyone, my name is John Miller. I have 15 years of experience marketing conferences like this one to vendors, colleges, and HR departments. What I’m good at, and the reason I'm here, is getting the right people, businesses, and great ideas in a room together. I'm not good on details; that's why I work with Tim. I promise that I'll get people excited about the conference, and the gifts and talents of everyone else in this room will take over from there. I'm looking forward to working with all of you.”

      Have a structured set of questions ready that you can ask everyone.

      For example:
      • How well is the company performing based on expectations?
      • What must the company do to sustain its financial performance and market competitiveness?
      • How do you foresee the CIO contributing to the team?
      • How have past CIOs performed from the perspective of the team?
      • What would successful performance of this role look like to you? To your peers?
      • What challenges and obstacles to success am I likely to encounter? What were the common challenges of my predecessor?
      • How do you view the culture here and how do successful projects tend to get approved?
      • What are your greatest challenges? How could I help you?

      Get to know your sphere of influence: prepare to connect with a variety of people before you get down to work

      Your ability to learn from others is critical at every stage in your first 100 days. Keep your sphere of influence in the loop as you progress through this period.

      A diagram of circles within circles representing your spheres of influence. The smallest circle is 'IT Leaders' and is noted as your 'Immediate circle'. The next largest circle is 'IT Team', then 'Peers - Business Leads', then 'Internal Clients' which is noted as you 'Extended circle'. The largest circle is 'External clients'.

      Write down the names, or at least the key people, in each segment of this diagram. This will serve as a quick reference when you're planning communications with others and will help you remember everyone as you're meeting lots of new people in your early days on the job.

      • Everyone knows their networks are important.
      • However, busy schedules can cause leaders to overlook their many audiences.
      • Plan to meet and learn from all people in your sphere to gain a full spectrum of insights.

      Presentation Deck, slide 29

      Identify how your competitors are leveraging technology for competitive advantage

      Competitor identification and analysis are critical steps for any new leader to assess the relative strengths and weaknesses of their organization and develop a sense of strategic opportunity and environmental awareness.

      Today’s CIO is accountable for driving innovation through technology. A competitive analysis will provide the foundation for understanding the current industry structure, rivalry within it, and possible competitive advantages for the organization.

      Surveying your competitive landscape prior to the first day will allow you to come to the table prepared with insights on how to support the organization and ensure that you are not vulnerable to any competitive blind spots that may exist in the evaluations conducted by the organization already.

      You will not be able to gain a nuanced understanding of the internal strengths and weaknesses until you are in the role, so focus on the external opportunities and how competitors are using technology to their advantage.

      Info-Tech Best Practice

      For a more in-depth approach to identifying and understanding relevant industry trends and turning them into insights, leverage the following Info-Tech blueprints:

      Presentation Deck, slide 9

      Assess the external competitive environment

      Associated Activity icon

      INPUT: External research

      OUTPUT: Competitor array

      1. Conduct a broad analysis of the industry as a whole. Seek to answer the following questions:
        1. Are there market developments or new markets?
        2. Are there industry or lifestyle trends, e.g. move to mobile?
        3. Are there geographic changes in the market?
        4. Are there demographic changes that are shaping decision making?
        5. Are there changes in market demand?
      2. Create a competitor array by identifying and listing key competitors. Try to be as broad as possible here and consider not only entrenched close competitors but also distant/future competitors that may disrupt the industry.
      3. Identify the strengths, weaknesses, and key brand differentiators that each competitor brings to the table. For each strength and differentiator, brainstorm ways that IT-based innovation enables each. These will provide a toolkit for deeper conversations with your peers and your business stakeholders as you move further into your first 100 days.
      Competitor Strengths Weaknesses Key Differentiators IT Enablers
      Competitor 1
      Competitor 2
      Competitor 3

      Complete the CEO-CIO Alignment Program

      Associated Activity icon Run the diagnostic program or use the alternative activities to complete your presentation

      INPUT: CEO-CEO Alignment Program (recommended)

      OUTPUT: Desired and target state of IT maturity, Innovation goals, Top priorities

      Materials: Presentation Deck, slides 11-13

      Participants: CEO, CIO

      Introduce the concept of the CEO-CIO Alignment Program using slide 10 of your presentation deck and the brief email text below.

      Talk to your advisory contact at Info-Tech about launching the program. More information is available on Info-Tech’s website.

      Once the report is complete, import the results into your presentation:

      • Slide 11, the CEO’s current and desired states
      • Slide 12, IT innovation goals
      • Slide 13, top projects and top departments from the CEO and the CIO

      Include any immediate recommendations you have.

      Hello CEO NAME,

      I’m excited to get started in my role as CIO, and to hit the ground running, I’d like to make sure that the IT department is aligned with the business leadership. We will accomplish this using Info-Tech Research Group’s CEO-CIO Alignment Program. It’s a simple survey of 20 questions to be completed by the CEO and the CIO.

      This survey will help me understand your perception and vision as I get my footing as CIO. I’ll be able to identify and build core IT processes that will automate IT-business alignment going forward and create an effective IT strategy that helps eliminate impediments to business growth.

      Research shows that IT departments that are effectively aligned to business goals achieve more success, and I’m determined to make our IT department as successful as possible. I look forward to further detailing the benefits of this program to you and answering any questions you may have the next time we speak.

      Regards,
      CIO NAME

      New KPIs for CEO-CIO Alignment — Recommended

      Info-Tech CEO-CIO Alignment Program

      Info-Tech's CEO-CIO Alignment Program is set up to build IT-business alignment in any organization. It helps the CIO understand CEO perspectives and priorities. The exercise leads to useful IT performance indicators, clarifies IT’s mandate and which new technologies it should invest in, and maps business goals to IT priorities.

      Benefits

      Master the Basics
      Cut through the jargon.
      Take a comprehensive look at the CEO perspective.
      Target Alignment
      Identify how IT can support top business priorities. Address CEO-CIO differences.
      Start on the Right Path
      Get on track with the CIO vision. Use correct indicators and metrics to evaluate IT from day one.

      Supporting Tool or Template icon Additional materials are available on Info-Tech’s website.

      The desired maturity level of IT — Alternative

      Associated Activity icon Use only if you can’t complete the CEO-CIO Alignment Program

      Step 1: Where are we today?

      Determine where the CEO sees the current overall maturity level of the IT organization.

      Step 2: Where do we want to be as an organization?

      Determine where the CEO wants the IT organization to be in order to effectively support the strategic direction of the business.

      A colorful visual representation of the different IT maturity levels. At the bottom is 'STRUGGLE, Unable to Provide Reliable Business Services', then moving upwards are 'SUPPORT, Reliable Infrastructure and IT Service Desk', 'OPTIMIZE, Effective Fulfillment of Work Orders, Functional Business Applications, and Reliable Service Management', 'EXPAND, Effective Execution on Business Projects, Strategic Use of Analytics and Customer Technology', and at the top is 'TRANSFORM, Reliable Technology Innovation'.

      Presentation Deck, slide 11

      Tim Cook's powerful use of language

      CASE STUDY

      Industry Consumer technology
      Source Carmine Gallo, Inc., 2019

      Apple CEO Tim Cook, an internal hire, had big shoes to fill after taking over from the late Steve Jobs. Cook's ability to control how the company is perceived is a big credit to his success. How does he do it? His favorite five words are “The way I see it..." These words allow him to take a line of questioning and reframe it into another perspective that he wants to get across. Similarly, he'll often say, "Let me tell you the way I look at it” or "To put it in perspective" or "To put it in context."

      In your first two weeks on the job, try using these phrases in your conversations with peers and direct reports. It demonstrates that you value their point of view but are independently coming to conclusions about the situation at hand.

      Photo of Tim Cook, CEO, Apple Inc.
      Tim Cook, CEO, Apple Inc. (Image source: Apple)

      Listen to 'The First 100 Days' podcast – Denis Gaudreault

      Inform your team that you plan to do an IT Management & Governance Diagnostic survey

      Associated Activity icon Run the diagnostic program or use the alternative activities to complete your presentation

      INPUT: IT Management & Governance Diagnostic (recommended)

      OUTPUT: Process to improve first, Processes important to the business

      Materials: Presentation Deck, slides 19-20

      Participants: CIO, IT staff

      Introduce the IT Management & Governance Diagnostic survey that will help you form your IT strategy.

      Explain that you want to understand current IT capabilities and you feel a formal approach is best. You’ll also be using this approach as an important metric to track your department’s success. Tell them that Info-Tech Research Group will be conducting the survey and it’s important to you that they take action on the email when it’s sent to them.

      Example email:

      Hello TEAM,

      I appreciate meeting each of you, and so far I’m excited about the talents and energy on the team. Now I need to understand the processes and capabilities of our department in a deeper way. I’d like to map our process landscape against an industry-wide standard, then dive deeper into those processes to understand if our team is aligned. This will help us be accountable to the business and plan the year ahead. Advisory firm Info-Tech Research Group will be reaching out to you with a simple survey that shouldn’t take too long to complete. It’s important to me that you pay attention to that message and complete the survey as soon as possible.

      Regards,
      CIO NAME

      Call 3

      Day 16 to Day 30

      Leverage team interviews as a source of determining organizational culture

      Info-Tech recommends that you hold group conversations with your team to uncover their opinions of the current organizational culture. This not only helps build transparency between you and your team but also gives you another means of observing behavior and reactions as you listen to team members’ characterizations of the current culture.

      A visualization of the organizational culture of a company asks the question 'What is culture?' Five boxes are stacked, the bottom two are noted as 'The invisible causes' and the top two are noted as 'The visible signs'. From the bottom, 'Fundamental assumptions and beliefs', 'Values and attitudes', 'The way we do things around here', 'Behaviors', and at the top, 'Environment'. (Source: Hope College Blog Network)

      Note: It is inherently difficult for people to verbalize what constitutes a culture – your strategy for extracting this information will require you to ask indirect questions to solicit the highest value information.

      Questions for Discussion:

      • What about the current organizational environment do you think most contributes to your success?
      • What barriers do you experience as you try to accomplish your work?
      • What is your favorite quality that is present in our organization?
      • What is the one thing you would most like to change about this organization?
      • Do the organization's policies and procedures support your efforts to accomplish work or do they impede your progress?
      • How effective do you think IT’s interactions are with the larger organization?
      • What would you consider to be IT’s top three guiding principles?
      • What kinds of people fail in this organization?

      Supporting Tool or Template icon See Info-Tech’s Cultural Archetype Calculator.

      Use the Competing Values Framework to define your organization’s cultural archetype

      THE COMPETING VALUES FRAMEWORK (CVF):

      CVF represents the synthesis of academic study of 39 indicators of effectiveness for organizations. Using a statistical analysis, two polarities that are highly predictive of differences in organizational effectiveness were isolated:

      1. Internal focus and integration vs. external focus and differentiation.
      2. Stability and control vs. flexibility and discretion.

      By plotting these dimensions on a matrix of competing values, four main cultural archetypes are identified with their own value drivers and theories of effectiveness.

      A map of cultural archetypes with 'Internal control and integration' on the left, 'External focus and differentiation' on the right, 'Flexibility and discretion' on top, and 'Stability and control' on the bottom. Top left is 'Clan Archetype', internal and flexible. Top right is 'Adhocracy Archetype', external and flexible. Bottom left is 'Hierarchy Archetype', internal and controlled. Bottom right is 'Market Archetype', external and controlled.

      Presentation Deck, slide 16

      Create a cultural adjustment plan

      Now that you've assessed the cultural archetype, you can plan an appropriate approach to shape the culture in a positive way. When new executives want to change culture, there are a few main options at hand:

      Autonomous evolution: Encourage teams to learn from each other. Empower hybrid teams to collaborate and reward teams that perform well.

      Planned and managed change: Create steering committee and project-oriented taskforces to work in parallel. Appoint employees that have cultural traits you'd like to replicate to hold responsibility for these bodies.

      Cultural destruction: When a toxic culture needs to be eliminated, get rid of its carriers. Putting new managers or directors in place with the right cultural traits can be a swift and effective way to realign.

      Each option boils down to creating the right set of incentives and deterrents. What behaviors will you reward and which ones will you penalize? What do those consequences look like? Sometimes, but not always, some structural changes to the team will be necessary. If you feel these changes should be made, it's important to do it sooner rather than later. (Source: “Enlarging Your Sphere of Influence in Your Organization,” MindTools Corporate, 2014.)

      As you're thinking about shaping a desired culture, it's helpful to have an easy way to remember the top qualities you want to espouse. Try creating an acronym that makes it easy for staff to remember. For example: RISE could remind your staff to be Responsive, Innovative, Sustainable, and Engaging (RISE). Draw upon your business direction from your manager to help produce desired qualities (Source: Jennifer Schaeffer).

      Presentation Deck, slide 17

      Gary Davenport’s welcome “surprise”

      CASE STUDY

      Industry Telecom
      Source Interview with Gary Davenport

      After Gary Davenport was hired on as VP of IT at MTS Allstream, his first weekend on the job was spent at an all-executive offsite meeting. There, he learned from the CEO that the IT department had a budget reduction target of 25%, like other departments in the company. “That takes your breath away,” Davenport says.

      He decided to meet the CEO monthly to communicate his plans to reduce spending while trying to satisfy business stakeholders. His top priorities were:

      1. Stabilize IT after seven different leaders in a five-year period.
      2. Get the IT department to be respected. To act like business owners instead of like servants.
      3. Better manage finances and deliver on projects.

      During Davenport’s 7.5-year tenure, the IT department became one of the top performers at MTS Allstream.

      Photo of Gary Davenport.
      Gary Davenport’s first weekend on the job at MTS Allstream included learning about a 25% reduction target. (Image source: Ryerson University)

      Listen to 'The First 100 Days' podcast – David Penny & Andrew Wertkin

      Initiate IT Management & Governance Diagnostic — Recommended

      Info-Tech Management & Governance Diagnostic

      Talk to your Info-Tech executive advisor about launching the survey shortly after informing your team to expect it. You'll just have to provide the names and email addresses of the staff you want to be involved. Once the survey is complete, you'll harvest materials from it for your presentation deck. See slides 19 and 20 of your deck and follow the instructions on what to include.

      Benefits

      A sample of the 'High Level Process Landscape' materials available from Info-Tech. A sample of the 'Strategy and Governance In Depth Results' materials available from Info-Tech. A sample of the 'Process Accountability' materials available from Info-Tech.
      Explore IT Processes
      Dive deeper into performance. Highlight problem areas.
      Align IT Team
      Build consensus by identifying opposing views.
      Ownership & Accountability
      Identify process owners and hold team members accountable.

      Supporting Tool or Template icon Additional materials available on Info-Tech’s website.

      Conduct a high-level analysis of current IT capabilities — Alternative

      Associated Activity icon

      INPUT: Interviews with IT leadership team, Capabilities graphic on next slide

      OUTPUT: High-level understanding of current IT capabilities

      Run this activity if you're not able to conduct the IT Management & Governance Diagnostic.

      Schedule meetings with your IT leadership team. (In smaller organizations, interviewing everyone may be acceptable.) Provide them a list of the core capabilities that IT delivers upon and ask them to rate them on an effectiveness scale of 1-5, with a short rationale for their score.

      • 1. Not effective (NE)
      • 2. Somewhat Effective (SE)
      • 3. Effective (E)
      • 4. Very Effective (VE)
      • 5. Extremely Effective (EE)

      Presentation Deck, slide 21

      Use the following set of IT capabilities for your assessment

      Strategy & Governance

      IT Governance Strategy Performance Measurement Policies Quality Management Innovation

      People & Resources

      Stakeholder Management Resource Management Financial Management Vendor Selection & Contract Management Vendor Portfolio Management Workforce Strategy Strategic Comm. Organizational Change Enablement

      Service Management & Operations

      Operations Management Service Portfolio Management Release Management Service Desk Incident & Problem Management Change Management Demand Management

      Infrastructure

      Asset Management Infrastructure Portfolio Management Availability & Capacity Management Infrastructure Management Configuration Management

      Information Security & Risk

      Security Strategy Risk Management Compliance, Audit & Review Security Detection Response & Recovery Security Prevention

      Applications

      Application Lifecycle Management Systems Integration Application Development User Testing Quality Assurance Application Maintenance

      PPM & Projects

      Portfolio Management Requirements Gathering Project Management

      Data & BI

      Data Architecture BI & Reporting Data Quality & Governance Database Operations Enterprise Content Management

      Enterprise Architecture

      Enterprise Architecture Solution Architecture

      Quick wins: CEO-CIO Alignment Program

      Complete this while waiting on the IT M&G survey results. Based on your completed CEO-CIO Alignment Report, identify the initiatives you can tackle immediately.

      If you are here... And want to be here... Drive toward... Innovate around...
      Business Partner Innovator Leading business transformation
      • Emerging technologies
      • Analytical capabilities
      • Risk management
      • Customer-facing tech
      • Enterprise architecture
      Trusted Operator Business Partner Optimizing business process and supporting business transformation
      • IT strategy and governance
      • Business architecture
      • Projects
      • Resource management
      • Data quality
      Firefighter Trusted Operator Optimize IT processes and services
      • Business applications
      • Service management
      • Stakeholder management
      • Work orders
      Unstable Firefighter Reduce use disruption and adequately support the business
      • Network and infrastructure
      • Service desk
      • Security
      • User devices

      Call 4

      Day 31 to Day 45

      Inform your peers that you plan to do a CIO Business Vision survey to gauge your stakeholders’ satisfaction

      Associated Activity icon Run the diagnostic program or use the alternative activities to complete your presentation

      INPUT: CIO Business Vision survey (recommended)

      OUTPUT: True measure of business satisfaction with IT

      Materials: Presentation Deck, slide 30

      Participants: CIO, IT staff

      Meet the business leaders at your organization face-to-face if possible. If you can't meet in person, try a video conference to establish some rapport. At the end of your introduction and after listening to what your colleague has to say, introduce the CIO Business Vision Diagnostic.

      Explain that you want to understand how to meet their business needs and you feel a formal approach is best. You'll also be using this approach as an important metric to track your department's success. Tell them that Info-Tech Research Group will be conducting the survey and it’s important to you that they take the survey when the email is sent to them.

      Example email:

      Hello PEER NAMES,

      I'm arranging for Info-Tech Research Group to invite you to take a survey that will be important to me. The CIO Business Vision survey will help me understand how to meet your business needs. It will only take about 15 minutes of your time, and the top-line results will be shared with the organization. We will use the results to plan initiatives for the future that will improve your satisfaction with IT.

      Regards,
      CIO NAME

      Gain feedback on your initial assessments from your IT team

      There are two strategies for gaining feedback on your initial assessments of the organization from the IT team:

      1. Review your personal assessments with the relevant members of your IT organization as a group. This strategy can help to build trust and an open channel for communication between yourself and your team; however, it also runs the risk of being impacted by groupthink.
      2. Ask for your team to complete their own assessments for you to compare and contrast. This strategy can help extract more candor from your team, as they are not expected to communicate what may be nuanced perceptions of organizational weaknesses or criticisms of the way certain capabilities function.

      Who you involve in this process will be impacted by the size of your organization. For larger organizations, involve everyone down to the manager level. In smaller organizations, you may want to involve everyone on the IT team to get an accurate lay of the land.

      Areas for Review:

      • Strategic Document Review: Are there any major themes or areas of interest that were not covered in my initial assessment?
      • Competitor Array: Are there any initiatives in flight to leverage new technologies?
      • Current State of IT Maturity: Does IT’s perception align with the CEO’s? Where do you believe IT has been most effective? Least effective?
      • IT’s Key Priorities: Does IT’s perception align with the CEO’s?
      • Key Performance Indicators: How has IT been measured in the past?

      Info-Tech Best Practice

      You need your team’s hearts and minds or you risk a short tenure. Overemphasizing business commitment by neglecting to address your IT team until after you meet your business stakeholders will result in a disenfranchised group. Show your team their importance.

      Susan Bowen's talent maximization

      CASE STUDY

      Industry Infrastructure Services
      Source Interview with Susan Bowen

      Susan Bowen was promoted to be the president of Cogeco Peer 1, an infrastructure services firm, when it was still a part of Cogeco Communications. Part of her mandate was to help spin out the business to a new owner, which occurred when it was acquired by Digital Colony. The firm was renamed Aptum and Bowen was put in place as CEO, which was not a certainty despite her position as president at Cogeco Peer 1. She credits her ability to put the right talent in the right place as part of the reason she succeeded. After becoming president, she sought a strong commitment from her directors. She gave them a choice about whether they'd deliver on a new set of expectations – or not. She also asks her leadership on a regular basis if they are using their talent in the right way. While it's tempting for directors to want to hold on to their best employees, those people might be able to enable many more people if they can be put in another place.

      Bowen fully rounded out her leadership team after Aptum was formed. She created a chief operating officer and a chief infrastructure officer. This helped put in place more clarity around roles at the firm and put an emphasis on client-facing services.

      Photo of Susan Bowen, CEO, Aptum.
      Susan Bowen, CEO, Aptum (Image source: Aptum)

      Listen to 'The First 100 Days' podcast – Susan Bowen

      Initiate CIO Business Vision survey – new KPIs for stakeholder management — Recommended

      Info-Tech CIO Business Vision

      Be sure to effectively communicate the context of this survey to your business stakeholders before you launch it. Plan to talk about your plans to introduce it in your first meetings with stakeholders. When ready, let your executive advisor know you want to launch the tool and provide the names and email addresses of the stakeholders you want involved. After you have the results, harvest the materials required for your presentation deck. See slide 30 and follow the instructions on what to include.

      Benefits

      Icon for Key Stakeholders. Icon for Credibility. Icon for Improve. Icon for Focus.
      Key Stakeholders
      Clarify the needs of the business.
      Credibility
      Create transparency.
      Improve
      Measure IT’s progress.
      Focus
      Find what’s important.

      Supporting Tool or Template icon Additional materials are available on Info-Tech’s website.

      Create a catalog of key stakeholder details to reference prior to future conversations — Alternative

      Only conduct this activity if you’re not able to run the CIO Business Vision diagnostic.

      Use the Organizational Catalog as a personal cheat sheet to document the key details around each of your stakeholders, including your CEO when possible.

      The catalog will be an invaluable tool to keep the competing needs of your different stakeholders in line, while ensuring you are retaining the information to build the political capital needed to excel in the C-suite.

      Note: It is important to keep this document private. While you may want to communicate components of this information, ensure your catalog remains under lock and (encryption) key.

      Screenshot of the Organizational Catalog for Stakeholders. At the top are spaces for 'Name', 'Job Title', etc. Boxes include 'Key Personal Details', 'Satisfaction Levels With IT', 'Preferred Communications', 'Key Activities', 'In-Flight and Scheduled Projects', 'Key Performance Indicators', and 'Additional Details'.

      Info-Tech Insight

      While profiling your stakeholders is important, do not be afraid to profile yourself as well. Visualizing how your interests overlap with those of your stakeholders can provide critical information on how to manage your communications so that those on the receiving end are hearing exactly what they need.

      Activity: Conduct interviews with your key business stakeholders — Alternative

      Associated Activity icon

      1. Once you have identified your key stakeholders through your interviews with your boss and your IT team, schedule a set of meetings with those individuals.
      2. Use the meetings to get to know your stakeholders, their key priorities and initiatives, and their perceptions of the effectiveness of IT.
        1. Use the probative questions to the right to elicit key pieces of information.
        2. Refer to the Organizational Catalog tool for more questions to dig deeper in each category. Ensure that you are taking notes separate from the tool and are keeping the tool itself secure, as it will contain private information specific to your interests.
      3. Following each meeting, record the results of your conversation and any key insights in the Organizational Catalog. Refer to the following slide for more details.

      Questions for Discussion:

      • Be indirect about your personal questions – share stories that will elicit details about their interests, kids, etc.
      • What are your most critical/important initiatives for the year?
      • What are your key revenue streams, products, and services?
      • What are the most important ways that IT supports your success? What is your satisfaction level with those services?
      • Are there any current in-flight projects or initiatives that are a current pain point? How can IT assist to alleviate challenges?
      • How is your success measured? What are your targets for the year on those metrics?

      Presentation Deck, slide 34

      Call 5

      Day 46 to Day 60

      Inform your team that you plan to do an IT staffing assessment

      Associated Activity icon Introduce the IT Staffing Assessment that will help you get the most out of your team

      INPUT: Email template

      OUTPUT: Ready to launch diagnostic

      Materials: Email template, List of staff, Sample of diagnostic

      Participants: CIO, IT staff

      Explain that you want to understand how the IT staff is currently spending its time by function and by activity. You want to take a formal approach to this task and also assess the team’s feelings about its effectiveness across different processes. The results of the assessment will serve as the foundation that helps you improve your team’s effectiveness within the organization.

      Example email:

      Hello PEER NAMES,

      The feedback I've heard from the team since joining the company has been incredibly useful in beginning to formulate my IT strategy. Now I want to get a clear picture of how everyone is spending their time, especially across different IT functions and activities. This will be an opportunity for you to share feedback on what we're doing well, what we need to do more of, and what we're missing. Expect to receive an email invitation to take this survey from Info-Tech Research Group. It's important to me that you complete the survey as soon as you're can. Attached you’ll find an example of the report this will generate. Thank you again for providing your time and feedback.

      Regards,
      CIO NAME

      Wayne Berger's shortcut to solve staffing woes

      CASE STUDY

      Industry Office leasing
      Source Interview with Wayne Berger

      Wayne Berger was hired to be the International Workplace Group (IWG) CEO for Canada and Latin America in 2014.

      Wayne approached his early days with the office space leasing firm as a tour of sorts, visiting nearly every one of the 48 office locations across Canada to host town hall meetings. He heard from staff at every location that they felt understaffed. But instead of simply hiring more staff, Berger actually reduced the workforce by 33%.

      He created a more flexible approach to staffing:

      • Employees no longer just reported to work at one office; instead, they were ready to go to wherever they were most needed in a specific geographic area.
      • He centralized all back-office functions for the company so that not every office had to do its own bookkeeping.
      • Finally, he changed the labor profile to consist of full-time staff, part-time staff, and time-on-demand workers.
      Photo of Wayne Berger, CEO, IWG Plc.
      Wayne Berger, CEO, IWG Plc (Image source: IWG)

      Listen to 'The First 100 Days' podcast – Wayne Berger

      Initiate IT Staffing Assessment – new KPIs to track IT performance — Recommended

      Info-Tech IT Staffing Assessment

      Info-Tech’s IT Staffing Assessment provides benchmarking of key metrics against 4,000 other organizations. Dashboard-style reports provide key metrics at a glance, including a time breakdown by IT function and by activity compared against business priorities. Run this survey at about the 45-day mark of your first 90 days. Its insights will be used to inform your long-term IT strategy.

