Analyze Your Service Desk Ticket Data

  • Buy Link or Shortcode: {j2store}483|cart{/j2store}
  • member rating overall impact: 10.0/10 Overall Impact
  • member rating average dollars saved: $6,499 Average $ Saved
  • member rating average days saved: 3 Average Days Saved
  • Parent Category Name: Service Desk
  • Parent Category Link: /service-desk
  • Leverage your service desk ticket data to gain insights for your service desk strategy.

Our Advice

Critical Insight

  • Properly analyzing ticket data is challenging for the following reasons:
    • Poor ticket hygiene and unclear ticket handling means the data is often inaccurate or incomplete.
    • Service desk personnel are not sure where to start with analysis.
    • Too many metrics are tracked to parse actionable data from the noise.
  • Ticket data won’t give you a silver bullet, but it can help point you in the right direction.

Impact and Result

  • Create an iterative framework for tracking metrics, keeping data clean, and actioning your data on day-to-day and month-to-month timelines.

Analyze Your Service Desk Ticket Data Research & Tools

Start here – read the Executive Brief

Read our concise Executive Brief to find out why you should analyze your service desk ticket data, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

Besides the small introduction, subscribers and consulting clients within this management domain have access to:

1. Import your ticket data

Enter your data into our tool. Compare your own ITSM ticket fields to improve ticket data moving forward.

  • Service Desk Ticket Analysis Tool

2. Analyze your ticket data

Use the ticket analysis tool as a guide to build your own operational dashboards to measure metrics over time. Gain actionable insights from your data.

  • Ticket Analysis Report

3. Action your ticket data

Use the data to communicate your findings to the business and leadership using the Ticket Analysis Report.

[infographic]

Further reading

INFO-TECH RESEARCH GROUP

Analyze Your Service Desk Ticket Data

Take a data-driven approach to service desk optimization.

EXECUTIVE BRIEF

Analyst Perspective

Photo of Benedict Chang, Research Analyst, Infrastructure & Operations, Info-Tech Research Group

Benedict Chang
Research Analyst, Infrastructure & Operations
Info-Tech Research Group

Photo of Ken Weston ITIL MP, PMP, Cert.APM, SMC, Research Director, Infrastructure & Operations, Info-Tech Research Group

Ken Weston ITIL MP, PMP, Cert.APM, SMC
Research Director, Infrastructure & Operations
Info-Tech Research Group

The perfect time to start analyzing your ticket data is now

Service desks improve their services by leveraging ticket data to inform their actions. However, many organizations don’t know where to start. It’s tempting to wait for perfect data, but there’s a lot of value in analyzing your ticket data as it exists today.

Start small. Track key tension metrics based on the out-of-the-box functionality in your tool. Review the metrics regularly to stay on track.

By reviewing your ticket data, you’re going to get better organically. You’re going to learn about the state of your environment, the health of your processes, and the quality of your services. Regularly analyze your data to drive improvements.

Make ticket analysis a weekly habit. Every week, you should be evaluating how the past week went. Every month, you should be looking for patterns and trends.

Executive Summary

Your Situation

Leverage your service desk ticket data to gain insights for improving your operations:

  1. Use a data-based approach to allocate service desk resources.
  2. Design appropriate SLOs and SLAs to better service end users.
  3. Gain efficiencies for your shift-left strategy.
  4. Communicate the current and future value of the service desk to the business.

Common Obstacles

Properly analyzing ticket data is challenging for the following reasons:

  • Poor ticket hygiene and unclear ticket handling guidelines can lead to untrustworthy results.
  • Undocumented tickets from various intake channels prevents you from seeing the whole picture.
  • Service desk personnel are not sure where to start with analysis and are too busy to find time.
  • Too many metrics are tracked to parse actionable insights from the noise.

Info-Tech’s Approach

Info-Tech’s approach to improvement:

  • To reduce the noise, standardize your ticket data in a format that will ease analysis.
  • Start with common analyses using the cleaned data set.
  • Identify action items based on your ticket data.

Analyze your ticket data to help continually improve your service desk.

Slow down. Give yourself time.

Give yourself time to observe the new metrics and draw enough insights to make recommendations for improvement. Then, execute on those recommendations. Slow and steady improvement of the service desk only adds business value and will have a positive impact on customer satisfaction.

Your challenge

This research is designed to help service desk managers analyze their ticket data

Analyzing ticket data involves:

  • Collecting ticket data and keeping it clean. Based on the metrics you’re analyzing, define ticket expectations and keep the data up to date.
  • Showing the value of the service desk. SLAs are meaningless if they are not met consistently. The prerequisite to implementing proper SLAs is fully understanding the workload of the service desk.
  • Understanding – and improving – the user experience. You cannot improve the user experience without meaningful metrics that allow you to understand the user experience. Different user groups will have different needs and different expectations of the level of service. Your metrics should reflect those needs and expectations.

36% of organizations are prioritizing ticket handling in IT for 2021 (Source: SDI, 2021)

12% of organizations are focusing directly on service desk improvement (Source: SDI, 2021)

Common obstacles

Many organizations face these barriers to analyzing their ticket data:

  • Finding time to properly analyze ticket data is a challenge. Not knowing where to start can lead to not analyzing the proper data. Service desks end up either tracking too much data or not tracking the proper metrics.
  • Data, even if clean, can be housed in various tools and databases. It’s difficult to aggregate data if the data is stored throughout various tools. Comparisons may also be difficult if the data sets aren’t consistent.
  • Shifting left to move tickets toward self-service is difficult when there is no visibility into which tickets should be shifted left.

What your peers are saying about why they can’t start analyzing their ticket data:

  • “My technicians do not consistently update and close tickets.”
  • “My ITSM doesn’t have the capabilities I need to make informed decisions on shifting tickets left.”
  • “My tickets are always missing data”
  • “I’m constantly firefighting. I have no time for ticket data analysis.”
  • “I have no idea where to start with the amount of data I have.”
(Source: Info-Tech survey, 2021; N=20.)

Common obstacles that prevent effective ticket analysis

We asked IT service desk managers and teams about their biggest hurdles

Missing or Inaccurate Information
  • Lack of information in the ticket
  • Categories are too general/specific to draw insights
  • Poor ticket hygiene
Missing Updates
  • Tickets aren’t updated while being resolved
Correlating Tickets to Identify Trends
  • Not sure where to start with all the data at hand
No Time
  • No time to figure out the tool or analyze the data properly
Ineffective Categorization Schemes
  • Reduces the power of ticket data
Tool Limitations
  • Can’t be easily customized
  • Too customized to be effective
  • Desired dashboards unavailable
(Source: Info-Tech survey, 2021; N=20)

Info-Tech’s approach

Repeat this analysis every business cycle:

  • Gather Your Data
    Collect your ticket data OR start measuring the right metrics.
  • Extract & Analyze
    Organize and visualize your data to extract insights
  • Action the Results
    Implement low-effort improvements and celebrate quick successes.
  • Implement Larger Changes
    Reference your ticket data while implementing process, tooling, and other changes.
  • Communicate the Results
    Use your data to show the value of your effort.

Measure the value of this blueprint

Track these metrics as you improve

Use the data to tell you which aspects of IT need to be shifted left and which need to be automated

Your data will show you where you can improve.

As you act on your data, you should see:

  • Lower costs per ticket
  • Decreased average time to resolve
  • Increased end-user satisfaction
  • Fewer tickets escalated beyond Tier 1

An illustration of the 'Shift Left Strategy' using three line graphs arranged in a table with the same axes but representing different metrics. The header row is 'Metrics,' then values of the x-axes are 'Auto-Fix,' 'User,' 'Tier 1,' 'Tier2/Tier3,' and 'Vendor.' Under 'Metrics' we see 'Cost,' 'Time,' and 'Satisfaction.' The 'Cost' graph begins 'Low' at 'Auto-Fix' and gradually moves to 'High' at 'Vendor.' The 'Time' graph begins 'Low' at 'Auto-Fix' and gradually moves to 'High' at 'Vendor.' The 'Satisfaction' graph begins 'High' at 'Auto-Fix' and gradually moves to 'Low' at 'Vendor.' Below is an arrow directing us away from the 'Vendor' option and toward the 'Auto-Fix' option, 'Shift Ticket Resolution Left.'

See Info-Tech’s blueprint Optimize the Service Desk With a Shift-Left Strategy.

Info-Tech’s methodology for analyzing service desk tickets

1. Import Your Ticket Data 2. Analyze Your Ticket Data 3. Communicate Your Insights
Phase Steps
  1. Import Your Ticket Data
  1. Analyze High-Level Ticket Data
  2. Analyze Incidents, Service Requests, and Ticket Categories
  1. Build Recommendations
  2. Action and Communicate Your Ticket Data
Phase Outcomes Enter your data into our tool. Compare your own ITSM ticket fields to improve ticket data moving forward. Use the Service Desk Ticket Analysis Tool as a guide to build your own operational dashboards to measure metrics over time. Gain actionable insights from your data. Use the data to communicate your findings to the business and leadership using the Ticket Analysis Report.

Insight summary

Slow down. Give yourself time.

Give yourself time to observe the new metrics and draw enough insights to make recommendations for improvement. Then, execute on those recommendations. Slow and steady improvement of the service desk only adds business value and will have a positive impact on customer satisfaction.

Iterate on what to track rather than trying to get it right the first time.

Tracking the right data in your ticket can be challenging if you don’t know what you’re looking for. Start with standardized fields and iterate on your data analysis to figure out your gaps and needs.

If you don’t know where to go, ticket data can point you in the right direction.

If you have service desk challenges, you will need to allocate time to process improvement. However, prioritizing your initiatives is easier if you have the ticket data to point you in the right direction.

Start with data from one business cycle.

Service desks don’t need three years’ worth of data. Focus on gathering data for one business cycle (e.g. three months). That will give you enough information to start generating value.

Let the data do the talking.

Leverage the data to drive organizational and process change in your organization by tracking meaningful metrics. Choose those metrics using business-aligned goals.

Paint the whole picture.

Single metrics in isolation, even if measured over time, may not tell the whole story. Make sure you design tension metrics where necessary to get a holistic view of your service desk.

Blueprint deliverables

This blueprint’s key deliverable is a ticket analysis tool. Many of the activities throughout this blueprint will direct you to complete and interpret this tool. The other main deliverable is a stakeholder presentation template to help you document the outcomes of the project.
Service Desk Ticket Analysis Tool Ticket Analysis Report
Use this tool to identify trends and patterns in your ticket data to action improvement initiatives.

Sample of the Service Desk Ticket Analysis Tool blueprint deliverable.

Use this template to document the justification for addressing service desk improvement, the results of your analysis, and your next steps.

Sample of the Ticket Analysis Report blueprint deliverable.

Blueprint benefits

IT Benefits

  • Discover and implement the proper metrics to improve your service desk
  • Use a data-based approach to improve your customer service and operational goals
  • Increase visibility with the business and other IT departments using a structured presentation

Business Benefits

  • Quicker resolutions to incidents and service requests
  • Better expectations for the service desk and IT
  • Better visibility into the current state, challenges, and goals of the service desk
  • More effective support when contacting the service desk

Info-Tech offers various levels of support to best suit your needs

DIY Toolkit

Guided Implementation

Workshop

Consulting

"Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful." "Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track." "We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place." "Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project."

Diagnostics and consistent frameworks used throughout all four options

Guided Implementation

A Guided Implementation (GI) is a series of calls with an Info-Tech analyst to help implement our best practices in your organization.

A typical GI is 3-4 calls over the course of 2-3 months.

What does a typical GI on this topic look like?

    Phase 1

  • Call #1: Scope requirements, objectives, and your specific challenges. Enter your data into the tool.
  • Phase 2

  • Call #2: Assess the current state across the different dashboards.
  • Phase 3

  • Call #3: Identify improvements and insights to include in the communication report.
  • Call #4: Review the service desk ticket analysis report.

PHASE 1

Import Your Ticket Data

This phase will walk you through the following activities:

  • 1.1.1 Define your objectives for analyzing ticket data
  • 1.1.2 Identify success metrics
  • 1.1.3 Import your ticket data into the tool
  • 1.1.4 Update your ticket fields for future analysis

This phase involves the following participants:

  • Service Desk Manager
  • ITSM Manager
  • Service Desk Technician

1.1.1 Define your objectives for analyzing ticket data

Input: Understanding of current service desk process and ticket routing

Output: Defined objectives for the project

Materials: Whiteboard/flip charts, Ticket Analysis Report

Participants: Service Desk Staff, Service Desk Manager, IT Director, CIO

Use the discussion questions below as a guide
  1. Identify your main objective for analyzing ticket data. Use these three sample objectives as a starting point:
    • Demonstrate value to the business by improving customer service.
    • Improve service desk operations.
    • Reduce the number of recurring incidents.
  2. Answer the following questions as a group:
    • What challenges do you have getting accurate data for this objective?
    • What data is missing for supporting this objective?
    • What kind of issues must be solved for us to make progress on achieving this objective?
    • What decisions are held up from a lack of data?
    • How can better ticket data help us to more effectively manage our services and operations?

Document in the Ticket Analysis Report.

1.1.2 Identify success metrics

Select metrics that will track your progress on meeting the objective identified in Activity 1.1.1.

Input: Understanding of current service desk process and ticket routing

Output: Defined objectives for the project

Materials: Whiteboard/flip charts, Ticket Analysis Report

Participants: Service Desk Manager, IT Director, CIO

Use these sample metrics as a starting point:
Demonstrate value to the business by improving customer service
Ticket trends by category by month # tickets by business department % SLAs met by IT teams
Average customer satisfaction rating % incident tickets closed in one day Service request SLAs met by % Annual IT satisfaction survey result
Improve service desk operations
Incident tickets assigned, sorted by age and priority Scheduled requests for today and tomorrow Knowledgebase articles due for renewal this month Top 5-10 tickets for the quarter
Unassigned tickets by age # incident tickets assigned by tech Open tickets by category Backlog summary by age
Reducing the number of recurring incidents
# incidents by category and resolution code Number of problem tickets opened and resolved Correlation of ticket volume trends to events Reduction of volume of recurring tickets
Use of knowledgebase by users Use of self-service for ticket creation Use of service catalog Use of automated features (e.g. password resets)
Average call hold time % calls abandoned Average resolution time Number of tickets reopened

Document in the Ticket Analysis Report.

Inefficient ticket-handling processes lead to SLA breaches and unplanned downtime

Analyze the ticket data to catch mismanaged or lost tickets that lead to unnecessary escalations and impact business profitability

  • Ticket Category – Are your tickets categorized by type of asset? By service?
  • Average Ticket Times – How long does it take to resolve or fulfill tickets?
  • Ticket Priority – What is the impact and urgency of the ticket?
  • SLA/OLA Violations – Did we meet our SLA objectives? If not, why?
  • Ticket Channel – How was the issue reported or ticket received?
  • Response and Fulfillment – Did we complete first contact resolution? How many times was it transferred?
  • Associated Tasks and Tickets – Is this incident associated with any other tasks like change tickets or problem tickets?

Encourage proper ticket-handling procedures to enable data quality

Ensure everyone understands the expectations and the value created from having ticket data that follows these expectations

  • Create and update tickets, but not at the expense of good customer service. Agents can start the ticket but shouldn’t spend five minutes creating the ticket when they should be troubleshooting the problem.
  • Update the ticket when the issue is resolved or needs to be escalated. If agents are escalating, they should make sure all relevant information is passed along within the ticket to the next technician.
  • Update user of ETA if issue cannot be resolved quickly.
  • Ticket templates for common incidents can lead to fast creation, data input, and categorizations. Templates can reduce the time it takes to create tickets from two minutes to 30 seconds.
  • Update categories to reflect the actual issue and resolution.
  • Reference or link to the knowledgebase article as the documented steps taken to resolve the incident.
  • Validate with the client that the incident is resolved; automate this process with ticket closure after a certain time.
  • Close or resolve the ticket on time.

Info-Tech Insight

Ticket handling ensures clean handovers, whether it is to higher tiers or back to the customer. When filling the ticket out with information intended for another party, ensure the information is written for their benefit and from their point of view.

Service Desk Ticket Analysis Tool overview

The Service Desk Ticket Analysis Tool will help you standardize your ticket data in a meaningful format that will allow you to apply common analyses to identify the actions you need to take to improve service desk operations

TABS 1 & 2
INSTRUCTIONS & DATA ENTRY
TAB 3 : TICKET SUMMARY
TICKET SUMMARY DASHBOARDS
TABS 4 to 8: DASHBOARDS
INCIDENT SERVICE REQUEST CATEGORY
Sample of the Service Desk Ticket Analysis Tool, tabs 1 & 2.
Input at least three months of your exported ticket data into the corresponding columns in the tool to feed into the common analysis graphs in the other tabs.
Sample of the Service Desk Ticket Analysis Tool, tab 3.
This tab contains multiple dashboards analyzing how tickets come in, who requests them, who resolves them, and how long it takes to resolve them.
Sample of the Service Desk Ticket Analysis Tool, tabs 4 to 8.
These tabs each have dashboards outlining analysis on incidents and service requests. The category tab will allow you to dive deeper on commonly reported issues.

1.1.3 Import your data into our Service Desk Ticket Analysis Tool

You can still leverage your current data, but use this opportunity to improve your service desk ticket fields down the line

Input: ITSM data log

Output: Populated Service Desk Ticket Data Analysis Tool

Materials: Whiteboard/flip charts, Service Desk Ticket Analysis Tool

Participants: Service Desk Manager, Service Desk Technicians

Start here:

  • Extract your ticket data from your ITSM tool in an Excel or text format.
  • Look at the fields on the data entry tab of the Service Desk Ticket Analysis Tool.
  • Fill the fields with your ticket data by copying and pasting relevant sections. It is okay if you don’t have all the fields, but take note of the fields you are missing.
  • With the list of the fields you are missing, run through the following activity to decide if you will need to adopt or add fields to your own service desk ticket tool.
Fields Captured
Ticket Number Open Date
Open Time Closed Date
Closed Time Intake Channel
Time to Resolve Site Location
First Contact Resolution Resolution Code
Category (I, II, III) Ticket Type (Request or Incident)
Status of Ticket Resolved by Tier
Ticket Priority Requestor/Department
SLA Fulfilled Subject
Technician

When entering your data, pay close attention to the following fields:

  • Time to Resolve: This is automatically calculated using data in the Open Date, Open Time, Close Date, and Close Time fields. You have three options for entering your data in these fields:
    1. Enter your data as the fields describe. Ensure your data contain only the field description (e.g. Open Date separated from Open Time). If your data contain Open Date AND Open Time, Excel will not show both.
    2. Enter your data only in Open Date and Close Date. If your ITSM does not separate date and time, you can keep the data in a single cell and enter it in the column. The formula in Time to Resolve will still be accurate.
    3. If your ITSM outputs Time to Resolve, overwrite the formula in the Time to Resolve column.
  • SLA: If your ITSM outputs SLA fulfilled: Y/N, enter that directly into the SLA Fulfilled column.
  • Blank Columns: If you do not have data for all the columns, that is okay. Continue with the following activity. Note that some stock dashboards will be empty if that is the case.
  • Incidents vs. Service Requests: If you separate incidents and service requests, be sure to capture that in the SR/Incident for Tabs 4 and 5. If you do not separate the two, then you will only need to analyze Tab 3.
Fields Captured
Ticket Number Open Date
Open Time Closed Date
Closed Time Intake Channel
Time to Resolve Site Location
First Contact Resolution Resolution Code
Category (I, II, III) Ticket Type (Request or Incident)
Status of Ticket Resolved by Tier
Ticket Priority Requestor/Department
SLA Fulfilled Subject
Technician

Use Info-Tech’s tool instead of building your own. Download the Service Desk Ticket Analysis Tool.

1.1.4 Update your ticket fields for future analysis

Input: Populated Service Desk Ticket Data Analysis Tool

Output: New ticket fields to track

Materials: Whiteboard/flip charts, Service Desk Ticket Analysis Tool

Participants: Service Desk Manager, Service Desk Technicians

As a group, pay attention to the ticket fields populated in the tool as well as the ticket fields that you were not able to populate. Use the example “Fields Captured” table to the right, which lists all fields present in the ticket analysis tool.

Discuss the following questions:

  1. Consider the fields not captured. Would it be valuable to start capturing that data for future analysis?
  2. If so, does your ITSM support that field?
  3. Can you make the change in-house or do you have to bring in an external ITSM administrator to make the change?
  4. Capture the results in the Ticket Analysis Report.
Example: Fields Captured - Fields Not Captured
Ticket Number Open Date
Open Time Closed Date
Closed Time Intake Channel
Time to Resolve Site Location
First Contact Resolution Resolution Code
Category (I, II, III) Ticket Type (Request or Incident)
Status of Ticket Resolved by Tier
Ticket Priority Requestor/Department
SLA Fulfilled Subject
Technician

Document in the Ticket Analysis Report.

Info-Tech Insight

Don’t wait for your ticket quality to be perfect. You can still draw actions from your ticket data. They will likely be process improvements initially, but the exercise of pulling the data is a necessary first step.

Common ticket fields tracked by your peers

Which of these metrics do you track and action?

  • Remember you don’t have to track every metric. Only track metrics that are actionable.

For each metric that you end up tracking:

  • Look for trends over time.
  • Brainstorm reasons why the metric could rise or fall.

Associate a metric with each improvement you execute.

  • Performing this step will allow you to better see the value from your team’s efforts.
  • It will also give you a quicker response than waiting for spikes in your data.

A bar chart of 'Metrics tracked by other organizations' with the x-axis populated by different metrics and the y-axis as '% organizations who track the metric'. The highest percentage of businesses track 'Ticket volume', then 'Ticket trends by category', then 'Tickets by business units'. The lowest three shown are 'Reopened tickets', 'Cost per ticket', and 'Other'.(Source: Info-Tech survey, 2021; N=20)

PHASE 2

Analyze Your Ticket Data

This phase will walk you through the following activities:

  • 2.1.1 Review high-level ticket dashboards
  • 2.2.1 Review incident, service request, and ticket category dashboards

This phase involves the following participants:

  • Service Desk Manager
  • Service Desk Technicians
  • IT Managers

Visualize your ticket data as a first step to analysis

Identifying trends is easier when looking at diagrams, graphs, and figures

Start your analysis with common visuals employed by other service desk professionals

  • Phase 2 will walk you through visualizing your data to get a better understanding of your ticket intake, incident management, and service request management.
  • Each step will walk you through:
    • Common visualizations used by service desks
    • Patterns to look for in your visualizations
    • Actions to take to address negative patterns and to continue positive trends
  • Share diagrams that underscore both the value being provided by the service desk as well as the scope of the pain points. Use Info-Tech’s Ticket Analysis Report template as a starting point.