      Benefits

      Icon for Right-Size IT Headcount. Icon for Allocate Staff Correctly. Icon for Maximize Teams.
      Right-Size IT Headcount
      Find the right level for stakeholder satisfaction.
      Allocate Staff Correctly
      Identify staff misalignments with priorities.
      Maximize Teams
      Identify how to drive staff.

      Supporting Tool or Template icon Additional materials are available on Info-Tech’s website.

      Quick wins: Make recommendations based on IT Management & Governance Framework

      Complete this exercise while waiting on the IT Staffing Assessment results. Based on your completed IT Management & Governance report, identify the initiatives you can tackle immediately. You can conduct this as a team exercise by following these steps:

      1. Create a shortlist of initiatives based on the processes that were identified as high need but scored low in effectiveness. Think as broadly as possible during this initial brainstorming.
      2. Write each initiative on a sticky note and conduct a high-level analysis of the amount of effort that would be required to complete it, as well as its alignment with the achievement of business objectives.
      3. Draw the matrix below on a whiteboard and place each sticky note onto the matrix based on its potential impact and difficulty to address.
      A matrix of initiative categories based on effort to achieve and alignment with business objectives. It is split into quadrants: the vertical axis is 'Potential Impact' with 'High, Fully supports achievement of business objectives' at the top and 'Low, Limited support of business objectives' at the bottom; the horizontal axis is 'Effort' with 'Low' on the left and 'High' on the right. Low impact, low effort is 'Low Current Value, No immediate attention required, but may become a priority in the future if business objectives change'. Low impact, high effort is 'Future Reassessment, No immediate attention required, but may become a priority in the future if business objectives change'. High impact, high effort is 'Long-Term Initiatives, High impact on business outcomes but will take more effort to implement. Schedule these in your long-term roadmap'. High impact, low effort is 'Quick Wins, High impact on business objectives with relatively small effort. Some combination of these will form your early wins'.

      Call 6

      Day 61 to Day 75

      Run a start, stop, continue exercise with your IT staff — Alternative

      This is an alternative activity to running an IT Staffing Assessment, which contains a start/stop/continue assessment. This activity can be facilitated with a flip chart or a whiteboard. Create three pages or three columns and label them Start, Stop, and Continue.

      Hand out sticky notes to each team member and then allow time for individual brainstorming. Instruct them to write down their contributions for each category on the sticky notes. After a few minutes, have everyone stick their notes in the appropriate category on the board. Discuss as a group and see what themes emerge. Record the results that you want to share in your presentation deck (GroupMap).

      Gather your team and explain the meaning of these categories:

      Start: Activities you're not currently doing but should start doing very soon.

      Stop: Activities you're currently doing but aren’t working and should cease.

      Continue: Things you're currently doing and are working well.

      Presentation Deck, slide 24

      Determine the alignment of IT commitments with business objectives

      Associated Activity icon

      INPUT: Interviews with IT leadership team

      OUTPUT: High-level understanding of in-flight commitments and investments

      Run this only as an alternative to the IT Management & Governance Diagnostic.

      1. Schedule meetings with IT leadership to understand what commitments have been made to the business in terms of new products, projects, or enhancements.
      2. Determine the following about IT’s current investment mix:
        1. What are the current IT investments and assets? How do they align to business goals?
        2. What investments in flight are related to which information assets?
        3. Are there any immediate risks identified for these key investments?
        4. What are the primary business issues that demand attention from IT consistently?
        5. What choices remain undecided in terms of strategic direction of the IT organization?
      3. Document your key investments and commitments as well as any points of misalignment between objectives and current commitments as action items to address in your long-term plans. If they are small fixes, consider them during your quick-win identification.

      Presentation Deck, slide 25

      Determine the alignment of IT commitments with business objectives

      Run this only as an alternative to the IT Staffing Assessment diagnostic.

      Schedule meetings with IT leadership to understand what commitments have been made to the business in terms of new products, projects, or enhancements.

      Determine the following about IT’s current investment mix:

      • What are the current IT investments and assets?
      • How do they align to business goals?
      • What in-flight investments are related to which information assets?
      • Are there any immediate risks identified for these key investments?
      • What are the primary business issues that demand attention from IT consistently?
      • What remains undecided in terms of strategic direction of the IT organization?

      Document your key investments and commitments, as well as any points of misalignment between objectives and current commitments, as action items to address in your long-term plans. If they are small-effort fixes, consider them during your quick-win identification.

      Presentation Deck, slide 25

      Make a categorized vendor list by IT process

      As part of learning the IT team, you should also create a comprehensive list of vendors under contract. Collaborate with the finance department to get a clear view of how much of the IT budget is spent on specific vendors. Try to match vendors to the IT processes they serve from the IT M&G framework.

      You should also organize your vendors based on their budget allocation. Go beyond just listing how much money you’re spending with each vendor and categorize them into either “transactional” relationships or “strategic relationships.” Use the grid below to organize them. Ideally, you’ll want most relationships to be high spend and strategic (Source: Gary Davenport).

      A matrix of vendor categories with the vertical axis 'Spend' increasing upward, and the horizontal axis 'Type of relationship' with values 'Transactional' or 'Strategic'. The bottom left corner is 'Low Spend Transactional', the top right corner is 'High Spend Strategic'.

      Where to source your vendor list:

      • Finance department
      • Infrastructure managers
      • Vendor manager in IT

      Further reading: Manage Your Vendors Before They Manage You

      Presentation Deck, slide 26

      Jennifer Schaeffer’s short-timeline turnaround

      CASE STUDY

      Industry Education
      Source Interview with Jennifer Schaeffer

      Jennifer Schaeffer joined Athabasca University as CIO in November 2017. She was entering a turnaround situation as the all-online university lacked an IT strategy and had built up significant technical debt. Armed with the mandate of a third-party consultant that was supported by the president, Schaeffer used a people-first approach to construct her strategy. She met with all her staff, listening to them carefully regardless of role, and consulted with the administrative council and faculty members. She reflected that feedback in her plan or explained to staff why it wasn’t relevant for the strategy. She implemented a “strategic calendaring” approach for the organization, making sure that her team members were participating in meetings where their work was assessed and valued. Drawing on Spotify as an inspiration, she designed her teams in a way that everyone was connected to the customer experience. Given her short timeline to execute, she put off a deep skills analysis of her team for a later time, as well as creating a full architectural map of her technology stack. The outcome is that 2.5 years later, the IT department is unified in using the same tooling and optimization standards. It’s more flexible and ready to incorporate government changes, such as offering more accessibility options.

      Photo of Jennifer Schaeffer.
      Jennifer Schaeffer took on the CIO role at Athabasca University in 2017 and was asked to create a five-year strategic plan in just six weeks.
      (Image source: Athabasca University)

      Listen to 'The First 100 Days' podcast – Eric Wright

      Call 7

      Day 76 to Day 90

      Finalize your vision – mission – values statement

      A clear statement for your values, vision, and mission will help crystallize your IT strategy and communicate what you're trying to accomplish to the entire organization.

      Mission: This statement describes the needs that IT was created to meet and answers the basic question of why IT exists.

      Vision: Write a statement that captures your values. Remember that the vision statement sets out what the IT organization wants to be known for now and into the future.

      Values: IT core values represent the standard axioms by which the IT department operates. Similar to the core values of the organization as a whole, IT’s core values are the set of beliefs or philosophies that guide its strategic actions.

      Further reading: IT Vision and Mission Statements Template

      Presentation Deck, slide 42

      John Chen's new strategic vision

      CASE STUDY

      Industry Mobile Services
      Source Sean Silcoff, The Globe and Mail

      John Chen, known in the industry as a successful turnaround executive, was appointed BlackBerry CEO in 2014 following the unsuccessful launch of the BlackBerry 10 mobile operating system and a new tablet.

      He spent his first three months travelling, talking to customers and suppliers, and understanding the company's situation. He assessed that it had a problem generating cash and had made some strategic errors, but there were many assets that could benefit from more investment.

      He was blunt about the state of BlackBerry, making cutting observations of the past mistakes of leadership. He also settled a key question about whether BlackBerry would focus on consumer or enterprise customers. He pointed to a base of 80,000 enterprise customers that accounted for 80% of revenue and chose to focus on that.

      His new mission for BlackBerry: to transform it from being a "mobile technology company" that pushes handset sales to "a mobile solutions company" that serves the mobile computing needs of its customers.

      Photo of John Chen, CEO of BlackBerry.
      John Chen, CEO of BlackBerry, presents at BlackBerry Security Summit 2018 in New York City (Image source: Brian Jackson)

      Listen to 'The First 100 Days' podcast – Erin Bury

      Quick wins: Make recommendations based on the CIO Business Vision survey

      Based on your completed CIO Business Vision survey, use the IT Satisfaction Scorecard to determine some initiatives. Focus on areas that are ranked as high importance to the business but low satisfaction. While all of the initiatives may be achievable given enough time, use the matrix below to identify the quick wins that you can focus on immediately. It’s important to not fail in your quick-win initiative.

      • High Visibility, Low Risk: Best bet for demonstrating your ability to deliver value.
      • Low Visibility, Low Risk: Worth consideration, depending on the level of effort required and the relative importance to the stakeholder.
      • High Visibility, High Risk: Limit higher-risk initiatives until you feel you have gained trust from your stakeholders, demonstrating your ability to deliver.
      • Low Visibility, High Risk: These will be your lowest value, quick-win initiatives. Keep them in a backlog for future consideration in case business objectives change.
      A matrix of initiative categories based on organizational visibility and risk of failure. It is split into quadrants: the vertical axis is 'Organizational Visibility' with 'High' at the top and 'Low' at the bottom; the horizontal axis is 'Risk of Failure' with 'Low' on the left and 'High' on the right. 'Low Visibility, Low Risk, Few stakeholders will benefit from the initiative’s implementation.' 'Low Visibility, High Risk, No immediate attention is required, but it may become a priority in the future if business objectives change.' 'High Visibility, Low Risk, Multiple stakeholders will benefit from the initiative’s implementation, and it has a low risk of failure.' 'High Visibility, High Risk, Multiple stakeholders will benefit from the initiative’s implementation, but it has a higher risk of failure.'

      Presentation Deck, slide 27

      Create and communicate a post-100 plan

      The last few slides of your presentation deck represent a roundup of all the assessments you’ve done and communicate your plan for the months ahead.

      Slide 38. Based on the information on the previous slide and now knowing which IT capabilities need improvement and which business priorities are important to support, estimate where you'd like to see IT staff spend their time in the near future. Will you be looking to shift staff from one area to another? Will you be looking to hire staff?

      Slide 39. Take your IT M&G initiatives from slide 19 and list them here. If you've already achieved a quick win, list it and mark it as completed to show what you've accomplished. Briefly outline the objectives, how you plan to achieve the result, and what measurement will indicate success.

      Slide 40. Reflect your CIO Business Vision initiatives from slide 31 here.

      Slide 41. Use this roadmap template to list your initiatives by roughly when they’ll be worked on and completed. Plan for when you’ll update your diagnostics.

      Expert Contributors

      Photo of Alan Fong, Chief Technology Officer, Dealer-FX Alan Fong, Chief Technology Officer, Dealer-FX
      Photo of Andrew Wertkin, Chief Strategy Officer, BlueCat NetworksPhoto of David Penny, Chief Technology Officer, BlueCat Networks Andrew Wertkin, Chief Strategy Officer, BlueCat Networks
      David Penny, Chief Technology Officer, BlueCat Networks
      Photo of Susan Bowen, CEO, Aptum Susan Bowen, CEO, Aptum
      Photo of Erin Bury, CEO, Willful Erin Bury, CEO, Willful
      Photo of Denis Gaudreault, Country Manager, Intel Canada and Latin America Denis Gaudreault, Country Manager, Intel Canada and Latin America
      Photo of Wayne Berger, CEO, IWG Plc Wayne Berger, CEO, IWG Plc
      Photo of Eric Wright, CEO, LexisNexis Canada Eric Wright, CEO, LexisNexis Canada
      Photo of Gary Davenport Gary Davenport, past president of CIO Association” of Canada, former VP of IT, Enterprise Solutions Division, MTS AllStream
      Photo of Jennifer Schaeffer, VP of IT and CIO, Athabasca University Jennifer Schaeffer, VP of IT and CIO, Athabasca University

      Bibliography

      Beaudan, Eric. “Do you have what it takes to be an executive?” The Globe and Mail, 9 July 2018. Web.

      Bersohn, Diana. “Go Live on Day One: The Path to Success for a New CIO.” PDF document. Accenture, 2015. Web.

      Bradt, George. “Executive Onboarding When Promoted From Within To Follow A Successful Leader.” Forbes, 15 Nov. 2018. Web.

      “CIO Stats: Length of CIO Tenure Varies By Industry.” CIO Journal, The Wall Street Journal. 15 Feb. 2017. Web.

      “Enlarging Your Sphere of Influence in Your Organization: Your Learning and Development Guide to Getting People on Side.” MindTools Corporate, 2014.

      “Executive Summary.” The CIO's First 100 Days: A Toolkit. PDF document. Gartner, 2012. Web.

      Forbes, Jeff. “Are You Ready for the C-Suite?” KBRS, n.d. Web.

      Gallo, Carmine. “Tim Cook Uses These 5 Words to Take Control of Any Conversation.” Inc., 9 Aug. 2019. Web.

      Giles, Sunnie. “The Most Important Leadership Competencies, According to Leaders Around the World.” Harvard Business Review, 15 March 2016. Web.

      Godin, Seth. “Ode: How to tell a great story.” Seth's Blog. 27 April 2006. Web.

      Green, Charles W. “The horizontal dimension of race: Social culture.” Hope College Blog Network, 19 Oct. 2014. Web.

      Hakobyan, Hayk. “On Louis Gerstner And IBM.” Hayk Hakobyan, n.d. Web.

      Bibliography

      Hargrove, Robert. Your First 100 Days in a New Executive Job, edited by Susan Youngquist. Kindle Edition. Masterful Coaching Press, 2011.

      Heathfield, Susan M. “Why ‘Blink’ Matters: The Power of Your First Impressions." The Balance Careers, 25 June 2019. Web.

      Hillis, Rowan, and Mark O'Donnell. “How to get off to a flying start in your new job.” Odgers Berndtson, 29 Nov. 2018. Web.

      Karaevli, Ayse, and Edward J. Zajac. “When Is an Outsider CEO a Good Choice?” MIT Sloan Management Review, 19 June 2012. Web.

      Keizer, Gregg. “Microsoft CEO Nadella Aces First-100-Day Test.” Computerworld, 15 May 2014. Web.

      Keller, Scott, and Mary Meaney. “Successfully transitioning to new leadership roles.” McKinsey & Company, May 2018. Web.

      Kress, R. “Director vs. Manager: What You Need to Know to Advance to the Next Step.” Ivy Exec, 2016. Web.

      Levine, Seth. “What does it mean to be an ‘executive’.” VC Adventure, 1 Feb. 2018. Web.

      Lichtenwalner, Benjamin. “CIO First 90 Days.” PDF document. Modern Servant Leader, 2008. Web.

      Nawaz, Sabina. “The Biggest Mistakes New Executives Make.” Harvard Business Review, 15 May 2017. Web.

      Pruitt, Sarah. “Fast Facts on the 'First 100 Days.‘” History.com, 22 Aug. 2018. Web.

      Rao, M.S. “An Action Plan for New CEOs During the First 100 Days.” Training, 4 Oct. 2014. Web.

      Reddy, Kendra. “It turns out being a VP isn't for everyone.” Financial Post, 17 July 2012. Web.

      Silcoff, Sean. “Exclusive: John Chen’s simple plan to save BlackBerry.” The Globe & Mail, 24 Feb. 2014. Web.

      Bibliography

      “Start Stop Continue Retrospective.” GroupMap, n.d. Web.

      Surrette, Mark. “Lack of Rapport: Why Smart Leaders Fail.” KBRS, n.d. Web.

      “Understanding Types of Organization – PMP Study.” Simplilearn, 4 Sept. 2019. Web.

      Wahler, Cindy. “Six Behavioral Traits That Define Executive Presence.” Forbes, 2 July 2015. Web.

      Watkins, Michael D. The First 90 Days, Updated and Expanded. Harvard Business Review Press, 2013.

      Watkins, Michael D. “7 Ways to Set Up a New Hire for Success.” Harvard Business Review, 10 May 2019. Web.

      “What does it mean to be a business executive?” Daniels College of Business, University of Denver, 12 Aug. 2014. Web.

      Yeung, Ken. “Turnaround: Marissa Mayer’s first 300 days as Yahoo’s CEO.” The Next Web, 19 May 2013. Web.

      AI Trends 2023

      • Buy Link or Shortcode: {j2store}207|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Business Intelligence Strategy
      • Parent Category Link: /business-intelligence-strategy

      As AI technologies are constantly evolving, organizations are looking for AI trends and research developments to understand the future applications of AI in their industries.

      Our Advice

      Critical Insight

      • Understanding trends and the focus of current and future AI research helps to define how AI will drive an organization’s new strategic opportunities.
      • Understanding the potential application of AI and its promise can help plan the future investments in AI-powered technologies and systems.

      Impact and Result

      Understanding AI trends and developments enables an organization’s competitive advantage.

      AI Trends 2023 Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. AI Trends 2023 – An overview of trends that will continue to drive AI innovation.

      • AI Trends Report 2023
      [infographic]

      Further reading

      AI Trends Report 2023

      The eight trends:

      1. Design for AI
      2. Event-Based Insights
      3. Synthetic Data
      4. Edge AI
      5. AI in Science and Engineering
      6. AI Reasoning
      7. Digital Twin
      8. Combinatorial Optimization
      Challenges that slowed the adoption of AI

      To overcome the challenges, enterprises adopted different strategies

      Data Readiness

      • Lack of unified systems and unified data
      • Data quality issues
      • Lack of the right data required for machine learning
      • Improve data management capabilities, including data governance and data initiatives
      • Create data catalogs
      • Document data and information architecture
      • Solve data-related problems including data quality, privacy, and ethics

      ML Operations Capabilities

      • Lack of tools, technologies, and methodologies to operationalize models created by data scientists
      • Increase availability of cloud platforms, tools, and capabilities
      • Develop and grow machine learning operations (MLOps) tools, platforms, and methodologies to enable model operationalizing and monitoring in production

      Understanding of AI Role and Its Business Value

      • Lack of understanding of AI use cases – how AI/ML can be applied to solve specific business problems
      • Lack of understanding how to define the business value of AI investments
      • Identify AI C-suite toolkits (for example, Empowering AI Leadership from the World Economic Forum, 2022)
      • Document industry use cases
      • Use frameworks and tools to define business value for AI investments

      Design for AI

      Sustainable AI system design needs to consider several aspects: the business application of the system, data, software and hardware, governance, privacy, and security.

      It is important to define from the beginning how AI will be used by and for the application to clearly articulate business value, manage expectations, and set goals for the implementation.

      Design for AI will change how we store and manage data and how we approach the use of data for development and operation of AI systems.

      An AI system design approach should cover all stages of AI lifecycle, from design to maintenance. It should also support and enable iterative development of an AI system.

      To take advantage of different tools and technologies for AI system development, deployment, and monitoring, the design of an AI system should consider software and hardware needs and design for seamless and efficient integrations of all components of the system and with other existing systems within the enterprise.

      AI in Science and Engineering

      AI helps sequence genomes to identify variants in a person’s DNA that indicate genetic disorders. It allows researchers to model and calculate complicated physics processes, to forecast the genesis of the universe’s structure, and to understand planet ecosystem to help advance the climate research. AI drives advances in drug discovery and can assist with molecule synthesis and molecular property identification.

      AI finds application in all areas of science and engineering. The role of AI in science will grow and allow scientists to innovate faster.

      AI will further contribute to scientific understanding by assisting scientists in deriving new insights, generating new ideas and connections, generalizing scientific concepts, and transferring them between areas of scientific research.

      Using synthetic data and combining physical and machine learning models and other advances of AI/ML – such as graphs, use of unstructured data (language models), and computer vision – will accelerate the use of AI in science and engineering.

      Event- and Scenario-Driven AI

      AI-driven signal-gathering systems analyze a continuous stream of data to generate insights and predictions that enable strategic decision modeling and scenario planning by providing understanding of how and what areas of business might be impacted by certain events.

      AI enables the scenario-based approach to drive insights through pattern identification in addition to familiar pattern recognition, helping to understand how events are related.

      A system with anticipatory capabilities requires an event-driven architecture that enables gathering and analyzing different types of data (text, video, images) across multiple channels (social media, transactional systems, news feeds, etc.) for event-driven and event-sequencing modeling.

      ML simulation-based training of the model using advanced techniques under the umbrella of Reinforcement Learning in conjunction with statistically robust Bayesian probabilistic framework will aid in setting up future trends in AI.

      AI Reasoning

      Most of the applications of machine learning and AI today is about predicting future behaviors based on historical data and past behaviors. We can predict what product the customer would most likely buy or the price of a house when it goes on sale.

      Most of the current algorithms use the correlation between different parameters to make a prediction, for example, the correlation between the event and the outcome can look like “When X occurs, we can predict that Y will occur.” This, however, does not translate into “Y occurred because of X.”

      The development of a causal AI that uses causal inference to reason and identify the root cause and the causal relationships between variables without mistaking correlation and causation is still in its early stages but rapidly evolving.

      Some of the algorithms that the researchers are working with are casual graph models and algorithms that are at the intersection of causal inference with decision making and reinforcement learning (Causal Artificial Intelligence Lab, 2022).

      Synthetic Data

      Synthetic data is artificially generated data that mimics the structure of real-life data. It should also have the same mathematical and statistical properties as the real-world data that it is created to replicate.

      Synthetic data is used to train machine learning models when there is not enough real data or the existing data does not meet specific needs. It allows users to remove contextual bias from data sets containing personal data, prevent privacy concerns, and ensure compliance with privacy laws and regulations.

      Another application of synthetic data is solving data-sharing challenges.

      Researchers learned that quite often synthetic data sets outperform real-world data. Recently, a team of researchers at MIT built a synthetic data set of 150,000 video clips capturing human actions and used that data set to train the model. The researchers found that “the synthetically trained models performed even better than models trained on real data for videos that have fewer background objects” (MIT News Office, 2022).

      Today, synthetic data is used in language systems, in training self-driving cars, in improving fraud detection, and in clinical research, just to name a few examples.

      Synthetic data opens the doors for innovation across all industries and applications of AI by enabling access to data for any scenario and technology and business needs.

      Digital Twins

      Digital twins (DT) are virtual replicas of physical objects, devices, people, places, processes, and systems. In Manufacturing, almost every product and manufacturing process can have a complete digital replica of itself thanks to IoT, streaming data, and cheap cloud storage.

      All this data has allowed for complex simulations of, for example, how a piece of equipment will perform over time to predict future failures before they happen, reducing costly maintenance and extending equipment lifetime.

      In addition to predictive maintenance, DT and AI technologies have enabled organizations to design and digitally test complex equipment such as aircraft engines, trains, offshore oil platforms, and wind turbines before physically manufacturing them. This helps to improve product and process quality, manufacturing efficiency, and costs. DT technology also finds applications in architecture, construction, energy, infrastructure industries, and even retail.

      Digital twins combined with the metaverse provide a collaborative and interactive environment with immersive experience and real-time physics capabilities (as an example, Siemens presented an Immersive Digital Twin of a Plant at the Collision 2022 conference).

      Future trends include enabling autonomous behavior of a DT. An advanced DT can replicate itself as it moves into several devices, hence requiring the autonomous property. Such autonomous behavior of the DT will in turn influence the growth and further advancement of AI.

      Edge AI

      A simple definition for edge AI: A combination of edge computing and artificial intelligence, it enables the deployment of AI applications in devices of the physical world, in the field, where the data is located, such as IoT devices, devices on the manufacturing floor, healthcare devices, or a self-driving car.

      Edge AI integrates AI into edge computing devices for quicker and improved data processing and smart automation.

      The main benefits of edge AI include:

      • Real-time data processing capabilities to reduce latency and enable near real-time analytics and insights.
      • Reduced cost and bandwidth requirements as there is no need to transfer data to the cloud for computing.
      • Increased data security as the data is processed locally, on the device, reducing the risk of loss of sensitive data.
      • Improved automation by training machines to perform automated tasks.

      Edge AI is already used in a variety of applications and use cases including computer vision, geospatial intelligence, object detection, drones, and health monitoring devices.

      Combinatorial Optimization

      “Combinatorial optimization is a subfield of mathematical optimization that consists of finding an optimal object from a finite set of objects” (Wikipedia, retrieved December 2022).

      Applications of combinatorial optimization include:

      • Supply chain optimization
      • Scheduling and logistics, for example, vehicle routing where the trucks are making stops for pickup and deliveries
      • Operations optimization

      Classical combinatorial optimization (CO) techniques were widely used in operations research and played a major role in earlier developments of AI.

      The introduction of deep learning algorithms in recent years allowed researchers to combine neural network and conventional optimization algorithms; for example, incorporating neural combinatorial optimization algorithms in the conventional optimization framework. Researchers confirmed that certain combinations of these frameworks and algorithms can provide significant performance improvements.

      The research in this space continues and we look forward to learning how machine learning and AI (backtracking algorithms, reinforcement learning, deep learning, graph attention networks, and others) will be used for solving challenging combinatorial and decision-making problems.

      References

      “AI Can Power Scenario Planning for Real-Time Strategic Insights.” The Wall Street Journal, CFO Journal, content by Deloitte, 7 June 2021. Accessed 11 Dec. 2022.
      Ali Fdal, Omar. “Synthetic Data: 4 Use Cases in Modern Enterprises.” DATAVERSITY, 5 May 2022. Accessed
      11 Dec. 2022.
      Andrews, Gerard. “What Is Synthetic Data?” NVIDIA, 8 June 2021. Accessed 11 Dec. 2022.
      Bareinboim, Elias. “Causal Reinforcement Learning.” Causal AI, 2020. Accessed 11 Dec. 2022.
      Bengio, Yoshua, Andrea Lodi, and Antoine Prouvost. “Machine learning for combinatorial optimization: A methodological tour d’horizon.” European Journal of Operational Research, vol. 290, no. 2, 2021, pp. 405-421, https://doi.org/10.1016/j.ejor.2020.07.063. Accessed 11 Dec. 2022.
      Benjamins, Richard. “Four design principles for developing sustainable AI applications.” Telefónica S.A., 10 Sept. 2018. Accessed on 11 Dec. 2022.
      Blades, Robin. “AI Generates Hypotheses Human Scientists Have Not Thought Of.” Scientific American, 28 October 2021. Accessed 11 Dec. 2022.
      “Combinatorial Optimization.” Wikipedia article, Accessed 11 Dec. 2022.
      Cronholm, Stefan, and Hannes Göbel. “Design Principles for Human-Centred Artificial Intelligence.” University of Borås, Sweden, 11 Aug. 2022. Accessed on 11 Dec. 2022
      Devaux, Elise. “Types of synthetic data and 4 real-life examples.” Statice, 29 May 2022. Accessed 11 Dec. 2022.
      Emmental, Russell. “A Guide to Causal AI.” ITBriefcase, 30 March 2022. Accessed 11 Dec. 2022.
      “Empowering AI Leadership: AI C-Suite Toolkit.” World Economic Forum, 12 Jan. 2022. Accessed 11 Dec 2022.
      Falk, Dan. “How Artificial Intelligence Is Changing Science.” Quanta Magazine, 11 March 2019. Accessed 11 Dec. 2022.
      Fritschle, Matthew J. “The Principles of Designing AI for Humans.” Aumcore, 17 Aug. 2018. Accessed 8 Dec. 2022.
      Garmendia, Andoni I., et al. Neural Combinatorial Optimization: a New Player in the Field.” IEEE, arXiv:2205.01356v1, 3 May 2022. Accessed 11 Dec. 2022.
      Gülen, Kerem. “AI Is Revolutionizing Every Field and Science is no Exception.” Dataconomy Media GmbH, 9 Nov. 9, 2022. Accessed 11 Dec. 2022
      Krenn, Mario, et al. “On scientific understanding with artificial intelligence.” Nature Reviews Physics, vol. 4, 11 Oct. 2022, pp. 761–769. https://doi.org/10.1038/s42254-022-00518-3. Accessed 11 Dec. 2022.
      Laboratory for Information and Decision Systems. “The real promise of synthetic data.” MIT News, 16 Oct. 2020. Accessed 11 Dec. 2022.
      Lecca, Paola. “Machine Learning for Causal Inference in Biological Networks: Perspectives of This Challenge.” Frontiers, 22 Sept. 2021. Accessed 11 Dec. 2022. Mirabella, Lucia. “Digital Twin x Metaverse: real and virtual made easy.” Siemens presentation at Collision 2022 conference, Toronto, Ontario. Accessed 11 Dec. 2022. Mitchum, Rob, and Louise Lerner. “How AI could change science.” University of Chicago News, 1 Oct. 2019. Accessed 11 Dec. 2022.
      Okeke, Franklin. “The benefits of edge AI.” TechRepublic, 22 Sept. 2022, Accessed 11 Dec. 2022.
      Perlmutter, Nathan. “Machine Learning and Combinatorial Optimization Problems.” Crater Labs, 31 July 31, 2019. Accessed 11 Dec. 2022.
      Sampson, Ovetta. “Design Principles for a New AI World.” UX Magazine, 6 Jan. 2022. Accessed 11 Dec. 2022.
      Sgaier, Sema K., Vincent Huang, and Grace Charles. “The Case for Causal AI.” Stanford Social Innovation Review, Summer 2020. Accessed 11 Dec. 2022.
      “Synthetic Data.” Wikipedia article, Accessed 11 Dec. 2022.
      Take, Marius, et al. “Software Design Patterns for AI-Systems.” EMISA Workshop 2021, CEUR-WS.org, Proceedings 30. Accessed 11 Dec. 2022.
      Toews, Rob. “Synthetic Data Is About To Transform Artificial Intelligence.” Forbes, 12 June 2022. Accessed
      11 Dec. 2022.
      Zewe, Adam. “In machine learning, synthetic data can offer real performance improvements.” MIT News Office, 3 Nov. 2022. Accessed 11 Dec. 2022.
      Zhang, Junzhe, and Elias Bareinboim. “Can Humans Be out of the Loop?” Technical Report, Department of Computer Science, Columbia University, NY, June 2022. Accessed 11 Dec. 2022.

      Contributors

      Irina Sedenko Anu Ganesh Amir Feizpour David Glazer Delina Ivanova

      Irina Sedenko

      Advisory Director

      Info-Tech

      Anu Ganesh

      Technical Counselor

      Info-Tech

      Amir Feizpour

      Co-Founder & CEO

      Aggregate Intellect Inc.

      David Glazer

      VP of Analytics

      Kroll

      Delina Ivanova

      Associate Director, Data & Analytics

      HelloFresh

      Usman Lakhani

      DevOps

      WeCloudData

      2021 Q3 Research Highlights

      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: The Briefs
      • Parent Category Link: /the-briefs
      Our research team is a prolific bunch! Every quarter we produce lots of research to help you get the most value out of your organization. This PDF contains a selection of our most compelling research from the third quarter of 2021.

      Assess the Viability of M365-O365 Security Add-Ons

      • Buy Link or Shortcode: {j2store}251|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Security Strategy & Budgeting
      • Parent Category Link: /security-strategy-and-budgeting

      The technical side of IT security demands the best security possible, but the business side of running IT demands that you determine what is cost-effective and can still do the job. You likely shrugged off the early iterations of Microsoft’s security efforts, but you may have heard that things have changed. Where do you start in evaluating Microsoft’s security products in terms of effectiveness? The value proposition sounds tremendous to the CFO, “free” security as part of your corporate license, but how does it truly measure up and how do you articulate your findings to the business?

      Our Advice

      Critical Insight

      Microsoft’s security products have improved to the point where they are often ranked competitively with mainstream security products. Depending on your organization’s licensing of Office 365/Microsoft 365, some of these products are included in what you’re already paying for. That value proposition is hard to deny.

      Impact and Result

      Determine what is important to the business, and in what order of priority.

      Take a close look at your current solution and determine what are table stakes, what features you would like to have in its replacement, and what your current solution is missing.

      Consider Microsoft’s security solutions using an objective methodology. Sentiment will still be a factor, but it shouldn’t dictate the decision you make for the good of the business.

      Assess the Viability of M365/O365 Security Add-Ons Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to assess the viability of M365/O365 security add-ons. Review Info-Tech’s methodology and understand the four key steps to completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Review your current state

      Examine what you are licensed for, what you are paying, what you need, and what your constraints are.

      • Microsoft 365/Office 365 Security Add-Ons Assessment Tool

      2. Assess your needs

      Determine what is “good enough” security and assess the needs of your organization.

      3. Select your path

      Decide what you will go with and start planning your next steps.

      [infographic]

      Configuration management

      • Buy Link or Shortcode: {j2store}4|cart{/j2store}
      • Related Products: {j2store}4|crosssells{/j2store}
      • Up-Sell: {j2store}4|upsells{/j2store}
      • Download01-Title: Harness the power of Configuration Management Executive Brief
      • Download-01: Visit Link
      • member rating overall impact: 8.0/10
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Infra and Operations
      • Parent Category Link: /infra-and-operations
      Configuration management is all about being able to manage your assets within the support processes. That means to record what you need. Not less than that, and not more either.

      Asset Management, Configuration Management, Lifecycle Management

      Govern Shared Services

      • Buy Link or Shortcode: {j2store}459|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Operations Management
      • Parent Category Link: /i-and-o-process-management
      • IT managers have come under increasing pressure to cut costs, and implementing shared services has become a popular demand from the business.
      • Business unit resistance to a shared services implementation can derail the project.
      • Shared services rearranges responsibilities within existing IT departments, potentially leaving no one accountable for project success and causing cost overruns and service performance failures.

      Our Advice

      Critical Insight

      • Over one-third of shared services implementations increase IT costs, due to implementation failures. Ineffective governance plays a major role in the breakdown of shared services, particularly when it does not overcome stakeholder resistance or define clear areas of responsibility.
      • Effective governance of a shared services implementation requires the IT leader to find the optimal combination of independence and centralization for the shared service provider.
      • Three primary models exist for governing shared services: entrepreneurial, mandated, and market-based. Each one occupies a different location in the trade-off of independence and centralization. The optimal model for a specific situation depends on the size of the organization, the number of participants, the existing trend towards centralization, and other factors.

      Impact and Result

      • Find the optimal governance model for your organization by weighing the different likely benefits and costs of each path.
      • Assign appropriate individual responsibilities to participants, so you can effectively scope your service offering and fund your implementation.
      • Support the governance effort effectively using published Info-Tech tools and templates.

      Govern Shared Services Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Understand each of the governance models and what each entails

      Build a plan for governing an implementation.

      • Storyboard: Govern Shared Services
      • None

      2. Choose the optimal approach to shared services governance

      Maximize the net benefit conferred by governance.

      • Shared Services Governance Strategy Roadmap Tool
      [infographic]

      Map Technical Skills for a Changing Infrastructure & Operations Organization

      • Buy Link or Shortcode: {j2store}333|cart{/j2store}
      • member rating overall impact: 10.0/10 Overall Impact
      • member rating average dollars saved: 5 Average Days Saved
      • member rating average days saved: After each Info-Tech experience, we ask our members to quantify the real-time savings, monetary impact, and project improvements our research helped them achieve.
      • Parent Category Name: Strategy and Organizational Design
      • Parent Category Link: /strategy-and-organizational-design
      • Infrastructure & Operations is changing rapidly. It’s a constant challenge to find the right skills to support the next new technology while at the same time maintaining the skills in house that allow you to support your existing platforms.
      • A lack of clarity around required skills makes finding the right skills difficult, and it’s not clear whether you should train, hire, contract, or outsource to address gaps.
      • You need to keep up with changes and new strategy while continuing to support your existing environment.

      Our Advice

      Critical Insight

      • Take a strategic approach to acquiring skills – looking only as far as the needs of the next project will lead to a constant skills shortage with no plan for it to be addressed.
      • Begin by identifying your future state. Identify needed skills in the organization to support planned projects and initiatives, and to mitigate skills-related risks.

      Impact and Result

      • Leverage your infrastructure roadmap and cloud strategy to identify needed skills in your future state environment.
      • Decide how you’ll acquire needed skills based on the characteristics of need for each skill.
      • Communicate the change and create a plan of action for the skills transformation.

      Map Technical Skills for a Changing Infrastructure & Operations Organization Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you should map technical skills for a changing Infrastructure & Operations organization, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Identify skills needs for the future state environment

      Identify what skills are needed based on where the organization is going.

      • Map Technical Skills for a Changing Infrastructure & Operations Organization – Phase 1: Identify Skills Needs for Your Future State Environment
      • Future State Playbook
      • IT/Cloud Solutions Architect
      • IT/Cloud Engineer
      • IT/Cloud Administrator
      • IT/Cloud Demand Billing & Accounting Analyst

      2. Acquire needed skills

      Ground skills acquisition decisions in the characteristics of need.

      • Map Technical Skills for a Changing Infrastructure & Operations Organization – Phase 2: Acquire Needed Skills
      • Technical Skills Map

      3. Maximize the value of the skills map

      Get stakeholder buy-in; leverage the skills map in other processes.

      • Map Technical Skills for a Changing Infrastructure & Operations Organization – Phase 3: Maximize the Value of Your Skills Map
      • Technical Skills Map Communication Deck Template
      [infographic]

      Workshop: Map Technical Skills for a Changing Infrastructure & Operations Organization

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Review Initiatives and Skills-Related Risks

      The Purpose

      Identify process and skills changes required by the future state of your environment.

      Key Benefits Achieved

      Set foundation for alignment between strategy-defined technology initiatives and needed skills.

      Activities

      1.1 Review the list of initiatives and projects with the group.

      1.2 Identify how key support, operational, and deployment processes will change through planned initiatives.

      1.3 Identify skills-related risks and pain points.

      Outputs

      Future State Playbook

      2 Identify Needed Skills and Roles

      The Purpose

      Identify process and skills changes required by the future state of your environment.

      Key Benefits Achieved

      Set foundation for alignment between strategy-defined technology initiatives and needed skills.

      Activities

      2.1 Identify skills required to support the new environment.

      2.2 Map required skills to roles.

      Outputs

      IT/Cloud Architect Role Description

      IT/Cloud Engineer Role Description

      IT/Cloud Administrator Role Description

      3 Create a Plan to Acquire Needed Skills

      The Purpose

      Create a skills acquisition strategy based on the characteristics of need.

      Key Benefits Achieved

      Optimal skills acquisition strategy defined.

      Activities

      3.1 Modify impact scoring scale for key skills decision factors.

      3.2 Apply impact scoring scales to needed skills

      3.3 Decide whether to train, hire, contract, or outsource to acquire needed skills.

      Outputs

      Technical Skills Map

      4 Develop a Communication Plan

      The Purpose

      Create an effective communication plan for different stakeholders across the organization.

      Identify opportunities to leverage the skills map elsewhere.

      Key Benefits Achieved

      Create a concise, clear, consistent, and relevant change message for stakeholders across the organization.

      Activities

      4.1 Review skills decisions and decide how you will acquire skills in each role.

      4.2 Update roles descriptions.

      4.3 Create a change message.

      4.4 Identify opportunities to leverage the skills map in other processes.

      Outputs

      Technical Skills Map Communication Deck

      Change Management's Role in Incident Prevention: standard changes

      • Large vertical image:
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A

      During peak business hours, I witnessed a straightforward database field addition bring down a whole e-commerce platform. It was meant to be standard procedure, the type of “standard change” that is automatically approved because we have performed it innumerable times.

      Adding a field to the end of a table and having applications retrieve data by field name instead of position made the change itself textbook low-impact. There is no need to alter the application or the functional flow. This could have been problematic in the past if you added a field in the middle of the list and it affected the values of other fields, but adding it at the end? That ought to have been impenetrable.

      However, it wasn't.

      Before I tell you what went wrong, let me explain why this is important to all of the IT professionals who are reading this.

      Over the past three decades, industry data has repeatedly supported what this incident taught me: our presumptions about “safe” changes are frequently our greatest weakness. Upon reviewing the ITIL research, I was not surprised to learn that failed changes, many of which were categorized as “standard” or “low-risk,” are responsible for about 80% of unplanned outages.

      When you look more closely, the numbers become even more concerning. Since I've been following the Ponemon Institute's work for years, I wasn't surprised to learn that companies with well-established change management procedures have 65% fewer unscheduled outages. The paradox surprised me: many of these “mature” procedures still operate under the premise that safety correlates with repetition.

      What I had been observing in the field for decades was confirmed when Gartner released their research showing that standard changes are responsible for almost 40% of change-related incidents. The very changes we consider safe enough to avoid thorough review subtly create some of our greatest risks. IBM's analysis supports the pattern I've seen in innumerable organizations: standard changes cause three times as much business disruption due to their volume and our decreased vigilance around them, whereas emergency changes receive all the attention and scrutiny.

      Aberdeen Group data indicates that the average cost of an unplanned outage has increased to $300,000 per hour, with change-related failures accounting for the largest category of preventable incidents. This data makes the financial reality stark.

      What precisely went wrong with the addition of that database field that caused our e-commerce platform to crash?

      We were unaware that the addition of this one field would cause the database to surpass an internal threshold, necessitating a thorough examination of its execution strategy. In its algorithmic wisdom, the database engine determined that the table structure had changed enough to necessitate rebuilding its access and retrieval mechanisms. Our applications relied on high-speed requests, and the new execution plan was terribly unoptimized for them.

      Instead of completing quotes or purchases, customers were spending minutes viewing error pages. All applications began to time out while they awaited data that just wasn't showing up in the anticipated amounts of time. Thousands of transactions were impacted by a single extra field that should have been invisible to the application layer.

      The field addition itself was not the primary cause. We assumed that since we had made similar adjustments dozens of times previously, this one would also act in the same way. Without taking into account the hidden complexities of database optimization thresholds, we had categorized it as a standard change based on superficial similarities.

      My approach to standard changes was completely altered by this experience, and it is now even more applicable in DevOps-driven environments. Many organizations use pipeline deployments, which produce a standard change at runtime. It's great for speed and reliability, but it can easily fall into the same trap.

      However, I have witnessed pipeline deployments result in significant incidents for non-code-related reasons. Due to timing, resource contention, or environmental differences that weren't noticeable in earlier runs, a deployment that performed flawlessly in development and staging abruptly fails in production. Although the automation boosts our confidence, it may also reveal blind spots.

      Over the course of thirty years, I have come to the unsettling realization that there is no such thing as a truly routine change in complex systems. Every modification takes place in a slightly different setting, with varying environmental factors, data states, and system loads. What we refer to as “standard changes” are actually merely modifications with comparable processes rather than risk profiles.

      For this reason, I support contextual change management. We must consider the system state, timing, dependencies, and cumulative effect of recent changes rather than just categorizing them based on their technical features. After three other changes have changed the system's behavior patterns, a change made at two in the morning on a Sunday with little system load is actually different from the same change made during peak business hours.

      Effective change advisory boards must therefore go beyond assessing individual changes separately. I've worked with organizations where the change board carefully considered and approved each modification on its own merits, only to find that the cumulative effect of seemingly unrelated changes led to unexpected interactions and stress on the system. The most developed change management procedures I've come across mandate that their advisory boards take a step back and look at the whole change portfolio over a specified period of time. They inquire whether we are altering the database too frequently during a single maintenance window. Could there be unanticipated interactions between these three different application updates? What is the total resource impact of this week's approved changes?

      It's the distinction between forest management and tree management. While each change may seem logical individually, when combined, they can create situations beyond the scope of any single change assessment.

      Having worked in this field for thirty years, I've come to the conclusion that our greatest confidences frequently conceal our greatest vulnerabilities. Our primary blind spots frequently arise from the changes we've made a hundred times before, the procedures we've automated and standardized, and the adjustments we've labeled as “routine.”

      Whether we should slow down our deployment pipelines or stop using standard changes is not the question. In the current competitive environment, speed and efficiency are crucial. The issue is whether we are posing the appropriate queries before carrying them out. Are we taking into account not only what the change accomplishes but also when it occurs, what else is changing at the same time, and how our systems actually look right now?

      I've discovered that the phrase “we've done this before” is more dangerous in IT operations than “what could go wrong?” Because, despite what we may believe, we never actually perform the same action twice in complex systems.

      Here is what I would like you to think about: which everyday modifications are subtly putting your surroundings at risk? Which procedures have you standardized or automated to the extent that you no longer challenge their presumptions? Most importantly, when was the last time your change advisory board examined your changes as a cohesive portfolio of system modifications rather than as discrete items on a checklist?

      Remember that simple addition to a database field the next time you're tempted to accept a standard change. The most unexpected outcomes can occasionally result from the most routine adjustments.

      I'm always up for a conversation if you want to talk about your difficulties with change management.

      Architect Your Big Data Environment

      • Buy Link or Shortcode: {j2store}202|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Big Data
      • Parent Category Link: /big-data
      • Organizations may understand the transformative potential of a big data initiative, but they struggle to make the transition from the awareness of its importance to identifying a concrete use case for a pilot project.
      • The big data ecosystem is crowded and confusing, and a lack of understanding of it may cause paralysis for organizations.

      Our Advice

      Critical Insight

      • Don’t panic, and make use of the resources you already have. The skills, tools, and infrastructure for big data can break any budget quickly, but before making rash decisions, start with the resources you have in-house.
      • Big data as a service (BDaaS) is making big waves. BDaaS removes many of the hurdles associated with implementing a big data strategy and vastly lowers the barrier of entry.

      Impact and Result

      • Follow Info-Tech’s methodology for understanding the types of modern approaches to big data tools, and then determining which approach style makes the most sense for your organization.
      • Based on your big data use case, create a plan for getting started with big data tools that takes into account the backing of the use case, the organization’s priorities, and resourcing available.
      • Put a repeatable framework in place for creating a comprehensive big data tool environment that will help you decide on the necessary tools to help you realize the value from your big data use case and scale for the future.

      Architect Your Big Data Environment Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you should find your optimal approach to big data tools, review Info-Tech’s methodology, and understand the ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Plant the foundations of your big data tool architecture

      Identify your big data use case and your current data-related capabilities.

      • Architect Your Big Data Environment – Phase 1: Plant the Foundations of Your Big Data Tool Architecture
      • Big Data Execution Plan Presentation
      • Big Data Architecture Planning Tool

      2. Weigh your big data architecture decision criteria

      Determine your capacity for big data tools, as well as the level of customizability and security needed for your solution to help justify your implementation style decision.

      • Architect Your Big Data Environment – Phase 2: Weigh Your Big Data Architecture Decision Criteria

      3. Determine your approach to implementing big data tools

      Analyze the three big data implementation styles, select your approach, and complete the execution plan for your big data initiative.

      • Architect Your Big Data Environment – Phase 3: Determine Your Approach To Implementing Big Data Tools
      [infographic]

      Set a Strategic Course of Action for the PMO in 100 Days

      • Buy Link or Shortcode: {j2store}356|cart{/j2store}
      • member rating overall impact: 9.3/10 Overall Impact
      • member rating average dollars saved: $13,744 Average $ Saved
      • member rating average days saved: 19 Average Days Saved
      • Parent Category Name: Project Management Office
      • Parent Category Link: /project-management-office
      • As a new PMO director, you’ve been thrown into the middle of an unfamiliar organizational structure and a chaotic project environment.
      • The expectations are that the PMO will help improve project outcomes, but beyond that your mandate as PMO director is opaque.
      • You know that the statistics around PMO longevity aren’t good, with 50% of new PMOs closing within the first three years. As early in your tenure as possible, you need to make sure that your stakeholders understand the value that your role could provide to the organization with the right level of buy-in and support.
      • Whether you’re implementing a new PMO or taking over an already existing one, you need to quickly overcome these challenges by rapidly assessing your unfamiliar tactical environment, while at the same time demonstrating confidence and effective leadership to project staff, business stakeholders, and the executive layer.

      Our Advice

      Critical Insight

      • The first 100 days are critical. You have a window of influence where people are open to sharing insights and opinions because you were wise enough to seek them out. If you don’t reach out soon, people notice and assume you’re not wise enough to seek them out, or that you don’t think they are important enough to involve.
      • PMOs most commonly stumble when they shortsightedly provide project management solutions to what are, in fact, more complex, systemic challenges requiring a mix of project management, portfolio management, and organizational change management capabilities. If you fail to accurately diagnose pain points and needs in your first days, you could waste your tenure as PMO leader providing well-intentioned solutions to the wrong project problems.
      • You have diminishing value on your time before skepticism and doubt start to erode your influence. Use your first 100 days to define an appropriate mandate for your PMO, get the right people behind you, and establish buy-in for long-term PMO success.

      Impact and Result

      • Develop an action plan to help leverage your first 100 days on the job. Hit the ground running in your new role with an action plan to achieve realistic goals and milestones in your first 100 days. A results-driven first three months will help establish roots throughout the organization that will continue to feed and grow the PMO beyond your first year.
      • Get to know what you don’t know quickly. Use Info-Tech’s advice and tools to perform a triage of every aspect of PMO accountability as well as harvest stakeholder input to ensure that your PMO meets or exceeds expectations and establishes the right solutions to the organization’s project challenges.
      • Solidify the PMO’s long-term mission. Adopt our stakeholder engagement best practices to ensure that you knock on the right doors early in your tenure. Not only do you need to clarify expectations, but you will ultimately need buy-in from key stakeholders as you move to align the mandate, authority, and resourcing needed for long-term PMO success.

      Set a Strategic Course of Action for the PMO in 100 Days Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out how capitalizing on your first 100 days as PMO leader can help ensure the long-term success of your PMO.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Survey the project landscape

      Get up-to-speed quickly on key PMO considerations by engaging PMO sponsors, assessing stakeholders, and taking stock of your PMO inventory.

      • Set a Strategic Course of Action for the PMO in 100 Days – Phase 1: Survey the Project Landscape
      • Mission Identification and Inventory Tool
      • PMO Director First 100 Days Timeline - MS Project
      • PMO Director First 100 Days Timeline - MS Excel

      2. Gather PMO requirements

      Make your first major initiative as PMO director be engaging the wider pool of PMO stakeholders throughout the organization to determine their expectations for your office.

      • Set a Strategic Course of Action for the PMO in 100 Days – Phase 2: Gather PMO Requirements
      • PMO Requirements Gathering Tool
      • PMO Course of Action Stakeholder Interview Guide

      3. Solidify your PPM goals

      Review the organization’s current PPM capabilities in order to identify your ability to meet stakeholder expectations and define a sustainable mandate.

      • Set a Strategic Course of Action for the PMO in 100 Days – Phase 3: Solidify Your PPM Goals
      • Project Portfolio Management Maturity Assessment Workbook
      • Project Management Maturity Assessment Workbook
      • Organizational Change Management Maturity Assessment Workbook
      • PMO Strategic Expectations Glossary

      4. Formalize the PMO’s mandate

      Communicate your strategic vision for the PMO and garner stakeholder buy-in.

      • Set a Strategic Course of Action for the PMO in 100 Days – Phase 4: Formalize the PMO's Mandate
      • PMO Mandate and Strategy Roadmap Template
      • PMO Director Peer Feedback Evaluation Template
      • PMO Director First 100 Days Self-Assessment Tool
      [infographic]

      Workshop: Set a Strategic Course of Action for the PMO in 100 Days

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Assess the Current Project Ecosystem

      The Purpose

      Quickly develop an on-the-ground view of the organization’s project ecosystem and the PMO’s abilities to effectively serve.

      Key Benefits Achieved

      A comprehensive and actionable understanding of the PMO’s tactical environment

      Activities

      1.1 Perform a PMO SWOT analysis.

      1.2 Assess the organization’s portfolio management, project management, and organizational change management capability levels.

      1.3 Take inventory of the PMO’s resourcing levels, project demand levels, and tools and artifacts.

      Outputs

      Overview of current strengths, weaknesses, opportunities, and threats

      Documentation of your current process maturity to execute key portfolio management, project management, and organizational change management functions

      Stock of the PMO’s current access to PPM personnel relative to total project demand

      2 Analyze PMO Stakeholders

      The Purpose

      Determine stakeholder expectations for the PMO.