“Being able to tell stories with data is a skill that’s becoming ever more important in our world of increasing data and desire for data-driven decision making. An effective data visualization can mean the difference between success and failure when it comes to communicating the findings of your study, raising money for your nonprofit, presenting to your board, or simply getting your point across to your audience.” - Cole Knaflic, Founder and CEO, Storytelling with Data: A Data Visualization Guide for Business Professionals

Use the detailed dashboards to determine the next steps for improvement

A single number doesn’t tell the whole picture

Analyze trends over time:

  • Analyze trends by day, by week, by month, and by year to determine:
    • When are the busy periods? (E.g. Do tickets tend to spike every morning, every Monday, or every September?)
    • When are the slow periods? (E.g. Do tickets drop at the end of the day, at midday, on Fridays, or over the summer?)
  • Are spikes or drops in volume consistent trends or one-time anomalies?

Then build a plan to address them:

  • How will you handle volume spikes, if they’re consistent?
  • What can your resources work on during slow times, if they are consistent?
  • If you assume no shrinkage, can you handle the peaks in volume if you make all FTEs available to work on tickets at a certain time of day?

Sample of a bar chart comparing tickets that were 'Backlog versus Closed by Month Opened'.

Look for seasonal trends. In this example, we see high ticket volumes in May and January, with lower ticket volumes in June and July when many staff are taking holidays. However, also be careful to look at the big picture of how you pulled the data. August through October sees a high volume of open tickets because the data set is pulled in November, not because there’s a seasonal spike on tickets not closing at the end of the fiscal year.

Track ticket data over time

Make low-effort adjustments before major changes

Don’t rush to a decision based off the first numbers you see

Review ticket summary dashboard

Ideally, you should track ticket patterns over an entire year to get a full sense of trends within each month of the year. At minimum, track for 30 days, then 60, then 90, and see if anything changes. The longer you can track ticket patterns, the more accurate your picture will be.

Review additional dashboards

If you separate incidents and service requests, and you have accurate ticket categories, then you can use these dashboards to further break down the data to identify ticket trends.

The output of the ticket analysis will only be as accurate as its input.
To get the most accurate results, first ensure your data is accurate, then analyze it over as much time as possible. Aggregating with accurate data will give you a better picture of the trends in demand that your service desk sees.

Not separating incidents and service requests? Need to fix your ticket categories? Visit Standardize the Service Desk to get started.

Analyze incidents and requests separately

Each type has its own set of customer experiences and expectations

  • Different ticket types are associated with radically different prioritization, routing, and service levels. For instance, most incidents are resolved within a business day, but requests take longer to implement.
  • If you fail to distinguish between ticket types, your metrics will obscure service desk performance.
  • From a ticket analysis standpoint, separating ticket types prior to analysis or, better yet, at intake allows for cleaner data. In turn, this means more structured analyses, better insights, and more meaningful actions. Not separating ticket types may still get you to the same conclusions, but it will be much more difficult to sift through the data.

Incident

An unanticipated interruption of a service.
The goal of incident management is to restore the service as soon as possible, even if the resolution involves a workaround.

Request

A generic description for a small change or service access.
Requests are small, frequent, and low risk. They are best handled by a process distinct from incident, change, and project management.

Not separating incidents and service requests? Need to fix your ticket categories? Visit Standardize the Service Desk to get started.

Step 2.1

Analyze Your High-Level Ticket Data

Dashboards
  • Ticket Volume
  • Ticket Intake
  • Ticket Handling and Resolution
  • Ticket Categorization

This step will walk you through the following activities:

Visualize the current state of your service desk.

This step involves the following participants:

  • Service Desk Manager
  • Service Desk Technicians
  • IT Managers

Outcomes of this step

Build your metrics baseline to compare with future metric results.

Dashboards: Ticket Volume

Example of a dashboard for ticket volume with two bar charts, one breaking down volume by month, and the other marking certain days or weeks in each month.

Analyze your data for insights

  • Analyze volume trends by day, by week, by month, and by year to determine:
    • When are the busy periods? (E.g. Do tickets tend to spike every morning, every Monday, or every September?)
    • When are slow periods? (E.g. Do tickets drop at the end of the day, at midday, on Fridays, or over the summer?)
  • Are spikes or drops in volume consistent trends or one-time anomalies?
  • What can your resources be working on during slow times? Are you able to address ticket backlog?

Dashboards: Ticket Intake

Example of a dashboard for ticket intake with three bar charts, one breaking it down by 'Intake Channel', one by 'Requestor/Department', and one by 'Location'.

Analyze your data for insights

  • Determine how to drive intake to the most appropriate solution for your organization:
    • A web portal is the most efficient intake method, but it must be user friendly to increase its adoption.
    • The phone should be available for urgent requests or incidents. Encourage those who call with a request to submit a ticket through the portal.
    • Discourage use of email if it is unstructured, as users don’t provide enough detail, and often two or three transactions are required for triage.
    • If walk-ups are encouraged, structure and formalize the support so it can be resourced and managed rather than interrupt-driven.

Dashboard: Ticket Handling and Resolution

Example of a dashboard for ticket handling and resolution with three bar charts, one breaking down 'Tickets Resolved by Technician', one by 'Tier', and one by 'Average Time to Resolve (Hours)'.

Analyze your data for insights

  • Look at your ticket load by technician and by tier. This is an essential step to set your baseline to measure your shift-left initiatives. If you are focusing on self-service or Tier 1 training, the ticket load from higher tiers should decrease over time.
  • If Tiers 2 and 3 are handling the majority of the tickets, this could be a red flag indicating tickets are inappropriately escalated or Tier 1 could use more training and support.
  • For average time to resolve and average time to resolve by tier, are you meeting your SLAs? If not, are your SLAs too aggressive? Are tickets left open and not properly closed?

Dashboard: Ticket Categorization

Analyze your data for insights

  • Ticket categorization is critical to clean data. Having a categorization scheme with categories that are miscellaneous, too specific, or too general easily leads to inaccurate reporting or confusing workflows for technicians.
  • When looking at your ticket categories, first look for duplicate categories that could be collapsed into one.
  • Also look at your top five to seven categories and see if they make sense. Are these good candidates in your organization for automation or shift-left?
  • Compare your Tier 1 categories. The level of specificity for these categories should be comparable to easily run reports. If they are not, assess the need for a category redesign.

Example of a dashboard for ticket categorization with one horizontal bar chart, 'Incident Ticket Volume by Level 1 Category'.

Step 2.2

Analyze Incidents, Service Requests, and Ticket Categories

Dashboards
  • Incidents
  • Service Requests
  • Volume by Ticket Category
  • Resolution Times by Priority and/or Category
  • Tabs for More Granular Investigation and Reporting

This step will walk you through the following activities:

Visualize your incident and service request ticket load and analyze trends. Use this information and cross reference data sets to gain a holistic view of how the service desk interacts with IT and the business.

This step involves the following participants:

  • Service Desk Manager
  • Service Desk Technicians
  • IT Managers

Outcomes of this step

Gain actionable, data-driven improvements based on your incident and service request data. Show the value of the service desk and highlight improvements needed.

Incident and Service Requests Dashboard: Priority and SLA

Example of an Incident and Service Requests dashboard for priority and SLA with three charts, one breaking down 'Incident Priority', one 'Average time to resolve (in hours) by priority', and one '% of SLA met'.

Analyze your data for insights

  • Your ticket priority distribution for overall load and time to resolve (TTR) should look something like above with low-priority tickets having higher load and TTR and high/critical-priority tickets having a lower load and lower TTR. If it is reversed, that is a good indication that the service desk is too reactive or isn’t properly prioritizing its work.
  • If your SLA has a high failure rate, consider reassessing your targets with SLOs that you can meet before publishing them as achievable SLAs.

Incident and Service Requests Dashboard: Priority and SLA

Example of an Incident and Service Requests dashboard for resolution and close with three bar charts, one breaking down 'Incident Volume by Resolution Code', one 'Incidents Resolved by Tier', and one 'Average time to resolve (in hours) by Resolution Code'.

Analyze your data for insights

  • Examine your ticket handling by looking at ticket status and resolution codes.
    • If you have a lot of blanks, then tickets are not properly handled. Consider reinforcing your standards for close codes and statuses.
    • Alternatively, if tickets are left open, you may have to build follow-ups on stale tickets into your process or introduce proper auto-close processes.

Category, Resolution Time, and Resolution Code Dashboards

These PivotCharts allow you to dig deeper

Investigate whether there are trends in ticket volume and resolution times within specific categories and subcategories

Tab 6, Category Dashboard; tab 7, Resolution Time Dashboard; and tab 8, Resolution Code Dashboard are PivotCharts. Use these tabs to investigate whether there are trends in ticket volume, resolution times, and resolution codes within specific categories and subcategories.

Start with the charts that are available. The +/- buttons will allow you to show more granular information. By default, this granularity will be into the levels of the ticket categorization scheme.

For most categorization schemes, there will be too many categories to properly graph. You can apply a filter to investigate specific categories by clicking on the drop-down buttons.

Example of dashboards featured on next slide

Use these tabs for more granular investigation and reporting

TAB 6
CATEGORY DASHBOARD
TAB 7
RESOLUTION TIME DASHBOARD
TAB 8
RESOLUTION TIME DASHBOARD
Sample of the 'Ticket Volume by Second, Third Level Category' dashboard tab.
Investigate ticket distributions in first, second, and third levels. Are certain categories overcrowded, suggesting they can be split? Are certain categories not being used?
Sample of the 'Average Resolution Times' dashboard tab.
Do average resolution times match your service level agreements? Do certain categories have significantly different resolution times? Are there areas that can benefit from shift-left?
Sample of the 'Volume of Resolution Codes' dashboard tab.
Are resolution codes being accurately used? Are there trends in resolution codes? Are these codes providing sufficient information for problem management?

PHASE 3

Communicate Your Insights

This phase will walk you through the following activities:

  • 3.1.1 Review common recommendations
  • 3.2.1 Review ticket reports daily
  • 3.2.2 Incorporate ticket data into retrospectives and team updates
  • 3.2.3 Regularly review trends with business leaders
  • 3.2.4 Tell a story with your data

This phase involves the following participants:

  • Service Desk Manager
  • Service Desk Technicians
  • IT Managers

Step 3.1

Build Recommendations Based on Your Ticket Data

Activities
  • 3.1.1 Review common recommendations

This step will walk you through the following activities:

Review common recommendations as a first step to extracting insights from your own data.

This step involves the following participants:

  • Service Desk Manager
  • Service Desk Technicians

Outcomes of this step

You will gain an understanding of the common challenges with service desks and ticket analysis in general. See which ones apply to you to inform your ticket data analysis moving forward.

Review these common recommendations

  1. Fix your ticket categories
    Organize your ticket categorization scheme for proper routing and reporting.
  2. Focus more on self-service
    Self-service is essential to enable shift-left strategies. Focus on knowledgebase processes and portal ease of use.
  3. Update your service catalog
    Improve your service catalog, if necessary, to make it easy for end users to request services and for the service desk to provide those services.
  4. Direct volume toward other channels
    Walk-ups make it more difficult to properly log tickets and assign service desk resources. Drive volume to other channels to improve your ticket quality.
  5. Crosstrain Tier 1 on certain topics
    Tier 1 breadth of knowledge is essential to drive up first contact resolution.
  6. Build more automation
    Identify bottlenecks and challenges with your ticket data to streamline ticket handling and resolution.
  7. Revisit service level agreements
    Update your SLAs and/or SLOs to prioritize expectation management for your end users.
  8. Improve your data quality
    You can only analyze data that exists. Revisit your ticket-handling guidelines and more regularly check tickets to ensure they comply with those standards.

Optimize your processes and look for opportunities for automation

Leverage Info-Tech research to improve service desk processes

Review your service desk processes and tools for optimization opportunities:

  • Clearly establish ticket-handling guidelines.
  • Use ticket templates to reduce time spent entering tickets.
  • Document incident management and service request fulfillment workflows and eliminate any unnecessary steps.
  • Automate manual tasks wherever possible.
  • Build or improve a self-service portal with a knowledgebase to allow users to resolve their own issues, reducing incoming ticket volume to the service desk.
  • Optimize your internal knowledgebase to reduce time spent troubleshooting recurring issues.
  • Leverage AI capabilities to speed up ticket processing and resolution.

Standardize the Service Desk

This project will help you build and improve essential service desk processes, including incident management, request fulfillment, and knowledge management.

Optimize the Service Desk With a Shift-Left Strategy

This project will help you build a strategy to shift service support left to optimize your service desk operations and increase end-user satisfaction.

Step 3.2

Action and Communicate Your Ticket Data

Activities
  • 3.2.1 Review your ticket queues daily
  • 3.2.2 Incorporate ticket data into retrospectives and team status updates
  • 3.2.3 Regularly review trends with business leaders
  • 3.2.4 Tell a story with your data

This step will walk you through the following activities:

Organize your scrums to report on the metrics that will inform daily and monthly operations.

This step involves the following participants:

  • Service Desk Manager
  • Service Desk Technicians
  • IT Managers

Outcomes of this step

Use the dashboards and data to inform your daily and monthly scrums.

3.2.1 Review your ticket queues daily

Clean data is still useless if not used properly

  • The metrics you’ve chosen to measure and visualize in the previous step are useful for informing your day-to-day, week-to-week, and month-to-month strategies for the service desk and IT. Conduct scrums daily to action your dashboard data to help clear ticket queues.
  • Reference your dashboards daily with each IT team.
  • You need to have a dashboard of open tickets assigned to each team.

Review Daily

  • Ticket volume over the last day (look for spikes)
  • SLA breach risks/SLA breaches
  • Recurring incidents
  • Tickets open
  • Tickets handed over (confirmation of handover)

3.2.2 Incorporate ticket data into retrospectives and team status updates

Explain your metric spikes and trends

  • Hold weekly or monthly meetings to review the ticket trends selected during Phases 1 and 2 of this blueprint.
  • Review ticket spikes, identify seasonal trends, and discuss root causes (e.g. projects/changes going live, onboarding blitz).
  • Discuss any actions associated with spikes and seasonal trends (e.g. resource allocation, hiring, training).
  • You can incorporate other IT leaders or departments in this meeting as needed to discuss action items for improvement, quality assurance concerns, customer service concerns, and/or operating level agreement concerns.

Review Weekly/Monthly

  • Ticket volume
  • Ticket category by priority level over time
  • Tickets from different business groups, VIP groups, and different vertical levels
  • Tickets escalated, tickets that didn’t need to be escalated, tickets that were incorrectly escalated
  • Ticket priority levels over time
  • Most requested services
  • Tickets resolved by which group over time
  • Ability to meet SLAs and OLAs over time by different groups

3.2.3 Regularly review trends with business leaders

Use your data to help improve business relationships

Review the following with business leaders:

  • Volume of work done this past time cycle for the leader’s group
  • Trends and spikes in the data and possible explanations for them (note: get their input on the potential causes of trends)
  • Improvements you plan to execute within the service desk
  • Action items you need from the business leader

Use your data to show the value you provide to the group. Schedule quarterly meetings with the heads of different business groups to discuss the work that the service desk does for each group.

Show trends in incidents and service requests: “I see you have a spike in CRM tickets. I’ve been working with the CRM team to address this issue.”

3.2.4 Tell a story with your data

Effectively communicate with the business and leadership

  • With your visualized metrics, organize your story into a presentation for different stakeholder groups. You can use the Ticket Analysis Report as a starting point to provide data about:
    • Value provided by the service desk
    • Successes
    • Opportunities for Improvements
    • Current state of KPIs
  • Include information about the causes of data trends and actions you will take in response to the data.
  • For each of these themes, look at the metrics you’ve chosen to track and see which ones fit to tell the story. Let the data do the talking.
  • Consider supplementing the ticket data with data from other systems. For example, you can include data on transactional customer satisfaction surveys, knowledgebase utilization, and self-service utilization.

Sample of the Ticket Analysis Report.

Download the Ticket Analysis Report.

Ticket Analysis Report

Include the following information as you build your ticket analysis report:

  • Value Provided by the Service Desk
    Start with the value provided by the service desk to different areas of the business. Include information about first contact resolution, average resolution times, ticket volume (e.g. by category, priority, location, requestor).
  • Successes
    Successes is a general field that can include how process improvements have impacted the service desk or how initiatives have enhanced shift-left opportunities. Highlight any positive trends over time.
  • Opportunities for Improvement
    Let the data guide the conversation to where improvements can be made. Day-to-day ops, self-service tools, shifting work left from Tier 2, Tier 3, standardizing a non-standard service, and staffing adjustments are possibilities for this section.
  • Current State of KPIs
    Mean time to resolve, FCR, ticket volume, and end-user satisfaction are great KPIs to include as a starting point.

Sample of the Ticket Analysis Report.

Download the Ticket Analysis Report.

Summary of Accomplishment

Problem Solved

You now have a better understanding of how to action your service desk ticket data, including improvements to your current ticket templates for incidents and service requests.

You also have the data to craft a story to different stakeholder groups to celebrate the successes of the service desk and highlight possible improvements. Continue this exercise iteratively to continue improving the service desk.

Remember, ticket analysis is not a single event but an ongoing initiative. As you track, analyze, and action more data, you will find more improvements.

If you would like additional support, have our analysts guide you through other phases as part of an Info-Tech workshop.

Contact your account representative for more information.

workshops@infotech.com 1-888-670-8889

Additional Support

If you would like additional support, have our analysts guide you through other phases as part of an Info-Tech workshop.

Photo of Benedict Chang.

Contact your account representative for more information.

workshops@infotech.com 1-888-670-8889

To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team. Info-Tech analysts will join you and your team at your location or welcome you to Info-Tech’s historic Toronto office to participate in an innovative onsite workshop.

The following are sample activities that will be conducted by Info-Tech analysts with your team:

Sample of dashboards we saw earlier. Sample of the 'Ticket Analysis Report'.
Analyze your dashboards
An analyst will walk through the ticket data and dashboards with you and your team to help interpret the data and tailor improvements
Populate your ticket data report
Given the action items from this solution set, an analyst will help you craft a report to celebrate the successes and highlight needed improvements in the service desk.

Related Info-Tech Research

Optimize the Service Desk With a Shift-Left Strategy

The best type of service desk ticket is the one that doesn’t exist.

Incident & Problem Management

Don’t let persistent problems govern your department.

Design & Build a User-Facing Service Catalog

Improve user satisfaction with IT with a convenient menu-like catalog.

Bibliography

Bayes, Scarlett. “ITSM: 2021 & Beyond.” Service Desk Institute, 2021. Web.

“Benchmarking Report v.9.” Service Desk Institute, 17 Jan. 2020. Web.

Bennett, Micah. “The 9 Help Desk Metrics That Should Guide Your Customer Support.” Zapier, 3 Dec. 2015. Web.

“Global State of Customer Service: The transformation of customer service from 2015 to present day.” Microsoft Dynamics 365, Microsoft, 2020. Web.

Goodey, Ben. “How to Manually Analyze Support Tickets.” SentiSum, 26 July 2021. Web.

Jadhav, Megha. “Four Metrics to Analyze When Using Ticketing Software.” Vision Helpdesk Blog, 21 Mar. 2016. Web.

Knaflic, Cole Nussbaumer. Storytelling with Data: A Data Visualization Guide for Business Professionals. Wiley, 2015.

Li, Ta Hsin, et al. “Incident Ticket Analytics for IT Application Management Services.” 2014 IEEE International Conference on Services Computing, 2014. Web.

Olson, Sarah. “10 Help Desk Metrics for Service Desks and Internal Help Desks.” Zendesk Blog, Sept. 2021. Web.

Paramesh, S.P., et al. “Classifying the Unstructured IT Service Desk Tickets Using Ensemble of Classifiers.” 2018 3rd International Conference on Computational Systems and Information Technology for Sustainable Solutions (CSITSS), 2018. Web.

Volini, Erica, et al. “2021 Global Human Capital Trends: Special Report.” Deloitte Insights, 21 July 2021. Web.

“What Kind of Analysis You Can Perform on a Ticket Management System.” Commence, 3 Dec. 2019. Web.

INFO-TECH RESEARCH GROUP

Prepare Your Organization to Successfully Embrace the “New Normal”

  • Buy Link or Shortcode: {j2store}422|cart{/j2store}
  • member rating overall impact: 9.3/10 Overall Impact
  • member rating average dollars saved: $61,749 Average $ Saved
  • member rating average days saved: 2 Average Days Saved
  • Parent Category Name: DR and Business Continuity
  • Parent Category Link: /business-continuity
  • The COVID-19 pandemic is creating significant challenges across every sector, but even the deepest crisis will eventually pass. However, many of the changes it has brought to how organizations function are here to stay.
  • As an IT leader, it can be challenging to envision what this future state will look like and how to position IT as a trusted partner to the business to help steer the ship as the crisis abates.

Our Advice

Critical Insight

  • Organizations need to cast their gaze into the “New Normal” and determine an appropriate strategy to stabilize their operations, mitigate ongoing challenges, and seize new opportunities that will be presented in a post-COVID-19 world.
  • IT needs to understand the key trends and permanent changes that will exist following the crisis and develop a proactive roadmap for rapidly adapting their technology stack, processes, and resourcing to adjust to the new normal.

Impact and Result

  • Info-Tech recommends a three-step approach for adapting to the new normal: begin by surveying crucial changes that will occur as a result of the COVID-19 pandemic, assess their relevance to your organization’s unique situation, and create an initiatives roadmap to support the new normal.
  • This mini-blueprint will examine five key themes: changing paradigms for remote work, new product delivery models, more self-service options for customers, greater decentralization and agility for organizational decision making, and a renewed emphasis on security architecture.

Prepare Your Organization to Successfully Embrace the “New Normal” Research & Tools

Read the Research

Understand the five key trends that will persist after the pandemic has passed and create a roadmap of initiatives to help your organization adapt to the "New Normal."

Besides the small introduction, subscribers and consulting clients within this management domain have access to:

  • Prepare Your Organization to Successfully Embrace the “New Normal” Storyboard
[infographic]

Develop an Availability and Capacity Management Plan

  • Buy Link or Shortcode: {j2store}500|cart{/j2store}
  • member rating overall impact: 8.0/10 Overall Impact
  • member rating average dollars saved: $2,840 Average $ Saved
  • member rating average days saved: 10 Average Days Saved
  • Parent Category Name: Availability & Capacity Management
  • Parent Category Link: /availability-and-capacity-management
  • It is crucial for capacity managers to provide capacity in advance of need to maximize availability.
  • In an effort to ensure maximum uptime, organizations are overprovisioning (an average of 59% for compute, and 48% for storage). With budget pressure mounting (especially on the capital side), the cost of this approach can’t be ignored.
  • Half of organizations have experienced capacity-related downtime, and almost 60% wait more than three months for additional capacity.

Our Advice

Critical Insight

  • All too often capacity management is left as an afterthought. The best capacity managers bake capacity management into their organization’s business processes, becoming drivers of value.
  • Communication is key. Build bridges between your organization’s silos, and involve business stakeholders in a dialog about capacity requirements.

Impact and Result

  • Map business metrics to infrastructure component usage, and use your organization’s own data to forecast demand.
  • Project future needs in line with your hardware lifecycle. Never suffer availability issues as a result of a lack of capacity again.
  • Establish infrastructure as a driver of business value, not a “black hole” cost center.

Develop an Availability and Capacity Management Plan Research & Tools

Start here – read the Executive Brief

Read our concise Executive Brief to find out why you should build a capacity management plan, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

Besides the small introduction, subscribers and consulting clients within this management domain have access to:

  • Develop an Availability and Capacity Management Plan – Phases 1-4

1. Conduct a business impact analysis

Determine the most critical business services to ensure availability.

  • Develop an Availability and Capacity Management Plan – Phase 1: Conduct a Business Impact Analysis
  • Business Impact Analysis Tool

2. Establish visibility into core systems

Craft a monitoring strategy to gather usage data.

  • Develop an Availability and Capacity Management Plan – Phase 2: Establish Visibility into Core Systems
  • Capacity Snapshot Tool

3. Solicit and incorporate business needs

Integrate business stakeholders into the capacity management process.

  • Develop an Availability and Capacity Management Plan – Phase 3: Solicit and Incorporate Business Needs
  • Capacity Plan Template

4. Identify and mitigate risks

Identify and mitigate risks to your capacity and availability.

  • Develop an Availability and Capacity Management Plan – Phase 4: Identify and Mitigate Risks

[infographic]

Workshop: Develop an Availability and Capacity Management Plan

Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

1 Conduct a Business Impact Analysis

The Purpose

Determine the most important IT services for the business.

Key Benefits Achieved

Understand which services to prioritize for ensuring availability.

Activities

1.1 Create a scale to measure different levels of impact.

1.2 Evaluate each service by its potential impact.

1.3 Assign a criticality rating based on the costs of downtime.

Outputs

RTOs/RPOs

List of gold systems

Criticality matrix

2 Establish Visibility Into Core Systems

The Purpose

Monitor and measure usage metrics of key systems.

Key Benefits Achieved

Capture and correlate data on business activity with infrastructure capacity usage.

Activities

2.1 Define your monitoring strategy.

2.2 Implement your monitoring tool/aggregator.

Outputs

RACI chart

Capacity/availability monitoring strategy

3 Develop a Plan to Project Future Needs

The Purpose

Determine how to project future capacity usage needs for your organization.

Key Benefits Achieved

Data-based, systematic projection of future capacity usage needs.

Activities

3.1 Analyze historical usage trends.

3.2 Interface with the business to determine needs.

3.3 Develop a plan to combine these two sources of truth.

Outputs

Plan for soliciting future needs

Future needs

4 Identify and Mitigate Risks

The Purpose

Identify potential risks to capacity and availability.

Develop strategies to ameliorate potential risks.

Key Benefits Achieved

Proactive approach to capacity that addresses potential risks before they impact availability.

Activities

4.1 Identify capacity and availability risks.

4.2 Determine strategies to address risks.

4.3 Populate and review completed capacity plan.

Outputs

List of risks

List of strategies to address risks

Completed capacity plan

Further reading

Develop an Availability and Capacity Management Plan

Manage capacity to increase uptime and reduce costs.

ANALYST PERSPECTIVE

The cloud changes the capacity manager’s job, but it doesn’t eliminate it.

"Nobody doubts the cloud’s transformative power. But will its ascent render “capacity manager” an archaic term to be carved into the walls of datacenters everywhere for future archaeologists to puzzle over? No. While it is true that the cloud has fundamentally changed how capacity managers do their jobs , the process is more important than ever. Managing capacity – and, by extent, availability – means minimizing costs while maximizing uptime. The cloud era is the era of unlimited capacity – and of infinite potential costs. If you put the infinity symbol on a purchase order… well, it’s probably not a good idea. Manage demand. Manage your capacity. Manage your availability. And, most importantly, keep your stakeholders happy. You won’t regret it."

Jeremy Roberts,

Consulting Analyst, Infrastructure Practice

Info-Tech Research Group

Availability and capacity management transcend IT

This Research Is Designed For:

✓ CIOs who want to increase uptime and reduce costs

✓ Infrastructure managers who want to deliver increased value to the business

✓ Enterprise architects who want to ensure stability of core IT services

✓ Dedicated capacity managers

This Research Will Help You:

✓ Develop a list of core services

✓ Establish visibility into your system

✓ Solicit business needs

✓ Project future demand

✓ Set SLAs

✓ Increase uptime

✓ Optimize spend

This Research Will Also Assist:

✓ Project managers

✓ Service desk staff

This Research Will Help Them:

✓ Plan IT projects

✓ Better manage availability incidents caused by lack of capacity

Executive summary

Situation

  • IT infrastructure leaders are responsible for ensuring that the business has access to the technology needed to keep the organization humming along. This requires managing capacity and availability.
  • Dependencies go undocumented. Services are provided on an ad hoc basis, and capacity/availability are managed reactively.

Complication

  • Organizations are overprovisioning an average of 59% for compute, and 48% for storage. This is expensive. With budget pressure mounting, the cost of this approach can’t be ignored.
  • Lead time to respond to demand is long. Half of organizations have experienced capacity-related downtime, and almost 60% wait 3+ months for additional capacity. (451 Research, 3)

Resolution

  • Conduct a business impact analysis to determine which of your services are most critical, and require active capacity management that will reap more in benefits than it produces in costs.
  • Establish visibility into your system. You can’t track what you can’t see, and you can’t see when you don’t have proper monitoring tools in place.
  • Develop an understanding of business needs. Use a combination of historical trend analyses and consultation with line of business and project managers to separate wants from needs. Overprovisioning used to be necessary, but is no longer required.
  • Project future needs in line with your hardware lifecycle. Never suffer availability issues as a result of a lack of capacity again.

Info-Tech Insight

  1. Components are critical. The business doesn’t care about components. You, however, are not so lucky…
  2. Ask what the business is working on, not what they need. If you ask them what they need, they’ll tell you – and it won’t be cheap. Find out what they’re going to do, and use your expertise to service those needs.
  3. Cloud shmoud. The role of the capacity manager is changing with the cloud, but capacity management is as important as ever.

Save money and drive efficiency with an effective availability and capacity management plan

Overprovisioning happens because of the old style of infrastructure provisioning (hardware refresh cycles) and because capacity managers don’t know how much they need (either as a result of inaccurate or nonexistent information).

According to 451 Research, 59% of enterprises have had to wait 3+ months for new capacity. It is little wonder, then, that so many opt to overprovision. Capacity management is about ensuring that IT services are available, and with lead times like that, overprovisioning can be more attractive than the alternative. Fortunately there is hope. An effective availability and capacity management plan can help you:

  • Identify your gold systems
  • Establish visibility into them
  • Project your future capacity needs

Balancing overprovisioning and spending is the capacity manager’s struggle.

Availability and capacity management go together like boots and feet

Availability and capacity are not the same, but they are related and can be effectively managed together as part of a single process.

If an IT department is unable to meet demand due to insufficient capacity, users will experience downtime or a degradation in service. To be clear, capacity is not the only factor in availability – reliability, serviceability, etc. are significant as well. But no organization can effectively manage availability without paying sufficient attention to capacity.

"Availability Management is concerned with the design, implementation, measurement and management of IT services to ensure that the stated business requirements for availability are consistently met."

– OGC, Best Practice for Service Delivery, 12

"Capacity management aims to balance supply and demand [of IT storage and computing services] cost-effectively…"

– OGC, Business Perspective, 90

Integrate the three levels of capacity management

Successful capacity management involves a holistic approach that incorporates all three levels.

Business The highest level of capacity management, business capacity management, involves predicting changes in the business’ needs and developing requirements in order to make it possible for IT to adapt to those needs. Influx of new clients from a failed competitor.
Service Service capacity management focuses on ensuring that IT services are monitored to determine if they are meeting pre-determined SLAs. The data gathered here can be used for incident and problem management. Increased website traffic.
Component Component capacity management involves tracking the functionality of specific components (servers, hard drives, etc.), and effectively tracking their utilization and performance, and making predictions about future concerns. Insufficient web server compute.

The C-suite cares about business capacity as part of the organization’s strategic planning. Service leads care about their assigned services. IT infrastructure is concerned with components, but not for their own sake. Components mean services that are ultimately designed to facilitate business.

A healthcare organization practiced poor capacity management and suffered availability issues as a result

CASE STUDY

Industry: Healthcare

Source: Interview

New functionalities require new infrastructure

There was a project to implement an elastic search feature. This had to correlate all the organization’s member data from an Oracle data source and their own data warehouse, and pool them all into an elastic search index so that it could be used by the provider portal search function. In estimating the amount of space needed, the infrastructure team assumed that all the data would be shared in a single place. They didn’t account for the architecture of elastic search in which indexes are shared across multiple nodes and shards are often split up separately.

Beware underestimating demand and hardware sourcing lead times

As a result, they vastly underestimated the amount of space that was needed and ended up short by a terabyte. The infrastructure team frantically sourced more hardware, but the rush hardware order arrived physically damaged and had to be returned to the vendor.

Sufficient budget won’t ensure success without capacity planning

The project’s budget had been more than sufficient to pay for the extra necessary capacity, but because a lack of understanding of the infrastructure impact resulted in improper forecasting, the project ended up stuck in a standstill.

Manage availability and keep your stakeholders happy

If you run out of capacity, you will inevitably encounter availability issues like downtime and performance degradation . End users do not like downtime, and neither do their managers.

There are three variables that are monitored, measured, and analyzed as part of availability management more generally (Valentic).

    1. Uptime:

The availability of a system is the percentage of time the system is “up,” (and not degraded) which can be calculated using the following formula: uptime/(uptime + downtime) x 100%. The more components there are in a system, the lower the availability, as a rule.

    1. Reliability:

The length of time a component/service can go before there is an outage that brings it down, typically measured in hours.

    1. Maintainability:

The amount of time it takes for a component/service to be restored in the event of an outage, also typically measured in hours.

Enter the cloud: changes in the capacity manager role

There can be no doubt – the rise of the public cloud has fundamentally changed the nature of capacity management.

Features of the public cloudImplications for capacity management
Instant, or near-instant, instantiation Lead times drop; capacity management is less about ensuring equipment arrives on time.
Pay-as-you go services Capacity no longer needs to be purchased in bulk. Pay only for what you use and shut down instances that are no longer necessary.
Essentially unlimited scalability Potential capacity is infinite, but so are potential costs.
Offsite hosting Redundancy, but at the price of the increasing importance of your internet connection.

Vendors will sell you the cloud as a solution to your capacity/availability problems

The image contains two graphs. The first graph on the left is titled: Reactive Management, and shows the struggling relationship between capacity and demand. The second graph on the right is titled: Cloud future (ideal), which demonstrates a manageable relationship between capacity and demand over time.

Traditionally, increases in capacity have come in bursts as a reaction to availability issues. This model inevitably results in overprovisioning, driving up costs. Access to the cloud changes the equation. On-demand capacity means that, ideally, nobody should pay for unused capacity.

Reality check: even in the cloud era, capacity management is necessary

You will likely find vendors to nurture the growth of a gap between your expectations and reality. That can be damaging.

The cloud reality does not look like the cloud ideal. Even with the ostensibly elastic cloud, vendors like the consistency that longer-term contracts offer. Enter reserved instances: in exchange for lower hourly rates, vendors offer the option to pay a fee for a reserved instance. Usage beyond the reserved will be billed at a higher hourly rate. In order to determine where that line should be drawn, you should engage in detailed capacity planning. Unfortunately, even when done right, this process will result in some overprovisioning, though it does provide convenience from an accounting perspective. The key is to use spot instances where demand is exceptional and bounded. Example: A university registration server that experiences exceptional demand at the start of term but at no other time.

The image contains an example of cloud reality not matching with the cloud ideal in the form of a graph. The graph is split horizontally, the top half is red, and there is a dotted line splitting it from the lower half. The line is labelled: Reserved instance ceiling. In the bottom half, it is the colour green and has a curving line.

Use best practices to optimize your cloud resources

The image contains two graphs. The graph on the left is labelled: Ineffective reserve capacity. At the top of the graph is a dotted line labelled: Reserved Instance ceiling. The graph is measuring capacity requirements over time. There is a curved line on the graph that suddenly spikes and comes back down. The spike is labelled unused capacity. The graph on the right is labelled: Effective reserve capacity. The reserved instance ceiling is about halfway down this graph, and it is comparing capacity requirements over time. This graph has a curved line on it, also has a spike and is labelled: spot instance.

Even in the era of elasticity, capacity planning is crucial. Spot instances – the spikes in the graph above – are more expensive, but if your capacity needs vary substantially, reserving instances for all of the space you need can cost even more money. Efficiently planning capacity will help you draw this line.

Evaluate business impact; not all systems are created equal

Limited resources are a reality. Detailed visibility into every single system is often not feasible and could be too much information.

Simple and effective. Sometimes a simple display can convey all of the information necessary to manage critical systems. In cars it is important to know your speed, how much fuel is in the tank, and whether or not you need to change your oil/check your engine.

Where to begin?! Specialized information is sometimes necessary, but it can be difficult to navigate.

Take advantage of a business impact analysis to define and understand your critical services

Ideally, downtime would be minimal. In reality, though, downtime is a part of IT life. It is important to have realistic expectations about its nature and likelihood.

STEP 1

STEP 2

STEP 3

STEP 4

STEP 5

Record applications and dependencies

Utilize your asset management records and document the applications and systems that IT is responsible for managing and recovering during a disaster.

Define impact scoring scale

Ensure an objective analysis of application criticality by establishing a business impact scale that applies to all applications.

Estimate impact of downtime

Leverage the scoring criteria from the previous step and establish an estimated impact of downtime for each application.

Identify desired RTO and RPO

Define what the RTOs/RPOs should be based on the impact of a business interruption and the tolerance for downtime and data loss.

Determine current RTO/RPO

Conduct tabletop planning and create a flowchart of your current capabilities. Compare your current state to the desired state from the previous step.

Info-Tech Insight

According to end users, every system is critical and downtime is intolerable. Of course, once they see how much totally eliminating downtime can cost, they might change their tune. It is important to have this discussion to separate the critical from the less critical – but still important – services.

Establish visibility into critical systems

You may have seen “If you can’t measure it, you can’t manage it” or a variation thereof floating around the internet. This adage is consumable and makes sense…doesn’t it?

"It is wrong to suppose that if you can’t measure it, you can’t manage it – a costly myth."

– W. Edwards Deming, statistician and management consultant, author of The New Economics

While it is true that total monitoring is not absolutely necessary for management, when it comes to availability and capacity – objectively quantifiable service characteristics – a monitoring strategy is unavoidable. Capturing fluctuations in demand, and adjusting for those fluctuations, is among the most important functions of a capacity manager, even if hovering over employees with a stopwatch is poor management.

Solicit needs from line of business managers

Unless you head the world’s most involved IT department (kudos if you do) you’re going to have to determine your needs from the business.

Do

Do not

✓ Develop a positive relationship with business leaders responsible for making decisions.

✓ Make yourself aware of ongoing and upcoming projects.

✓ Develop expertise in organization-specific technology.

✓ Make the business aware of your expenses through chargebacks or showbacks.

✓ Use your understanding of business projects to predict business needs; do not rely on business leaders’ technical requests alone.

X Be reactive.

X Accept capacity/availability demands uncritically.

X Ask line of business managers for specific computing requirements unless they have the technical expertise to make informed judgments.

X Treat IT as an opaque entity where requests go in and services come out (this can lead to irresponsible requests).

Demand: manage or be managed

You might think you can get away with uncritically accepting your users’ demands, but this is not best practice. If you provide it, they will use it.

The company meeting

“I don’t need this much RAM,” the application developer said, implausibly. Titters wafted above the assembled crowd as her IT colleagues muttered their surprise. Heads shook, eyes widened. In fact, as she sat pondering her utterance, the developer wasn’t so sure she believed it herself. Noticing her consternation, the infrastructure manager cut in and offered the RAM anyway, forestalling the inevitable crisis that occurs when seismic internal shifts rock fragile self-conceptions. Until next time, he thought.

"Work expands as to fill the resources available for its completion…"

– C. Northcote Parkinson, quoted in Klimek et al.

Combine historical data with the needs you’ve solicited to holistically project your future needs

Predicting the future is difficult, but when it comes to capacity management, foresight is necessary.

Critical inputs

In order to project your future needs, the following inputs are necessary.

  1. Usage trends: While it is true that past performance is no indication of future demand, trends are still a good way to validate requests from the business.
  2. Line of business requests: An understanding of the projects the business has in the pipes is important for projecting future demand.
  3. Institutional knowledge: Read between the lines. As experts on information technology, the IT department is well-equipped to translate needs into requirements.
The image contains a graph that is labelled: Projected demand, and graphs demand over time. There is a curved line that passes through a vertical line labelled present. There is a box on top of the graph that contains the text: Note: confidence in demand estimates will very by service and by stakeholder.

Follow best practice guidelines to maximize the efficiency of your availability and capacity management process

The image contains Info-Tech's IT Management & Governance Framework. The framework displays many of Info-Tech's research to help optimize and improve core IT processes. The name of this blueprint is under the Infrastructure & Operations section, and has been circled to point out where it is in the framework.

Understand how the key frameworks relate and interact

The image contains a picture of the COBIT 5 logo.

BA104: Manage availability and capacity

  • Current state assessment
  • Forecasting based on business requirements
  • Risk assessment of planning and implementation of requirements
The image contains a picture of the ITIL logo

Availability management

  • Determine business requirements
  • Match requirements to capabilities
  • Address any mismatch between requirements and capabilities in a cost-effective manner

Capacity management

  • Monitoring services and components
  • Tuning for efficiency
  • Forecasting future requirements
  • Influencing demand
  • Producing a capacity plan
The image contains a picture of Info-Tech Research Group logo.

Availability and capacity management

  • Conduct a business impact analysis
  • Establish visibility into critical systems
  • Solicit and incorporate business needs
  • Identify and mitigate risks

Disaster recovery and business continuity planning are forms of availability management

The scope of this project is managing day-to-day availability, largely but not exclusively, in the context of capacity. For additional important information on availability, see the following Info-Tech projects.

    • Develop a Business Continuity Plan

If your focus is on ensuring process continuity in the event of a disaster.

    • Establish a Program to Enable Effective Performance Monitoring

If your focus is on flow mapping and transaction monitoring as part of a plan to engage APM vendors.

    • Create a Right-Sized Disaster Recovery Plan

If your focus is on hardening your IT systems against major events.

Info-Tech’s approach to availability and capacity management is stakeholder-centered and cloud ready

Phase 1:

Conduct a business impact analysis

Phase 2:

Establish visibility into core systems

Phase 3:

Solicit and incorporate business needs

Phase 4:

Identify and mitigate risks

1.1 Conduct a business impact analysis

1.2 Assign criticality ratings to services

2.1 Define your monitoring strategy

2.2 Implement monitoring tool/aggregator

3.1 Solicit business needs

3.2 Analyze data and project future needs

4.1 Identify and mitigate risks

Deliverables

  • Business impact analysis
  • Gold systems
  • Monitoring strategy
  • List of stakeholders
  • Business needs
  • Projected capacity needs
  • Risks and mitigations
  • Capacity management summary cards

Info-Tech offers various levels of support to best suit your needs

DIY Toolkit

“Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful.”

Guided Implementation

“Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track.”

Workshop

“We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place.”

Consulting

“Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project.”

Diagnostics and consistent frameworks used throughout all four options

Availability & capacity management – project overview

 

Conduct a business impact analysis

Establish visibility into core systems

Solicit and incorporate business needs

Identify and
mitigate risks

Best-Practice Toolkit

1.1 Create a scale to measure different levels of impact

1.2 Assign criticality ratings to services

2.1 Define your monitoring strategy

2.2 Implement your monitoring tool/aggregator

3.1 Solicit business needs and gather data

3.2 Analyze data and project future needs

4.1 Identify and mitigate risks

Guided Implementations

Call 1: Conduct a business impact analysis Call 1: Discuss your monitoring strategy

Call 1: Develop a plan to gather historical data; set up plan to solicit business needs

Call 2: Evaluate data sources

Call 1: Discuss possible risks and strategies for risk mitigation

Call 2: Review your capacity management plan

Onsite Workshop

Module 1:

Conduct a business impact analysis

Module 2:

Establish visibility into core systems

Module 3:

Develop a plan to project future needs

Module 4:

Identify and mitigate risks

 

Phase 1 Results:

  • RTOs/RPOs
  • List of gold systems
  • Criticality matrix

Phase 2 Results:

  • Capacity/availability monitoring strategy

Phase 3 Results:

  • Plan for soliciting future needs
  • Future needs

Phase 4 Results:

  • Strategies for reducing risks
  • Capacity management plan

Workshop overview

Contact your account representative or email Workshops@InfoTech.com for more information.