      Key Benefits Achieved

      An accurate understanding of others’ expectations to help ensure the PMO’s course of action is responsive to organizational culture and strategy

      Activities

      2.1 Conduct a PMO Mission Identification Survey with key stakeholders.

      2.2 Map the PMO’s stakeholder network.

      2.3 Analyze key stakeholders for influence, interest, and support.

      Outputs

      An understanding of expected PMO outcomes

      A stakeholder map and list of key stakeholders

      A prioritized PMO requirements gathering elicitation plan

      3 Determine Strategic Expectations and Define the Tactical Plan

      The Purpose

      Develop a process and method to turn stakeholder requirements into a strategic vision for the PMO.

      Key Benefits Achieved

      A strategic course of action for the PMO that is responsive to stakeholders’ expectations.

      Activities

      3.1 Assess the PMO’s ability to support stakeholder expectations.

      3.2 Use Info-Tech’s PMO Strategic Expectations glossary to turn raw process and service requirements into specific strategic expectations.

      3.3 Define an actionable tactical plan for each of the strategic expectations in your mandate.

      Outputs

      An understanding of PMO capacity and limits

      A preliminary PMO mandate

      High-level statements of strategy to help support your mandate

      4 Formalize the PMO’s Mandate and Roadmap

      The Purpose

      Establish a final PMO mandate and a process to help garner stakeholder buy-in to the PMO’s long-term vision.

      Key Benefits Achieved

      A viable PMO course of action complete with stakeholder buy-i

      Activities

      4.1 Finalize the PMO implementation timeline.

      4.2 Finalize Info-Tech’s PMO Mandate and Strategy Roadmap Template.

      4.3 Present the PMO’s strategy to key stakeholders.

      Outputs

      A 3-to-5-year implementation timeline for key PMO process and staffing initiatives

      A ready-to-present strategy document

      Stakeholder buy-in to the PMO’s mandate

      Improve Email Security

      • Buy Link or Shortcode: {j2store}272|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Secure Cloud & Network Architecture
      • Parent Category Link: /secure-cloud-network-architecture

      As the sophistication of malicious attacks increases, it has become more difficult to ensure applications such as email software are properly protected and secured. The increase in usage and traffic of email exacerbates the security risks to the organization.

      Our Advice

      Critical Insight

      Email has changed. Your email security needs to evolve as well to ensure you are protecting your organization’s communication.

      Impact and Result

      • Gain an understanding of the importance of email security and steps to secure your corporate email.
      • Develop holistic guidelines on implementing best practices to modernize your organization’s email security.

      Improve Email Security Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Improve Email Security Storyboard – A guide to best practices for improving an organization’s email security.

      This research provides guidelines to assist organizations in identifying controls to secure their emails along with recommendations on the most common and effective controls to secure and protect corporate emails.

      • Improve Email Security Storyboard

      2. Email Security Checklist – A checklist tool that enables organizations to monitor their progress in implementing controls to improve their email security.

      This checklist of common email security categories and their associated controls helps ensure organizations are following best practices.

      • Email Security Checklist
      [infographic]

      Further reading

      Improve Email Security

      Follow the latest best practices for email security to mitigate evolving threats.

      Analyst Perspective

      Protecting your organization’s digital assets begins with securing your email communication.

      As organizations increasingly rely on email communication for day-to-day business operations, threat actors are exploiting the increased traction to develop and implement more sophisticated email-based attacks. Furthermore, the lack of investment in measures, tools, and technologies for an organization’s email security exacerbates the vulnerabilities at hand.

      Effective use of security procedures and techniques can mitigate and minimize email-based threats have been shown to reduce the ability of these attacks to infiltrate the email inbox. These guidelines and best practices will help your organization conduct due diligence to protect the contents of the email, its transit, and its arrival to the authorized recipient.

      Ahmad Jowhar, Research Specialist, Security & Privacy

      Ahmad Jowhar
      Research Specialist, Security & Privacy
      Info-Tech Research Group

      Executive Summary

      Your Challenge Common Obstacles Info-Tech’s Approach
      • As malicious attacks get increasingly sophisticated, it has become more difficult to ensure applications such as email software are properly protected and secured.
      • The increased usage and traffic of emails, as well as their contents, exacerbates security risks to the organization.
      • Given the variety of email security controls, it can be complicated to identify the most important techniques for improving your organization’s email security.
      • Understand the importance of implementing email security for your organization.
      • Develop a holistic guideline for implementing best practices to secure your organization’s emails.

      Info-Tech Insight
      Email has changed. Your email security must evolve to ensure the safety of your organization’s communication.

      Your Challenge

      As a security leader, you need to modernize your email security services so you can protect business communications and prevent security incidents.

      • Various factors must be considered when deciding how best to safeguard your organization’s communication chain. This includes the frequency of email traffic and the contents of emails.
      • The increased number of email-based cyberattacks reveals the sophistication of threat actors in leveraging an organization’s lack of email security to infiltrate their business.
      • As organizations continue to rely heavily on email communication, email-based threats will become increasingly prevalent.

      75% of organizations have experienced an increase in email-based threats.

      97% of security breaches are due to phishing attacks.

      82% of companies reported a higher volume of email in 2022.

      Source: Mimecast, 2023.

      Modern email security controls framework for security leaders

      Email has changed. Your email security must evolve to ensure the safety of your organization’s communication.

      Modern email security controls framework for security leaders

      Understand the best practices in securing your organization’s emails

      Enhance your security posture by modernizing your email security
      Email has changed. Your email security must evolve to ensure the safety of your organization’s communication.

      Deploy an added layer of defense by preventing the contents of your email from being intercepted.

      Encrypting your email communication will provide an additional layer of protection which only allows authorized users to read the email.

      Leverage triple-threat authentication controls to strengthen your email security.

      Leveraging SPF, DKIM, and DMARC enables you to have the proper authentication controls in place, ensuring that only legitimate users are part of the email communication.

      Protect the contents of your email through data classification and data loss prevention.

      Having tools and technologies in place to ensure that data is classified and backed up will enable better storage, analysis, and processing of the email.

      Implement email policies for a holistic email security protection.

      Policies ensure acceptable standards are in place to protect the organization’s assets, including the creation, attachment, sending, and receiving of emails.

      User awareness and training
      Training employees on protecting their corporate emails adds an extra layer of defense by ensuring end users are aware of various email-based threats and can confidently safeguard their organizations from attacks.

      Email encryption

      Deploy an added layer of defense by preventing the contents of your email from being intercepted.

      • Protecting your organization’s emails begins by ensuring only the appropriate recipients can receive and read the email’s contents.
      • This process includes encrypting the email’s contents to protect sensitive information from being read by unauthorized recipients.
      • This protects the contents even if the email is intercepted by anyone besides the intended recipient.
      • Other benefits of email encryption include:
        • Reducing any risks associated with regulatory violations.
        • Enabling business to confidently communicate sensitive information via email.
        • Ensuring protective measures taken to prevent data loss and corporate policy violations.

      Along with the increased use of emails, organizations are seeing an increase in the number of attacks orchestrating from emails. This has resulted in 74% of organizations seeing an increase in email-based threats.

      Source: Mimecast, 2023.

      Info-Tech Insight
      Encrypting your email communication will provide an additional layer of protection which only allows authorized users to read the email.

      Implementing email encryption

      Leverage these protocols and tools to help encrypt your email.

      • The most common email encryption protocols and tools include:
        • Transport Layer Security (TLS): A cryptographic protocol designed to securely deliver data via the internet, which prevents third parties from intercepting and accessing the data.
        • Secure/Multipurpose Internet Mail Extension (S/MIME): A protocol for sending digitally signed and encrypted messages by leveraging public key encryption to provide at-rest and in-transit data protection.
        • Secure Email Gateway: An email security solution that inspects emails for malicious content prior to it reaching the corporate system. The solution is positioned between the public internet and corporate email servers. An email gateway solution would be provided by a third-party vendor and can be implemented on-premises, through the cloud, or hybrid.
      • Email encryption policies can also be implemented to ensure processes are in place when sending sensitive information through emails.
      • Email encryption ensures end-to-end privacy for your email and is especially important when the email requires strict content privacy.

      Email authentication

      Three authentication controls your organization should leverage to stay secure.

      • Along with content encryption, it’s important to authenticate both the sender and recipient of an email to ensure that only legitimate users are able to send and receive it.
      • Implementing email authentication techniques prevents unsolicited email (e.g. spam) from entering your mailbox.
      • This also prevents unauthorized users from sending email on your organization’s behalf.
      • Having these standards in place would safeguard your organization from spam, spoofing, and phishing attacks.
      • The three authentication controls include:
        • Sender Policy Framework (SPF): Email validation control that verifies that the incoming email is from an authorized list of IP addresses provided by the sender’s domain administrator.
        • DomainKeys Identified Mail (DKIM): Enables recipients to verify that an email from a specific domain was authorized by the domain’s owner. This is conducted through cryptographic authentication by adding a digital signature to the message headers of outbound emails.
        • Domain Message Authentication Reporting & Conformance (DMARC): Provides domain-level protection of email channel by publishing DMARC records in the organization’s domain name system (DNS) and creates policies which prompts actions to take if an email fails authentication.

      Although these authentication controls are available for organizations to leverage, the adoption rate remains low. 73% of survey respondents indicated they didn’t deploy email authentication controls within their organization.

      Source: Mimecast, 2023.

      Email authentication controls

      All three authentication controls should be implemented to effectively secure your organization’s email. They ensure the emails you send and receive are securely authorized and legitimate.

      SPF DKIM DMARC

      Creating an SPF record identifies which IP addresses are allowed to send emails from your domain. Steps to implement SPF include the following:

      1. Create an SPF record by identifying the IP addresses that are authorized to send emails.
      2. Publish your SPF record into your DNS by creating a TXT record on your domain.

      Implementing DKIM helps prevent attackers from sending emails that pretend to come from your domain. Steps to implement DKIM include the following:

      1. Identify and enable domains you wish to configure DKIM to create DKIM keys.
      2. Copy the canonical names (CNAMEs) that are provided.
      3. Publish the CNAME records to your DNS service provider.

      Setting up DMARC ensures emails are validated and defines actions to take if an email fails authentication. These include:

      • None: Message is delivered to recipient and a DMARC report is sent to domain owner.
      • Quarantine: Message moved to quarantine folder and recipient is notified.
      • Reject: Message is not delivered to the recipient.
      • Steps to implement DMARC include:
      1. Create a DMARC record by including your organization’s email domain and IP addresses.
      2. Form a DMARC TXT record for your domain to include policies and publish it to your DNS.

      For more information:

      Data classification

      Ensure sensitive data is securely processed, analyzed, and stored.

      • Besides authenticating the legitimacy of an email and its traffic to the recipient, it’s important to have procedures in place to protect the contents of an email.
      • Data classification is found not only in databases and spreadsheets, but also in the email messages being communicated. Examples of data most commonly included in emails:
        • Personal identifiable information (PII): social security number, financial account number, passcodes/passwords
      • Applying data classification to your email can help identify the sensitivity of the information it contains. This ensures any critical data within an email message is securely processed and protected against unauthorized use, theft, and loss.
      • Emails can be classified based on various sensitivity levels. such as:
        • Top secret, public, confidential, internal

      Discover and Classify Your Data

      Leverage this Info-Tech blueprint for guidelines on implementing a data classification program for your organization.

      Info-Tech Insight
      Having tools and technologies in place to ensure that data is classified and backed up will enable better storage, analysis, and processing of the email.

      Data loss prevention (DLP)

      Protect your data from being lost/stolen.

      • Protecting an email’s contents through data classification is only one approach for improving email security. Having a data loss prevention solution would further increase security by minimizing the threat of sensitive information leaving your organization’s email network.
      • Examples of tools embedded in DLP solutions that help monitor an organization's email communication:
        • Monitoring data sent and received from emails: This ensures the data within an email communication is protected with the necessary encryption based on its sensitivity.
        • Detecting suspicious email activity: This includes analyzing users’ email behavior regarding email attachments and identifying irregular behaviors.
        • Flagging or blocking email activities which may lead to data loss: This prevents highly sensitive data from being communicated via email and reduces the risk of information being intercepted.
      • The types of DLP technologies that can be leveraged include:
        • Rule-based: Data that has been tagged by admins as sensitive can be blocklisted, which would flag and/or block data from being sent via email.
        • Machine learning: Data on users’ email behavior is collected, processed, and trained to understand the employee’s normal email behavior and detect/flag suspicious activities.
      • Implementing DLP solutions would complement your data classification techniques by ensuring proper measures are in place to secure your organization’s assets through policies, technology, and tools.

      48% of employees have accidently attached the wrong file to an email.

      39% of respondents have accidently sent emails that contained security information such as passwords and passcodes.

      Source: Tessian, 2021.

      User awareness & training

      A strong security awareness & training program is an important element of strengthening your email security.

      • Having all these tools and techniques in place to improve your email security will not be effective unless you also improve your employees’ awareness.
      • Employees should participate in email security training, especially since the majority utilize this channel of communication for day-to-day operations.
      • User awareness and training should go beyond phishing campaigns and should highlight the various types of email-based threats, the characteristics of these threats, and what procedures they can follow to minimize these threats.
      • 95% of data breaches are caused by human error. It can take nine months to discover and contain them, and they are expected to cost $8 trillion this year (Mimecast, 2023).
      • Investments in employee awareness and training would mitigate these risks by ensuring employees recognize and report suspicious emails, remain mindful of what type of data to share via email, and improve their overall understanding of the importance of email security.

      Develop a Security Awareness and Training Program That Empowers End Users

      Leverage this Info-Tech blueprint for assistance on creating various user training materials and empower your employees to become a main line of defense for your organization.

      64% of organizations conduct formal training sessions (in-person or computer-based).

      74% of organizations only focus on providing phishing-based training.

      Source: Proofpoint, 2021.

      Examples of email-based threats

      Phishing
      Email sent by threat actors designed to manipulate end user into providing sensitive information by posing as a trustworthy source

      Business Email Compromise
      Attackers trick a user into sending money or providing confidential information

      Spam
      Users receive unsolicited email, usually in bulk, some of which contains malware

      Spear Phishing
      A type of phishing attack where the email is sent to specific and targeted emails within the organization

      Whaling
      A type of phishing attack similar to spear phishing, but targeting senior executives within the organization

      Password/Email Exposure
      Employees use organizational email accounts and passwords to sign up for social media, leaving them susceptible to email and/or password exposure in a social media breach

      Email policies

      Having policies in place will enable these controls to be implemented.

      Developing security policies that are reasonable, auditable, enforceable, and measurable ensures proper procedures are followed and necessary measures are implemented to protect the organization. Policies relating to email security can be categorized into two groups:

      • User policy: Policies employees must adhere to when using their corporate email. Examples:
        • User acceptance of technology: Acknowledgment of legitimate and restrictive actions when using corporate email
        • Security awareness and training: Acknowledging completion of email security training
      • Administrator-set policy: Policies that are implemented by IT and/or security admins. Examples:
        • Email backup: Policy on how long emails should be archived and processes for disposing of them
        • Log retention: Policy on how to retain, process, and analyze logs created from email servers
        • Throttling: Policies that limit the number of emails sent by a sender and the number of recipients per email and per day depending on the employee’s grouping

      Develop and Deploy Security Policies

      Leverage this Info-Tech blueprint for assistance on developing and deploying actionable policies and creating an overall policy management lifecycle to keep your policies current, effective, and compliant.

      Info-Tech Insight
      Policies ensure acceptable standards are in place to protect the organization’s assets, including the creation, attachment, sending, and receiving of emails.

      Email security technologies & tools (SoftwareReviews)

      SoftwareReviews, a division of Info-Tech Research Group, provides enterprise software reviews to help organizations make more efficient decisions during the software selection process. Reviews are provided by authenticated IT professionals who have leveraged the software and provide unbiased insights on different vendors and their products.

      Learn from the collective knowledge of real IT professionals.

      • Know the products and features available.
      • Explore modules and detailed feature-level data.
      • Quickly understand the market.

      Evaluate market leaders through vendor rankings and awards.

      • Convince stakeholders with professional reports.
      • Avoid pitfalls with unfiltered data from real users.
      • Choose software with confidence.

      Cut through misleading marketing material.

      • Negotiate contracts based on data.
      • Know what to expect before you sign.
      • Effectively manage the vendor.

      Email security technologies & tools

      Leverage these tools for an enhanced email security solution.

      Email Security Checklist

      Follow these guidelines to ensure you are implementing best practices for securing your organization’s emails.

      • The Email Security Checklist is a tool to assess the current and future state of your organization’s email security and provides a holistic understanding on monitoring your progress within each category and associated controls.
      • The status column allows you to select the feature’s current implementation status, which includes the following options:
        • Enabled: The feature is deployed within the organization’s network.
        • Implemented: The feature is implemented within the organization’s network, but not yet deployed.
        • Not implemented: The feature has not been enabled or implemented.
      • Comments can be added for each feature to provide details such as indicating the progress on enabling/implementing a feature and why certain features are not yet implemented.

      Email Security Checklist

      Download the Email Security Checklist tool

      Related Info-Tech Research

      Discover and Classify Your Data
      Leverage this Info-Tech blueprint for guidelines on implementing a data classification program for your organization.

      Develop a Security Awareness and Training Program That Empowers End Users
      Leverage this Info-Tech blueprint for assistance on creating various user training materials and empower your employees to become a main line of defense for your organization.

      Develop and Deploy Security Policies
      Leverage this Info-Tech blueprint for assistance on developing and deploying actionable policies and creating an overall policy management lifecycle to keep your policies current, effective, and compliant.

      Bibliography

      “10 Best Practices for Email Security in 2022.” TitanFile, 22 Sept. 2022. Web.

      “2021 State of the Phish.” Proofpoint, 2021. Web.

      Ahmad, Summra. “11 Email Security Best Practices You Shouldn't Miss (2023).” Mailmunch, 9 Mar. 2023. Web.

      “Blumira's State of Detection and Response.” Blumira, 18 Jan. 2023. Web.

      Clay, Jon. “Email Security Best Practices for Phishing Prevention.” Trend Micro, 17 Nov. 2022. Web.

      Crane, Casey. “6 Email Security Best Practices to Keep Your Business Safe in 2019.” Hashed Out by The SSL Store™, 7 Aug. 2019. Web.

      Hateb, Seif. “Basic Email Security Guide.” Twilio Blog, Twilio, 5 Dec. 2022. Web.

      “How DMARC Advances Email Security.” CIS, 9 July 2021. Web.

      Pal, Suryanarayan. “10 Email Security Best Practices You Should Know in 2023.” Mailmodo, 9 Feb. 2023. Web.

      Pitchkites, Max. “Email Security: A Guide to Keeping Your Inbox Safe in 2023.” Cloudwards, 9 Dec. 2022. Web.

      Rudra, Ahona. “Corporate Email Security Checklist.” PowerDMARC, 4 July 2022. Web.

      “Sender Policy Framework.” Mimecast, n.d. Web.

      Shea, Sharon, and Peter Loshin. “Top 15 Email Security Best Practices for 2023: TechTarget.” TechTarget, 14 Dec. 2022. Web.

      “The Email Security Checklist: Upguard.” UpGuard, 16 Feb. 2022. Web.

      “The State of Email Security 2023.” Mimecast, 2023. Web.

      Wetherald, Harry. “New Product - Stop Employees Emailing the Wrong Attachments.” Tessian, 16 Sept. 2021. Web.

      “What Is DMARC? - Record, Verification & More: Proofpoint Us.” Proofpoint, 9 Mar. 2023. Web.

      “What Is Email Security? - Defining Security of Email: Proofpoint Us.” Proofpoint, 3 Mar.2023. Web.

      Wilton, Laird. “How to Secure Email in Your Business with an Email Security Policy.” Carbide, 31 Jan. 2022. Web.

      Voka 2025 Resilience Scores

       

      Test uw digitale slagkracht!

      Jammer! U bent te laat.

      De VOKA Bedrijven Contact Dagen 2025 zijn voorbij en onze winnaars zijn bekend!

      Liguris: 80 points
      Keiretsu: 71 points
      Staffler: 69 points
      Xpo group: 67 points
      Actief: 66 points

      Continue reading

      AI and the Future of Enterprise Productivity

      • Buy Link or Shortcode: {j2store}329|cart{/j2store}
      • member rating overall impact: 9.0/10 Overall Impact
      • member rating average dollars saved: $12,399 Average $ Saved
      • member rating average days saved: 10 Average Days Saved
      • Parent Category Name: Innovation
      • Parent Category Link: /innovation
      • We’re witnessing a fundamental transformation in how businesses operate and productivity is achieved.
      • Advances in narrow but powerful forms of artificial intelligence (AI) are being driven by a cluster of factors.
      • Applications for enterprise AI aren’t waiting for the emergence of a general AI. They’re being rapidly deployed in task-specific domains. From robotic process automation (RPA) to demand forecasting, from real-world robotics to AI-driven drug development, AI is boosting enterprise productivity in significant ways.

      Our Advice

      Critical Insight

      Algorithms are becoming more advanced, data is now richer and easier to collect, and hardware is cheaper and more powerful. All of this is true and contributes to the excitement around enterprise AI applications, but the biggest difference today is that enterprises are redesigning their processes around AI, rather than simply adding AI to their existing processes.

      Impact and Result

      This report outlines six emerging ways AI is being used in the enterprise, with four future scenarios outlining their possible trajectories. These are designed to guide strategic decision making and facilitate future-focused ideation.

      AI and the Future of Enterprise Productivity Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Read the trend report

      This report outlines six emerging ways AI is being used in the enterprise, with four future scenarios outlining their possible trajectories. These are designed to guide strategic decision making and facilitate future-focused ideation.

      • AI and the Future of Enterprise Productivity Trend Report
      • AI and the Future of Enterprise Productivity Trend Report (PDF)
      [infographic]

      Security Priorities 2023

      • Buy Link or Shortcode: {j2store}254|cart{/j2store}
      • member rating overall impact: 9.0/10 Overall Impact
      • member rating average dollars saved: $909 Average $ Saved
      • member rating average days saved: 1 Average Days Saved
      • Parent Category Name: Security Strategy & Budgeting
      • Parent Category Link: /security-strategy-and-budgeting
      • Most people still want a hybrid work model but there is a shortage in security workforce to maintain secure remote work, which impacts confidence in the security practice.
      • Pressure of operational excellence drives organizational modernization with the consequence of higher risks of security attacks that impact not only cyber but also physical systems.
      • The number of regulations with stricter requirements and reporting is increasing, along with high sanctions for violations.
      • Accurate assessment of readiness and benefits to adopt next-gen cybersecurity technologies can be difficult. Additionally, regulation often faces challenges to keep up with next-gen cybersecurity technologies implications and risks of adoption, which may not always be explicit.
      • Software is usually produced as part of a supply chain instead in a silo. Thus, a vulnerability in any part of the supply chain can become a threat surface.

      Our Advice

      Critical Insight

      • Secure remote work still needs to be maintained to facilitate the hybrid work model post pandemic.
      • Despite all the cybersecurity risks, organizations continue modernization plans due to the long-term overall benefits. Hence, we need to secure organization modernization.
      • Organizations should use regulatory changes to improve security practices, instead of treating them as a compliance burden.
      • Next-gen cybersecurity technologies alone are not the silver bullet. A combination of technologies with skilled talent, useful data, and best practices will give a competitive advantage.

      Impact and Result

      • Use this report to help decide your 2023 security priorities by:
        • Collecting and analyzing your own related data, such as your organization 2022 incident reports. Use Info-Tech’s Security Priorities 2023 material for guidance.
        • Identifying your needs and analyzing your capabilities. Use Info-Tech's template to explain the priorities you need to your stakeholders.
        • Determining the next steps. Refer to Info-Tech's recommendations and related research.

      Security Priorities 2023 Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Security Priorities 2023 Report – A report to help decide your 2023 security priorities.

      Each organization is different, so a generic list of security priorities will not be applicable to every organization. Thus, you need to:

    • Collect and analyze your own related data such as your organization 2022 incident reports. Use Info-Tech’s Security Priorities 2023 material for guidance.
    • Identify your needs and analyze your capabilities. Use Info-Tech's template to explain the priorities you need to your stakeholders.
    • Refer to Info-Tech's recommendations and related research for guidance on the next steps.
      • Security Priorities 2023 Report

      Infographic

      Further reading

      Security Priorities 2023

      How we live post pandemic

      Each organization is different, so a generic list of priorities will not be applicable to every organization.

      During 2022, ransomware campaigns declined from quarter to quarter due to the collapse of experienced groups. Several smaller groups are developing to recapture the lost ransomware market. However, ransomware is still the most worrying cyber threat.

      Also in 2022, people returned to normal activities such as traveling and attending sports or music events but not yet to the office. The reasons behind this trend can be many fold, such as employees perceive that work from home (WFH) has positive productivity effects and time flexibility for employees, especially for those with families with younger children. On the other side of the spectrum, some employers perceive that WFH has negative productivity effects and thus are urging employees to return to the office. However, employers also understand the competition to retain skilled workers is harder. Thus, the trend is to have hybrid work where eligible employees can WFH for a certain portion of their work week.

      Besides ransomware and the hybrid work model, in 2022, we saw an evolving threat landscape, regulatory changes, and the potential for a recession by the end of 2023, which can impact how we prioritize cybersecurity this year. Furthermore, organizations are still facing the ongoing issues of insufficient cybersecurity resources and organization modernization.

      This report will explore important security trends, the security priorities that stem from these trends, and how to customize these priorities for your organization.

      In Q2 2022, the median ransom payment was $36,360 (-51% from Q1 2022), a continuation of a downward trend since Q4 2021 when the ransom payment median was $117,116.
      Source: Coveware, 2022

      From January until October 2022, hybrid work grew in almost all industries in Canada especially finance, insurance, real estate, rental and leasing (+14.7%), public administration and professional services (+11.8%), and scientific and technical services (+10.8%).
      Source: Statistics Canada, Labour Force Survey, October 2022; N=3,701

      Hybrid work changes processes and infrastructure

      Investment on remote work due to changes in processes and infrastructure

      As part of our research process for the 2023 Security Priorities Report, we used the results from our State of Hybrid Work in IT Survey, which collected responses between July 10 and July 29, 2022 (total N=745, with n=518 completed surveys). This survey details what changes in processes and IT infrastructure are likely due to hybrid work.

      Process changes to support hybrid work

      A bar graph is depicted with the following dataset: None of the above - 12%; Change management - 29%; Asset management - 34%; Service request support - 41%; Incident management - 42%

      Survey respondents (n=518) were asked what processes had the highest degree of change in response to supporting hybrid work. Incident management is the #1 result and service request support is #2. This is unsurprising considering that remote work changed how people communicate, how they access company assets, and how they connect to the company network and infrastructure.

      Infrastructure changes to support hybrid work

      A bar graph is depicted with the following dataset: Changed queue management and ticketing system(s) - 11%; Changed incident and service request processes - 23%; Addition of chatbots as part of the Service Desk intake process - 29%; Reduced the need for recovery office spaces and alternative work mitigations - 40%; Structure & day-to-day operation of Service Desk - 41%; Updated network architecture - 44%

      For 2023, we believe that hybrid work will remain. The first driver is that employees still prefer to work remotely for certain days of the week. The second driver is the investment from employers on enabling WFH during the pandemic, such as updated network architecture (44%) and the infrastructure and day-to-day operations (41%) as shown on our survey.

      Top cybersecurity concerns and organizational preparedness for them

      Concerns may correspond to readiness.

      In the Info-Tech Research Group 2023 Trends and Priorities Survey of IT professionals, we asked about cybersecurity concerns and the perception about readiness to meet current and future government legislation regarding cybersecurity requirements.

      Cybersecurity issues

      A bar graph is depicted with the following dataset: Cyber risks are not on the radar of the executive leaders or board of directors - 3.19; Organization is not prepared to respond to a cyber attack - 3.08; Supply chain risks related to cyber threats - 3.18; Talent shortages leading to capacity constraints in cyber security - 3.51; New government or industry-imposed regulations - 3.15

      Survey respondents were asked how concerned they are about certain cybersecurity issues from 1 (not concerned at all) to 5 (very concerned). The #1 concern was talent shortages. Other issues with similar concerns included cyber risks not on leadership's radar, supply chain risks, and new regulations (n=507).

      Cybersecurity legislation readiness

      A bar graph is depicted with the following dataset: 1 (Not confident at all) - 2.4%; 2 - 11.2%; 3 - 39.7%; 4 - 33.3%; 5 (Very confident) - 13.4%

      When asked about how confident organizations are about being prepared to meet current and future government legislation regarding cybersecurity requirements, from 1 (not confident at all) to 5 (very confident), the #1 response was 3 (n=499).

      Unsurprisingly, the ever-changing government legislation environment in a world emerging from a pandemic and ongoing wars may not give us the highest confidence.

      We know the concerns and readiness…

      But what is the overall security maturity?

      As part of our research process for the 2023 Security Priorities Report, we reviewed results of completed Info-Tech Research Group Security Governance and Management Benchmark diagnostics (N=912). This report details what we see in our clients' security governance maturity. Setting aside the perception on readiness – what are their actual security maturity levels?

      A bar graph is depicted with the following dataset: Security Culture - 47%; Policy and Process Governance - 47%; Event and Incident Management - 58%; Vulnerability - 57%; Auditing - 52%; Compliance Management - 58%; Risk Analysis - 52%

      Overall, assessed organizations are still scoring low (47%) on Security Culture and Policy and Process Governance. This justifies why most security incidents are still due to gaps in foundational security and security awareness, not lack of advanced controls such as event and incident management (58%).

      And how will the potential recession impact security?

      Organizations are preparing for recession, but opportunities for growth during recession should be well planned too.

      As part of our research process for the 2023 Security Priorities Report, we reviewed the results of the Info-Tech Research Group 2023 Trends and Priorities Survey of IT professionals, which collected responses between August 9 and September 9, 2022 (total N=813 with n=521 completed surveys).

      Expected organizational spending on cybersecurity compared to the previous fiscal year

      A bar graph is depicted with the following dataset: A decrease of more than 10% - 2.2%; A decrease of between 1-10% - 2.6%; About the same - 41.4%; An increase of between 1-10% - 39.6%; An increase of more than 10% - 14.3%

      Keeping the same spending is the #1 result and #2 is increasing spending up to 10%. This is a surprising finding considering the survey was conducted after the middle of 2022 and a recession has been predicted since early 2022 (n=489).

      An infographic titled Cloudy with a Chance of Recession

      Source: Statista, 2022, CC BY-ND

      US recession forecast

      Contingency planning for recessions normally includes tight budgeting; however, it can also include opportunities for growth such as hiring talent who have been laid off by competitors and are difficult to acquire in normal conditions. This can support our previous findings on increasing cybersecurity spending.

      Five Security Priorities for 2023

      This image describes the Five Security Priorities for 2023.

      Maintain Secure Hybrid Work

      PRIORITY 01

      • HOW TO STRATEGICALLY ACQUIRE, RETAIN, OR UPSKILL TALENT TO MAINTAIN SECURE SYSTEMS.

      Executive summary

      Background

      If anything can be learned from COVID-19 pandemic, it is that humans are resilient. We swiftly changed to remote workplaces and adjusted people, processes, and technologies accordingly. We had some hiccups along the way, but overall, we demonstrated that our ability to adjust is amazing.

      The pandemic changed how people work and how and where they choose to work, and most people still want a hybrid work model. However, the number of days for hybrid work itself varies. For example, from our survey in July 2022 (n=516), 55.8% of employees have the option of 2-3 days per week to work offsite, 21.0% for 1 day per week, and 17.8% for 4 days per week.

      Furthermore, the investment (e.g. on infrastructure and networks) to initiate remote work was huge, and the cost doesn't end there, as we need to maintain the secure remote work infrastructure to facilitate the hybrid work model.

      Current situation

      Remote work: A 2022 survey by WFH Research (N=16,451) reports that ~14% of full-time employees are fully remote and ~29% are in a hybrid arrangement as of Summer-Fall 2022.

      Security workforce shortage: A 2022 survey by Bridewell (N=521) reports that 68% of leaders say it has become harder to recruit the right people, impacting organizational ability to secure and monitor systems.

      Confidence in the security practice: A 2022 diagnostic survey by Info-Tech Research Group (N=55) reports that importance may not correspond to confidence; for example, the most important selected cybersecurity area, namely Data Access/Integrity (93.7%), surprisingly has the lowest confidence of the practice (80.5%).

      "WFH doubled every 15 years pre-pandemic. The increase in WFH during the pandemic was equal to 30 years of pre-pandemic growth."

      Source: National Bureau of Economic Research, 2021

      Leaders must do more to increase confidence in the security practice

      Importance may not correspond to confidence

      As part of our research process for the 2023 Security Priorities Report, we analyzed results from the Info-Tech Research Group diagnostics. This report details what we see in our clients' perceived importance of security and their confidence in existing security practices.

      Cybersecurity importance

      A bar graph is depicted with the following dataset: Importance to the Organization - 94.3%; Importance to My Department	92.2%

      Cybersecurity importance areas

      A bar graph is depicted with the following dataset: Mobility (Remote & Mobile Access) - 90.2%; Regulatory Compliance - 90.1%; Desktop Computing - 90.9%; Data Access / Integrity - 93.7%

      Confidence in cybersecurity practice

      A bar graph is depicted with the following dataset: Confidence in the Organization's Overall Security - 79.4%; Confidence in Security for My Department - 79.8%

      Confidence in cybersecurity practice areas

      A bar graph is depicted with the following dataset: Mobility (Remote & Mobile Access) - 75.8%; Regulatory Compliance - 81.5%; Desktop Computing - 80.9%; Data Access / Integrity - 80.5%

      Diagnostics respondents (N=55) were asked about how important security is to their organization or department. Importance to the overall organization is 2.1 percentage points (pp) higher, but confidence in the organization's overall security is slightly lower (-0.4 pp).

      If we break down to security areas, we can see that the most important area, Data Access/Integrity (93.7%), surprisingly has the lowest confidence of the practice: 80.5%. From this data we can conclude that leaders must build a strong cybersecurity workforce to increase confidence in the security practice.

      Use this template to explain the priorities you need your stakeholders to know about.

      Maintain secure hybrid work plan

      Provide a brief value statement for the initiative.

      Build a strong cybersecurity workforce to increase confidence in the security practice to facilitate hybrid work.

      Initiative Description:

      • Description must include what organization will undertake to complete the initiative.
      • Review your security strategy for hybrid work.
      • Identify skills gaps that hinder the successful execution of the hybrid work security strategy.
      • Use the identified skill gaps to define the technical skill requirements for current and future work roles.
      • Conduct a skills assessment on your current workforce to identify employee skill gaps.
      • Decide whether to train, hire, contract, or outsource each skill gap.

      Drivers:

      List initiative drivers.

      • Employees still prefer to WFH for certain days of the week.
      • The investment on WFH during pandemic such as updated network architecture and infrastructure and day-to-day operations.
      • Tech companies' huge layoffs, e.g. Meta laid off more than 11,000 employees.

      Risks:

      List initiative risks and impacts.

      • Unskilled workers lacking certificates or years of experience who are trained and become skilled workers then quit or are hijacked by competitors.
      • Organizational and cultural changes cause friction with work-life balance.
      • Increased attack surface of remote/hybrid workforce.

      Benefits:

      List initiative benefits and align to business benefits or benefits for the stakeholder groups that it impacts.

      • Increase perceived productivity by employees and increase retention.
      • Increase job satisfaction and work-life balance.
      • Hiring talent that has been laid off who are difficult to acquire in normal conditions.

      Related Info-Tech Research:

      Recommended Actions

      1. Identify skill requirements to maintain secure hybrid work

      Review your security strategy for hybrid work.

      Determine the skill needs of your security strategy.

      2. Identify skill gaps

      Identify skills gaps that hinder the successful execution of the hybrid work security strategy.

      Use the identified skill gaps to define the technical skill requirements for work roles.

      3. Decide whether to build or buy skills

      Conduct a skills assessment on your current workforce to identify employee skill gaps.

      Decide whether to train, hire, contract, or outsource each skill gap.

      Source: Close the InfoSec Skills Gap: Develop a Technical Skills Sourcing Plan, Info-Tech

      Secure Organization Modernization

      PRIORITY 02

      • TRENDS SUGGEST MODERNIZATION SUCH AS DIGITAL
        TRANSFORMATION TO THE CLOUD, OPERATIONAL TECHNOLOGY (OT),
        AND THE INTERNET OF THINGS (IOT) IS RISING; ADDRESSING THE RISK
        OF CONVERGING ENVIRONMENTS CAN NO LONGER BE DEFERRED.

      Executive summary

      From computerized milk-handling systems in Wisconsin farms, to automated railway systems in Europe, to Ausgrid's Distribution Network Management System (DNMS) in Australia, to smart cities and beyond; system modernization poses unique challenges to cybersecurity.

      The threats can be safety, such as the trains stopped in Denmark during the last weekend of October 2022 for several hours due to an attack on a third-party IT service provider; economics, such as a cream cheese production shutdown that occurred at the peak of cream cheese demand in October 2021 due to hackers compromising a large cheese manufacturer's plants and distribution centers; and reliability, such as the significant loss of communication for the Ukrainian military, which relied on Viasat's services.

      Despite all the cybersecurity risks, organizations continue modernization plans due to the long-term overall benefits.

      Current situation

      • Pressure of operational excellence: Competitive markets cannot keep pace with demand without modernization. For example, in automated milking systems, the labor time saved from milking can be used to focus on other essential tasks such as the decision-making process.
      • Technology offerings: Technologies are available and affordable such as automated equipment, versatile communication systems, high-performance human machine interaction (HMI), IIoT/Edge integration, and big data analytics.
      • Higher risks of cyberattacks: Modernization enlarges attack surfaces, which are not only cyber but also physical systems. Most incidents indicate that attackers gained access through the IT network, which was followed by infiltration into OT networks.

      IIoT market size is USD 323.62 billion in 2022 and projected to be around USD 1 trillion in 2028.

      Source: Statista,
      March 2022

      Modernization brings new opportunities and new threats

      Higher risks of cyberattacks on Industrial Control System (ICS)

      Target: Australian sewage plant.

      Method: Insider attack. Impact: 265,000 gallons of untreated sewage released.

      Target: Middle East energy companies.

      Method: Shamoon.

      Impact: Overwritten Windows-based systems files.

      Target: German Steel Mill

      Method: Spear-phishing

      Impact: Blast furnace control shutdown failure.

      Target: Middle East Safety Instrumented System (SIS).

      Method: TRISIS/TRITON.

      Impact: Modified safety system ladder logic.

      Target: Viasat's KA-SAT Network.

      Method: AcidRain.

      Impact: Significant loss of communication for the Ukrainian military, which relied on Viasat's services.

      A timeline displaying the years 1903; 2000; 2010; 2012; 2013; 2014; 2018; 2019; 2021; 2022 is displayed.

      Target: Marconi wireless telegraphs presentation. Method: Morse code.

      Impact: Fake message sent "Rats, rats, rats, rats. There was a young fellow of Italy, Who diddled the public quite prettily."

      Target: Iranian uranium enrichment plant.

      Method: Stuxnet.

      Impact: Compromised programmable logic controllers (PLCs).

      Target: ICS supply chain.

      Method: Havex.

      Impact: Remote Access Trojan (RAT) collected information and uploaded data to command-and-control (C&C) servers.

      Target: Ukraine power grid.

      Method: BlackEnergy.

      Impact: Manipulation of HMI View causing 1-6 hour power outages for 230,000 consumers.

      Target: Colonial Pipeline.

      Method: DarkSide ransomware.

      Impact: Compromised billing infrastructure halted the pipeline operation.

      Sources:

      • DOE, 2018
      • CSIS, 2022
      • MIT Technology Review, 2022

      Info-Tech Insight

      Most OT incidents start with attacks against IT networks and then move laterally into the OT environment. Therefore, converging IT and OT security will help protect the entire organization.

      Use this template to explain the priorities you need your stakeholders to know about.

      Secure organization modernization

      Provide a brief value statement for the initiative.

      The systems (OT, IT, IIoT) are evolving now – ensure your security plan has you covered.

      Initiative Description:

      • Description must include what organization will undertake to complete the initiative.
      • Identify the drivers to align with your organization's business objectives.
      • Build your case by leveraging a cost-benefit analysis and update your security strategy.
      • Identify people, process, and technology gaps that hinder the modernization security strategy.
      • Use the identified skill gaps to update risks, policies and procedures, IR, DR, and BCP.
      • Evaluate and enable modernization technology top focus areas and refine security processes.
      • Decide whether to train, hire, contract, or outsource to fill the security workforce gap.

      Drivers:

      List initiative drivers.

      • Pressure of operational excellence
      • Technology offerings
      • Higher risks of cyberattacks

      Risks:

      List initiative risks and impacts.

      • Complex systems with many components to implement and manage require diligent change management.
      • Organizational and cultural changes cause friction between humans and machines.
      • Increased attack surface of cyber and physical systems.

      Benefits:

      List initiative benefits and align to business benefits or benefits for the stakeholder groups that it impacts.

      • Improve service reliability through continuous and real-time operation.
      • Enhance efficiency through operations visibility and transparency.
      • Gain cost savings and efficiency to automate operations of complex and large equipment and instrumentations.

      Related Info-Tech Research:

      Recommended Actions

      1. Identify modernization business cases to secure

      Identify the drivers to align with your organization's business objectives.

      Build your case by leveraging a cost-benefit analysis, and update your security strategy.

      2. Identify gaps

      Identify people, process, and technology gaps that hinder the modernization
      security strategy.

      Use the identified skill gaps to update risks, policies and procedures, IR, DR, and BCP.

      3. Decide whether to build or buy capabilities

      Evaluate and enable modernization technology top focus areas and refine
      security processes.

      Decide whether to train, hire, contract, or outsource to fill the security workforce gap.

      Sources:

      Industrial Control System (ICS) Modernization: Unlock the Value of Automation in Utilities, Info-Tech

      Secure IT-OT Convergence, Info-Tech

      Develop a cost-benefit analysis

      Identify a modernization business case for security.

      Benefits

      Metrics

      Operational Efficiency and Cost Savings

      • Reduction in truck rolls and staff time of manual operations of equipment or instrumentation.
      • Cost reduction in energy usage such as substation power voltage level or water treatment chemical level.

      Improve Reliability and Resilience

      • Reduction in field crew time to identify the outage locations by remotely accessing field equipment to narrow down the
        fault areas.
      • Reduction in outage time impacting customers and avoiding financial penalty in service quality metrics.
      • Improve operating reliability through continuous and real-time trend analysis of equipment performance.

      Energy & Capacity Savings

      • Optimize energy usage of operation to reduce overall operating cost and contribution to organizational net-zero targets.

      Customers & Society Benefits

      • Improve customer safety for essential services such as drinkable water consumption.
      • Improve reliability of services and address service equity issues based on data.

      Cost

      Metrics

      Equipment and Infrastructure

      Upgrade existing security equipment or instrumentation or deploy new, e.g. IPS on Enterprise DMZ and Operations DMZ.

      Implement communication network equipment and labor to install and configure.

      Upgrade or construct server room including cooling/heating, power backup, and server and rack hardware.

      Software and Commission

      The SCADA/HMI software and maintenance fee as well as lifecycle upgrade implementation project cost.

      Labor cost of field commissioning and troubleshooting.

      Integration with security systems, e.g. log management and continuous monitoring.

      Support and Resources

      Cost to hire/outsource security FTEs for ongoing managing and operating security devices, e.g. SOC.

      Cost to hire/outsource IT/OT FTEs to support and troubleshoot systems and its integrations with security systems, e.g. MSSP.

      An example of a cost-benefit analysis for ICS modernization

      Sources:

      Industrial Control System (ICS) Modernization: Unlock the Value of Automation in Utilities, Info-Tech

      Lawrence Berkeley National Laboratory, 2021

      IT-OT convergence demands new security approach and solutions

      Identify gaps

      Attack Vectors

      IT

      • User's compromised credentials
      • User's access device, e.g. laptop, smartphone
      • Access method, e.g. denial-of-service to modem, session hijacking, bad data injection

      OT

      • Site operations, e.g. SCADA server, engineering workstation, historian
      • Controls, e.g. SCADA Client, HMI, PLCs, RTUs
      • Process devices, e.g. sensors, actuators, field devices

      Defense Strategies

      • Limit exposure of system information
      • Identify and secure remote access points
      • Restrict tools and scripts
      • Conduct regular security audits
      • Implement a dynamic network environment

      (Control System Defense: Know the Opponent, CISA)

      An example of a high-level architecture of an electric utility's control system and its interaction with IT systems.

      An example of a high-level architecture of an electric utility's control system and its interaction with IT systems.

      Source: ISA-99, 2007

      RESPOND TO REGULATORY CHANGES

      PRIORITY 03

      • GOVERNMENT-ENACTED POLICY CHANGES AND INDUSTRY REGULATORY CHANGES COULD BE A COMPLIANCE BURDEN … OR PREVENT YOUR NEXT SECURITY INCIDENT.

      Executive summary

      Background

      Government-enacted regulatory changes are occurring at an ever-increasing rate these days. As one example, on November 10, 2022, the EU Parliament introduced two EU cybersecurity laws: the Network and Information Security (NIS2) Directive (applicable to organizations located within the EU and organizations outside the EU that are essential within an EU country) and the Digital Operational Resilience Act (DORA). There are also industry regulatory changes such as PCI DSS v4.0 for the payment sector and the North American Electric Reliability Corporation Critical Infrastructure Protection (NERC CIP) for Bulk Electric Systems (BES).

      Organizations should use regulatory changes as a means to improve security practices, instead of treating them as a compliance burden. As said by lead member of EU Parliament Bart Groothuis on NIS2, "This European directive is going to help around 160,000 entities tighten their grip on security […] It will also enable information sharing with the private sector and partners around the world. If we are being attacked on an industrial scale, we need to respond on an industrial scale."

      Current situation

      Stricter requirements and reporting: Regulations such as NIS2 include provisions for incident response, supply chain security, and encryption and vulnerability disclosure and set tighter cybersecurity obligations for risk management reporting obligations.

      Broader sectors: For example, the original NIS directive covers 19 sectors such as Healthcare, Digital Infrastructure, Transport, and Energy. Meanwhile, the new NIS2 directive increases to 35 sectors by adding other sectors such as providers of public electronic communications networks or services, manufacturing of certain critical products (e.g. pharmaceuticals), food, and digital services.

      High sanctions for violations: For example, Digital Services Act (DSA) includes fines of up to 6% of global turnover and a ban on operating in the EU single market in case of repeated serious breaches.

      Approximately 100 cross-border data flow regulations exist in 2022.

      Source: McKinsey, 2022

      Stricter requirements for payments

      Obligation changes to keep up with emerging threats and technologies

      64 New requirements were added
      A total of 64 requirements have been added to version 4.0 of the PCI DSS.

      13 New requirements become effective March 31, 2024
      The other 51 new requirements are considered best practice until March 31, 2025, at which point they will become effective.

      11 New requirements only for service providers
      11 of the new requirements are applicable only to entities that provide third-party services to merchants.

      Defined roles must be assigned for requirements.

      Focus on periodically assessing and documenting scope.

      Entities may choose a defined approach or a customized approach to requirements.

      An example of new requirements for PCI DSS v4.0

      Source: Prepare for PCI DSS v4.0, Info-Tech

      Use this template to explain the priorities you need your stakeholders to know about.

      Respond to regulatory changes

      Provide a brief value statement for the initiative.

      The compliance obligations are evolving – ensure your security plan has you covered.

      Initiative Description:

      Description must include what organization will undertake to complete the initiative.

      • Identify relevant security and privacy compliance and conformance levels.
      • Identify gaps for updated obligations, and map obligations into control framework.
      • Review, update, and implement policies and strategy.
      • Develop compliance exception process and forms.
      • Develop test scripts.
      • Track status and exceptions

      Drivers:

      List initiative drivers.

      • Pressure of new regulations
      • Governance, risk & compliance (GRC) tool offerings
      • High administrative or criminal penalties of non-compliance

      Risks:

      List initiative risks and impacts.

      • Complex structures and a great number of compliance requirements
      • Restricted budget and lack of skilled workforce for organizations such as local municipalities and small or medium organizations compared to private counterparts
      • Personal liability for some regulations for non-compliance

      Benefits:

      List initiative benefits and align to business benefits or benefits for the stakeholder groups that it impacts.

      • Reduces compliance risk.
      • Reduces complexity within the control environment by using a single framework to align multiple compliance regimes.
      • Reduces costs and efforts related to managing IT audits through planning and preparation.

      Related Info-Tech Research:

      Recommended Actions

      1. Identify compliance obligations

      Identify relevant security and privacy obligations and conformance levels.

      Identify gaps for updated obligations, and map obligations into control framework.

      2. Implement compliance strategy

      Review, update, and implement policies and strategy.

      Develop compliance exception process.

      3. Track and report

      Develop test scripts to check your remediations to ensure they are effective.

      Track and report status and exceptions.

      Sources: Build a Security Compliance Program and Prepare for PCI DSS v4.0, Info-Tech

      Identify relevant security and privacy compliance obligations

      Identify obligations

      # Security Jurisdiction
      1 Network and Information Security (NIS2) Directive European Union (EU) and organizations outside the EU that are essential within an EU country
      2 North American Electric Reliability Corporation (NERC) Critical Infrastructure Protection (CIP) North American electrical utilities
      3 Executive Order (EO) 14028: Improving the Nation's Cybersecurity, The White House, 2021 United States

      #

      Privacy Jurisdiction
      1 General Data Protection Regulation (GDPR) EU and EU citizens
      2 Personal Information Protection and Electronic Documents Act (PIPEDA) Canada
      3 California Consumer Privacy Act (CCPA) California, USA
      4 Personal Information Protection Law of the People’s Republic of China (PIPL) China

      An example of security and privacy compliance obligations

      How much does it cost to become compliant?

      • It is important to understand the various frameworks and to adhere to the appropriate compliance obligations.
      • Many factors influence the cost of compliance, such as the size of organization, the size of network, and current security readiness.
      • To manage compliance obligations, it is important to use a platform that not only performs internal and external monitoring but also provides third-party vendors (if applicable) with visibility into potential threats in their organization.

      Adopt Next-Generation Cybersecurity Technologies

      PRIORITY 04

      • GOVERNMENTS AND HACKERS ARE RECOGNIZING THE IMPORTANCE OF EMERGING TECHNOLOGIES, SUCH AS ZERO TRUST ARCHITECTURE AND AI-BASED CYBERSECURITY. SO SHOULD YOUR ORGANIZATION.

      Executive summary

      Background

      The cat and mouse game between threat actors and defenders is continuing. The looming question "can defenders do better?" has been answered with rapid development of technology. This includes the automation of threat analysis (signature-based, specification-based, anomaly-based, flow-based, content-based, sandboxing) not only on IT but also on other relevant environments, e.g. IoT, IIoT, and OT based on AI/ML.

      More fundamental approaches such as post-quantum cryptography and zero trust (ZT) are also emerging.
      ZT is a principle, a model, and also an architecture focused on resource protection by always verifying transactions using the least privilege principle. Hopefully in 2023, ZT will be more practical and not just a vendor marketing buzzword.

      Next-gen cybersecurity technologies alone are not a silver bullet. A combination of skilled talent, useful data, and best practices will give a competitive advantage. The key concepts are explainable, transparent, and trustworthy. Furthermore, regulation often faces challenges to keep up with next-gen cybersecurity technologies, especially with the implications and risks of adoption, which may not always be explicit.

      Current situation

      ZT: Performing an accurate assessment of readiness and benefits to adopt ZT can be difficult due to ZT's many components. Thus, an organization needs to develop a ZT roadmap that aligns with organizational goals and focuses on access to data, assets, applications, and services; don't select solutions or vendors too early.

      Post-quantum cryptography: Current cryptographic applications, such as RSA for PKI, rely on factorization. However, algorithms such as Shor's show quantum speedup for factorization, which can break current crypto when sufficient quantum computing devices are available. Thus, threat actors can intercept current encrypted information and store it to decrypt in the future.

      AI-based threat management: AI helps in analyzing and correlating data extremely fast compared to humans. Millions of telemetries, malware samples, raw events, and vulnerability data feed into the AI system, which humans cannot process manually. Furthermore, AI does not get tired in processing this big data, thus avoiding human error and negligence.

      Data breach mitigation cost without AI: USD 6.20 million; and with AI: USD 3.15 million

      Source: IBM, 2022

      Traditional security is not working

      Alert Fatigue

      Too many false alarms and too many events to process. Evolving threat landscapes waste your analysts' valuable time on mundane tasks, such as evidence collection. Meanwhile, only limited time is spared for decisions and conclusions, which results in the fear of missing an incident and alert fatigue.