 

Workshop Day 1

Workshop Day 2

Workshop Day 3

Workshop Day 4

 

Conduct a business
impact analysis

Establish visibility into
core systems

Solicit and incorporate business needs

Identify and mitigate risks

Activities

1.1 Conduct a business impact analysis

1.2 Create a list of critical dependencies

1.3 Identify critical sub-components

1.4 Develop best practices to negotiate SLAs

2.1 Determine indicators for sub-components

2.2 Establish visibility into components

2.3 Develop strategies to ameliorate visibility issues

3.1 Gather relevant business-level data

3.2 Gather relevant service-level data

3.3 Analyze historical trends

3.4 Build a list of business stakeholders

3.5 Directly solicit requirements from the business

3.6 Map business needs to technical requirements

3.7 Identify inefficiencies and compare historical data

  • 4.1 Brainstorm potential causes of availability and capacity risk
  • 4.2 Identify and mitigate capacity risks
  • 4.3 Identify and mitigate availability risks

Deliverables

  1. Business impact analysis
  2. List of gold systems
  3. SLA best practices
  1. Sub-component metrics
  2. Strategy to establish visibility into critical sub-components
  1. List of stakeholders
  2. Business requirements
  3. Technical requirements
  4. Inefficiencies
  1. Strategies for mitigating risks
  2. Completed capacity management plan template

PHASE 1

Conduct a Business Impact Analysis

Step 1.1: Conduct a business impact analysis

This step will walk you through the following activities:

  • Record applications and dependencies in the Business Impact Analysis Tool.
  • Define a scale to estimate the impact of various applications’ downtime.
  • Estimate the impact of applications’ downtime.

This involves the following participants:

  • Capacity manager
  • Infrastructure team

Outcomes of this step

  • Estimated impact of downtime for various applications

Execute a business impact analysis (BIA) as part of a broader availability plan

1.1a Business Impact Analysis Tool

Business impact analyses are an invaluable part of a broader IT strategy. Conducting a BIA benefits a variety of processes, including disaster recovery, business continuity, and availability and capacity management

STEP 1

STEP 2

STEP 3

STEP 4

STEP 5

Record applications and dependencies

Utilize your asset management records and document the applications and systems that IT is responsible for managing and recovering during a disaster.

Define impact scoring scale

Ensure an objective analysis of application criticality by establishing a business impact scale that applies to all applications.

Estimate impact of downtime

Leverage the scoring criteria from the previous step and establish an estimated impact of downtime for each application.

Identify desired RTO and RPO

Define what the RTOs/RPOs should be based on the impact of a business interruption and the tolerance for downtime and data loss.

Determine current RTO/RPO

Conduct tabletop planning and create a flowchart of your current capabilities. Compare your current state to the desired state from the previous step.

Info-Tech Insight

Engaging in detailed capacity planning for an insignificant service draws time and resources away from more critical capacity planning exercises. Time spent tracking and planning use of the ancient fax machine in the basement is time you’ll never get back.

Control the scope of your availability and capacity management planning project with a business impact analysis

Don’t avoid conducting a BIA because of a perception that it’s too onerous or not necessary. If properly managed, as described in this blueprint, the BIA does not need to be onerous and the benefits are tangible.

A BIA enables you to identify appropriate spend levels, continue to drive executive support, and prioritize disaster recovery planning for a more successful outcome. For example, an Info-Tech survey found that a BIA has a significant impact on setting appropriate recovery time objectives (RTOs) and appropriate spending.

The image contains a graph that is labelled: BIA Impact on Appropriate RTOS. With no BIA, there is 59% RTOs are appropriate. With BIA, there is 93% RTOS being appropriate. The image contains a graph that is labelled: BIA Impact on Appropriate Spending. No BIA has 59% indication that BCP is cost effective. With a BIA there is 86% indication that BCP is cost effective.

Terms

No BIA: lack of a BIA, or a BIA bases solely on the perceived importance of IT services.

BIA: based on a detailed evaluation or estimated dollar impact of downtime.

Source: Info-Tech Research Group; N=70

Select the services you wish to evaluate with the Business Impact Analysis Tool

1.1b 1 hour

In large organizations especially, collating an exhaustive list of applications and services is going to be onerous. For the purposes of this project, a subset should suffice.

Instructions

  1. Gather a diverse group of IT staff and end users in a room with a whiteboard.
  2. Solicit feedback from the group. Questions to ask:
  • What services do you regularly use? What do you see others using? (End users)
  • Which service inspires the greatest number of service calls? (IT)
  • What services are you most excited about? (Management)
  • What services are the most critical for business operations? (Everybody)
  • Record these applications in the Business Impact Analysis Tool.
  • Input

    • Applications/services

    Output

    • Candidate applications for the business impact analysis

    Materials

    • Whiteboard
    • Markers

    Participants

    • Infrastructure manager
    • Enterprise architect
    • Application owners
    • End users

    Info-Tech Insight

    Include a variety of services in your analysis. While it might be tempting to jump ahead and preselect important applications, don’t. The process is inherently valuable, and besides, it might surprise you.

    Record the applications and dependencies in the BIA tool

    1.1c Use tab 1 of the Business Impact Analysis Tool

    1. In the Application/System column, list the applications identified for this pilot as well as the Core Infrastructure category. Also indicate the Impact on the Business and Business Owner.
    2. List the dependencies for each application in the appropriate columns:
    • Hosted On-Premises (In-House) – If the physical equipment is in a facility you own, record it here, even if it is managed by a vendor.
    • Hosted by a Co-Lo/MSP – List any dependencies hosted by a co-lo/MSP vendor.
    • Cloud (includes "as a Service”) – List any dependencies hosted by a cloud vendor.

    Note: If there are no dependencies for a particular category, leave it blank.

  • If you wish to highlight specific dependencies, put an asterisk in front of them (e.g. *SAN). This will cause the dependency to be highlighted in the remaining tabs in this tool.
  • Add comments as needed in the Notes columns. For example, for equipment that you host in-house but is remotely managed by an MSP, specify this in the notes. Similarly, note any DR support services.
  • Example

    The image contains a screenshot of Info-Tech's Business Impact Analysis Tool specifically tab 1.

    ID is optional. It is a sequential number by default.

    In-House, Co-Lo/MSP, and Cloud dependencies; leave blank if not applicable.

    Add notes as applicable – e.g. critical support services.

    Define a scoring scale to estimate different levels of impact

    1.1d Use tab 2 of the Business Impact Analysis Tool

    Modify the Business Impact Scales headings and Overall Criticality Rating terminology to suit your organization. For example, if you don’t have business partners, use that column to measure a different goodwill impact or just ignore that column in this tool (i.e. leave it blank). Estimate the different levels of potential impact (where four is the highest impact and zero is no impact) and record these in the Business Impact Scales columns.

    The image contains a screenshot of Info-Tech's Business Impact Analysis Tool, specifically tab 2.

    Estimate the impact of downtime for each application

    1.1e Use tab 3 of the Business Impact Analysis Tool

    In the BIA tab columns for Direct Costs of Downtime, Impact on Goodwill, and Additional Criticality Factors, use the drop-down menu to assign a score of zero to four based on levels of impact defined in the Scoring Criteria tab. For example, if an organization’s ERP is down, and that affects call center sales operations (e.g. ability to access customer records and process orders), the impact might be as described below:

      • Loss of Revenue might score a two or three depending on the proportion of overall sales lost due to the downtime.
      • The Impact on Customers might be a one or two depending on the extent that existing customers might be using the call center to purchase new products or services, and are frustrated by the inability to process orders.
      • The Legal/Regulatory Compliance and Health or Safety Risk might be a zero.

    On the other hand, if payroll processing is down, this may not impact revenue, but it certainly impacts internal goodwill and productivity.

    Rank service criticality: gold, silver, and bronze

    Gold

    Mission critical services. An outage is catastrophic in terms of cost or public image/goodwill. Example: trading software at a financial institution.

    Silver

    Important to daily operations, but not mission critical. Example: email services at any large organization.

    Bronze

    Loss of these services is an inconvenience more than anything, though they do serve a purpose and will be missed if they are never brought back online. Example: ancient fax machines.

    Info-Tech Best Practice

    Info-Tech recommends gold, silver, and bronze because of this typology’s near universal recognition. If you would prefer a particular designation (it might help with internal comprehension), don’t hesitate to use that one instead.

    Use the results of the business impact analysis to sort systems based on their criticality

    1.1f 1 hour

    Every organization has its own rules about how to categorize service importance. For some (consumer-facing businesses, perhaps) reputational damage may trump immediate costs.

    Instructions

    1. Gather a group of key stakeholders and project the completed Business Impact Analysis Tool onto a screen for them.
    2. Share the definitions of gold, silver, and bronze services with them (if they are not familiar), and begin sorting the services by category,
    • How long would it take to notice if a particular service went out?
    • How important are the non-quantifiable damages that could come with an outage?
  • Sort the services into gold, silver, and bronze on a whiteboard, with sticky notes, or with chart paper.
  • Verify your findings and record them in section 2.1 of the Capacity Plan Template.
  • Input

    • Results of the business impact analysis exercise

    Output

    • List of gold, silver, and bronze systems

    Materials

    • Projector
    • Business Impact Analysis Tool
    • Capacity Plan Template

    Participants

    • Infrastructure manager
    • Enterprise architect

    Leverage the rest of the BIA tool as part of your disaster recovery planning

    Disaster recovery planning is a critical activity, and while it is a sort of availability management, it is beyond this project’s scope. You can complete the business impact analysis (including RTOs and RPOs) for the complete disaster recovery package.

    See Info-Tech’s Create a Right-Sized Disaster Recovery Plan blueprint for instructions on how to complete your business impact analysis.

    Step 1.2: Assign criticality ratings to services

    This step will walk you through the following activities:

    • Create a list of dependencies for your most important applications.
    • Identify important sub-components.
    • Use best practices to develop and negotiate SLAs.

    This involves the following participants:

    • Capacity manager
    • Infrastructure team

    Outcomes of this step

    • List of dependencies of most important applications
    • List of important sub-components
    • SLAs based on best practices

    Determine the base unit of the capacity you’re looking to purchase

    Not every IT organization should approach capacity the same way. Needs scale, and larger organizations will inevitably deal in larger quantities.

    Large cloud provider

    Local traditional business

    • Thousands of servers housed in a number of datacenters around the world.
    • Dedicated capacity manager.
    • Purchases components from OEMs in bulk as part of bespoke contracts that are worth many millions of dollars over time.
    • May deal with components at a massive scale (dozens of servers at once, for example).
    • A small server room that runs non-specialized services (email, for example).
    • Barely even a dedicated IT person, let alone an IT capacity manager.
    • Purchases new components from resellers or even retail stores.
    • Deals with components at a small scale (a single switch here, a server upgrade there).

    "Cloud capacity management is not exactly the same as the ITIL version because ITIL has a focus on the component level. I actually don’t do that, because if I did I’d go crazy. There’s too many components in a cloud environment."

    – Richie Mendoza, IT Consultant, SMITS Inc.

    Consider the relationship between component capacity and service capacity

    End users’ thoughts about IT are based on what they see. They are, in other words, concerned with service availability: does the organization have the ability to provide access to needed services?

    Service

    • Email
    • CRM
    • ERP

    Component

    • Switch
    • SMTP server
    • Archive database
    • Storage

    "You don’t ask the CEO or the guy in charge ‘What kind of response time is your requirement?’ He doesn’t really care. He just wants to make sure that all his customers are happy."

    – Todd Evans, Capacity and Performance Management SME, IBM.

    One telco solved its availability issues by addressing component capacity issues

    CASE STUDY

    Industry: Telecommunications

    Source: Interview

    Coffee and Wi-Fi – a match made in heaven

    In tens of thousands of coffee shops around the world, patrons make ample use of complimentary Wi-Fi. Wi-Fi is an important part of customers’ coffee shop experience, whether they’re online to check their email, do a YouTube, or update their Googles. So when one telco that provided Wi-Fi access for thousands of coffee shops started encountering availability issues, the situation was serious.

    Wi-Fi, whack-a-mole, and web woes

    The team responsible for resolving the issue took an ad hoc approach to resolving complaints, fixing issues as they came up instead of taking a systematic approach.

    Resolution

    Looking at the network as a whole, the capacity manager took a proactive approach by using data to identify and rank the worst service areas, and then directing the team responsible to fix those areas in order of the worst first, then the next worst, and so on. Soon the availability of Wi-Fi service was restored across the network.

    Create a list of dependencies for your most important applications

    1.2a 1.5 hours

    Instructions

    1. Work your way down the list of services outlined in step 1, starting with your gold systems. During the first iteration of this exercise select only 3-5 of your most important systems.
    2. Write the name of each application on a sticky note or at the top of a whiteboard (leaving ample space below for dependency mapping).
    3. In the first tier below the application, include the specific services that the general service provides.
    • This will vary based on the service in question, but an example for email is sending, retrieving, retrieving online, etc.
  • For each of the categories identified in step 3, identify the infrastructure components that are relevant to that system. Be broad and sweeping; if the component is involved in the service, include it here. The goal is to be exhaustive.
  • Leave the final version of the map intact. Photographing or making a digital copy for posterity. It will be useful in later activities.
  • Input

    • List of important applications

    Output

    • List of critical dependencies

    Materials

    • Whiteboard
    • Markers
    • Sticky notes

    Participants

    • Infrastructure manager
    • Enterprise architect

    Info-Tech Insight

    Dependency mapping can be difficult. Make sure you don’t waste effort creating detailed dependency maps for relatively unimportant services.

    Dependency mapping can be difficult. Make sure you don’t waste effort creating detailed dependency maps for relatively unimportant services.

    The image contains a sample dependency map on ride sharing. Ride Sharing has been split between two categories: Application and Drivers. Under drivers it branches out to: Availability, Car, and Pay. Under Application, it branches out to: Compute, Network, Edge devices, Q/A maintenance, and Storage. Compute branches out to Cloud Services. Network branches out to Cellular network and Local. Edge Devices branch out to Drivers and Users. Q/A maintenance does not have a following branch. Storage branches out to Storage (Enterprise) and Storage (local).

    Ride sharing cannot work, at least not at maximum effectiveness, without these constituent components. When one or more of these components are absent or degraded, the service will become unavailable. This example illustrates some challenges of capacity management; some of these components are necessary, but beyond the ride-sharing company’s control.

    Leverage a sample dependency tree for a common service

    The image contains a sample dependency tree for the Email service. Email branches out to: Filtering, Archiving, Retrieval, and Send/receive. Filtering branches out to security appliance which then branches out to CPU, Storage, and Network. Archiving branches to Archive server, which branches out to CPU, Storage, and Network. Retrieval branches out to IMAP/PoP which branches out to CPU, Storage, and Network. Send/receive branches out to IMAP/PoP and SMTP. SMTP branches out to CPU, Storage and Network.

    Info-Tech Best Practice

    Email is an example here not because it is necessarily a “gold system,” but because it is common across industries. This is a useful exercise for any service, but it can be quite onerous, so it should be conducted on the most important systems first.

    Separate the wheat from the chaff; identify important sub-components and separate them from unimportant ones

    1.2b 1.5 hours

    Use the bottom layer of the pyramid drawn in step 1.2a for a list of important sub-components.

    Instructions

    1. Record a list of the gold services identified in the previous activity. Leave space next to each service for sub-components.
    2. Go through each relevant sub-component. Highlight those that are critical and could reasonably be expected to cause problems.
    • Has this sub-component caused a problem in the past?
    • Is this sub-component a bottleneck?
    • What could cause this component to fail? Is it such an occurrence feasible?
  • Record the results of the exercise (and the service each sub-component is tied to) in tab 2 (columns B &C) of the Capacity Snapshot Tool.
  • Input

    • List of important applications

    Output

    • List of critical dependencies

    Materials

    • Whiteboard
    • Markers

    Participants

    • Infrastructure manager
    • Enterprise architect

    Understand availability commitments with SLAs

    With the rise of SaaS, cloud computing, and managed services, critical services and their components are increasingly external to IT.

    • IT’s lack of access to the internal working of services does not let them off the hook for performance issues (as much as that might be the dream).
    • Vendor management is availability management. Use the dependency map drawn earlier in this phase to highlight the components of critical services that rely on capacity that cannot be managed internally.
    • For each of these services ensure that an appropriate SLA is in place. When acquiring new services, ensure that the vendor SLA meets business requirements.

    The image contains a large blue circle labelled: Availability. Also in the blue circle is a small red circle labelled: Capacity.

    In terms of service provision, capacity management is a form of availability management. Not all availability issues are capacity issues, but the inverse is true.

    Info-Tech Insight

    Capacity issues will always cause availability issues, but availability issues are not inherently capacity issues. Availability problems can stem from outages unrelated to capacity (e.g. power or vendor outages).

    Use best practices to develop and negotiate SLAs

    1.2c 20 minutes per service

    When signing contracts with vendors, you will be presented with an SLA. Ensure that it meets your requirements.

    1. Use the business impact analysis conducted in this project’s first step to determine your requirements. How much downtime can you tolerate for your critical services?
    2. Once you have been presented with an SLA, be sure to scour it for tricks. Remember, just because a vendor offers “five nines” of availability doesn’t mean that you’ll actually get that much uptime. It could be that the vendor is comfortable eating the cost of downtime or that the contract includes provisions for planned maintenance. Whether or not the vendor anticipated your outage does little to mitigate the damage an outage can cause to your business, so be careful of these provisions.
    3. Ensure that the person ultimately responsible for the SLA (the approver) understands the limitations of the agreement and the implications for availability.

    Input

    • List of external component dependencies

    Output

    • SLA requirements

    Materials

    • Whiteboard
    • Markers

    Participants

    • Infrastructure manager
    • Enterprise architect

    Info-Tech Insight

    Vendors are sometimes willing to eat the cost of violating SLAs if they think it will get them a contract. Be careful with negotiation. Just because the vendor says they can do something doesn’t make it true.

    Negotiate internal SLAs using Info-Tech’s rigorous process

    Talking past each other can drive misalignment between IT and the business, inconveniencing all involved. Quantify your needs through an internal SLA as part of a comprehensive availability management plan.

    See Info-Tech’s Improve IT-Business Alignment Through an Internal SLA blueprint for instructions on why you should develop internal SLAs and the potential benefits they bring.

    If you want additional support, have our analysts guide you through this phase as part of an Info-Tech workshop.

    The image contains a picture of an Info-Tech analyst.

    Book a workshop with our Info-Tech analysts:

    • To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team.
    • Info-Tech analysts will join you and your team onsite at your location or welcome you to Info-Tech’s historic Toronto office to participate in an innovative onsite workshop.
    • Contact your account manager (www.infotech.com/account), or email Workshops@InfoTech.com for more information.

    The following are sample activities that will be conducted by Info-Tech analysts with your team:

    1.2

    The image contains a screenshot of activity 1.2 as previously described above.

    Create a list of dependencies for your most important applications

    Using the results of the business impact analysis, the analyst will guide workshop participants through a dependency mapping exercise that will eventually populate the Capacity Plan Template.

    Phase 1 Guided Implementation

    Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.

    Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.

    Guided Implementation 1: Conduct a business impact analysis

    Proposed Time to Completion: 1 week

    Step 1.1: Create a scale to measure different levels of impact

    Review your findings with an analyst

    Discuss how you arrived at the rating of your critical systems and their dependencies. Consider whether your external SLAs are appropriate.

    Then complete these activities…

    • Use the results of the business impact analysis to sort systems based on their criticality

    With these tools & templates:

    Business Impact Analysis Tool

    Step 1.2: Assign criticality ratings to services

    Review your findings with an analyst

    Discuss how you arrived at the rating of your critical systems and their dependencies. Consider whether your external SLAs are appropriate.

    Then complete these activities…

    • Create a list of dependencies for your most important applications
    • Identify important sub-components
    • Use best practices to develop and negotiate SLAs

    With these tools & templates:

    Capacity Snapshot Tool

    Phase 1 Results & Insights:

    • Engaging in detailed capacity planning for an insignificant service is a waste of resources. Focus on ensuring availability for your most critical systems.
    • Carefully evaluate vendors’ service offerings. Make sure the SLA works for you, and approach pie-in-the-sky promises with skepticism.

    PHASE 2

    Establish Visibility Into Core Systems

    Step 2.1: Define your monitoring strategy

    This step will walk you through the following activities:

    • Determine the indicators you should be tracking for each sub-component.

    This involves the following participants:

    • Capacity manager
    • Infrastructure team

    Outcomes of this step

    • List of indicators to track for each sub-component

    Data has its significance—but also its limitations

    The rise of big data can be a boon for capacity managers, but be warned: not all data is created equal. Bad data can lead to bad decisions – and unemployed capacity managers.

    Your findings are only as good as your data. Remember: garbage in, garbage out. There are three characteristics of good data:*

    1. Accuracy: is the data exact and correct? More detail and confidence is better.
    2. Reliability: is the data consistent? In other words, if you run the same test twice will you get the same results?
    3. Validity: is the information gleaned believable and relevant?

    *National College of Teaching & Leadership, “Reliability and Validity”

    "Data is king. Good data is absolutely essential to [the capacity manager] role."

    – Adrian Blant, Independent Capacity Consultant, IT Capability Solutions

    Info-Tech Best Practice

    Every organization’s data needs are different; your data needs are going to be dictated by your services, delivery model, and business requirements. Make sure you don’t confuse volume with quality, even if others in your organization make that mistake.

    Take advantage of technology to establish visibility into your systems

    Managing your availability and capacity involves important decisions about what to monitor and how thresholds should be set.

    • Use the list of critical applications developed through the business impact analysis and the list of components identified in the dependency mapping exercise to produce a plan for effectively monitoring component availability and capacity.
    • The nature of IT service provision – the multitude of vendors providing hardware and services necessary for even simple IT services to work effectively – means that it is unlikely that capacity management will be visible through a single pane of glass. In other words, “email” and “CRM” don’t have a defined capacity. It always depends.
    • Establishing visibility into systems involves identifying what needs to be tracked for each component.

    Too much monitoring can be as bad as the inverse

    In 2013, a security breach at US retailer Target compromised more than 70 million customers’ data. The company received an alert, but it was thought to be a false positive because the monitoring system produced so many false and redundant alerts. As a result of the daily deluge, staff did not respond to the breach in time.