      Lack of Insight

      To report progress, clear metrics are needed. However, cybersecurity still lacks in this area as the system itself is complex and some systems work in silos. Furthermore, lessons learned are not yet distilled into insights for improving future accuracy.

      Lack of Visibility

      System integration is required to create consistent workflows across the organization and to ensure complete visibility of the threat landscape, risks, and assets. Also, the convergence of OT, IoT, and IT enhances this challenge.

      Source: IBM Security Intelligence, 2020

      A business case for AI-based cybersecurity

      Threat management

      Prevention

      Risk scores are generated by machine learning based on variables such as behavioral patterns and geolocation. Zero trust architecture is combined with machine learning. Asset management leverages visibility using machine learning. Comply with regulations by improving discovery, classification, and protection of data using machine learning. Data security and data privacy services use machine learning for data discovery.

      Detection

      AI, advanced machine learning, and static approaches, such as code file analysis, combine to automatically detect and analyze threats and prevent threats from spreading, assisted by threat intelligence.

      Response

      AI helps in orchestrating security technologies for organizations to reduce the number of security agents installed, which may not talk to each other or, worse, may conflict with each other.

      Recovery

      AI continuously tunes based on lessons learned, such as creating security policies for improving future accuracy. AI also does not get fatigue, and it assists humans in a faster recovery.

      Prevention; Detection; Response; Recovery

      AI has been around since the 1940s, but why is it only gaining traction now? Because supporting technologies are only now available, including faster GPUs for complex computations and cheaper storage for massive volumes of data.

      Use this template to explain the priorities you need your stakeholders to know about.

      Adopt next-gen cybersecurity technologies

      Use this template to explain the priorities you need your stakeholders to know about.

      Develop a practical roadmap that shows the business value of next-gen cybersecurity technologies investment.

      Initiative Description:

      Description must include what organization will undertake to complete the initiative.

      • Identify the stakeholders who will be affected by the next-gen cybersecurity technologies implementation and define responsibilities based on skillsets and the degree of support.
      • Adopt well-established data governance practices for cross-functional teams.
      • Conduct a maturity assessment of key processes and highlight interdependencies.
      • Develop a baseline and periodically review risks, policies and procedures, and business plan.
      • Develop a roadmap and deploy next-gen cybersecurity architecture and controls step by step, working with trusted technology partners.
      • Monitor metrics on effectiveness and efficiency.

      Drivers:

      List initiative drivers.

      • Pressure of attacks by sophisticated threat actors
      • Next-gen cybersecurity technologies tool offerings
      • High cost of traditional security, e.g. longer breach lifecycle

      Risks:

      List initiative risks and impacts.

      • Lack of transparency of the model or bias, leading to non-compliance with policies/regulations
      • Risks related with data quality and inadequate data for model training
      • Adversarial attacks, including, but not limited to, adversarial input and model extraction

      Benefits:

      List initiative benefits and align to business benefits or benefits for the stakeholder groups that it impacts.

      • Reduces the number of alerts, thus reduces alert fatigue.
      • Increases the identification of unknown threats.
      • Leads to faster detection and response.
      • Closes skills gap and increases productivity.

      Related Info-Tech Research:

      Recommended Actions

      1. People

      Identify the stakeholders who will be affected by the next-gen cybersecurity technologies implementation and define responsibilities based on skillsets and the degree of support.

      Adopt well-established data governance practices for cross-functional teams.

      2. Process

      Conduct a maturity assessment of key processes and highlight interdependencies.

      Develop a baseline and periodically review risks, policies and procedures, and business plan.

      3. Technology

      Develop a roadmap and deploy next-gen cybersecurity architecture and controls step by step, working with trusted technology partners.

      Monitor metrics on effectiveness and efficiency.

      Source: Leverage AI in Threat Management (keynote presentation), Info-Tech

      Secure Services and Applications

      PRIORITY 05

      • APIS ARE STILL THE #1 THREAT TO APPLICATION SECURITY.

      Executive summary

      Background

      Software is usually produced as part of a supply chain instead of in silos. A vulnerability in any part of the supply chain can become a threat surface. We have learned this from recent incidents such as Log4j, SolarWinds, and Kaseya where attackers compromised a Virtual System Administrator tool used by managed service providers to attack around 1,500 organizations.

      DevSecOps is a culture and philosophy that unifies development, security, and operations to answer this challenge. DevSecOps shifts security left by automating, as much as possible, development and testing. DevSecOps provides many benefits such as rapid development of secure software and assurance that, prior to formal release and delivery, tests are reliably performed and passed.

      DevSecOps practices can apply to IT, OT, IoT, and other technology environments, for example, by integrating a Secure Software Development Framework (SSDF).

      Current situation

      Secure Software Supply Chain: Logging is a fundamental feature of most software, and recently the use of software components, especially open source, are based on trust. From the Log4j incident we learned that more could be done to improve the supply chain by adopting ZT to identify related components and data flows between systems and to apply the least privilege principle.

      DevSecOps: A software error wiped out wireless services for thousands of Rogers customers across Canada in 2021. Emergency services were also impacted, even though outgoing 911 calls were always accessible. Losing such services could have been avoided, if tests were reliably performed and passed prior to release.

      OT insecure-by-design: In OT, insecurity-by-design is still a norm, which causes many vulnerabilities such as insecure protocols implementation, weak authentication schemes, or insecure firmware updates. Additional challenges are the lack of CVEs or CVE duplication, the lack of Software Bill of Materials (SBOM), and product supply chains issues such as vulnerable products that are certified because of the scoping limitation and emphasis on functional testing.

      Technical causes of cybersecurity incidents in EU critical service providers in 2019-2021 shows: software bug (12%) and faulty software changes/update (9%).

      Source: CIRAS Incident reporting, ENISA (N=1,239)

      Software development keeps evolving

      DOD Maturation of Software Development Best Practices

      Best Practices 30 Years Ago 15 Years Ago Present Day
      Lifecycle Years or Months Months or Weeks Weeks or Days
      Development Process Waterfall Agile DevSecOps
      Architecture Monolithic N-Tier Microservices
      Deployment & Packaging Physical Virtual Container
      Hosting Infrastructure Server Data Center Cloud
      Cybersecurity Posture Firewall + SIEM + Zero Trust

      Best practices in software development are evolving as shown on the diagram to the left. For example, 30 years ago the lifecycle was "Years or Months," while in the present day it is "Weeks or Days."

      These changes also impact security such as the software architecture, which is no longer "Monolithic" but "Microservices" normally built within the supply chain.

      The software supply chain has known integrity attacks that can happen on each part of it. Starting from bad code submitted by a developer, to compromised source control platform (e.g. PHP git server compromised), to compromised build platform (e.g. malicious behavior injected on SolarWinds build), to a compromised package repository where users are deceived into using the bad package by the similarity between the malicious and the original package name.

      Therefore, we must secure each part of the link to avoid attacks on the weakest link.

      Software supply chain guidance

      Secure each part of the link to avoid attacks on the weakest link.

      Guide for Developers

      Guide for Suppliers

      Guide for Customers

      Secure product criteria and management, develop secure code, verify third-party components, harden build environment, and deliver code.

      Define criteria for software security checks, protect software, produce well-secured software, and respond to vulnerabilities.

      Secure procurement and acquisition, secure deployment, and secure software operations.

      Source: "Securing the Software Supply Chain" series, Enduring Security Framework (ESF), 2022

      "Most software today relies on one or more third-party components, yet organizations often have little or no visibility into and understanding of how these software components are developed, integrated, and deployed, as well as the practices used to ensure the components' security."

      Source: NIST – NCCoE, 2022

      Use this template to explain the priorities you need your stakeholders to know about.

      Secure services and applications

      Provide a brief value statement for the initiative.

      Adopt recommended practices for securing the software supply chain.

      Initiative Description:

      Description must include what organization will undertake to complete the initiative.

      • Define and keep security requirements and risk assessments up to date.
      • Require visibility into provenance of product, and require suppliers' self-attestation of security hygiene.
      • Verify distribution infrastructure, product and individual components integrity, and SBOM.
      • Use multi-layered defenses, e.g. ZT for integration and control configuration.
      • Train users on how to detect and report anomalies and when to apply updates to a system.
      • Ensure updates from authorized and authenticated sources and verify the integrity of the updated SBOM.

      Drivers:

      List initiative drivers.

      • Cyberattacks exploit the vulnerabilities of weak software supply chain
      • Increased need to enhance software supply chain security, e.g. under the White House Executive Order (EO) 14028
      • OT insecure-by-design hinders OT modernization

      Risks:

      List initiative risks and impacts.

      Only a few developers and suppliers explicitly address software security in detail.

      Time pressure to deliver functionality over security.

      Lack of security awareness and lack of trained workforce.

      Benefits:

      List initiative benefits and align to business benefits or benefits for the stakeholder groups that it impacts.

      Customers (acquiring organizations) achieve secure acquisition, deployment, and operation of software.

      Developers and suppliers provide software security with minimal vulnerabilities in its releases.

      Automated processes such as automated testing avoid error-prone and labor-intensive manual test cases.

      Related Info-Tech Research:

      Recommended Actions

      1. Procurement and Acquisition

      Define and keep security requirements and risk assessments up to date.

      Perform analysis on current market and supplier solutions and acquire security evaluation.

      Require visibility into provenance of product, and require suppliers' self-attestation of security hygiene

      2. Deployment

      Verify distribution infrastructure, product and individual components integrity, and SBOM.

      Save and store the tests and test environment and review and verify the
      self-attestation mechanism.

      Use multi-layered defenses, e.g. ZT for integration and control configuration.

      3. Software Operations

      Train users on how to detect and report anomalies and when to apply updates to a system.

      Ensure updates from authorized and authenticated sources and verify the integrity of the updated SBOM.

      Apply supply chain risk management (SCRM) operations.

      Source: "Securing the Software Supply Chain" series, Enduring Security Framework (ESF), 2022

      Bibliography

      Aksoy, Cevat Giray, Jose Maria Barrero, Nicholas Bloom, Steven J. Davis, Mathias Dolls, and Pablo Zarate. "Working from Home Around the World." Brookings Papers on Economic Activity, 2022.
      Barrero, Jose Maria, Nicholas Bloom, and Steven J. Davis. "Why working from home will stick." WFH Research, National Bureau of Economic Research, Working Paper 28731, 2021.
      Boehm, Jim, Dennis Dias, Charlie Lewis, Kathleen Li, and Daniel Wallance. "Cybersecurity trends: Looking over the horizon." McKinsey & Company, March 2022. Accessed
      31 Oct. 2022.
      "China: TC260 issues list of national standards supporting implementation of PIPL." OneTrust, 8 Nov. 2022. Accessed 17 Nov. 2022.
      Chmielewski, Stéphane. "What is the potential of artificial intelligence to improve cybersecurity posture?" before.ai blog, 7 Aug. 2022. Accessed 15 Aug. 2022.
      Conerly, Bill. "The Recession Will Begin Late 2023 Or Early 2024." Forbes, 1 Nov. 2022. Accessed 8 Nov. 2022.
      "Control System Defense: Know the Opponent." CISA, 22 Sep. 2022. Accessed 17 Nov. 2022.
      "Cost of a Data Breach Report 2022." IBM, 2022.
      "Cybersecurity: Parliament adopts new law to strengthen EU-wide resilience." European Parliament News, 10 Nov. 2022. Press Release.
      "Cyber Security in Critical National Infrastructure Organisations: 2022." Bridewell, 2022. Accessed 7 Nov. 2022.
      Davis, Steven. "The Big Shift to Working from Home." NBER Macro Annual Session On
      "The Future of Work," 1 April 2022.
      "Digital Services Act: EU's landmark rules for online platforms enter into force."
      EU Commission, 16 Nov. 2022. Accessed 16 Nov. 2022.
      "DoD Enterprise DevSecOps Fundamentals." DoD CIO, 12 May 2022. Accessed 21 Nov. 2022.
      Elkin, Elizabeth, and Deena Shanker. "That Cream Cheese Shortage You Heard About? Cyberattacks Played a Part." Bloomberg, 09 Dec. 2021. Accessed 27 Oct. 2022.
      Evan, Pete. "What happened at Rogers? Day-long outage is over, but questions remain." CBC News, 21 April 2022. Accessed 15 Nov. 2022.
      "Fewer Ransomware Victims Pay, as Median Ransom Falls in Q2 2022." Coveware,
      28 July 2022. Accessed 18 Nov. 2022.
      "Fighting cybercrime: new EU cybersecurity laws explained." EU Commission, 10 Nov. 2022. Accessed 16 Nov. 2022.
      "Guide to PCI compliance cost." Vanta. Accessed 18 Nov. 2022.
      Hammond, Susannah, and Mike Cowan. "Cost of Compliance 2022: Competing priorities." Thomson Reuters, 2022. Accessed 18 Nov. 2022.
      Hemsley, Kevin, and Ronald Fisher. "History of Industrial Control System Cyber Incidents." Department of Energy (DOE), 2018. Accessed 29 Aug. 2022.
      Hofmann, Sarah. "What Is The NIS2 And How Will It Impact Your Organisation?" CyberPilot,
      5 Aug. 2022. Accessed 16 Nov. 2022.
      "Incident reporting." CIRAS Incident Reporting, ENISA. Accessed 21 Nov. 2022.
      "Introducing SLSA, an End-to-End Framework for Supply Chain Integrity." Google,
      16 June 2021. Accessed 25 Nov. 2022.
      Kovacs, Eduard. "Trains Vulnerable to Hacker Attacks: Researchers." SecurityWeek, 29 Dec. 2015. Accessed 15 Nov. 2022.
      "Labour Force Survey, October 2022." Statistics Canada, 4 Nov. 2022. Accessed 7 Nov. 2022.
      Malacco, Victor. "Promises and potential of automated milking systems." Michigan State University Extension, 28 Feb. 2022. Accessed 15 Nov. 2022.
      Maxim, Merritt, et al. "Planning Guide 2023: Security & Risk." Forrester, 23 Aug. 2022. Accessed 31 Oct. 2022.
      "National Cyber Threat Assessment 2023-2024." Canadian Centre for Cyber Security, 2022. Accessed 18 Nov. 2022.
      Nicaise, Vincent. "EU NIS2 Directive: what's changing?" Stormshield, 20 Oct. 2022. Accessed
      17 Nov. 2022.
      O'Neill, Patrick. "Russia hacked an American satellite company one hour before the Ukraine invasion." MIT Technology Review, 10 May 2022. Accessed 26 Aug. 2022.
      "OT ICEFALL: The legacy of 'insecure by design' and its implications for certifications and risk management." Forescout, 2022. Accessed 21 Nov. 2022.
      Palmer, Danny. "Your cybersecurity staff are burned out - and many have thought about quitting." ZDNet, 8 Aug. 2022. Accessed 19 Aug. 2022.
      Placek, Martin. "Industrial Internet of Things (IIoT) market size worldwide from 2020 to 2028 (in billion U.S. dollars)." Statista, 14 March 2022. Accessed 15 Nov. 2022.
      "Revised Proposal Attachment 5.13.N.1 ADMS Business Case PUBLIC." Ausgrid, Jan. 2019. Accessed 15 Nov. 2022.
      Richter, Felix. "Cloudy With a Chance of Recession." Statista, 6 April 2022. Web.
      "Securing the Software Supply Chain: Recommended Practices Guide for Developers." Enduring Security Framework (ESF), Aug. 2022. Accessed 22 Sep. 2022.
      "Securing the Software Supply Chain: Recommended Practices Guide for Suppliers." Enduring Security Framework (ESF), Sep. 2022. Accessed 21 Nov. 2022.
      "Securing the Software Supply Chain: Recommended Practices Guide for Customers." Enduring Security Framework (ESF), Oct. 2022. Accessed 21 Nov. 2022.
      "Security Guidelines for the Electricity Sector: Control System Electronic Connectivity."
      North American Electric Reliability Corporation (NERC), 28 Oct. 2013. Accessed 25 Nov. 2022.
      Shepel, Jan. "Schreiber Foods hit with cyberattack; plants closed." Wisconsin State Farmer,
      26 Oct. 2022. Accessed 15 Nov. 2022.
      "Significant Cyber Incidents." Center for Strategic and International Studies (CSIS). Accessed
      1 Sep. 2022.
      Souppaya, Murugiah, Michael Ogata, Paul Watrobski, and Karen Scarfone. "Software Supply Chain and DevOps Security Practices: Implementing a Risk-Based Approach to DevSecOps." NIST - National Cybersecurity Center of Excellence (NCCoE), Nov. 2022. Accessed
      22 Nov. 2022.
      "Ten Things Will Change Cybersecurity in 2023." SOCRadar, 23 Sep. 2022. Accessed
      31 Oct. 2022.
      "The Nature of Cybersecurity Defense: Pentagon To Reveal Updated Zero-Trust Cybersecurity Strategy & Guidelines." Cybersecurity Insiders. Accessed 21 Nov. 2022.
      What Is Threat Management? Common Challenges and Best Practices." IBM Security Intelligence, 2020.
      Woolf, Tim, et al. "Benefit-Cost Analysis for Utility-Facing Grid Modernization Investments: Trends, Challenges, and Considerations." Lawrence Berkeley National Laboratory, Feb. 2021. Accessed 15 Nov. 2022.
      Violino, Bob. "5 key considerations for your 2023 cybersecurity budget planning." CSO Online,
      14 July 2022. Accessed 27 Oct. 2022

      Research Contributors and Experts

      Andrew Reese
      Cybersecurity Practice Lead
      Zones

      Ashok Rutthan
      Chief Information Security Officer (CISO)
      Massmart

      Chris Weedall
      Chief Information Security Officer (CISO)
      Cheshire East Council

      Jeff Kramer
      EVP Digital Transformation and Cybersecurity
      Aprio

      Kris Arthur
      Chief Information Security Officer (CISO)
      SEKO Logistics

      Mike Toland
      Chief Information Security Officer (CISO)
      Mutual Benefit Group

      Transform Your Field Technical Support Services

      • Buy Link or Shortcode: {j2store}112|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Strategy and Organizational Design
      • Parent Category Link: /strategy-and-organizational-design
      • Redefine the role of deskside or field technicians as demand for service evolves and service teams are restructured.
      • Redefine the role of onsite technicians when the help desk is outsourced.
      • Define requirements when supplementing with outsourced field services teams.
      • Identify barriers to streamlining processes.
      • Look for opportunities to streamline processes and better use technical teams.
      • Communicate and manage change to support roles.

      Our Advice

      Critical Insight

      • Service needs to be defined in a way that considers the organizational need for local, hands-on technicians, the need for customer service, and the need to make the best use of resources that you have.
      • Service level agreements will need to be refined and metrics will need to be analyzed for capacity and skilled planning.
      • Organizational change management will be key to persuade users to engage with the technical team in a way that supports the new structure.

      Impact and Result

      • Many IT teams are struggling to keep up with demand while trying to refocus on customer service. With more remote workers than ever, organizations who have traditionally provided desktop and field services have been revaluating the role of the field service technicians. Add in the price of fuel, and there is even more reason to assess the support model.
      • Often changes to the way IT does support, especially if moving centralized support to an outsourcer, is met with resistance by end users who don’t see the value of phoning someone else when their local technician is still available to problem solve. This speaks to the need to ensure the central group is providing value to end users as well as the technical team.
      • With the challenges of finding the right number of technicians with the right skills, it’s time to rethink remote support and how that can be used to train and upskill the people you have. And it’s time to think about how to use field services tools to make the best use of your technician’s time.

      Transform Your Field Technical Support Services Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Transform Field Services Guide – A brief deck that outlines key migration steps to improve our remote client support services.

      This blueprint will help you:

      • Transform Your Field Technical Services Storyboard

      2. Transform Field Services Template – A template to create a transformation proposal.

      This template will help you to build your proposal to transform your field services.

      • Proposal to Transform Field Technical Services Template
      [infographic]

      Further reading

      Transform Your Field Technical Support Services

      Improve service and reduce costs through digital transformation.

      Analyst Perspective

      Improve staffing challenges through digital transformation.

      Many IT teams are struggling to keep up with demand while trying to refocus on customer service. With more remote workers than ever, organizations who have traditionally provided desktop and field services have been revaluating the role of the field service technicians. Add in the price of fuel, and there is even more reason to assess the support model. Often changes to the way IT does support, especially if moving centralized support to an outsourcer, is met with resistance by end users who don’t see the value of phoning someone else when their local technician is still available to problem solve. This speaks to the need to ensure the central group is providing value to end users as well as the technical team. With the challenges of finding the right number of technicians with the right skills, it’s time to rethink remote support and how that can be used to train and upskill the people you have. And it’s time to think about how to use field services tools to make the best use of your technician’s time.

      The image contains a picture of Sandi Conrad.

      Sandi Conrad

      Principal Research Director

      Infrastructure & Operations Practice

      Info-Tech Research Group

      Executive Summary

      Your Challenge

      With remote work becoming a normal employee offering for many organizations, self-serve/self-solve becoming more prominent, and a common call out to improve customer service, there is a need to re-examine the way many organizations are supplying onsite support. For organizations with a small number of offices, a central desk with remote tools may be enough or can be combined with a concierge service or technical center, but for organizations with multiple offices it becomes difficult to provide a consistent level of service for all customers unless there is a team onsite for each location. This may not be financially possible if there isn’t enough work to keep a technical team busy full-time.

      Common Obstacles

      Where people have a choice between calling a central phone number or talking to the technician down the hall, the in-person experience often wins out. End users may resist changes to in-person support as work is rerouted to a centralized group by choosing to wait for their favorite technician to show up onsite rather than reporting issues centrally. This can make the job of the onsite technician more challenging as they need to schedule time in every visit for unplanned work. And where technicians need to support multiple locations, travel needs to be calculated into lost technician time and costs.

      Info-Tech’s Approach

      • Service needs to be defined in a way that considers the organizational need for local, hands-on technicians, the need for customer service, and the need to make the best use of resources that you have.
      • Service-level agreements will need to be refined and metrics will need to be analyzed for capacity and skilled planning.
      • Organizational change management will be key to persuade users to engage with the technical team in a way that supports the new structure.

      Info-Tech Insight

      Improving process will be helpful for smaller teams, but as teams expand or work gets more complicated, investment in appropriate tools to support field services technicians will enable them to be more efficient, reduce costs, and improve outcomes when visits are warranted.

      Your challenge

      This research is designed to help organizations who are looking to:

      • Redefine the role of deskside or field technicians as demand for service evolves and service teams are restructured.
      • Redefine the role of onsite technicians when the help desk is outsourced.
      • Define requirements when supplementing with outsourced field services teams.
      • Identify barriers to streamlining processes.
      • Look for opportunities to streamline processes and better use technical teams.
      • Communicate and manage change to support roles.

      With many companies having new work arrangements for users, where remote work may be a permanent offering or if your digital transformation is well underway, this provides an opportunity to rethink how field support needs to be done.

      What is field services?

      Field services is in-person support delivered onsite at one or more locations. Management of field service technicians may include queue management, scheduling service and maintenance requests, triaging incidents, dispatching technicians, ordering parts, tracking job status, and billing.

      The image contains a diagram to demonstrate what may be supported by field services and what should be supported by field services.

      What challenges are you trying to solve within your field services offering?

      Focus on the reasons for the change to ensure the outcome can be met. Common goals include improved customer service, better technician utilization, and increased response time and stability.

      • Discuss specific challenges the team feels are contributing to less-than-ideal customer service.
      • Does the team have the skills, knowledge, and tools they need to be successful? Technicians may be solving issues with the customer looking over their shoulder. Having quick access to knowledge articles or to subject matter experts who can provide deeper expertise remotely may be the difference between a single visit to resolve or multiple or extended visits.
      • What percentage of tickets would benefit from triage and troubleshooting done remotely before sending a technician onsite? Where there are a high number of no-fault-found visits, this may be imperative to improving technician availability.
      • Review method for distribution of tickets, including batching criteria and dispatching of technicians. Are tickets being dispatched efficiently? By location and/or priority? Is there an attempt to solve more tickets centrally? Should there be? What SLA adjustment is reasonable for onsite visits?
      • Has the support value been defined?
      The image contains a graph to demonstrate Case Casuals in Field Services, where the highest at 55% is break/fix.

      Field services will see the biggest improvements through technology updates

      Customer Intake

      Provide tools for scheduling technicians, self-serve and self- or assisted-solve through ITSM or CRM-based portal and visual remote tools.

      The image contains a picture to demonstrate the different field services.

      Triage and Troubleshoot

      Upgrade remote tools to visual remote solutions to troubleshoot equipment as well as software. Eliminate no-fault-found visits and improve first-time fix rate by visually inspecting equipment before technician deployments.

      Improve Communications

      FSM GPS and SMS updates can be set to notify customers when a technician is close by and can be used for customer sign-off to immediately update service records and launch survey or customer billing where applicable.

      Schedule Technicians

      Field service management (FSM) ITSM modules will allow skills-based scheduling for remote technicians and determine best route for multi-site visits.

      Enable Work From Anywhere

      FSM mobile applications can provide technicians with daily schedules, turn-by-turn directions, access to inventory, knowledge articles, maintenance, and warranty and asset records. Visual remote captures service records and enables access to SMEs.

      Manage Expectations

      Know where technicians are for routing to emergency calls and managing workload using field service management solutions with GPS.

      Digital transformation can dramatically improve customer and technician experience

      The image contains an arrown that dips and rises dramatically to demonstrate how digital transformation can dramatically increase customer and technician experience.
      Sources: 1 - TechSee, 2019; 2 - Glartek; 3 - Geoforce; 4 - TechSee, 2020

      Improve technician utilization and scheduling with field services management software

      Field services management (FSM) software is designed to improve scheduling of technicians by skills and location while reducing travel time and mileage. When integrated with ITSM software, the service record is transferred to the field technician for continuity and to prepare for the job. FSM mobile apps will enable technicians to receive schedule updates through the day and through GPS update the dispatcher as technicians move from site to site.

      FSM solutions are designed to manage large teams of technicians, providing automated dispatch recommendations based on skills matching and proximity.

      Routes can be mapped to reduce travel time and mileage and adjusted to respond to emergency requests by technician skills or proximity. Automation will provide suggestions for work allocation.

      Spare parts management may be part of a field services solution, enabling technicians to easily identify parts needed and update real-time inventory as parts are deployed.