    Info-Tech Insight

    Don’t confuse monitoring with management. While establishing visibility is a crucial step, it is only part of the battle. Move on to this project’s next phase to explore opportunities to improve your capacity/availability management process.

    Determine the indicators you should be tracking for each sub-component

    2.1a Tab 3 of the Capacity Snapshot Tool

    It is nearly impossible to overstate the importance of data to the process of availability and capacity management. But the wrong data will do you no good.

    Instructions

    1. Open the Capacity Snapshot Tool to tab 2. The tool should have been populated in step 1.2 as part of the component mapping exercise.
    2. For each service, determine which metric(s) would most accurately tell the component’s story. Consider the following questions when completing this activity (you may end up with more than one metric):
    • How would the component’s capacity be measured (storage space, RAM, bandwidth, vCPUs)?
    • Is the metric in question actionable?
  • Record each metric in the Metric column (D) of the Capacity Snapshot Tool. Use the adjacent column for any additional information on metrics.
  • Info-Tech Insight

    Bottlenecks are bad. Use the Capacity Snapshot Tool (or another tool like it) to ensure that when the capacity manager leaves (on vacation, to another role, for good) the knowledge that they have accumulated does not leave as well.

    Understand the limitations of this approach

    Although we’ve striven to make it as easy as possible, this process will inevitably be cumbersome for organizations with a complicated set of software, hardware, and cloud services.

    Tracking every single component in significant detail will produce a lot of noise for each bit of signal. The approach outlined here addresses that concern in two ways:

    • A focus on gold services
    • A focus on sub-components that have a reasonable likelihood of being problematic in the future.

    Despite this effort, however, managing capacity at the component level is a daunting task. Ultimately, tools provided by vendors like SolarWinds and AppDynamics will fill in some of the gaps. Nevertheless, an understanding of the conceptual framework underlying availability and capacity management is valuable.

    Step 2.2: Implement your monitoring tool/aggregator

    This step will walk you through the following activities:

    • Clarify visibility.
    • Determine whether or not you have sufficiently granular visibility.
    • Develop strategies to .any visibility issues.

    This involves the following participants:

    • Capacity manager
    • Infrastructure team
    • Applications personnel

    Outcomes of this step

    • Method for measuring and monitoring critical sub-components

    Companies struggle with performance monitoring because 95% of IT shops don’t have full visibility into their environments

    CASE STUDY

    Industry: Financial Services

    Source: AppDynamics

    Challenge

    • Users are quick to provide feedback when there is downtime or application performance degradation.
    • The challenge for IT teams is that while they can feel the pain, they don’t have visibility into the production environment and thus cannot identify where the pain is coming from.
    • The most common solution that organizations rely on is leveraging the log files for issue diagnosis. However, this method is slow and often unable to pinpoint the problem areas, leading to delays in problem resolution.

    Solution

    • Application and infrastructure teams need to work together to develop infrastructure flow maps and transaction profiles.
    • These diagrams will highlight the path that each transaction travels across your infrastructure.
    • Ideally at this point, teams will also capture latency breakdowns across every tier that the business transaction flows through.
      • This will ultimately kick start the baselining process.

    Results

    • Ninety-five percent of IT departments don’t have full visibility into their production environment. As a result, a slow business transaction will often require a war-room approach where SMEs from across the organization gather to troubleshoot.
    • Having visibility into the production environment through infrastructure flow mapping and transaction profiling will help IT teams pinpoint problems.
      • At the very least, teams will be able to identify common problem areas and expedite the root-cause analysis process.

    Source: “Just how complex can a Login Transaction be? Answer: Very!,” AppDynamics

    Monitor your critical sub-components

    Establishing a monitoring plan for your capacity involves answering two questions: can I see what I need to see, and can I see it with sufficient granularity?

    • Having the right tool for the job is an important step towards effective capacity and availability management.
    • Application performance management tools (APMs) are essential to the process, but they tend to be highly specific and vertically oriented, like using a microscope.
    • Some product families can cover a wider range of capacity monitoring functions (SolarWinds, for example). It is still important, however, to codify your monitoring needs.

    "You don’t use a microscope to monitor an entire ant farm, but you might use many microscopes to monitor specific ants."

    – Fred Chagnon, Research Director, Infrastructure Practice, Info-Tech Research Group

    Monitor your sub-components: clarify visibility

    2.2a Tab 2 of the Capacity Snapshot Tool

    The next step in capacity management is establishing whether or not visibility (in the broad sense) is available into critical sub-components.

    Instructions

    1. Open the Capacity Snapshot Tool and record the list of sub-components identified in the previous step.
    2. For each sub-component answer the following question:
    • Do I have easy access to the information I need to monitor to ensure this component remains available?
  • Select “Yes” or “No” from the drop-down menus as appropriate. In the adjacent column record details about visibility into the component.
    • What tool provides the information? Where can it be found?

    The image contains a screenshot of Info-Tech's Capacity Snapshot Tool, Tab 2.

    Monitor your sub-components; determine whether or not you have sufficient granular visibility

    2.2b Tab 2 of the Capacity Snapshot Tool

    Like ideas and watches, not all types of visibility are created equal. Ensure that you have access to the right information to make capacity decisions.

    Instructions

    1. For each of the sub-components clarify the appropriate level of granularity for the visibility gained to be useful. In the case of storage, for example, is raw usage (in gigabytes) sufficient, or do you need a breakdown of what exactly is taking up the space? The network might be more complicated.
    2. Record the details of this ideation in the adjacent column.
    3. Select “Yes” or “No” from the drop-down menu to track the status of each sub-component.

    The image contains a picture of an iPhone storage screen where it breaks down the storage into the following categories: apps, media, photos, and other.

    For most mobile phone users, this breakdown is sufficient. For some, more granularity might be necessary.

    Info-Tech Insight

    Make note of monitoring tools and strategies. If anything changes, be sure to re-evaluate the visibility status. An outdated spreadsheet can lead to availability issues if management is unaware of looming problems.

    Develop strategies to ameliorate any visibility issues

    2.2c 1 hour

    The Capacity Snapshot Tool color-codes your components by status. Green – visibility and granularity are both sufficient; yellow – visibility exists, though not at sufficient granularity; and red – visibility does not exist at all.

    Instructions

    1. Write each of the yellow and red sub-components on a whiteboard or piece of chart paper.
    2. Brainstorm amelioration strategies for each of the problematic sub-components.
    • Does the current monitoring tool have sufficient functionality?
    • Does it need to be further configured/customized?
    • Do we need a whole new tool?
  • Record these strategies in the Amelioration Strategy column on tab 4 of the tool.
  • Input

    • Sub-components
    • Capacity Snapshot Tool

    Output

    • Amelioration strategies

    Materials

    • Whiteboard
    • Markers
    • Capacity Snapshot Tool

    Participants

    • Infrastructure manager

    Info-Tech Best Practice

    It might be that there is no amelioration strategy. Make note of this difficulty and highlight it as part of the risk section of the Capacity Plan Template.

    See Info-Tech’s projects on storage and network modernization for additional details

    Leverage other products for additional details on how to modernize your network and storage services.

    The process of modernizing the network is fraught with vestigial limitations. Develop a program to gather requirements and plan.

    As part of the blueprint, Modernize Enterprise Storage, the Modernize Enterprise Storage Workbook includes a section on storage capacity planning.

    If you want additional support, have our analysts guide you through this phase as part of an Info-Tech workshop.

    The image contains a picture of an Info-Tech analyst.

    Book a workshop with our Info-Tech analysts:

    • To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team.
    • Info-Tech analysts will join you and your team onsite at your location or welcome you to Info-Tech’s historic Toronto office to participate in an innovative onsite workshop.
    • Contact your account manager (www.infotech.com/account), or email Workshops@InfoTech.com for more information.

    The following are sample activities that will be conducted by Info-Tech analysts with your team:

    2.2

    The image contains a screenshot of activity 2.2.

    Develop strategies to ameliorate visibility issues

    The analyst will guide workshop participants in brainstorming potential solutions to visibility issues and record them in the Capacity Snapshot Tool.

    Phase 2 Guided Implementation

    Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.

    Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.

    Guided Implementation 2: Establish visibility into core systems

    Proposed Time to Completion: 3 weeks

    Step 2.1: Define your monitoring strategy

    Review your findings with an analyst

    Discuss your monitoring strategy and ensure you have sufficient visibility for the needs of your organization.

    Then complete these activities…

    • Determine the indicators you should be tracking for each sub-component

    With these tools & templates:

    • Capacity Snapshot Tool

    Step 2.2: Implement your monitoring tool/aggregator

    Review your findings with an analyst

    Discuss your monitoring strategy and ensure you have sufficient visibility for the needs of your organization.

    Then complete these activities…

    • Clarify visibility
    • Determine whether or not you have sufficiently granular visibility
    • Develop strategies to ameliorate any visibility issues

    With these tools & templates:

    • Capacity Snapshot Tool

    Phase 2 Results & Insights:

    • Every organization’s data needs are different. Adapt data gathering, reporting, and analysis according to your services, delivery model, and business requirements.
    • Don’t confuse monitoring with management. Build a system to turn reported data into useful information that feeds into the capacity management process.

    PHASE 3

    Solicit and Incorporate Business Needs

    Step 3.1: Solicit business needs and gather data

    This step will walk you through the following activities:

    • Build relationships with business stakeholders.
    • Analyze usage data and identify trends.
    • Correlate usage trends with business needs.

    This involves the following participants:

    • Capacity manager
    • Infrastructure team members
    • Business stakeholders

    Outcomes of this step

    • System for involving business stakeholders in the capacity planning process
    • Correlated data on business level, service level, and infrastructure level capacity usage

    Summarize your capacity planning activities in the Capacity Plan Template

    The availability and capacity management summary card pictured here is a handy way to capture the results of the activities undertaken in the following phases. Note its contents carefully, and be sure to record specific outputs where appropriate. One such card should be completed for each of the gold services identified in the project’s first phase. Make note of the results of the activities in the coming phase, and populate the Capacity Snapshot Tool. These will help you populate the tool.

    The image contains a screenshot of Info-Tech's Capacity Plan Template.

    Info-Tech Best Practice

    The Capacity Plan Template is designed to be a part of a broader mapping strategy. It is not a replacement for a dedicated monitoring tool.

    Analyze historical trends as a crucial source of data

    The first place to look for information about your organization is not industry benchmarks or your gut (though those might both prove useful).

    • Where better to look than internally? Use the data you’ve gathered from your APM tool or other sources to understand your historical capacity needs and to highlight any periods of unavailability.
    • Consider monitoring the status of the capacity of each of your crucial components. The nature of this monitoring will vary based on the component in question. It can range from a rough Excel sheet all the way to a dedicated application performance monitoring tool.

    "In all cases the very first thing to do is to look at trending…The old adage is ‘you don’t steer a boat by its wake,’ however it’s also true that if something is growing at, say, three percent a month and it has been growing at three percent a month for the last twelve months, there’s a fairly good possibility that it’s going to carry on going in that direction."

    – Mike Lynch, Consultant, CapacityIQ

    Gather relevant data at the business level

    3.1a 2 hours per service

    A holistic approach to capacity management involves peering beyond the beaded curtain partitioning IT from the rest of the organization and tracking business metrics.

    Instructions

    1. Your service/application owners know how changes in business activities impact their systems. Business level capacity management involves responding to those changes. Ask service/application owners what changes will impact their capacity. Examples include:
    • Business volume (net new customers, number of transactions)
    • Staff changes (new hires, exits, etc.)
  • For each gold service, brainstorm relevant metrics. How can you capture that change in business volume?
  • Record these metrics in the summary card of the Capacity Plan Template.
  • In the notes section of the summary card record whether or not you have access to the required business metric.
  • Input

    • Brainstorming
    • List of gold services

    Output

    • Business level data

    Materials

    • In-house solution or commercial tool

    Participants

    • Capacity manager
    • Application/service owners

    Gather relevant data at the service level

    3.1b 2 hours per service

    One level of abstraction down is the service level. Service level capacity management, recall that service level capacity management is about ensuring that IT is meeting SLAs in its service provision.

    Instructions

    1. There should be internal SLAs for each service IT offers. (If not, that’s a good place to start. See Info-Tech’s research on the subject.) Prod each of your service owners for information on the metrics that are relevant for their SLAs. Consider the following:
    • Peak hours, requests per second, etc.
    • This will usually include some APM data.
  • Record these metrics in the summary card of the Capacity Plan Template.
  • Include any visibility issues in the notes in a similar section of the Capacity Plan Template.
  • Input

    • Brainstorming
    • List of gold services

    Output

    • Service level data

    Materials

    • In-house solution or commercial tool

    Participants

    • Capacity manager
    • Application/service owners

    Leverage the visibility into your infrastructure components and compare all of your data over time

    You established visibility into your components in the second phase of this project. Use this data, and that gathered at the business and service levels, to begin analyzing your demand over time.

    • Different organizations will approach this issue differently. Those with a complicated service catalog and a dedicated capacity manager might employ a tool like TeamQuest. If your operation is small, or you need to get your availability and capacity management activities underway as quickly as possible, you might consider using a simple spreadsheet software like Excel.
    • If you choose the latter option, select a level of granularity (monthly, weekly, etc.) and produce a line graph in Excel.
    • Example: Employee count (business metric)

    Jan

    Feb

    Mar

    Apr

    May

    June

    July

    74

    80

    79

    83

    84

    100

    102

    The image contains a graph using the example of employee count described above.

    Note: the strength of this approach is that it is easy to visualize. Use the same timescale to facilitate simple comparison.

    Manage, don’t just monitor; mountains of data need to be turned into information

    Information lets you make a decision. Understand the questions you don’t need to ask, and ask the right ones.

    "Often what is really being offered by many analytics solutions is just more data or information – not insights."

    – Brent Dykes, Director of Data Strategy, Domo

    Info-Tech Best Practice

    You can have all the data in the world and absolutely nothing valuable to add. Don’t fall for this trap. Use the activities in this phase to structure your data collection operation and ensure that your organization’s availability and capacity management plan is data driven.

    Analyze historical trends and track your services’ status

    3.1c Tab 3 of the Capacity Snapshot Tool

    At-a-glance – it’s how most executives consume all but the most important information. Create a dashboard that tracks the status of your most important systems.

    Instructions

    1. Consult infrastructure leaders for information about lead times for new capacity for relevant sub-components and include that information in the tool.
    • Look to historical lead times. (How long does it traditionally take to get more storage?)
    • If you’re not sure, contact an in-house expert, or speak to your vendor
  • Use tab 3 of the tool to record whether your existing capacity will be exceeded before you can stand more hardware up (red), you have a plan to ameliorate capacity issues but new capacity is not yet in place (yellow), or if you are not slated to run out of capacity any time soon (green).
  • Repeat the activity regularly. Include notes about spikes that might present capacity challenges, and information about when capacity may run out.
  • This tool collates and presents information gathered from other sources. It is not a substitute for a performance monitoring tool.

    Build a list of key business stakeholders

    3.1d 10 minutes

    Stakeholder analysis is crucial. Lines of authority can be diffuse. Understand who needs to be involved in the capacity management process early on.

    Instructions

    1. With the infrastructure team, brainstorm a group of departments, roles, and people who may impact demand on capacity.
    2. Go through the list with your team and identify stakeholders from two groups:
    • Line of business: who in the business makes use of the service?
    • Application owner: who in IT is responsible for ensuring the service is up?
  • Insert the list into section 3 of the Capacity Plan Template, and update as needed.
  • Input

    • Gold systems
    • Personnel Information

    Output

    • List of key business stakeholders

    Materials

    • Whiteboard
    • Markers

    Participants

    • Capacity manager
    • Infrastructure staff

    Info-Tech Best Practice

    Consider which departments are most closely aligned with the business processes that fuel demand. Prioritize those that have the greatest impact. Consider the stakeholders who will make purchasing decisions for increasing infrastructure capacity.

    Organize stakeholder meetings

    3.1e 10 hours

    Establishing a relationship with your stakeholders is a necessary step in managing your capacity and availability.

    Instructions

    1. Gather as many of the stakeholders identified in the previous activity as you can and present information on availability and capacity management
    • If you can’t get everyone in the same room, a virtual meeting or even an email blast could get the job done.
  • Explain the importance of capacity and availability management
    • Consider highlighting the trade-offs between cost and availability.
  • Field any questions the stakeholders might have about the process. Be honest. The goal of this meeting is to build trust. This will come in handy when you’re gathering business requirements.
  • Propose a schedule and seek approval from all present. Include the results in section 3 of the Capacity Plan Template.
  • Input

    • List of business stakeholders
    • Hard work

    Output

    • Working relationship, trust
    • Regular meetings

    Materials

    • Work ethic
    • Executive brief

    Participants

    • Capacity manager
    • Business stakeholders

    Info-Tech Insight

    The best capacity managers develop new business processes that more closely align their role with business stakeholders. Building these relationships takes hard work, and you must first earn the trust of the business.

    Bake stakeholders into the planning process

    3.1f Ongoing

    Convince, don’t coerce. Stakeholders want the same thing you do. Bake them into the planning process as a step towards this goal.

    1. Develop a system to involve stakeholders regularly in the capacity planning process.
    • Your system will vary depending on the structure and culture of your organization.
    • See the case study on the following slide for ideas.
    • It may be as simple as setting a recurring reminder in your own calendar to touch base with stakeholders.
  • Liaise with stakeholders regularly to keep abreast of new developments.
    • Ensure stakeholders have reasonable expectations about IT’s available resources, the costs of providing capacity, and the lead times required to source additional needed capacity.
  • Draw on these stakeholders for the step “Gather information on business requirements” later in this phase.
  • Input

    • List of business stakeholders
    • Ideas

    Output

    • Capacity planning process that involves stakeholders

    Materials

    • Meeting rooms

    Participants

    • Capacity manager
    • Business stakeholders
    • Infrastructure team

    A capacity manager in financial services wrangled stakeholders and produced results

    CASE STUDY

    Industry: Financial Services

    Source: Interview

    In financial services, availability is king

    In the world of financial services, availability is absolutely crucial. High-value trades occur at all hours, and any institution that suffers outages runs the risk of losing tens of thousands of dollars, not to mention reputational damage.

    People know what they want, but sometimes they have to be herded

    While line of business managers and application owners understand the value of capacity management, it can be difficult to establish the working relationship necessary for a fruitful partnership.

    Proactively building relationships keeps services available

    He built relationships with all the department heads on the business side, and all the application owners.

    • He met with department heads quarterly.
    • He met with application owners and business liaisons monthly.

    He established a steering committee for capacity.

    He invited stakeholders to regular capacity planning meetings.

    • The first half of each meeting was high-level outlook, such as business volume and IT capacity utilization, and included stakeholders from other departments.
    • The second half of the meeting was more technical, serving the purpose for the infrastructure team.

    He scheduled lunch and learn sessions with business analysts and project managers.

    • These are the gatekeepers of information, and should know that IT needs to be involved when things come down the pipeline.

    Step 3.2: Analyze data and project future needs

    This step will walk you through the following activities:

    • Solicit needs from the business.
    • Map business needs to technical requirements, and technical requirements to infrastructure requirements.
    • Identify inefficiencies in order to remedy them.
    • Compare the data across business, component, and service levels, and project your capacity needs.

    This involves the following participants:

    • Capacity manager
    • Infrastructure team members
    • Business stakeholders

    Outcomes of this step

    • Model of how business processes relate to technical requirements and their demand on infrastructure
    • Method for projecting future demand for your organization’s infrastructure
    • Comparison of current capacity usage to projected demand

    “Nobody tells me anything!” – the capacity manager’s lament

    Sometimes “need to know” doesn’t register with sales or marketing. Nearly every infrastructure manager can share a story about a time when someone has made a decision that has critically impacted IT infrastructure without letting anyone in IT in on the “secret.”

    In brief

    The image contains a picture of a man appearing to be overwhelmed.

    Imagine working for a media company as an infrastructure capacity manager. Now imagine that the powers that be have decided to launch a content-focused web service. Seems like something they would do, right? Now imagine you find out about it the same way the company’s subscribers do. This actually happened – and it shouldn’t have. But a similar lack of alignment makes this a real possibility for any organization. If you don’t establish a systematic plan for soliciting and incorporating business requirements, prepare to lose a chunk of your free time. The business should never be able to say, in response to “nobody tells me anything,” “nobody asked.”

    Pictured: an artist’s rendering of the capacity manager in question.

    Directly solicit requirements from the business

    3.2a 30 minutes per stakeholder

    Once you’ve established, firmly, that everyone’s on the same team, meet individually with the stakeholders to assess capacity.

    Instructions

    1. Schedule a one-on-one meeting with each line of business manager (stakeholders identified in 3.1). Ideally this will be recurring.
    • Experienced capacity managers suggest doing this monthly.
  • In the meeting address the following questions:
    • What are some upcoming major initiatives?
    • Is the department going to expand or contract in a noticeable way?
    • Have customers taken to a particular product more than others?
  • Include the schedule in the Capacity Plan Template, and consider including details of the discussion in the notes section in tab 3 of the Capacity Snapshot Tool.
  • Input

    • Stakeholder opinions

    Output

    • Business requirements

    Materials

    • Whiteboard
    • Markers

    Participants

    • Capacity manager
    • Infrastructure staff

    Info-Tech Insight

    Sometimes line of business managers will evade or ignore you when you come knocking. They do this because they don’t know and they don’t want to give you the wrong information. Explain that a best guess is all you can ask for and allay their fears.

    Below, you will find more details about what to look for when soliciting information from the line of business manager you’ve roped into your scheme.

    1. Consider the following:
    • Projected sales pipeline
    • Business growth
    • Seasonal cycles
    • Marketing campaigns
    • New applications and features
    • New products and services
  • Encourage business stakeholders to give you their best guess for elements such as projected sales or business growth.
  • Estimate variance and provide a range. What can you expect at the low end? The high end? Record your historical projections for an idea of how accurate you are.
  • Consider carefully the infrastructure impact of new features (and record this in the notes section of the Capacity Snapshot Tool).
  • Directly solicit requirements from the business (optional)

    3.2a 1 hour

    IT staff and line of business staff come with different skillsets. This can lead to confusion, but it doesn’t have to. Develop effective information solicitation techniques.

    Instructions

    1. Gather your IT staff in a room with a whiteboard. As a group, select a gold service/line of business manager you would like to use as a “practice dummy.”
    2. Have everyone write down a question they would ask of the line of business representative in a hypothetical business/service capacity discussion.
    3. As a group discuss the merits of the questions posed:
    • Are they likely to yield productive information?
    • Are they too vague or specific?
    • Is the person in question likely to know the answer?
    • Is the information requested a guarded trade secret?
  • Discuss the findings and include any notes in section 3 of the Capacity Plan Template.
  • Input

    • Workshop participants’ ideas

    Output

    • Interview skills

    Materials

    • Whiteboard
    • Markers
    • Sticky notes

    Participants

    • Capacity manager
    • Infrastructure staff

    Map business needs to technical requirements, and technical requirements to infrastructure requirements

    3.2b 5 hours

    When it comes to mapping technical requirements, IT alone has the ability to effectively translate business needs.

    Instructions

    1. Use your notes from stakeholder meetings to assess the impact of any changes on gold systems.
    2. For each system brainstorm with infrastructure staff (and any technical experts as necessary) about what the information gleaned from stakeholder discussions. Consider the following discussion points:
    • How has demand for the service been trending? Does it match what the business is telling us?
    • Have we had availability issues in the past?
    • Has the business been right with their estimates in the past?
  • Estimate what a change in business/service metrics means for capacity.
    • E.g. how much RAM does a new email user require?
  • Record the output in the summary card of the Capacity Plan Template.
  • Input

    • Business needs

    Output

    • Technical and infrastructure requirements

    Materials

    • Whiteboard
    • Markers

    Participants

    • Capacity manager
    • Infrastructure staff

    Info-Tech Insight

    Adapt the analysis to the needs of your organization. One capacity manager called the one-to-one mapping of business process to infrastructure demand the Holy Grail of capacity management. If this level of precision isn’t attainable, develop your own working estimates using the higher-level data

    Avoid putting too much faith in the cloud as a solution to your problem

    Has the rise of on-demand, functionally unlimited services eliminated the need for capacity and availability management?

    Capacity management

    The role of the capacity manager is changing, but it still has a purpose. Consider this:

    • Not everything can move to the cloud. For security/functionality reasons, on-premises infrastructure will continue to exist.
    • Cost management is more relevant than ever in the cloud age. Manage your instances.
    • While a cloud migration might render some component capacity management functions irrelevant, it could increase the relevance of others (the network, perhaps).

    Availability management

    Ensuring services are available is still IT’s wheelhouse, even if that means a shift to a brokerage model:

    • Business availability requirements (as part of the business impact analysis, potentially) are important; internal SLAs and contracts with vendors need to be managed.
    • Even in the cloud environment, availability is not guaranteed. Cloud providers have outages (unplanned, maintenance related, etc.) and someone will have to understand the limitations of cloud services and the impact on availability.

    Info-Tech Insight

    The cloud comes at the cost of detailed performance data. Sourcing a service through an SLA with a third party increases the need to perform your own performance testing of gold level applications. See performance monitoring.

    Beware Parkinson’s law

    A consequence of our infinite capacity for creativity, people have the enviable skill of making work. In 1955, C. Northcote Parkinson pointed out this fact in The Economist . What are the implications for capacity management?

    "It is a commonplace observation that work expands so as to fill the time available for its completion. Thus, an elderly lady of leisure can spend the entire day in writing and despatching a postcard to her niece at Bognor Regis. An hour will be spent in finding the postcard, another in hunting for spectacles, half-an-hour in a search for the address, an hour and a quarter in composition, and twenty minutes in deciding whether or not to take an umbrella when going to the pillar-box in the next street."

    C. Northcote Parkinson, The Economist, 1955

    Info-Tech Insight

    If you give people lots of capacity, they will use it. Most shops are overprovisioned, and in some cases that’s throwing perfectly good money away. Don’t be afraid to prod if someone requests something that doesn’t seem right.

    Optimally align demand and capacity

    When it comes to managing your capacity, look for any additional efficiencies.

    Questions to ask:

    • Are there any infrastructure services that are not being used to their full potential, sitting idle, or allocated to non-critical or zombie functions?
      • Are you managing your virtual servers? If, for example, you experience a seasonal spike in demand, are you leaving virtual machines running after the fact?
    • Do your organization’s policies and your infrastructure setup allow for the use of development resources for production during periods of peak demand?
    • Can you make organizational or process changes in order to satisfy demand more efficiently?

    In brief

    Who isn’t a sports fan? Big games mean big stakes for pool participants and armchair quarterbacks—along with pressure on the network as fans stream games from their work computers. One organization suffered from this problem, and, instead of taking a hardline and banning all streams, opted to stream the game on a large screen in a conference room where those interested could work for its duration. This alleviated strain on the network and kept staff happy.

    Shutting off an idle cloud to cut costs

    CASE STUDY

    Industry:Professional Services

    Source:Interview

    24/7 AWS = round-the-clock costs

    A senior developer realized that his development team had been leaving AWS instances running without any specific reason.

    Why?

    The development team appreciated the convenience of an always-on instance and, because the people spinning them up did not handle costs, the problem wasn’t immediately apparent.

    Resolution

    In his spare time over the course of a month, the senior developer wrote a program to manage the servers, including shutting them down during times when they were not in use and providing remote-access start-up when required. His team alone saved $30,000 in costs over the next six months, and his team lead reported that it would have been more than worth paying the team to implement such a project on company time.

    Identify inefficiencies in order to remediate them

    3.2c 20 minutes per service

    Instructions

    1. Gather the infrastructure team together and discuss existing capacity and demand. Use the inputs from your data analysis and stakeholder meetings to set the stage for your discussion.
    2. Solicit ideas about potential inefficiencies from your participants:
    • Are VMs effectively allocated? If you need 7 VMs to address a spike, are those VMs being reallocated post-spike?
    • Are developers leaving instances running in the cloud?
    • Are particular services massively overprovisioned?
    • What are the biggest infrastructure line items? Are there obvious opportunities for cost reduction there?
  • Record any potential opportunities in the summary of the Capacity Plan Template.
  • Input

    • Gold systems
    • Data inputs

    Output

    • Inefficiencies

    Materials

    • Whiteboard
    • Markers

    Participants

    • Capacity manager
    • Infrastructure staff

    Info-Tech Insight

    The most effective capacity management takes a holistic approach and looks at the big picture in order to find ways to eliminate unnecessary infrastructure usage, or to find alternate or more efficient sources of required capacity.

    Dodging the toll troll by rerouting traffic

    CASE STUDY

    Industry:Telecommunications

    Source: Interview

    High-cost lines

    The capacity manager at a telecommunications provider mapped out his firm’s network traffic and discovered they were using a number of VP circuits (inter building cross connects) that were very expensive on the scale of their network.

    Paying the toll troll

    These VP circuits were supplying needed network services to the telecom provider’s clients, so there was no way to reduce this demand.

    Resolution

    The capacity manager analyzed where the traffic was going and compared this to the cost of the lines they were using. After performing the analysis, he found he could re-route much of the traffic away from the VP circuits and save on costs while delivering the same level of service to their users.

    Compare the data across business, component, and service levels, and project your capacity needs

    3.2d 2 hour session/meeting

    Make informed decisions about capacity. Remember: retain all documentation. It might come in handy for the justification of purchases.

    Instructions

    1. Using either a dedicated tool or generic spreadsheet software like Excel or Sheets, evaluate capacity trends. Ask the following questions:
    • Are there times when application performance degraded, and the service level was disrupted?
    • Are there times when certain components or systems neared, reached, or exceeded available capacity?
    • Are there seasonal variations in demand?
    • Are there clear trends, such as ongoing growth of business activity or the usage of certain applications?
    • What are the ramifications of trends or patterns in relation to infrastructure capacity?
  • Use the insight gathered from stakeholders during the stakeholder meetings, project required capacity for the critical components of each gold service.
  • Record the results of this activity in the summary card of the Capacity Plan Template.
  • Compare current capacity to your projections

    3.2e Section 5 of the Capacity Plan Template

    Capacity management (and, by extension, availability management) is a combination of two balancing acts: cost against capacity and supply and demand.*

    Instructions

    1. Compare your projections with your reality. You already know whether or not you have enough capacity given your lead times. But do you have too much? Compare your sub-component capacity projections to your current state.
    2. Highlight any outliers. Is there a particular service that is massively overprovisioned?
    3. Evaluate the reasons for the overprovisioning.
    • Is the component critically important?
    • Did you get a great deal on hardware?
    • Is it an oversight?
  • Record the results in the notes section of the summary card of the Capacity Plan Template.
  • *Office of Government Commerce 2001, 119.

    In brief

    The fractured nature of the capacity management space means that every organization is going to have a slightly different tooling strategy. No vendor has dominated, and every solution requires some level of customization. One capacity manager (a cloud provider, no less!) relayed a tale about a capacity management Excel sheet programmed with 5,000+ lines of code. As much work as that is, a bespoke solution is probably unavoidable.

    If you want additional support, have our analysts guide you through this phase as part of an Info-Tech workshop.

    The image contains a picture of an Info-Tech analyst.

    Book a workshop with our Info-Tech analysts:

    • To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team.
    • Info-Tech analysts will join you and your team onsite at your location or welcome you to Info-Tech’s historic Toronto office to participate in an innovative onsite workshop.
    • Contact your account manager (www.infotech.com/account), or email Workshops@InfoTech.com for more information.

    The following are sample activities that will be conducted by Info-Tech analysts with your team:

    3.2

    The image contains a screenshot of activity 3.2.

    Map business needs to technical requirements and technical requirements to infrastructure requirements

    The analyst will guide workshop participants in using their organization’s data to map out the relationships between applications, technical requirements, and the underlying infrastructure usage.

    Phase 3 Guided Implementation

    Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.

    Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.

    Guided Implementation 3: Solicit and incorporate business needs

    Proposed Time to Completion: 2 weeks

    Step 3.1: Solicit business needs and gather data

    Review your findings with an analyst

    Discuss the effectiveness of your strategies to involve business stakeholders in the planning process and your methods of data collection and analysis.

    Then complete these activities…

    • Analyze historical trends and track your services’ status
    • Build a list of key business stakeholders
    • Bake stakeholders into the planning process

    With these tools & templates:

    Capacity Plan Template

    Step 3.2: Analyze data and project future needs

    Review your findings with an analyst

    Discuss the effectiveness of your strategies to involve business stakeholders in the planning process and your methods of data collection and analysis.

    Then complete these activities…

    • Map business needs to technical requirements and technical requirements to infrastructure requirements
    • Compare the data across business, component, and service levels, and project your capacity needs
    • Compare current capacity to your projections

    With these tools & templates:

    Capacity Snapshot Tool

    Capacity Plan Template

    Phase 3 Results & Insights:

    • Develop new business processes that more closely align your role with business stakeholders. Building these relationships takes hard work, and won’t happen overnight.
    • Take a holistic approach to eliminate unnecessary infrastructure usage or source capacity more efficiently.

    PHASE 4

    Identify and Mitigate Risks

    Step 4.1: Identify and mitigate risks

    This step will walk you through the following activities:

    • Identify potential risks.
    • Determine strategies to mitigate risks.
    • Complete your capacity management plan.

    This involves the following participants:

    • Capacity manager
    • Infrastructure team members
    • Business stakeholders

    Outcomes of this step

    • Strategies for reducing risks
    • Capacity management plan

    Understand what happens when capacity/availability management fails

    1. Services become unavailable. If availability and capacity management are not constantly practiced, an inevitable consequence is downtime or a reduction in the quality of that service. Critical sub-component failures can knock out important systems on their own.
    2. Money is wasted. In response to fears about availability, it’s entirely possible to massively overprovision or switch entirely to a pay-as-you-go model. This, unfortunately, brings with it a whole host of other problems, including overspending. Remember: infinite capacity means infinite potential cost.
    3. IT remains reactive and is unable to contribute more meaningfully to the organization. If IT is constantly putting out capacity/availability-related fires, there is no room for optimization and activities to increase organizational maturity. Effective availability and capacity management will allow IT to focus on other work.

    Mitigate availability and capacity risks

    Availability: how often a service is usable (that is to say up and not too degraded to be effective). Consequences of reduced availability can include financial losses, impacted customer goodwill, and reduced faith in IT more generally.

    Causes of availability issues:

    • Poor capacity management – a service becomes unavailable when there is insufficient supply to meet demand. This is the result of poor capacity management.
    • Scheduled maintenance – services go down for maintenance with some regularity. This needs to be baked into service-level negotiations with vendors.
    • Vendor outages – sometimes vendors experience unplanned outages. There is typically a contract provision that covers unplanned outages, but that doesn’t change the fact that your service will be interrupted.

    Capacity: a particular component’s/service’s/business’ wiggle room. In other words, its usage ceiling.

    Causes of capacity issues:

    • Poor demand management – allowing users to run amok without any regard for how capacity is sourced and paid for.
    • Massive changes in legitimate demand – more usage means more demand.
    • Poor capacity planning – predictable changes in demand that go unaddressed can lead to capacity issues.

    Add additional potential causes of availability and capacity risks as needed

    4.1a 30 minutes

    Availability and capacity issues can stem from a number of different causes. Include a list in your availability and capacity management plan.

    Instructions

    1. Gather the group together. Go around the room and have participants provide examples of incidents and problems that have been the result of availability and capacity issues.
    2. Pose questions to the group about the source of those availability and capacity issues.
    • What could have been done differently to avoid these issues?
    • Was the availability/capacity issue a result of a faulty internal/external SLA?
  • Record the results of the exercise in sections 4.1 and 4.2 of the Capacity Plan Template.
  • Input

    • Capacity Snapshot Tool results

    Output

    • Additional sources of availability and capacity risks

    Materials

    • Capacity Plan Template

    Participants

    • Capacity manager
    • Infrastructure staff

    Info-Tech Insight

    Availability and capacity problems result in incidents, critical incidents, and problems. These are addressed in a separate project (incident and problem management), but information about common causes can streamline that process.

    Identify capacity risks and mitigate them

    4.1b 30 minutes

    Based on your understanding of your capacity needs (through written SLAs and informal but regular meetings with the business) highlight major risks you foresee.

    Instructions

    1. Make a chart with two columns on a whiteboard. They should be labelled “risk” and “mitigation” respectively.
    2. Record risks to capacity you have identified in earlier activities.
    • Refer to the Capacity Snapshot Tool for components that are highlighted in red and yellow. These are specific components that present special challenges. Identify the risk(s) in as much detail as possible. Include service and business risks as well.
    • Examples: a marketing push will put pressure on the web server; a hiring push will require more Office 365 licenses; a downturn in registration will mean that fewer VMs will be required to run the service.

    Input

    • Capacity Snapshot Tool results

    Output

    • Inefficiencies

    Materials

    • Whiteboard
    • Markers

    Participants

    • Capacity manager
    • Infrastructure staff

    Info-Tech Insight

    It’s an old adage, but it checks out: don’t come to the table armed only with problems. Be a problem solver and prove IT’s value to the organization.

    Identify capacity risks and mitigate them (cont.)

    4.1b 1.5 hours

    Instructions (cont.)

    1. Begin developing mitigation strategies. Options for responding to known capacity risks fall into one of two camps:
    • Acceptance: responding to the risk is costlier than acknowledging its existence without taking any action. For gold systems, acceptance is typically not acceptable.
    • Mitigation: limiting/reducing, eliminating, or transferring risk (Herrera) comprise the sort of mitigation discussed here.
      • Limiting/reducing: taking steps to improve the capacity situation, but accepting some level of risk (spinning up a new VM, pushing back on demands from the business, promoting efficiency).
      • Eliminating: the most comprehensive (and most expensive) mitigation strategy, elimination could involve purchasing a new server or, at the extreme end, building a new datacenter.
      • Transfer: “robbing Peter to pay Paul,” in the words of capacity manager Todd Evans, is one potential way to limit your exposure. Is there a less critical service that can be sacrificed to keep your gold service online?
  • Record the results of this exercise in section 5 of the Capacity Plan Template.
  • Input

    • Capacity Snapshot Tool results

    Output

    • Capacity risk mitigations

    Materials

    • Whiteboard
    • Markers

    Participants

    • Capacity manager
    • Infrastructure staff

    Info-Tech Insight

    It’s an old adage, but it checks out: don’t come to the table armed only with problems. Be a problem solver and prove IT’s value to the organization.

    Identify availability risks and mitigate them

    4.1c 30 minutes

    While capacity management is a form of availability management, it is not the only form. In this activity, outline the specific nature of threats to availability.

    Instructions

    1. Make a chart with two columns on a whiteboard. They should be labelled “risk” and “mitigation” respectively.
    2. Begin brainstorming general availability risks based on the following sources of information/categories:
    • Vendor outages
    • Disaster recovery
    • Historical availability issues

    The image contains a large blue circle labelled: Availability. Also in the blue circle is a small red circle labelled: Capacity.

    Input

    • Capacity Snapshot Tool results

    Output

    • Availability risks and mitigations

    Materials

    • Whiteboard
    • Markers

    Participants

    • Capacity manager
    • Infrastructure staff

    Info-Tech Best Practice

    A dynamic central repository is a good way to ensure that availability issues stemming from a variety of causes are captured and mitigated.

    Identify availability risks and mitigate them (cont.)

    4.1c 1.5 hours

    Although it is easier said than done, identifying potential mitigations is a crucial part of availability management as an activity.

    Instructions (cont.)

    1. Begin developing mitigation strategies. Options for responding to known capacity risks fall into one of two camps:
    • Acceptance – responding to the risk is costlier than taking it on. Some unavailability is inevitable, between maintenance and unscheduled downtime. Record this, though it may not require immediate action.
    • Mitigation strategies:
      • Limiting/reducing – taking steps to increase availability of critical systems. This could include hot spares for unreliable systems or engaging a new vendor.
      • Eliminating – the most comprehensive (and most expensive) mitigation strategy. It could include selling.
      • Transfer – “robbing Peter to pay Paul,” in the words of capacity manager Todd Evans, is one potential way to limit your exposure. Is there a less critical service that can be sacrificed to keep your gold service online?
  • Record the results of this exercise in section 5 of Capacity Plan Template.
  • Input

    • Capacity Snapshot Tool results

    Output

    • Availability risks and mitigations

    Materials

    • Whiteboard
    • Markers

    Participants

    • Capacity manager
    • Infrastructure staff

    Iterate on the process and present your completed availability and capacity management plan

    The stakeholders consulted as part of the process will be interested in its results. Share them, either in person or through a collaboration tool.

    The current status of your availability and capacity management plan should be on the agenda for every stakeholder meeting. Direct the stakeholders’ attention to the parts of the document that are relevant to them, and solicit their thoughts on the document’s accuracy. Over time you should get a pretty good idea of who among your stakeholder group is skilled at projecting demand, and who over- or underestimates, and by how much. This information will improve your projections and, therefore, your management over time.

    Info-Tech Insight

    Use the experience gained and the artifacts generated to build trust with the business. The meetings should be regular, and demonstrating that you’re actually using the information for good is likely to make hesitant participants in the process more likely to open up.

    If you want additional support, have our analysts guide you through this phase as part of an Info-Tech workshop.

    The image contains a picture of an Info-Tech analyst.

    Book a workshop with our Info-Tech analysts:

    • To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team.
    • Info-Tech analysts will join you and your team onsite at your location or welcome you to Info-Tech’s historic Toronto office to participate in an innovative onsite workshop.
    • Contact your account manager (www.infotech.com/account), or email Workshops@InfoTech.com for more information.

    The following are sample activities that will be conducted by Info-Tech analysts with your team:

    4.1

    The image contains a screenshot of activity 4.1.

    Identify capacity risks and mitigate them

    The analyst will guide workshop participants in identifying potential risks to capacity and determining strategies for mitigating them.

    Phase 4 Guided Implementation

    Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.

    Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.

    Guided Implementation 4: Identify and mitigate risks

    Proposed Time to Completion: 1 week

    Step 4.1: Identify and mitigate risks

    Review your findings with an analyst

    • Discuss your potential risks and your strategies for mitigating those risks.

    Then complete these activities…

    • Identify capacity risks and mitigate them
    • Identify availability risks and mitigate them
    • Complete your capacity management plan

    With these tools & templates:

    Capacity Snapshot Tool

    Capacity Plan Template

    Phase 4 Results & Insights:

    • Be a problem solver and prove IT’s value to the organization. Capacity management allows infrastructure to drive business value.
    • Iterate and share results. Reinforce your relationships with stakeholders and continue to refine how capacity management transforms your organization’s business processes.

    Insight breakdown

    Insight 1

    Components are critical to availability and capacity management.

    The CEO doesn’t care about the SMTP server. She cares about meeting customer needs and producing profit. For IT capacity and availability managers, though, the devil is in the details. It only takes one faulty component to knock out a service. Keep track and keep the lights on.

    Insight 2

    Ask what the business is working on, not what they need.

    If you ask them what they need, they’ll tell you – and it won’t be cheap. Find out what they’re going to do, and use your expertise to service those needs. Use your IT experience to estimate the impact of business and service level changes on the components that secure the availability you need.

    Insight 3

    Cloud shmoud.

    The role of the capacity manager might be changing with the advent of the public cloud, but it has not disappeared. Capacity managers in the age of the cloud are responsible for managing vendor relationships, negotiating external SLAs, projecting costs and securing budgets, reining in prodigal divisions, and so on.

    Summary of accomplishment

    Knowledge Gained

    • Impact of downtime on the organization
    • Gold systems
    • Key dependencies and sub-components
    • Strategy for monitoring components
    • Strategy for soliciting business needs
    • Projected capacity needs
    • Availability and capacity risks and mitigations

    Processes Optimized

    • Availability management
    • Capacity management

    Deliverables Completed

    • Business Impact Analysis
    • Capacity Plan Template

    Project step summary

    Client Project: Develop an Availability and Capacity Management Plan

    1. Conduct a business impact analysis
    2. Assign criticality ratings to services
    3. Define your monitoring strategy
    4. Implement your monitoring tool/aggregator
    5. Solicit business needs and gather data
    6. Analyze data and project future needs
    7. Identify and mitigate risks

    Info-Tech Insight

    This project has the ability to fit the following formats:

    • Onsite workshop by Info-Tech Research Group consulting analysts.
    • Do-it-yourself with your team.
    • Remote delivery via Info-Tech Guided Implementation.