      Push notifications in real-time streamline communications from the field to the office, and enable technicians to close service records while in the field.

      Dispatchers can easily view availability, assign work orders, attach notes to work orders, and immediately receive updates if technicians acknowledge or reject a job.

      Maintenance work can be built into online checklists and forms to provide a technician with step-by-step instructions and to ensure a complete review.

      Skills and location-based routing allow dispatchers to be able to see closest tech for emergency deployments.

      Improve time to resolve while cutting costs by using visual remote support tools

      Visual remote support tools enable live video sessions to clearly see what the client or field service technician sees, enabling the experts to provide real-time assistance where the experts will provide guidance to the onsite person. Getting a view of the technology will reduce issues with getting the right parts, tools, and technicians onsite and dramatically reduce second visits.

      Visual remote tools can provide secure connections through any smartphone, with no need for the client to install an application.

      The technicians can take control of the camera to zoom in, turn on the flashlight for extra lighting, take photos, and save video directly to the tickets.

      Optical character recognition allows automatic text capture to streamline process to check warranty, recalls, and asset history.

      Visual, interactive workflows enhance break/fix and inspections, providing step-by-step guidance visual evidence and using AI and augmented reality to assess the images, and can provide next steps by connecting to a visual knowledgebase.

      Integration with field service management tools will allow information to easily be captured and uploaded immediately into the service record.

      Self-serve is available through many of these tools, providing step-by-step instructions using visual cues. These solutions are designed to work in low-bandwidth environments, using Wi-Fi or cellular service, and sessions can be started with a simple link sent through SMS.

      Get the Best Discount Possible With a Data-Driven Negotiation Approach

      • Buy Link or Shortcode: {j2store}610|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Selection & Implementation
      • Parent Category Link: /selection-and-implementation
      • Vendors have well-honed negotiation strategies that don’t prioritize the customer’s best interest, and they will take advantage of your weaknesses to extract as much money as they can from the deal.
      • IT teams are often working with time pressure and limited resources or experience in negotiation. Even those with an experienced procurement team aren’t evenly matched with the vendor when it comes to the ins and outs of the product.
      • As a result, many have a poor negotiation experience and fail to get the discount they wanted, ultimately leading to dissatisfaction with the vendor.

      Our Advice

      Critical Insight

      • Requirements should always come first, but IT leaders are under pressure to get discounts and cost ends up playing a big role in decision making.
      • Cost is one of the top factors influencing satisfaction with software and the decision to leave a vendor.
      • The majority of software customers are receiving a discount. If you’re in the minority who are not, there are strategies you can and should be using to improve your negotiating skills. Discounts of up to 40% off list price are available to those who enter negotiations prepared.

      Impact and Result

      • SoftwareReviews data shows that there are multiple benefits to taking a concerted approach to negotiating a discount on your software.
      • The most common ways of getting a discount (e.g. volume purchasing) aren’t necessarily the best methods. Choose a strategy that is appropriate for your organization and vendor relationship and that focuses on maximizing the value of your investment for the long term. Optimizing usage or licenses as a discount strategy leads to the highest software satisfaction.
      • Using a vendor negotiation service or advisory group was one of the most successful strategies for receiving a discount. If your team doesn’t have the right negotiation expertise, Info-Tech can help.

      Get the Best Discount Possible With a Data-Driven Negotiation Approach Research & Tools

      Prepare to negotiate

      Leverage insights from SoftwareReviews data to best position yourself to receive a discount through your software negotiations.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      • Get the Best Discount Possible with a Data-Driven Negotiation Approach Storyboard
      [infographic]

      Key Metrics for Every CIO

      • Buy Link or Shortcode: {j2store}119|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Performance Measurement
      • Parent Category Link: /performance-measurement
      • As a CIO, you are inundated with data and information about how your IT organization is performing based on the various IT metrics that exist.
      • The information we receive from metrics is often just that – information. Rarely is it used as a tool to drive the organization forward.
      • CIO metrics need to consider the goals of key stakeholders in the organization.

      Our Advice

      Critical Insight

      • The top metrics for CIOs don’t have anything to do with IT.
      • CIOs should measure and monitor metrics that have a direct impact on the business.
      • Be intentional with the metric and number of metrics that you monitor on a regular basis.
      • Be transparent with your stakeholders on what and why you are measuring those specific metrics.

      Impact and Result

      • Measure fewer metrics, but measure those that will have a significant impact on how your deliver value to your organization.
      • Focus on the metrics that you can take action against, rather than simply monitor.
      • Ensure your metrics tie to your top priorities as a CIO.

      Key Metrics for Every CIO Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Key Metrics for Every CIO deck – The top metrics every CIO should measure and act on

      Leverage the top metrics for every CIO to help focus your attention and provide insight into actionable steps.

      • Key Metrics for Every CIO Storyboard
      [infographic]

      Further reading

      Key Metrics for Every CIO

      The top six metrics for CIOs – and they have very little to do with IT

      Analyst Perspective

      Measure with intention

      Be the strategic CIO who monitors the right metrics relevant to their priorities – regardless of industry or organization. When CIOs provide a laundry list of metrics they are consistently measuring and monitoring, it demonstrates a few things.

      First, they are probably measuring more metrics than they truly care about or could action. These “standardized” metrics become something measured out of expectation, not intention; therefore, they lose their meaning and value to you as a CIO. Stop spending time on these metrics you will be unable or unwilling to address.

      Secondly, it indicates a lack of trust in the IT leadership team, who can and should be monitoring these commonplace operational measures. An empowered IT leader will understand the responsibility they have to inform the CIO should a metric be derailing from the desired outcome.

      Photo of Brittany Lutes, Senior Research Analyst, Organizational Transformation Practice, Info-Tech Research Group. Brittany Lutes
      Senior Research Analyst
      Organizational Transformation Practice
      Info-Tech Research Group

      Executive Summary

      Your Challenge

      CIOs need to measure a set of specific metrics that:

      • Will support the organization’s vision, their career, and the IT function all in one.
      • Can be used as a tool to make informed decisions and take appropriate actions that will improve the IT function’s ability to deliver value.
      • Consider the influence of critical stakeholders, especially the end customer.
      • Are easily measured at any point in time.
      Common Obstacles

      CIOs often cannot define these metrics because:

      • We confuse the operational metrics IT leaders need to monitor with strategic metrics CIOs need to monitor.
      • Previously monitored metrics did not deliver value.
      • It is hard to decide on a metric that will prove both insightful and easily measurable.
      • We measure metrics without any method or insight on how to take actionable steps forward.
      Info-Tech’s Approach

      For every CIO, there are six areas that should be a focus, no matter your organization or industry. These six priorities will inform the metrics worth measuring:

      • Risk management
      • Delivering on business objectives
      • Customer satisfaction
      • Employee engagement
      • Business leadership relations
      • Managing to a budget

      Info-Tech Insight

      The top metrics for a CIO to measure and monitor have very little to do with IT and everything to do with ensuring the success of the business.

      Your challenge

      CIOs are not using metrics as a personal tool to advance the organization:
      • Metrics should be used as a tool by the CIO to help inform the future actions that will be taken to reach the organization’s strategic vision.
      • As a CIO, you need to have a defined set of metrics that will support your career, the organization, and the IT function you are accountable for.
      • CIO metrics must consider the most important stakeholders across the entire ecosystem of the organization – especially the end customer.
      • The metrics for a CIO are distinctly different from the metrics you use to measure the operational effectiveness of the different IT functions.
      “CIOs are businesspeople first and technology people second.” (Myles Suer, Source: CIO, 2019.)

      Common obstacles

      These barriers make this challenge difficult to address for many CIOs:
      • CIOs often do not measure metrics because they are not aware of what should or needs to be measured.
      • As a result of not wanting to measure the wrong thing, CIOs can often choose to measure nothing at all.
      • Or they get too focused on the operational metrics of their IT organization, leaving the strategic business metrics forgotten.
      • Moreover, narrowing the number of metrics that are being measured down to an actionable number is very difficult.
      • We rely only on physical data sets to help inform the measurements, not considering the qualitative feedback received.
      CIO priorities are business priorities

      46% of CIOs are transforming operations, focused on customer experiences and employee productivity. (Source: Foundry, 2022.)

      Finances (41.3%) and customers (28.1%) remain the top two focuses for CIOs when measuring IT effectiveness. All other focuses combine for the remaining 30.6%. (Source: Journal of Informational Technology Management, 2018.)

      Info-Tech’s approach

      Organizational goals inform CIO metrics

      Diagram with 'CIO Metrics' at the center surrounded by 'Directive Goals', 'Product/Service Goals', 'IT Goals', and 'Operations Goals', each of which are connected to eachother by 'Customers'.

      The Info-Tech difference:
      1. Every CIO has the same set of priorities regardless of their organization or industry given that these metrics are influenced by similar goals of organizations.
      2. CIO metrics are a tool to help inform the actions that will support each core area in reaching their desired goals.
      3. Be mindful of the goals different business units are using to reach the organization’s strategic vision – this includes your own IT goals.
      4. Directly or indirectly, you will always influence the ability to acquire and retain customers for the organization.

      CIO priorities

      MANAGING TO A BUDGET
      Reducing operational costs and increasing strategic IT spend.
      Table centerpiece for CIO Priorities. DELIVERING ON BUSINESS OBJECTIVES
      Aligning IT initiatives to the vision of the organization.
      CUSTOMER SATISFACTION
      Directly and indirectly impacting customer experience.
      EMPLOYEE ENGAGEMENT
      Creating an IT workforce of engaged and purpose-driven people.
      RISK MANAGEMENT
      Actively knowing and mitigating threats to the organization.
      BUSINESS LEADERSHIP RELATONS
      Establishing a network of influential business leaders.

      High-level process flow

      How do we use the CIO metrics?
      Process flow that starts at 'Consider - Identify and analyze CIO priorities', and is followed by 'Select priorities - Identify the top priorities for CIOs (see previous slide)', 'Create a measure - Determine a measure that aligns to each priority', 'Make changes & improvements - Take action to improve the measure and reach the goal you are trying to achieve', 'Demonstrate progress - Use the metrics to demonstrate progress against priorities'. Using priority-based metrics allows you to make incremental improvements that can be measured and reported on, which makes program maturation a natural process.

      Example CIO dashboard

      Example CIO dashboard.
      * Arrow indicates month-over-month trend

      Harness the value of metric data

      Metrics are rarely used accurately as a tool
      • When you have good metrics, you can:
        • Ensure employees are focused on the priorities of the organization
        • Have insight to make better decisions
        • Communicate with the business using language that resonates with each stakeholder
        • Increase the performance of your IT function
        • Continually adapt to meet changing business demands
      • Metrics are tools that quantifiably indicate whether a goal is on track to being achieved (proactive) or if the goal was successfully achieved (retroactive)
      • This is often reflected through two metric types:
        • Leading Metrics: The metric indicates if there are actions that should be taken in the process of achieving a desired outcome.
        • Lagging Metrics: Based on the desired outcome, the metric can indicate where there were successes or failures that supported or prevented the outcome from being achieved.
      • Use the data from the metrics to inform your actions. Do not collect this data if your intent is simply to know the data point. You must be willing to act.
      "The way to make a metric successful is by understanding why you are measuring it." (Jeff Neyland CIO)

      CIOs measure strategic business metrics

      Keep the IT leadership accountable for operational metrics
      • Leveraging the IT leadership team, empower and hold each leader accountable for the operational metrics specific to their functional area
      • As a CIO, focus on the metrics that are going to impact the business. These are often tied to people or stakeholders:
        • The customers who will purchase the product or service
        • The decision makers who will fund IT initiatives
        • The champions of IT value
        • The IT employees who will be driven to succeed
        • The owner of an IT risk event
      • By focusing on these priority areas, you can regularly monitor aspects that will have major business impacts – and be able to address those impacts.
      As a CIO, avoid spending time on operational metrics such as:
      • Time to deliver
      • Time to resolve
      • Project delivery (scope, time, money)
      • Application usage
      • User experiences
      • SLAs
      • Uptime/downtime
      • Resource costs
      • Ticket resolution
      • Number of phishing attempts
      Info-Tech Insight

      While operational metrics are important to your organization, IT leaders should be empowered and responsible for their management.

      SECTION 1

      Actively Managing IT Risks

      Actively manage IT risks

      The impact of IT risks to your organization cannot be ignored any further
      • Few individuals in an organization understand IT risks and can proactively plan for the prevention of those threats, making the CIO the responsible and accountable individual when it comes to IT risks – especially the components that tie into cybersecurity.
      • When the negative impacts of an IT threat event are translated into terms that can be understood and actioned by all in the organization, it increases the likelihood of receiving the sponsorship and funding support necessary.
      • Moreover, risk management can be used as a tool to drive the organization toward its vision state, enabling informed risk decisions.

      Risk management metric:

      Number of critical IT threats that were detected and prevented before impact to the organization.

      Beyond risk prevention
      Organizations that have a clear risk tolerance can use their risk assessments to better inform their decisions.
      Specifically, taking risks that could lead to a high return on investment or other key organizational drivers.

      Protect the organization from more than just cyber threats

      Other risk-related metrics:
      • Percentage of IT risks integrated into the organization’s risk management approach.
      • Number of risk management incidents that were not identified by your organization (and the potential financial impact of those risks).
      • Business satisfaction with IT actions to reduce impact of negative IT risk events.
      • Number of redundant systems removed from the organizations portfolio.
      Action steps to take:
      • Create a risk-aware culture, not just with IT folks. The entire organization needs to understand how IT risks are preventable.
      • Clearly demonstrate the financial and reputational impact of potential IT risks and ensure that this is communicated with decision-makers in the organization.
      • Have a single source of truth to document possible risk events and report prevention tactics to minimize the impact of risks.
      • Use this information to recommend budget changes and help make risk-informed decisions.

      49%

      Investing in Risk

      Heads of IT “cited increasing cybersecurity protections as the top business initiative driving IT investments this year” (Source: Foundry, 2022.)

      SECTION 2

      Delivering on Business Objectives

      Delivering on business objectives

      Deliver on initiatives that bring value to your organization and stop benchmarking
      • CIOs often want to know how they are performing in comparison to their competitors (aka where do you compare in the benchmarking?)
      • While this is a nice to know, it adds zero value in demonstrating that you understand your business, let alone the goals of your business
      • Every organization will have a different set of goals it is striving toward, despite being in the same industry, sector, or market.
      • Measuring your performance against the objectives of the organization prevents CIOs from being more technical than it would do them good.

      Business Objective Alignment Metric:

      Percentage of IT metrics have a direct line of impact to the business goals

      Stop using benchmarks to validate yourself against other organizations. Benchmarking does not provide:
      • Insight into how well that organization performed against their goals.
      • That other organizations goals are likely very different from your own organization's goals.
      • It often aggregates the scores so much; good and bad performers stop being clearly identified.

      Provide a clear line of sight from IT metrics to business goals

      Other business alignment metrics:
      • Number of IT initiatives that have a significant impact on the success of the organization's goals.
      • Number of IT initiatives that exceed the expected value.
      • Positive impact ($) of IT initiatives on driving business innovation.
      Action steps to take:
      • Establish a library or dashboard of all the metrics you are currently measuring as an IT organization, and align each of them to one or more of the business objectives your organization has.
      • Leverage the members of the organization’s executive team to validate they understand how your metric ties to the business objective.
      • Any metric that does not have a clear line of sight should be reconsidered.
      • IT metrics should continue to speak in business terms, not IT terms.

      50%

      CIOs drive the business

      The percentage of CEOs that recognize the CIO as the main driver of the business strategy in the next 2-3 years. (Source: Deloitte, 2020.)

      SECTION 3

      Impact on Customer Satisfaction

      Influencing end-customer satisfaction

      Directly or indirectly, IT influences how satisfied the customer is with their product or service
      • Now more than ever before, IT can positively influence the end-customer’s satisfaction with the product or service they purchase.
      • From operational redundancies to the customer’s interaction with the organization, IT can and should be positively impacting the customer experience.
      • IT leaders who take an interest in the customer demonstrate that they are business-focused individuals and understand the intention of what the organization is seeking to achieve.
      • With the CIO role becoming a strategic one, understanding why a customer would or would not purchase your organization’s product or service stops being a “nice to have.”

      Customer satisfaction metric:

      What is the positive impact ($ or %) of IT initiatives on customer satisfaction?

      Info-Tech Insight

      Be the one to suggest new IT initiatives that will impact the customer experience – stop waiting for other business leaders to make the recommendation.

      Enhance the end-customer experience with I&T

      Other customer satisfaction metrics:
      • Amount of time CIO spends interacting directly with customers.
      • Customer retention rate.
      • Customer attraction rate.
      Action steps to take:
      • Identify the core IT capabilities that support customer experience. Automation? Mobile application? Personal information secured?
      • Suggest an IT-supported or-led initiative that will enhance the customer experience and meet the business goals. Retention? Acquisition? Growth in spend?
      • This is where operational metrics or dashboards can have a real influence on the customer experience. Be mindful of how IT impacts the customer journey.

      41%

      Direct CX interaction

      In 2022, 41% of IT heads were directly interacting with the end customer. (Source: Foundry, 2022.)

      SECTION 4

      Keeping Employees Engaged

      Keeping employees engaged

      This is about more than just an annual engagement survey
      • As a leader, you should always have a finger on the pulse of how engaged your employees are
      • Employee engagement is high when:
        • Employees have a positive disposition to their place of work
        • Employees are committed and willing to contribute to the organization's success
      • Employee engagement comprises three types of drivers: organizational, job, and retention. As CIO, you have a direct impact on all three drivers.
      • Providing employees with a positive work environment where they are empowered to complete activities in line with their desired skillset and tied to a clear purpose can significantly increase employee engagement.

      Employee engagement metric:

      Number of employees who feel empowered to complete purposeful activities related to their job each day

      Engagement leads to increases in:
      • Innovation
      • Productivity
      • Performance
      • Teamwork
      While reducing costs associated with high turnover.

      Employees daily tasks need to have purpose

      Other employee engagement metrics:
      • Tenure of IT employees at the organization.
      • Number of employees who seek out or use a training budget to enhance their knowledge/skills.
      • Degree of autonomy employees feel they have in their work on a daily basis.
      • Number of collaboration tools provided to enable cross-organizational work.
      Action steps to take:
      • If you are not willing to take actionable steps to address engagement, don’t bother asking employees about it.
      • Identify the blockers to empowerment. Common blockers include insufficient team collaboration, bureaucracy, inflexibility, and feeling unsupported and judged.
      • Ensure there is a consistent understanding of what “purposeful” means. Are you talking about “purposeful” to the organization or the individual?
      • Provide more clarity on what the organization’s purpose is and the vision it is driving toward. Just because you understand does not mean the employees do.

      26%

      Act on engagement

      Only 26% of leaders actually think about and act on engagement every single day. (Source: SHRM, 2022.)

      SECTION 5

      Establishing Trusted Business Relationships

      Establishing trusted business partnerships

      Leverage your relationships with other C-suite executives to demonstrate IT’s value
      • Your relationship with other business peers is critical – and, funny enough, it is impacted by the use of good metrics and data.
      • The performance of your IT team will be recognized by other members of the executive leadership team (ELT) and is a direct reflection of you as a leader.
      • A good relationship with the ELT can alleviate issues if concerns about IT staff surface.
        • Of the 85% of IT leaders working on transformational initiatives, only 30% are trying to cultivate an IT/business partnership (Foundry, 2022).
      • Don’t let other members of the organizations ELT overlook you or the value IT has. Build the key relationships that will drive trust and partnerships.

      Business leadership relationship metric:

      Ability to influence business decisions with trusted partners.

      Some key relationships that are worth forming with other C-suite executives right now include:
      • Chief Sustainability Officer
      • Chief Revenue Officer
      • Chief Marketing Officer
      • Chief Data Officer

      Influence business decisions with trusted partners

      Other business relations metrics:
      • The frequency with which peers on the ELT complain about the IT organization to other ELT peers.
      • Percentage of business leaders who trust IT to make the right choices for their accountable areas.
      • Number of projects that are initiated with a desired solution versus problems with no desired solution.
      Action steps to take:
      • From lunch to the boardroom, it is important you make an effort to cultivate relationships with the other members of the ELT.
      • Identify who the most influential members of the ELT are and what their primary goals or objectives are.
      • Follow through on what you promise you will deliver – if you do not know, do not promise it!
      • What will work for one member of the ELT will not work for another – personalize your approach.

      60%

      Enterprise-wide collaboration

      “By 2023, 60% of CIOs will be primarily measured for their ability to co-create new business models and outcomes through extensive enterprise and ecosystem-wide collaboration.” (Source: IDC, 2021.)

      SECTION 6

      Managing to a Budget

      Managing to a budget

      Every CIO needs to be able to spend within budget while increasing their strategic impact
      • From security, to cloud, to innovating the organization's products and services, IT has a lot of initiatives that demand funds and improve the organization.
      • Continuing to demonstrate good use of the budget and driving value for the organization will ensure ongoing recognition in the form of increased money.
      • 29% of CIOs indicated that controlling costs and expense management was a key duty of a functional CIO (Foundry, 2022).
      • Demonstrating the ability to spend within a defined budget is a key way to ensure the business trusts you.
      • Demonstrating an ability to spend within a defined budget and reducing the cost of operational expenses while increasing spend on strategic initiatives ensures the business sees the value in IT.

      Budget management metric:

      Proportion of IT budget that is strategic versus operational.

      Info-Tech Insight

      CIOs need to see their IT function as its own business – budget and spend like a CEO.

      Demonstrate IT’s ability to spend strategically

      Other budget management metrics:
      • Cost required to lead the organization through a digital transformation.
      • Reduction in operational spend due to retiring legacy solutions.
      • Percentage of budget in the run, grow, and transform categories.
      • Amount of money spent keeping the lights on versus investing in new capabilities.

      Action steps to take:

      • Consider opportunities to automate processes and reduce the time/talent required to spend.
      • Identify opportunities and create the time for resources to modernize or even digitize the organization to enable a better delivery of the products or services to the end customer.
      • Review the previous metrics and tie it back to running the business. If customer satisfaction will increase or risk-related threats decrease through an initiative IT is suggesting, you can make the case for increased strategic spend.

      90%

      Direct CX interaction

      Ninety percent of CIOs expect their budget to increase or remain the same in their next fiscal year. (Source: Foundry, 2022.)

      Research contributors and experts

      Photo of Jeff Neyland. Jeff Neyland
      Chief Information Officer – University of Texas at Arlington
      Photo of Brett Trelfa. Brett Trelfa
      SVP and CIO – Arkansas Blue Cross Blue Shield
      Blank photo template. Lynn Fyhrlund
      Chief Information Officer – Milwaukee County Department of Administrative Services

      Info-Tech Research Group

      Vicki Van Alphen Executive Counselor Ibrahim Abdel-Kader Research Analyst
      Mary Van Leer Executive Counselor Graham Price Executive Counselor
      Jack Hakimian Vice President Research Valence Howden Principal Research Director
      Mike Tweedie CIO Practice Lead Tony Denford Organization Transformation Practice Lead

      Related Info-Tech Research

      Sample of the 'IT Metrics Library'. IT Metrics Library
      • Use this tool to review commonly used KPIs for each practice area
      • Identify KPI owners, data sources, baselines, and targets. It also suggests action and research for low-performing KPIs.
      • Use the "Action Plan" tab to keep track of progress on actions that were identified as part of your KPI review.
      Sample of 'Define Service Desk Metrics That Matter'. Define Service Desk Metrics That Matter
      • Consolidate your metrics and assign context and actions to those currently tracked.
      • Establish tension metrics to see and tell the whole story.
      • Split your metrics for each stakeholder group. Assign proper cadences for measurements as a first step to building an effective dashboard.
      Sample of 'CIO Priorities 2022'. CIO Priorities 2022
      • Understand how to respond to trends affecting your organization.
      • Determine your priorities based on current state and relevant internal factors.
      • Assign the right resources to accomplish your vision.
      • Consider what new challenges outside of your control will demand a response.

      Bibliography

      “Developing and Sustaining Employee Engagement.” SHRM, 2022.

      Dopson, Elise. “KPIs Vs. Metrics: What’s the Difference & How Do You Measure Both?” Databox, 23 Jun. 2021.

      Shirer, Michael, and Sarah Murray. “IDC Unveils Worldwide CIO Agenda 2022 Predictions.” IDC, 27 Oct. 2021.

      Suer, Myles. “The Most Important Metrics to Drive IT as a Business.” CIO, 19 Mar. 2019.

      “The new CIO: Business Savvy.” Deloitte Insights. Deloitte, 2020.

      “2022 State of the CIO: Rebalancing Act: CIO’s Operational Pandemic-Era Innovation.” Foundry, 2022.

      “Why Employee Engagement Matters for Leadership at all Levels.” Walden University, 20 Dec. 2019.

      Zhang, Xihui, et al. “How to Measure IT Effectiveness: The CIO’s Perspective.” Journal of Informational Technology Management, 29(4). 2018.

      Scale Business Process Automation

      • Buy Link or Shortcode: {j2store}241|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Optimization
      • Parent Category Link: /optimization
      • Business process automation (BPA) adoption gained significant momentum as your business leaders saw the positive outcomes in your pilots, such as improvements in customer experience, operational efficiencies, and cost optimizations.
      • Your stakeholders are ready to increase their investments in more process automation solutions. They want to scale initial successes to other business and IT functions.
      • However, it is unclear how BPA can be successfully scaled and what benefits can be achieved from it.

      Our Advice

      Critical Insight

      The shift from isolated, task-based automations in your pilot to value-oriented, scaled automations brings new challenges and barriers to your organization such as:

      • Little motivation or tolerance to change existing business operations to see the full value of BPA.
      • Overinvesting in current BPA technologies to maximize the return despite available alternatives that can do the same tasks better.
      • BPA teams are ill-equipped to meet the demands and complexities of scaled BPA implementations.

      Impact and Result

      • Ground your scaling expectations. Set realistic and achievable goals centered on driving business value to the entire organization by optimizing and automating end-to-end business processes.
      • Define your scaling journey. Tailor your scaling approach according to your ability to ease BPA implementation, to broaden BPA adoption, and to loosen BPA constraints.
      • Prepare to scale BPA. Cement your BPA management and governance foundations to support BPA scaling using the lessons learned from your pilot implementation.

      Scale Business Process Automation Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Scale Business Process Automation Deck – A guide to learn the opportunities and values of scaling business process automation.

      This research walks you through the level setting of your scaled business process automation (BPA) expectations, factors to consider in defining your scaled BPA journey, and assessing your readiness to scale BPA.

      • Scale Business Process Automation Storyboard

      2. Scale Business Process Automation Readiness Assessment – A tool to help you evaluate your readiness to scale business process automation.

      Use this tool to identify key gaps in the people, processes, and technologies you need to support the scaling of business process automation (BPA). It also contains a canvas to facilitate your discussions around business process automation with your stakeholders and BPA teams.

      • Scale Business Process Automation Readiness Assessment
      [infographic]

      Further reading

      Scale Business Process Automation

      Take a value-first approach to automate the processes that matter

      Analyst Perspective

      Scaling business process automation (BPA) is an organization-wide commitment

      Business and IT must work together to ensure the right automations are implemented and BPA is grown and matured in a sustainable way. However, many organizations are not ready to make this commitment. Managing the automation demand backlog, coordinating cross-functional effort and organizational change, and measuring BPA value are some of the leading factors challenging scaling BPA.

      Pilot BPA with the intent to scale it. Pilots are safe starting points to establish your foundational governance and management practices and build the necessary relationships and collaborations for you to be successful. These factors will then allow you to explore more sophisticated, complicated, and innovative opportunities to drive new value to your team, department, and organization.

      A picture of Andrew Kum-Seun

      Andrew Kum-Seun
      Research Director,
      Application Delivery and Management
      Info-Tech Research Group

      Executive Summary

      Your Challenge

      • Business process automation (BPA) adoption gained significant momentum as your business leaders see the positive outcomes in your pilots, such as improvements in customer experience, operational efficiencies, and cost optimizations.
      • Your stakeholders are ready to increase their investments in more process automation solutions. They want to scale initial successes to other business and IT functions.
      • However, it is unclear how BPA can be successfully scaled and what benefits can be achieved from it.

      Common Obstacles

      The shift from isolated, task-based automations in your pilot to value-oriented and scaled automations brings new challenges and barriers to your organization:

      • Little motivation or tolerance to change existing business operations to see the full value of BPA.
      • Overinvesting in current BPA technologies to maximize return despite available alternatives that can do the same tasks better.
      • BPA teams are ill-equipped to meet the demands and complexities of scaled BPA implementations.

      Info-Tech's Approach

      • Ground your scaling expectations. Set realistic and achievable goals centered on driving business value to the entire organization by optimizing and automating end-to-end business processes.
      • Define your scaling journey. Tailor your scaling approach according to your ability to ease BPA implementation, to broaden BPA adoption, and to loosen BPA constraints.
      • Prepare to scale BPA. Cement your BPA management and governance foundations to support BPA scaling using the lessons learned from your pilot implementation.

      Info-Tech Insight

      Take a value-first approach in your scaling business process automation (BPA) journey. Low-risk, task-oriented automations are good starting points to introduce BPA but constrain the broader returns your organization wants. Business value can only scale when everything and everyone in your processes are working together to streamline the entire value stream rather than the small gains from optimizing small, isolated automations.

      Scale Business Process Automation

      Take a value-first approach to automate the processes that matter

      Pilot Your BPA Capabilities

      • Learn the foundation practices to design, deliver, and support BPA.
      • Understand the fit and value of BPA.
      • Gauge the tolerance for business operational change and system risk.

      See Info-Tech's Build a Winning Business Process Automation Playbook blueprint for more information.

      Build Your Scaling BPA Vision

      Apply Lessons Learned to Scale

      1. Ground Your Scaling Expectations
        Set realistic and achievable goals centered on driving business value to the entire organization by optimizing and automating end-to-end business processes.
      2. Define Your Scaling Journey
        Tailor your scaling approach according to your ability to ease BPA implementation, to broaden BPA adoption, and to loosen BPA constraints.
      3. Prepare to Scale BPA
        Cement your BPA management and governance foundations to support BPA scaling using the lessons learned from your pilot implementation.

      Research deliverable

      Design and communicate your approach to scale business process automation with Info-Tech's Scale Business Process Automation Readiness Assessment:

      • Level set your scaled BPA goals and objectives.
      • Discuss and design your scaled BPA journey.
      • Identify the gaps and improvements needed to scale your BPA practices and implementation.

      A screenshot from Info-Tech's Scale Business Process Automation Readiness Assessment

      Step 1.1

      Ground Your Scaling Expectations

      Activities

      1.1.1 Define Your Scaling Objectives

      This step involves the following participants:

      • Business Process Owners
      • Product Owners
      • Application Directors
      • Business Architects
      • BPA Delivery & Support Teams

      Outcomes of this step

      Scaling BPA objectives

      Organizations want to scale their initial BPA success

      Notable Initial Benefits

      1. Time Saved: "In the first day of live operations, the robots were saving 51 hours each day or the equivalent of six people working an eight-hour shift." – Brendan MacDonald, Director of Customer Compliance Operations, Ladbrokes (UiPath)
      2. Documentation & Knowledge Sharing: "If certain people left, knowledge of some processes would be lost and we realized that we needed a reliable process management system in place." – Peta Kinnane, Acting Audit and Risk Coordinator, Liverpool City Council (Nintex)
      3. Improved Service Delivery: "Thanks to this automation, our percentage of triaged and assigned tickets is now 100%. Nothing falls through the cracks. It has also improved the time to assignment. We assign tickets 2x faster than before." – Sebastian Goodwin, Head of Cybersecurity, Nutanix (Workato)

      Can We Gain More From Automation?

      The Solution

      As industries evolve and adopt more tools and technology, their products, services, and business operating models become more complex. Task- and desktop-based automations are often not enough. More sophisticated and scaled automations are needed to simplify and streamline the process from end-to-end of complex operations and align them with organizational goals.

      Stakeholders see automation as an opportunity to scale the business

      The value of scaling BPA is dependent on the organization's ability to scale with it. In other words, stakeholders should see an increase in business value without a substantial increase in resources and operational costs (e.g., there should be little difference if sending out 10 emails versus 1000).

      Examples of how business can be scaled with automation

      • Processes triggered by incoming documents or email: in these processes, an incoming document or email (that has semi-structured or unstructured data) is collected by a script or an RPA bot. This document is then processed with a machine learning model that validates it either by rules or ML models. The validated and enriched machine-readable data is then passed on to the next system of record.
      • The accounts payable process: this process includes receiving, processing, and paying out invoices from suppliers that provided goods or services to the company. While manual processing can be expensive, take too much time, and lead to errors, businesses can automate this process with machine learning and document extraction technologies like optical characters recognition (OCR), which converts texts containing images into characters that can be readable by computers to edit, compute, and analyze.
      • Order management: these processes include retrieving email and relevant attachments, extracting information that tells the business what its customers want, updating internal systems with newly placed orders or modifications, or taking necessary actions related to customer queries.
      • Enhance customer experience: [BPA tools] can help teams develop and distribute customer loyalty offers faster while also optimizing these offers with customer insights. Now, enterprises can more easily guarantee they are delivering the relevant solutions their clients are demanding.

      Source: Stefanini Group

      Scaling BPA has its challenges

      Perceived Lack of Opportunities

      Pilot BPA implementations often involve the processes that are straightforward to automate or are already shortlisted to optimize. However, these low-hanging fruits will run out. Discovering new BPA opportunities can be challenged for a variety of reasons, such as:

      • Lack of documentation and knowledge
      • Low user participation or drive to change
      • BPA technology limitations and constraints

      Perceived Lack of Opportunities

      BPA is not a cheap investment. A single RPA bot, for example, can cost between $5,000 to $15,000. This cost does not include the added cost for training, renewal fees, infrastructure set up and other variable and reoccurring costs that often come with RPA delivery and support (Blueprint). This reality can motivate BPA owners to favor existing technologies over other cheaper and more effective alternatives in an attempt boost their return on investment.

      Ill-Equipped Support Teams

      Good technical skills and tools, and the right mindset are critical to ensure BPA capabilities are deployed effectively. Low-code no-code (LCNC) can help but success isn't guaranteed. Lack of experience with low-code platforms is the biggest obstacle in low-code adoption according to 60% of respondents (Creatio). The learning curve has led some organizations to hire contractors to onboard BPA teams, hire new employees, or dedicate significant funding and resources to upskill internal resources.

      Shift your objectives from task-based efficiencies to value-driven capabilities

      How can I improve myself?

      How can we improve my team?

      How can we improve my organization?

      Objectives

      • Improve worker productivity
      • Improve the repeatability and predictability of the process
      • Deliver outputs of consistent quality and cadence
      • Increase process, tool, and technology confidence
      • Increase the team's throughput, commitment, and load
      • Apply more focus on cognitive and complex tasks
      • Reduce the time to complete error-prone, manual, and routine collaborations
      • Deliver insightful, personalized, and valuable outputs
      • Drive more value in existing pipelines and introduce new value streams
      • Deliver consistent digital experiences involving different technologies
      • Automatically tailor a customer's experience to individual preferences
      • Forecast and rapidly respond to customer issues and market trends

      Goals

      • Learn the fit of BPA & set the foundations
      • Improve the practices & tools and optimize the performance
      • Scale BPA capabilities throughout the organization

      Gauge the success of your scaled BPA

      BPA Practice Effectiveness

      Key Question: Are stakeholders satisfied with how the BPA practice is meeting their automation needs?

      Examples of Metrics:

      • User satisfaction
      • Automation request turnaround time
      • Throughput of BPA team

      Automation Solution Quality

      Key Question: How do your automation solutions perform and meet your quality standards?

      Examples of Metrics:

      • Licensing and operational costs
      • Service level agreement and uptime/downtime
      • Number of defects

      Business Value Delivery

      Key Question: How has automation improved the value your employees, teams, and the organization delivers?

      Examples of Metrics:
      Increase in revenue generation
      Reduction in operational costs
      Expansion of business capabilities with minimal increases in costs and risks

      1.1.1 Define your scaling objectives

      5 minutes

      1. Complete the following fields to build your scaled business process automation canvas:
        1. Problem that scaling BPA is intending to solve
        2. Your vision for scaling BPA
        3. Stakeholders
        4. Scaled BPA business and IT objectives and metrics
        5. Business capabilities, processes, and application systems involved
        6. Notable constraints, roadblocks, and challenges to your scaled BPA success
      2. Document your findings and discussions in Info-Tech's Scale Business Process Automation Readiness Assessment.

      Output

      Scaled BPA value canvas

      Participants

      • Business Process Owners
      • Product Owners
      • Application Directors
      • Business Architects
      • BPA Delivery & Support Teams

      Record the results in the 2. Value Canvas Tab in the Scale Business Process Automation Readiness Assessment.

      1.1.1 cont'd

      Scaled BPA Value Canvas Template:

      A screenshot of Scaled BPA Value Canvas Template

      Align your objectives to your application portfolio strategy

      Why is an application portfolio strategy important for BPA?

      • All business process optimizations are designed, delivered, and managed to support a consistent interpretation of the business and IT vision and goals.
      • Clear understanding of the sprawl, criticality, and risks of automation solutions and applications to business capabilities.
      • BPA initiatives are planned, prioritized, and coordinated alongside modernization, upgrades, and other changes to the application portfolio.
      • Resources, skills, and capacities are strategically allocated to meet BPA demand considering other commitments in the backlog and roadmap.
      • BPA expectations and practices uphold the persona, values, and principles of the application team.

      What is an application portfolio strategy?

      An application portfolio strategy details the direction, activities, and tactics to deliver on the promise of your application portfolio. It often includes:

      • Portfolio vision and goals
      • Application, automation, and process portfolio
      • Values and principles
      • Portfolio health
      • Risks and constraints
      • Strategic roadmap

      See our Application Portfolio Management Foundations blueprint for more information.

      Leverage your BPA champions to drive change and support scaling initiatives

      An arrow showing the steps to Leverage your BPA champions to drive change and support scaling initiatives

      Expected Outcome From Your Pilot: Your pilot would have recognized the roles that know how to effectively apply good BPA practices (e.g., process analysis and optimization) and are familiar with the BPA toolset. These individuals are prime candidates who can standardize your Build a Winning Business Process Automation Playbook, upskill interested teams, and build relationships among those involved in the delivery and use of BPA.

      Step 1.2

      Define Your Scaling Journey

      Activities

      1.2.1 Discuss Your BPA Opportunities
      1.2.2 Lay Out Your Scaling BPA Journey

      Scale Business Process Automation

      This step involves the following participants:

      • Business Process Owners
      • Product Owners
      • Application Directors
      • Business Architects
      • BPA Delivery & Support Teams

      Outcomes of this step

      • List of scaling BPA opportunities
      • Tailored scaling journey

      Maintain a healthy demand pipeline

      A successful scaled BPA practice requires a continuous demand for BPA capabilities and the delivery of minimum viable automations (MVA) held together by a broader strategic roadmap.

      An image of a healthy demand pipeline.  it flows from opportunities to trends, with inputs from internal and external sources.

      An MVA focuses on a single and small process use case, involves minimal possible effort to improve, and is designed to satisfy a specific user group. Its purpose is to maximize learning and value and inform the further scaling of the BPA technology, approach, or practice.

      See our Build a Winning Business Process Automation Playbook blueprint for more information.

      Investigate how BPA trends can drive more value for the organization

      • Event-Driven Automation
        Process is triggered by a schedule, system output, scenario, or user (e.g., voice-activated, time-sensitive, system condition)
      • Low- & No-Code Automation build and management are completed through an easy-to-learn scripting language and/or a GUI.
      • Intelligent Document Processing
        Transform documents for better analysis, processing and handling (e.g., optical character recognition) by a tool or system.
      • End-to-End Process Automation & Transparency
        Linking cross-functional processes to enable automation of the entire value stream with seamless handoffs or triggers.
      • Orchestration of Different BPA Technologies
        Integrating and sequencing the execution of multiple automation solutions through a single console.
      • Cognitive Automation
        AI and other intelligent technologies automate information-intensive processes, including semi and unstructured data and human thinking simulation.
      • Intelligent Internet-of-Things
        Connecting process automation technologies to physical environments with sensors and other interaction devices (e.g., computer vision).
      • Ethical Design
        Optimizing processes that align to the moral value, principles, and beliefs of the organization (e.g., respects data privacy, resists manipulative patterns).
      • User Profiling & Tailored Experiences
        Customizing process outputs and user experience with user-defined configurations or system and user activity monitoring.
      • Process Mining & Discovery
        Gleaning optimization opportunities by analyzing system activities (mining) or monitoring user interactions with applications (discovery).

      1.2.1 Discuss your BPA opportunities

      5 minutes

      1. Review the goals and objectives of your initiative and the expectations you want to gain from scaling BPA.
      2. Discuss how BPA trends can be leveraged in your organization.
      3. List high priority scaling BPA opportunities.

      Output

      • Scaled BPA opportunities

      Participants

      • Business Process Owners
      • Product Owners
      • Application Directors
      • Business Architects
      • BPA Delivery & Support Teams

      Create your recipe for success

      Your scaling BPA recipe (approach) can involve multiple different flavors of various quantities to fit the needs and constraints of your organization and workers.

      What and how many ingredients you need is dependent on three key questions:

      1. How can we ease BPA implementation?
      2. How can we broaden the BPA scope?
      3. How can we loosen constraints?

      Personalize Scaling BPA To Your Taste

      • Extend BPA Across Business Units (Horizontal)
      • Integrate BPA Across Your Application Architecture (Vertical)
      • Embed AI/ML Into Your Automation Technologies
      • Empower Users With Business-Managed Automations
      • Combine Multiple Technologies for End-to-End Automation
      • Increase the Volume and Velocity of Automation
      • Automate Cognitive Processes and Making Variable Decisions

      Answer these questions in the definition of your scaling BPA journey

      Seeing the full value of your scaling approach is dependent on your ability to support BPA adoption across the organization

      How can we ease BPA implementation?

      • Good governance practices (e.g., role definitions, delivery and management processes, technology standards).
      • Support for innovation and experimentation.
      • Interoperable and plug-and-play architecture.
      • Dedicated technology management and support, including resources, documents, templates and shells.
      • Accessible and easy-to-understand knowledge and document repository.

      How can we broaden BPA scope?

      • Provide a unified experience across processes, fragmented technologies, and siloed business functions.
      • Improve intellectually intensive activities, challenging decision making and complex processes with more valuable insights and information using BPA.
      • Proactively react to business and technology environments and operational changes and interact with customers with unattended automation.
      • Infuse BPA technologies into your product and service to expand their functions, output quality, and reliability.

      How can we loosen constraints?

      • Processes are automated without the need for structured data and optimized processes, and there is no need to work around or avoid legacy applications.
      • Workers are empowered to develop and maintain their own automations.
      • Coaching, mentoring, training, and onboarding capabilities.
      • Accessibility and adoption of underutilized applications are improved with BPA.
      • BPA is used to overcome the limitations or the inefficiencies of other BPA technologies.

      1.2.2 Lay out your scaling BPA journey

      5 minutes

      1. Review the goals and objectives of your initiative, the expectations you want to gain from scaling BPA, and the various scaling BPA opportunities.
      2. Discuss the different scaling BPA flavors (patterns) and how each flavor is applicable to your situation. Ask yourself these key questions:
        1. How can we ease BPA implementation?
        2. How can we broaden the BPA scope?
        3. How can we loosen constraints?
      3. Design the broad steps of your scaling BPA journey. See the following slide for an example.
      4. Document your findings and discussions in Info-Tech's Scale Business Process Automation Readiness Assessment.

      Record the results in the 3. Scaled BPA Journey Tab in the Scale Business Process Automation Readiness Assessment.

      Output

      • Scaled BPA journey

      Participants

      • Business Process Owners
      • Product Owners
      • Application Directors
      • Business Architects
      • BPA Delivery & Support Teams

      1.2.2 cont'd

      An image of the marker used to identify Continuous business process optimization and automation Continuous business process optimization and automation
      An image of the marker used to identify Scope of Info-Tech's Build Your Business Process Automation Playbook blueprintScope of Info-Tech's Build Your Business Process Automation Playbook blueprint

      Example:

      An example of the BPA journey.  Below are the links included in the journey.

      Continuously review and realign expectations

      Optimizing your scaled BPA practices and applying continuous improvements starts with monitoring the process after implementation.

      Purpose of Monitoring

      1. Diligent monitoring confirms your scaled BPA implementation is performing as desired and meeting initial expectations.
      2. Holding reviews of your BPA practice and implementations helps assess the impact of marketplace and business operations changes and allows the organization to stay on top of trends and risks.

      Metrics

      Metrics are an important aspect of monitoring and sustaining the scaled practice. The metrics will help determine success and find areas where adjustments may be needed.

      Hold retrospectives to identify any practice issues to be resolved or opportunities to undertake

      The retrospective gives your organization the opportunity to review themselves and brainstorm solutions and a plan for improvements to be actioned. This session is reoccurring, typically, after key milestones. While it is important to allow all participants the opportunity to voice their opinions, feelings, and experiences, retrospectives must be positive, productive, and time boxed.

      Step 1.3

      Prepare to Scale BPA

      Activities

      1.3.1 Assess Your Readiness to Scale BPA

      This step involves the following participants:

      • Business Process Owners
      • Product Owners
      • Application Directors
      • Business Architects
      • BPA Delivery & Support Teams

      Outcomes of this step

      • Scale BPA readiness assessment

      Prepare to scale by learning from your pilot implementations

      "While most organizations are advised to start with automating the 'low hanging fruit' first, the truth is that it can create traps that will impede your ability to achieve RPA at scale. In fact, scaling RPA into the organizational structure is fundamentally different from implementing a conventional software product or other process automation."
      – Blueprint

      What should be the takeaways from your pilot?

      Degree of Required BPA Support

      • Practices needed to address the organization's tolerance to business process changes and automation adoption.
      • Resources, budget and skills needed to configure and orchestrate automation technologies to existing business applications and systems.

      Technology Integration & Compatibility

      • The BPA technology and application system's flexibility to be enhanced, modified, and removed.
      • Adherence to data and system quality standards (e.g., security, availability) across all tools and technologies.

      Good Practices Toolkit

      • A list of tactics, techniques, templates, and examples to assist teams assessing and optimizing business processes and applying BPA solutions in your organization's context.
      • Strategies to navigate common blockers, challenges, and risks.

      Controls & Measures

      • Defined guardrails aligned to your organization's policies and risk tolerance
      • Key metrics are gathered to gauge the value and performance of your processes and automations for enhancements and further scaling.

      Decide how to architect and govern your BPA solutions

      Centralized

      A single body and platform to coordinate, execute, and manage all automation solutions.

      An image of the Centralized approach to governing BPA solutions.

      Distributed

      Automation solutions are locally delivered and managed whether that is per business unit, type of technology, or vendor. Some collaboration and integration can occur among solutions but might be done without a holistic strategy or approach.

      An image of the Distributed approach to governing BPA solutions.

      Hybrid

      Automation solutions are locally delivered and managed and executed for isolated use cases. Broader and complex automations are centrally orchestrated and administered.

      An image of the Hybrid approach to governing BPA solutions.

      Be prepared to address the risks with scaling BPA

      "Companies tend to underestimate the complexity of their business processes – and bots will frequently malfunction without an RPA design team that knows how to anticipate and prepare for most process exceptions. Unresolved process exceptions rank among the biggest RPA challenges, prompting frustrated users to revert to manual work."
      – Eduardo Diquez, Auxis, 2020

      Scenarios

      • Handling Failures of Dependent Systems
      • Handling Data Corruption & Quality Issues
      • Alignment to Regulatory & Industry Standards
      • Addressing Changes & Regressions to Business Processes
      • "Run Away" & Hijacked Automations
      • Unauthorized Access to Sensitive Information

      Recognize the costs to support your scaled BPA environment

      Cost Factors

      Automation Operations
      How will chaining multiple BPA technologies together impact your operating budget? Is there a limit on the number of active automations you can have at a single time?

      User Licenses
      How many users require access to the designer, orchestrator, and other functions of the BPA solution? Do they also require access to dependent applications, services, and databases?

      System Enhancements
      Are application and system upgrades and modernizations needed to support BPA? Is your infrastructure, data, and security controls capable of handling BPA demand?

      Supporting Resources
      Are dedicated resources needed to support, govern, and manage BPA across business and IT functions? Are internal resources or third-party providers preferred?

      Training & Onboarding
      Are end users and supporting resources trained to deliver, support, and/or use BPA? How will training and onboarding be facilitated: internally or via third party providers?

      Create a cross-functional and supportive body to lead the scaling of BPA

      Your supportive body is a cross-functional group of individuals promoting collaboration and good BPA practices. It enables an organization to extract the full benefits from critical systems, guides the growth and evolution of strategic BPA implementations, and provides critical expertise to those that need it. A supportive body distinctly caters to optimizing and strengthening BPA governance, management, and operational practices for a single technology or business function or broadly across the entire organization encompassing all BPA capabilities.

      What a support body is not:

      • A Temporary Measure
      • Exclusive to Large Organizations
      • A Project Management Office
      • A Physical Office
      • A Quick Fix

      See our Maximize the Benefits from Enterprise Applications With a Center of Excellence blueprint for more information.

      What are my options?

      Center of Excellence (CoE)
      AND
      Community of Practice (CoP)

      CoEs and CoPs provide critical functions

      An image of the critical functions provided by CoE and CoP.

      Shift your principles as you scale BPA

      As BPA scales, users and teams must not only think of how a BPA solution operates at a personal and technical level or what goals it is trying to achieve, but why it is worth doing and how the outcomes of the automated process will impact the organization's reputation, morality, and public perception.

      An image of the journey from Siloed BPA to Scaled BPA.

      "I think you're going to see a lot of corporations thinking about the corporate responsibility of [organizational change from automation], because studies show that consumers want and will only do business with socially responsible companies."

      – Todd Lohr

      Source: Appian, 2018.

      Assess your readiness to scale BPA

      Vision & Objectives
      Clear direction and goals of the business process automation practice.

      Governance
      Defined BPA roles and responsibilities, processes, and technology controls.

      Skills & Competencies
      The capabilities users and support roles must have to be successful with BPA.

      Business Process Management & Optimization
      The tactics to document, analyze, optimize, and monitor business processes.

      Business Process Automation Delivery
      The tactics to review the fit of automation solutions and deliver and support according to end user needs and preferences.

      Business Process Automation Platform
      The capabilities to manage BPA platforms and ensure it supports the growing needs of the business.

      1.3.1 Assess your readiness to scale BPA

      5 minutes

      1. Review your scaling BPA journey and selected patterns.
      2. Conduct a readiness assessment using the 4. Readiness Assessment tab in Info-Tech's Scale Business Process Automation Readiness Assessment.
      3. Brainstorm solutions to improve the capability or address the gaps found in this assessment.

      Output

      • Scaled BPA readiness assessment

      Participants

      • Business Process Owners
      • Product Owners
      • Application Directors
      • Business Architects
      • BPA Delivery & Support Teams

      Record the results in the 4. Readiness Assessment tab in Info-Tech's Scale Business Process Automation Readiness Assessment.

      Info-Tech offers various levels of support to best suit your needs

      DIY Toolkit

      “Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful.”

      Guided Implementation

      “Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track.”

      Workshop

      “We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place.”

      Consulting

      “Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project.”

      Diagnostics and consistent frameworks used throughout all four options

      Related Info-Tech Research

      Bibliography

      Alston, Roland. "With the Rise of Intelligent Automation, Ethics Matter Now More than Ever." Appian, 4 Sept. 2018. Web.
      "Challenges of Achieving RPA at Scale." Blueprint, N.d. Web.
      Dilmegani, Cem. "RPA Benefits: 20 Ways Bots Improve Businesses in 2023," AI Multiple, 9 Jan 2023. Web.
      Diquez, Eduardo. "Struggling To Scale RPA? Discover The Secret to Success." Auxis, 30 Sept. 2020. Web.
      "How much does Robotic Process Automation (RPA) Really Cost?" Blueprint, 14 Sept. 2021. Web.
      "Liverpool City Council improves document process with Nintex." Nintex, n.d. Web.
      "The State of Low-Code/No-Code." Creatio, 2021. Web.
      "Using automation to enhance security and increase IT NPS to 90+ at Nutanix." Workato, n.d. Web.
      "What Is Hyperautomation? A Complete Guide To One Of Gartner's Top Tech Trends." Stefanini Group, 26 Mar. 2021. Web.