    Research contributors and experts

    The image contains a picture of Adrian Blant.

    Adrian Blant, Independent Capacity Consultant, IT Capability Solutions

    Adrian has over 15 years' experience in IT infrastructure. He has built capacity management business processes from the ground up, and focused on ensuring a productive dialogue between IT and the business.

    The image contains a picture of James Zhang.

    James Zhang, Senior Manager Disaster Recovery, AIG Technology

    James has over 20 years' experience in IT and 10 years' experience in capacity management. Throughout his career, he has focused on creating new business processes to deliver value and increase efficiency over the long term.

    The image contains a picture of Mayank Banerjee.

    Mayank Banerjee, CTO, Global Supply Chain Management, HelloFresh

    Mayank has over 15 years' experience across a wide range of technologies and industries. He has implemented highly automated capacity management processes as part of his role of owning and solving end-to-end business problems.

    The image contains a picture of Mike Lynch

    Mike Lynch, Consultant, CapacityIQ

    Mike has over 20 years' experience in IT infrastructure. He takes a holistic approach to capacity management to identify and solve key problems, and has developed automated processes for mapping performance data to information that can inform business decisions.

    The image contains a picture of Paul Waguespack.

    Paul Waguespack, Manager of Application Systems Engineering, Tufts Health Plan

    Paul has over 10 years' experience in IT. He has specialized in implementing new applications and functionalities throughout their entire lifecycle, and integrating with all aspects of IT operations.

    The image contains a picture of Richie Mendoza.

    Richie Mendoza, IT Consultant, SMITS Inc.

    Richie has over 10 years' experience in IT infrastructure. He has specialized in using demand forecasting to guide infrastructure capacity purchasing decisions, to provide availability while avoiding costly overprovisioning.

    The image contains a picture of Rob Thompson.

    Rob Thompson, President, IT Tools & Process

    Rob has over 30 years’ IT experience. Throughout his career he has focused on making IT a generator of business value. He now runs a boutique consulting firm.

    Todd Evans, Capacity and Performance Management SME, IBM

    Todd has over 20 years' experience in capacity and performance management. At Kaiser Permanente, he established a well-defined mapping of the businesses workflow processes to technical requirements for applications and infrastructure.

    Bibliography

    451 Research. “Best of both worlds: Can enterprises achieve both scalability and control when it comes to cloud?” 451 Research, November 2016. Web.

    Allen, Katie. “Work Also Shrinks to Fit the Time Available: And We Can Prove It.” The Guardian. 25 Oct. 2017.

    Amazon. “Amazon Elastic Compute Cloud.” Amazon Web Services. N.d. Web.

    Armandpour, Tim. “Lies Vendors Tell about Service Level Agreements and How to Negotiate for Something Better.” Network World. 12 Jan 2016.

    “Availability Management.” ITIL and ITSM World. 2001. Web.

    Availability Management Plan Template. Purple Griffon. 30 Nov. 2012. Web.

    Bairi, Jayachandra, B., Murali Manohar, and Goutam Kumar Kundu. “Capacity and Availability Management by Quantitative Project Management in the IT Service Industry.” Asian Journal on Quality 13.2 (2012): 163-76. Web.

    BMC Capacity Optimization. BMC. 24 Oct 2017. Web.

    Brooks, Peter, and Christa Landsberg. Capacity Management in Today’s IT Environment. MentPro. 16 Aug 2017. Web.

    "Capacity and Availability Management." CMMI Institute. April 2017. Web.

    Capacity and Availability Management. IT Quality Group Switzerland. 24 Oct. 2017. Web.

    Capacity and Performance Management: Best Practices White Paper. Cisco. 4 Oct. 2005. Web.

    "Capacity Management." Techopedia.

    “Capacity Management Forecasting Best Practices and Recommendations.” STG. 26 Jan 2015. Web.

    Capacity Management from the Ground up. Metron. 24 Oct. 2017. Web.

    Capacity Management in the Modern Datacenter. Turbonomic. 25 Oct. 2017. Web.

    Capacity Management Maturity Assessing and Improving the Effectiveness. Metron. 24 Oct. 2017. Web.

    “Capacity Management Software.” TeamQuest. 24 Oct 2017. Web,

    Capacity Plan Template. Purainfo. 11 Oct 2012. Web.

    “Capacity Planner—Job Description.” Automotive Industrial Partnership. 24 Oct. 2017. Web.

    Capacity Planning. CDC. Web. Aug. 2017.

    "Capacity Planning." TechTarget. 24 Oct 2017. Web.

    “Capacity Planning and Management.” BMC. 24 Oct 2017. Web.

    "Checklist Capacity Plan." IT Process Wiki. 24 Oct. 2017. Web.

    Dykes, Brent. “Actionable Insights: The Missing Link Between Data and Business Value.” Forbes. April 26, 2016. Web.

    Evolved Capacity Management. CA Technologies. Oct. 2013. Web.

    Francis, Ryan. “False positives still cause threat alert fatigue.” CSO. May 3, 2017. Web.

    Frymire, Scott. "Capacity Planning vs. Capacity Analytics." ScienceLogic. 24 Oct. 2017. Web.

    Glossary. Exin. Aug. 2017. Web.

    Herrera, Michael. “Four Types of Risk Mitigation and BCM Governance, Risk and Compliance.” MHA Consulting. May 17, 2013.

    Hill, Jon. How to Do Capacity Planning. TeamQuest. 24 Oct. 2017. Web.

    “How to Create an SLA in 7 Easy Steps.” ITSM Perfection. 25 Oct. 2017. Web.

    Hunter, John. “Myth: If You Can’t Measure It: You Can’t Manage It.” W. Edwards Deming Institute Blog. 13 Aug 2015. Web.

    IT Service Criticality. U of Bristol. 24 Oct. 2017. Web.

    "ITIL Capacity Management." BMC's Complete Guide to ITIL. BMC Software. 22 Dec. 2016. Web.

    “Just-in-time.” The Economist. 6 Jul 2009. Web.

    Kalm, Denise P., and Marv Waschke. Capacity Management: A CA Service Management Process Map. CA. 24 Oct. 2017. Web.

    Klimek, Peter, Rudolf Hanel, and Stefan Thurner. “Parkinson’s Law Quantified: Three Investigations in Bureaucratic Inefficiency.” Journal of Statistical Mechanics: Theory and Experiment 3 (2009): 1-13. Aug. 2017. Web.

    Landgrave, Tim. "Plan for Effective Capacity and Availability Management in New Systems." TechRepublic. 10 Oct. 2002. Web.

    Longoria, Gina. “Hewlett Packard Enterprise Goes After Amazon Public Cloud in Enterprise Storage.” Forbes. 2 Dec. 2016. Web.

    Maheshwari, Umesh. “Understanding Storage Capacity.” NimbleStorage. 7 Jan. 2016. Web.

    Mappic, Sandy. “Just how complex can a Login Transaction be? Answer: Very!” Appdynamics. Dec. 11 2011. Web.

    Miller, Ron. “AWS Fires Back at Larry Ellison’s Claims, Saying It’s Just Larry Being Larry.” Tech Crunch. 2 Oct. 2017. Web.

    National College for Teaching & Leadership. “The role of data in measuring school performance.” National College for Teaching & Leadership. N.d. Web,

    Newland, Chris, et al. Enterprise Capacity Management. CETI, Ohio State U. 24 Oct. 2017. Web.

    Office of Government Commerce . Best Practice for Service Delivery. London: Her Majesty’s Stationery Office, 2001.

    Office of Government Commerce. Best Practice for Business Perspective: The IS View on Delivering Services to the Business. London: Her Majesty’s Stationery Office, 2004.

    Parkinson, C. Northcote. “Parkinson’s Law.” The Economist. 19 Nov. 1955. Web.

    “Parkinson’s Law Is Proven Again.” Financial Times. 25 Oct. 2017. Web.

    Paul, John, and Chris Hayes. Performance Monitoring and Capacity Planning. VM Ware. 2006. Web.

    “Reliability and Validity.” UC Davis. N.d. Web.

    "Role: Capacity Manager." IBM. 2008. Web.

    Ryan, Liz. “‘If You Can’t Measure It, You Can’t Manage It’: Not True.” Forbes. 10 Feb. 2014. Web.

    S, Lalit. “Using Flexible Capacity to Lower and Manage On-Premises TCO.” HPE. 23 Nov. 2016. Web.

    Snedeker, Ben. “The Pros and Cons of Public and Private Clouds for Small Business.” Infusionsoft. September 6, 2017. Web.

    Statement of Work: IBM Enterprise Availability Management Service. IBM. Jan 2016. Web.

    “The Road to Perfect AWS Reserved Instance Planning & Management in a Nutshell.” Botmetric. 25 Oct. 2017. Web.

    Transforming the Information Infrastructure: Build, Manage, Optimize. Asigra. Aug. 2017. Web.

    Valentic, Branimir. "Three Faces of Capacity Management." ITIL/ISO 20000 Knowledge Base. Advisera. 24 Oct. 2017. Web.

    "Unify IT Performance Monitoring and Optimization." IDERA. 24 Oct. 2017. Web.

    "What is IT Capacity Management?" Villanova U. Aug. 2017. Web.

    Wolstenholme, Andrew. Final internal Audit Report: IT Availability and Capacity (IA 13 519/F). Transport For London. 23 Feb. 2015. Web.

    Build a Roadmap for Service Management Agility

    • Buy Link or Shortcode: {j2store}280|cart{/j2store}
    • member rating overall impact: N/A
    • member rating average dollars saved: N/A
    • member rating average days saved: N/A
    • Parent Category Name: Service Management
    • Parent Category Link: /service-management
    • Business is moving faster than ever and IT is getting more demands at a faster pace.
    • Many IT organizations have traditional structures and approaches that have served them well in the past. However, these frameworks and approaches alone are no longer sufficient for today’s challenges and rapidly changing environment.
    • The inability to adaptively design and deliver services as requirements change has led to diminishing service quality and an increase in shadow IT.

    Our Advice

    Critical Insight

    • Being Agile is a mindset. It is not meant to be prescriptive, but to encourage you to leverage the best approaches, frameworks, and tools to meet your needs and get the job done now.
    • The goal of service management is to enable and drive value for the business. Service management practices have to be flexible and adaptable enough to manage and deliver the right service value at the right time at the right level of quality.

    Impact and Result

    • Understand Agile principles, how they align with service management principles, and what the optimal states for agility look like.
    • Use Info-Tech’s advice and tools to perform an assessment of your organization’s state of agility, identify the gaps, and create a custom roadmap to incorporate agility into your service management practice.
    • Increase business satisfaction. The ultimate outcome of having agility in your service delivery is satisfied customers.

    Build a Roadmap for Service Management Agility Research & Tools

    Start here – read the Executive Brief

    Read our concise Executive Brief to find out why you should create a roadmap for service management agility, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. Understand the optimal state for agility

    Understand the components of agility and what the optimal states are for service management agility.

    • Build a Roadmap for Service Management Agility – Phase 1: Understand the Optimal States for Agility

    2. Assess your current state of agility

    Determine the current state of agility in the service management practice.

    • Build a Roadmap for Service Management Agility – Phase 2: Assess Your Current State of Agility
    • Service Management Agility Assessment Tool

    3. Build the roadmap

    Create a roadmap for service management agility and present it to key stakeholders to obtain their support.

    • Build a Roadmap for Service Management Agility – Phase 3: Build the Roadmap for Service Management Agility
    • Service Management Agility Roadmap Template
    • Building Agility Into Our Service Management Practice Stakeholders Presentation Template
    [infographic]

    Workshop: Build a Roadmap for Service Management Agility

    Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

    1 Define the Optimal States for Agility in Service Management

    The Purpose

    Understand agility and how it can complement service management.

    Understand how the components of culture, structure, processes, and resources enable agility in service management.

    Key Benefits Achieved

    Clear understanding of Agile principles.

    Identifying opportunities for agility.

    Understanding of how Agile principles align with service management.

    Activities

    1.1 Understand agility.

    1.2 Understand how Agile methodologies can complement service management through culture, structure, processes, and resources.

    Outputs

    Summary of Agile principles.

    Summary of optimal components in culture, structure, processes, and resources that enable agility.

    2 Assess Your Current State of Agility in Service Management

    The Purpose

    Assess your current organizational agility with respect to culture, structure, processes, and resources.

    Identify your agility strengths and weaknesses with the agility score.

    Key Benefits Achieved

    Understand your organization’s current enablers and constraints for agility.

    Have metrics to identify strengths or weaknesses in culture, structure, processes, and resources.

    Activities

    2.1 Complete an agility assessment.

    Outputs

    Assessment score of current state of agility.

    3 Build the Roadmap for Service Management Agility

    The Purpose

    Determine the gaps between the current and optimal states for agility.

    Create a roadmap for service management agility.

    Create a stakeholders presentation.

    Key Benefits Achieved

    Have a completed custom roadmap that will help build sustainable agility into your service management practice.

    Present the roadmap to key stakeholders to communicate your plans and get organizational buy-in.

    Activities

    3.1 Create a custom roadmap for service management agility.

    3.2 Create a stakeholders presentation on service management agility.

    Outputs

    Completed roadmap for service management agility.

    Completed stakeholders presentation on service management agility.

    Build a Robust and Comprehensive Data Strategy

    • Buy Link or Shortcode: {j2store}120|cart{/j2store}
    • member rating overall impact: 9.3/10 Overall Impact
    • member rating average dollars saved: $46,734 Average $ Saved
    • member rating average days saved: 29 Average Days Saved
    • Parent Category Name: Data Management
    • Parent Category Link: /data-management
    • The volume and variety of data that organizations have been collecting and producing have been growing exponentially and show no sign of slowing down.
    • At the same time, business landscapes and models are evolving, and users and stakeholders are becoming more and more data centric, with maturing expectations and demands.

    Our Advice

    Critical Insight

    • As the CDO or equivalent data leader in your organization, a robust and comprehensive data strategy is the number one tool in your toolkit for delivering on your mandate of creating measurable business value from data.
    • A data strategy should never be formulated disjointed from the business. Ensure the data strategy aligns with the business strategy and supports the business architecture.
    • Building and fostering a data-driven culture will accelerate and sustain adoption of, appetite for, and appreciation for data and hence drive the ROI on your various data investments.

    Impact and Result

    • Formulate a data strategy that stitches all of the pieces together to better position you to unlock the value in your data:
      • Establish the business context and value: Identify key business drivers for executing on an optimized data strategy, build compelling and relevant use cases, understand your organization’s culture and appetite for data, and ensure you have well-articulated vision, principles, and goals for your data strategy
      • Ensure you have a solid data foundation: Understand your current data environment, data management enablers, people, skill sets, roles, and structure. Know your strengths and weakness so you can optimize appropriately.
      • Formulate a sustainable data strategy: Round off your strategy with effective change management and communication for building and fostering a data-driven culture.

    Build a Robust and Comprehensive Data Strategy Research & Tools

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. Data Strategy Research – A step-by-step document to facilitate the formulation of a data strategy that brings together the business context, data management foundation, people, and culture.

    Data should be at the foundation of your organization’s evolution. The transformational insights that executives and decision makers are constantly seeking to leverage can be unlocked with a data strategy that makes high-quality, trusted, and relevant data readily available to the users who need it.

    • Build a Robust and Comprehensive Data Strategy – Phases 1-3

    2. Data Strategy Stakeholder Interview Guide and Findings – A template to support you in your meetings or interviews with key stakeholders as you work on understanding the value of data within the various lines of business.

    This template will help you gather insights around stakeholder business goals and objectives, current data consumption practices, the types or domains of data that are important to them in supporting their business capabilities and initiatives, the challenges they face, and opportunities for data from their perspective.

    • Data Strategy Stakeholder Interview Guide and Findings

    3. Data Strategy Use Case Template – An exemplar template to demonstrate the business value of your data strategy.

    Data strategy optimization anchored in a value proposition will ensure that the data strategy focuses on driving the most valuable and critical outcomes in support of the organization’s enterprise strategy. The template will help you facilitate deep-dive sessions with key stakeholders for building use cases that are of demonstrable value not only to their relevant lines of business but also to the wider organization.

    • Data Strategy Use Case Template

    4. Chief Data Officer – A job description template that includes a detailed explication of the responsibilities and expectations of a CDO.

    Bring data to the C-suite by creating the Chief Data Officer role. This position is designed to bridge the gap between the business and IT by serving as a representative for the organization's data management practices and identifying how the organization can leverage data as a competitive advantage or corporate asset.

    • Chief Data Officer

    5. Data Strategy Document Template – A structured template to plan and document your data strategy outputs.

    Use this template to document and formulate your data strategy. Follow along with the sections of the blueprint Build a Robust and Comprehensive Data Strategy and complete the template as you progress.

    • Data Strategy Document Template
    [infographic]

    Workshop: Build a Robust and Comprehensive Data Strategy

    Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

    1 Establish Business Context and Value: Understand the Current Business Environment

    The Purpose

    Establish the business context for the business strategy.

    Key Benefits Achieved

    Substantiates the “why” of the data strategy.

    Highlights the organization’s goals, objectives, and strategic direction the data must align with.

    Activities

    1.1 Data Strategy 101

    1.2 Intro to Tech’s Data Strategy Framework

    1.3 Data Strategy Value Proposition: Understand stakeholder’s strategic priorities and the alignment with data

    1.4 Discuss the importance of vision, mission, and guiding principles of the organization’s data strategy

    1.5 Understand the organization’s data culture – discuss Data Culture Survey results

    1.6 Examine Core Value Streams of Business Architecture

    Outputs

    Business context; strategic drivers

    Data strategy guiding principles

    Sample vision and mission statements

    Data Culture Diagnostic Results Analysis

    2 Business-Data Needs Discovery: Key Business Stakeholder Interviews

    The Purpose

    Build use cases of demonstrable value and understand the current environment.

    Key Benefits Achieved

    An understanding of the current maturity level of key capabilities.

    Use cases that represent areas of concern and/or high value and therefore need to be addressed.

    Activities

    2.1 Conduct key business stakeholder interviews to initiate the build of high-value business-data cases

    Outputs

    Initialized high-value business-data cases

    3 Understand the Current Data Environment & Practice: Analyze Data Capability and Practice Gaps and Develop Alignment Strategies

    The Purpose

    Build out a future state plan that is aimed at filling prioritized gaps and that informs a scalable roadmap for moving forward on treating data as an asset.

    Key Benefits Achieved

    A target state plan, formulated with input from key stakeholders, for addressing gaps and for maturing capabilities necessary to strategically manage data.

    Activities

    3.1 Understand the current data environment: data capability assessment

    3.2 Understand the current data practice: key data roles, skill sets; operating model, organization structure

    3.3 Plan target state data environment and data practice

    Outputs

    Data capability assessment and roadmapping tool

    4 Align Business Needs with Data Implications: Initiate Roadmap Planning and Strategy Formulation

    The Purpose

    Consolidate business and data needs with consideration of external factors as well as internal barriers and enablers to the success of the data strategy. Bring all the outputs together for crafting a robust and comprehensive data strategy.

    Key Benefits Achieved

    A consolidated view of business and data needs and the environment in which the data strategy will be operationalized.

    An analysis of the feasibility and potential risks to the success of the data strategy.

    Activities

    4.1 Analyze gaps between current- and target-state

    4.2 Initiate initiative, milestone and RACI planning

    4.3 Working session with Data Strategy Owner

    Outputs

    Data Strategy Next Steps Action Plan

    Relevant data strategy related templates (example: data practice patterns, data role patterns)

    Initialized Data Strategy on-a-Page

    Further reading

    Build a Robust and Comprehensive Data Strategy

    Key to building and fostering a data-driven culture.

    ANALYST PERSPECTIVE

    Data Strategy: Key to helping drive organizational innovation and transformation

    "In the dynamic environment in which we operate today, where we are constantly juggling disruptive forces, a well-formulated data strategy will prove to be a key asset in supporting business growth and sustainability, innovation, and transformation.

    Your data strategy must align with the organization’s business strategy, and it is foundational to building and fostering an enterprise-wide data-driven culture."

    Crystal Singh,

    Director – Research and Advisory

    Info-Tech Research Group

    Our understanding of the problem

    This Research is Designed For:

    • Chief data officers (CDOs), chief architects, VPs, and digital transformation directors and CIOs who are accountable for ensuring data can be leveraged as a strategic asset of the organization.

    This Research Will Help You:

    • Put a strategy in place to ensure data is available, accessible, well integrated, secured, of acceptable quality, and suitably visualized to fuel decision making by the organizations’ executives.
    • Align data management plans and investments with business requirements and the organization’s strategic plans.
    • Define the relevant roles for operationalizing your data strategy.

    This Research Will Also Assist:

    • Data architects and enterprise architects who have been tasked with supporting the formulation or optimization of the organization’s data strategy.
    • Business leaders creating plans for leveraging data in their strategic planning and business processes.
    • IT professionals looking to improve the environment that manages and delivers data.

    This Research Will Help Them:

    • Get a handle on the current situation of data within the organization.
    • Understand how the data strategy and its resulting initiatives will affect the operations, integration, and provisioning of data within the enterprise.

    Executive Summary

    Situation

    • The volume and variety of data that organizations have been collecting and producing have been growing exponentially and show no sign of slowing down. At the same time, business landscapes and models are evolving, and users and stakeholders are becoming more and more data centric, with maturing and demanding expectations.

    Complication

    • As organizations pivot in response to industry disruptions and changing landscapes, a reactive and piecemeal approach leads to data architectures and designs that fail to deliver real and measurable value to the business.
    • Despite the growing focus on data, many organizations struggle to develop a cohesive business-driven strategy for effectively managing and leveraging their data assets.

    Resolution

    Formulate a data strategy that stitches all of the pieces together to better position you to unlock the value in your data:

    • Establish the business context and value: Identify key business drivers for executing on an optimized data strategy, build compelling and relevant use cases, understand your organization’s culture and appetite for data, and ensure you have well-articulated vision, principles, and goals for your data strategy.
    • Ensure you have a solid data foundation: Understand your current data environment, data management enablers, people, skill sets, roles, and structure. Know your strengths and weakness so you can optimize appropriately.
    • Formulate a sustainable data strategy: Round off your strategy with effective change management and communication for building and fostering a data-driven culture.

    Info-Tech Insight

    1. As the CDO or equivalent data leader in your organization, a robust and comprehensive data strategy is the number one tool in your toolkit for delivering on your mandate of creating measurable business value from data.
    2. A data strategy should never be formulated disjointed from the business. Ensure the data strategy aligns with the business strategy and supports the business architecture.
    3. Building and fostering a data-driven culture will accelerate and sustain adoption of, appetite for, and appreciation for data and hence drive the ROI on your various data investments.

    Why do you need a data strategy?

    Your data strategy is the vehicle for ensuring data is poised to support your organization’s strategic objectives.

    The dynamic marketplace of today requires organizations to be responsive in order to gain or maintain their competitive edge and place in their industry.

    Organizations need to have that 360-degree view of what’s going on and what’s likely to happen.

    Disruptive forces often lead to changes in business models and require organizations to have a level of adaptability to remain relevant.

    To respond, organizations need to make decisions and should be able to turn to their data to gain insights for informing their decisions.

    A well-formulated and robust data strategy will ensure that your data investments bring you the returns by meeting your organization’s strategic objectives.

    Organizations need to be in a position where they know what’s going on with their stakeholders and anticipate what their stakeholders’ needs are going to be.

    Data cannot be fully leveraged without a cohesive strategy

    Most organizations today will likely have some form of data management in place, supported by some of the common roles such as DBAs and data analysts.

    Most will likely have a data architecture that supports some form of reporting.

    Some may even have a chief data officer (CDO), a senior executive who has a seat at the C-suite table.

    These are all great assets as a starting point BUT without a cohesive data strategy that stitches the pieces together and:

    • Effectively leverages these existing assets
    • Augments them with additional and relevant key roles and skills sets
    • Optimizes and fills in the gaps around your current data management enablers and capabilities for the growing volume and variety of data you’re collecting
    • Fully caters to real, high-value strategic organizational business needs

    you’re missing the mark – you are not fully leveraging the incredible value of your data.

    Cross-industry studies show that on average, less than half of an organization’s structured data is actively used in making decisions

    And, less than 1% of its unstructured data is analyzed or used at all. Furthermore, 80% of analysts' time is spent simply discovering and preparing, data with over 70% of employees having access to data they should not. Source: HBR, 2017

    Organizational drivers for a data strategy

    Your data strategy needs to align with your organizational strategy.

    Main Organizational Strategic Drivers:

    1. Stakeholder Engagement/Service Excellence
    2. Product and Service Innovations
    3. Operational Excellence
    4. Privacy, Risk, and Compliance Management

    “The companies who will survive and thrive in the future are the ones who will outlearn and out-innovate everyone else. It is no longer ‘survival of the fittest’ but ‘survival of the smartest.’ Data is the element that both inspires and enables this new form of rapid innovation.– Joel Semeniuk, 2016

    A sound data strategy is the key to unlocking the value in your organization’s data.

    Data should be at the foundation of your organization’s evolution.

    The transformational insights that executives are constantly seeking to leverage can be unlocked with a data strategy that makes high-quality, well-integrated, trustworthy, relevant data readily available to the business users who need it.

    Whether hoping to gain a better understanding of your business, trying to become an innovator in your industry, or having a compliance and regulatory mandate that needs to be met, any organization can get value from its data through a well-formulated, robust, and cohesive data strategy.

    According to a leading North American bank, “More than one petabyte of new data, equivalent to about 1 million gigabytes” is entering the bank’s systems every month. – The Wall Street Journal, 2019

    “Although businesses are at many different stages in unlocking the power of data, they share a common conviction that it can make or break an enterprise.”– Jim Love, ITWC CIO and Chief Digital Officer, IT World Canada, 2018

    Data is a strategic organizational asset and should be treated as such

    The expression “Data is an asset” or any other similar sentiment has long been heard.

    With such hype, you would have expected data to have gotten more attention in the boardrooms. You would have expected to see its value reflected on financial statements as a result of its impact in driving things like acquisition, retention, product and service development and innovation, market growth, stakeholder satisfaction, relationships with partners, and overall strategic success of the organization.

    The time has surely come for data to be treated as the asset it is.

    “Paradoxically, “data” appear everywhere but on the balance sheet and income statement.”– HBR, 2018

    “… data has traditionally been perceived as just one aspect of a technology project; it has not been treated as a corporate asset.”– “5 Essential Components of a Data Strategy,” SAS

    According to Anil Chakravarthy, who is the CEO of Informatica and has a strong vantage point on how companies across industries leverage data for better business decisions, “what distinguishes the most successful businesses … is that they have developed the ability to manage data as an asset across the whole enterprise.”– McKinsey & Company, 2019

    How data is perceived in today’s marketplace

    Data is being touted as the oil of the digital era…

    But just like oil, if left unrefined, it cannot really be used.

    "Data is the new oil." – Clive Humby, Chief Data Scientist

    Source: Joel Semeniuk, 2016

    Enter your data strategy.

    Data is being perceived as that key strategic asset in your organization for fueling innovation and transformation.

    Your data strategy is what allows you to effectively mine, refine, and use this resource.

    “The world’s most valuable resource is no longer oil, but data.”– The Economist, 2017

    “Modern innovation is now dependent upon this data.”– Joel Semeniuk, 2016

    “The better the data, the better the resulting innovation and impact.”– Joel Semeniuk, 2016

    What is it in it for you? What opportunities can data help you leverage?

    GOVERNMENT

    Leveraging data as a strategic asset for the benefit of citizens.

    • The strategic use of data can enable governments to provide higher-quality services.
    • Direct resources appropriately and harness opportunities to improve impact.
    • Make better evidence-informed decisions and better understand the impact of programs so that funds can be directed to where they are most likely to deliver the best results.
    • Maintain legitimacy and credibility in an increasingly complex society.
    • Help workers adapt and be competitive in a changing labor market.
    • A data strategy would help protect citizens from the misuse of their data.

    Source: Privy Council Office, Government of Canada, 2018

    What is it in it for you? What opportunities can data help you leverage?

    FINANCIAL

    Leveraging data to boost traditional profit and loss levers, find new sources of growth, and deliver the digital bank.

    • One bank used credit card transactional data (from its own terminals and those of other banks) to develop offers that gave customers incentives to make regular purchases from one of the bank’s merchants. This boosted the bank’s commissions, added revenue for its merchants, and provided more value to the customer (McKinsey & Company, 2017).
    • In terms of enhancing productivity, a bank used “new algorithms to predict the cash required at each of its ATMs across the country and then combined this with route-optimization techniques to save money” (McKinsey & Company, 2017).

    A European bank “turned to machine-learning algorithms that predict which currently active customers are likely to reduce their business with the bank.” The resulting understanding “gave rise to a targeted campaign that reduced churn by 15 percent” (McKinsey & Company, 2017).

    A leading Canadian bank has built a marketplace around their data – they have launched a data marketplace where they have productized the bank’s data. They are providing data – as a product – to other units within the bank. These other business units essentially represent internal customers who are leveraging the product, which is data.

    Through the use of data and advanced analytics, “a top bank in Asia discovered unsuspected similarities that allowed it to define 15,000 microsegments in its customer base. It then built a next-product-to-buy model that increased the likelihood to buy three times over.” Several sets of big data were explored, including “customer demographics and key characteristics, products held, credit-card statements, transaction and point-of-sale data, online and mobile transfers and payments, and credit-bureau data” (McKinsey & Company, 2017).

    What is it in it for you? What opportunities can data help you leverage?

    HEALTHCARE

    Leveraging data and analytics to prevent deadly infections

    The fifth-largest health system in the US and the largest hospital provider in California uses a big data and advanced analytics platform to predict potential sepsis cases at the earliest stages, when intervention is most helpful.

    Using the Sepsis Bio-Surveillance Program, this hospital provider monitors 120,000 lives per month in 34 hospitals and manages 7,500 patients with potential sepsis per month.

    Collecting data from the electronic medical records of all patients in its facilities, the solution uses natural language processing (NLP) and a rules engine to continually monitor factors that could indicate a sepsis infection. In high-probability cases, the system sends an alarm to the primary nurse or physician.

    Since implementing the big data and predictive analytics system, this hospital provider has seen a significant improvement in the mortality and the length of stay in ICU for sepsis patients.

    At 28 of the hospitals which have been on the program, sepsis mortality rates have dropped an average of 5%.

    With patients spending less time in the ICU, cost savings were also realized. This is significant, as sepsis is the costliest condition billed to Medicare, the second costliest billed to Medicaid and the uninsured, and the fourth costliest billed to private insurance.

    Source: SAS, 2019

    What is it in it for you? What opportunities can data help you leverage?

    RETAIL

    Leveraging data to better understand customer preferences, predict purchasing, drive customer experience, and optimize supply and demand planning.

    Netflix is an example of a big brand that uses big data analytics for targeted advertising. With over 100 million subscribers, the company collects large amounts of data. If you are a subscriber, you are likely familiar with their suggestions messages of the next series or movie you should catch up on. These suggestions are based on your past search data and watch data. This data provides Netflix with insights into your interests and preferences for viewing (Mentionlytics, 2018).

    “For the retail industry, big data means a greater understanding of consumer shopping habits and how to attract new customers.”– Ron Barasch, Envestnet | Yodlee, 2019

    The business case for data – moving from platitudes to practicality

    When building your business case, consider the following:

    • What is the most effective way to communicate the business case to executives?
    • How can CDOs and other data leaders use data to advance their organizations’ corporate strategy?
    • What does your data estate look like? Are you looking to leverage and drive value from your semi-structured and unstructured data assets?
    • Does your current organizational culture support a data-driven one? Does the organization have a history of managing change effectively?
    • How do changing privacy and security expectations alter the way businesses harvest, save, use, and exchange data?

    “We’re the converted … We see the value in data. The battle is getting executive teams to see it our way.”– Ted Maulucci, President of SmartONE Solutions Inc. IT World Canada, 2018

    Where do you stack up? What is your current data management maturity?

    Info-Tech’s IT Maturity Ladder denotes the different levels of maturity for an IT department and its different functions. What is the current state of your data management capability?

    Innovator - Transforms the Business. Business Partner - Expands the Business. Trusted Operator - Optimizes the Business. Firefighter - Supports the Business. Unstable - Struggles to Support.

    Info-Tech Insight

    You are best positioned to successfully execute on a data strategy if you are currently at or above the Trusted Operator level. If you find yourself still at the Unstable or Firefighter stage, your efforts are best spent on ensuring you can fulfill your day-to-day data and data management demands. Improving this capability will help build a strong data management foundation.

    Guiding principles of a data strategy

    Value of Clearly Defined Data Principles

    • Guiding principles help define the culture and characteristics of your practice by describing your beliefs and philosophy.
    • Guiding principles act as the heart of your data strategy, helping to shape initiative plans and day-to-day behaviors related to the use and treatment of the organization’s data assets.

    “Organizational culture can accelerate the application of analytics, amplify its power, and steer companies away from risky outcomes.”– McKinsey, 2018

    Build a Robust and Comprehensive Data Strategy

    Business Strategy and Current Environment connect with the Data Strategy. Data Strategy includes: Organizational Drivers and Data Value, Data Strategy Objectives and Guiding Principles, Data Strategy Vision and Mission, Data Strategy Roadmap, People: Roles and Organizational Structure, Data Culture and Data Literacy, Data Management and Tools, Risk and Feasibility.

    Follow Info-Tech’s methodology for effectively leveraging the value out of your data

    Some say it’s the new oil. Or the currency of the new business landscape. Others describe it as the fuel of the digital economy. But we don’t need platitudes — we need real ways to extract the value from our data. – Jim Love, CIO and Chief Digital Officer, IT World Canada, 2018

    1. Business Context. 2. Data and Resources Foundation. 3. Effective Data Strategy

    Our practical step-by-step approach helps you to formulate a data strategy that delivers business value.

    1. Establish Business Context and Value: In this phase, you will determine and substantiate the business drivers for optimizing the data strategy. You will identify the business drivers that necessitate the data strategy optimization and examine your current organizational data culture. This will be key to ensuring the fruits of your optimization efforts are being used. You will also define the vision, mission, and guiding principles and build high-value use cases for the data strategy.
    2. Ensure You Have a Solid Data and Resources Foundation: This phase will help you ensure you have a solid data and resources foundation for operationalizing your data strategy. You will gain an understanding of your current environment in terms of data management enablers and the required resources portfolio of key people, roles, and skill sets.
    3. Formulate a Sustainable Data Strategy: In this phase, you will bring the pieces together for formulating an effective data strategy. You will evaluate and prioritize the use cases built in Phase 1, which summarize the alignment of organizational goals with data needs. You will also create your strategic plan, considering change management and communication.

    Info-Tech offers various levels of support to best suit your needs

    DIY Toolkit

    “Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful.”

    Guided Implementation

    “Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track.”

    Workshop

    “We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place.”

    Consulting

    “Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project.”

    Diagnostics and consistent frameworks are used throughout all four options.

    Improve IT Operations With AI and ML

    • Buy Link or Shortcode: {j2store}454|cart{/j2store}
    • member rating overall impact: 10.0/10 Overall Impact
    • member rating average dollars saved: After each Info-Tech experience, we ask our members to quantify the real-time savings, monetary impact, and project improvements our research helped them achieve.
    • member rating average days saved: Read what our members are saying
    • Parent Category Name: Operations Management
    • Parent Category Link: /i-and-o-process-management
    • Many IT departments experience difficulty with meeting the business' expectations for service delivery on a regular basis.
    • Despite significant investment in improving various areas of IT operations, you still feel like you’re constantly firefighting.
    • To tackle these issues, businesses tend to invest in purchasing multiple solutions. This not only complicates their IT operations, but also, in some cases, deteriorates functionality.

    Our Advice

    Critical Insight

    • To leverage AI capabilities, you first need to assess the current state of your IT operations and know what your priorities are.
    • Contemplate use cases that will get the most benefit from automation and start with processes that you are relatively comfortable handling.
    • Analyze your initial plan to identify easy wins, then expand your AIOps.

    Impact and Result

    • Perform a current state assessment to spot which areas within your operations management are the least mature and causing you the most grief. Identify which functional areas within operations management need to be prioritized for improvement.
    • Make a shortlist of use cases that will get the most benefit from AI-based technology.
    • Prepare a plan to deploy AI capabilities to improve your IT operations.

    Improve IT Operations With AI and ML Research & Tools

    Start here – read the Executive Brief

    Read our concise Executive Brief to find out about the latest improvements in AIOps and how these can help you improve your IT operations. Review Info-Tech’s methodology and understand the four ways we can support you in completing this project.

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. Assess the current state of IT operations management

    Identify where your organization currently stands in its operations management practices.

    • AIOps Project Summary Template
    • AIOps Prerequisites Assessment Tool

    2. Identify initiatives that align with operations requirements

    Recognize the benefits of AI and ML for your business. Determine the necessary roles and responsibilities for potential initiatives, then develop and assess your shortlist.

    • AIOps RACI Template
    • AIOps Shortlisting Tool

    3. Develop the AI roadmap

    Analyze your ROI for AIOps and create an action plan. Communicate your AI and ML initiatives to stakeholders to obtain their support.

    • AIOps ROI Calculator
    • AIOps Roadmap Tool
    • AIOps Communications Plan Template
    [infographic]

    Modernize Your Applications

    • Buy Link or Shortcode: {j2store}178|cart{/j2store}
    • member rating overall impact: 10.0/10 Overall Impact
    • member rating average dollars saved: After each Info-Tech experience, we ask our members to quantify the real-time savings, monetary impact, and project improvements our research helped them achieve.
    • member rating average days saved: Read what our members are saying
    • Parent Category Name: Architecture & Strategy
    • Parent Category Link: /architecture-and-strategy
    • Application modernization is essential to stay competitive and productive in today’s digital environment. Your stakeholders have outlined their digital business goals that IT is expected to meet.
    • Your application portfolio cannot sufficiently support the flexibility and efficiency the business needs because of legacy challenges.
    • Your teams do not have a framework to illustrate, communicate, and justify the modernization effort and organizational changes in the language your stakeholders understand.

    Our Advice

    Critical Insight

    • Build your digital applications around continuous modernization. End-user needs, technology, business direction, and regulations rapidly change in today’s competitive and fast-paced industry. This reality will quickly turn your modern applications into shelfware. Build continuous modernization at the center of your digital application vision to keep up with evolving business, end-user, and IT needs.
    • Application modernization is organizational change management. If you build and modernize it, they may not come. The crux of successful application modernization is centered on the strategic, well-informed, and onboarded adoption of changes in key business areas, capabilities, and processes. Organizational change management must be front and center so that applications are fit for purpose and are something that end users want and need to use.
    • Business-IT collaboration is not optional. Application modernization will not be successful if your lines of business (LOBs) and IT are not working together. IT must empathize how LOBs operate and proactively support the underlying operational systems. LOBs must be accountable for all products leveraging modern technologies and be able to rationalize the technical feasibility of their digital application vision.

    Impact and Result

    • Establish the digital application vision. Gain a grounded understanding of the digital application construct and prioritize these attributes against your digital business goals.
    • Define your modernization approach. Obtain a thorough view of your business and technical complexities, risks, and impacts. Employ the right modernization techniques based on your organization’s change tolerance.
    • Build your roadmap. Clarify the organizational changes needed to support modernization and adoption of your digital applications.

    Modernize Your Applications Research & Tools

    Start here – read the Executive Brief

    Read our concise Executive Brief to find out why you should strategically modernize your applications, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. Set your vision

    Describe your application vision and set the right modernization expectations with your stakeholders.

    • Modernize Your Applications – Phase 1: Set Your Vision

    2. Identify your modernization opportunities

    Focus your modernization efforts on the business opportunities that your stakeholders care about.

    • Modernize Your Applications – Phase 2: Identify Your Modernization Opportunities

    3. Plan your modernization

    Describe your modernization initiatives and build your modernization tactical roadmap.

    • Modernize Your Applications – Phase 3: Plan Your Modernization
    [infographic]

    Workshop: Modernize Your Applications

    Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

    1 Set Your Vision

    The Purpose

    Discuss the goals of your application modernization initiatives

    Define your digital application vision and priorities

    List your modernization principles

    Key Benefits Achieved

    Clear application modernization objectives and high priority value items

    Your digital application vision and attributes

    Key principles that will guide your application modernization initiatives

    Activities

    1.1 State Your Objectives

    1.2 Characterize Your Digital Application

    1.3 Define Your Modernization Principles

    Outputs

    Application modernization objectives

    Digital application vision and attributes definitions

    List of application modernization principles and guidelines

    2 Identify Your Modernization Opportunities

    The Purpose

    Identify the value streams and business capabilities that will benefit the most from application modernization

    Conduct a change tolerance assessment

    Build your modernization strategic roadmap

    Key Benefits Achieved

    Understanding of the value delivery improvements modernization can bring

    Recognizing the flexibility and tolerance of your organization to adopt changes

    Select an approach that best fits your organization’s goals and capacity

    Activities

    2.1 Identify the Opportunities

    2.2 Define Your Modernization Approach

    Outputs

    Value streams and business capabilities that are ideal modernization opportunities

    Your modernization strategic roadmap based on your change tolerance and modernization approach

    3 Plan Your Modernization

    The Purpose

    Identify the most appropriate modernization technique and the scope of changes to implement your techniques

    Develop an actionable tactical roadmap to complete your modernization initiatives

    Key Benefits Achieved

    Clear understanding of what must be changed to the organization and application considering your change tolerance

    An achievable modernization plan

    Activities

    3.1 Shortlist Your Modernization Techniques

    3.2 Roadmap Your Modernization Initiatives

    Outputs

    Scope of your application modernization initiatives

    Your modernization tactical roadmap

    Get Started With Customer Advocacy

    • Buy Link or Shortcode: {j2store}565|cart{/j2store}
    • member rating overall impact: N/A
    • member rating average dollars saved: N/A
    • member rating average days saved: N/A
    • Parent Category Name: Marketing Solutions
    • Parent Category Link: /marketing-solutions

    Getting started with customer advocacy (CA) is no easy task. Many customer success professionals carry out ad hoc customer advocacy activities to address immediate needs but lack a more strategic approach.

    Our Advice

    Critical Insight

    • Customer success leaders must reposition their CA program around growth; the recognition that customer advocacy is a strategic growth initiative is necessary to succeed in today’s competitive market.
    • Get key stakeholders on board early – especially Sales!
    • Always link your CA efforts back to retention and growth.
    • Make building genuine relationships with your advocates the cornerstone of your CA program.

    Impact and Result

    • Enable the organization to identify and develop meaningful relationships with top customers and advocates.
    • Understand the concepts and benefits of CA and how CA can be used to improve marketing and sales and fuel growth and competitiveness.
    • Follow SoftwareReviews’ methodology to identify where to start to apply CA within the organization.
    • Develop a customer advocacy proof of concept/pilot program to gain stakeholder approval and funding to get started with or expand efforts around customer advocacy.

    Get Started With Customer Advocacy Research & Tools

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. Get Started With Customer Advocacy Executive Brief – An overview of why customer advocacy is critical to your organization and the recommended approach for getting started with a pilot program.

    Understand the strategic benefits and process for building a formal customer advocacy program. To be successful, you must reposition CA as a strategic growth initiative and continually link any CA efforts back to growth.

    • Get Started With Customer Advocacy Storyboard

    2. Define Your Advocacy Requirements – Assess your current customer advocacy efforts, identify gaps, and define your program requirements.

    With the assessment tool and steps outlined in the storyboard, you will be able to understand the gaps and pain points, where and how to improve your efforts, and how to establish program requirements.

    • Customer Advocacy Maturity Assessment Tool

    3. Win Executive Approval and Launch Pilot – Develop goals, success metrics, and timelines, and gain approval for your customer advocacy pilot.

    Align on pilot goals, key milestones, and program elements using the template and storyboard to effectively communicate with stakeholders and gain executive buy-in for your customer advocacy pilot.

    • Get Started With Customer Advocacy Executive Presentation Template

    Infographic

    Further reading

    Get Started With Customer Advocacy

    Develop a customer advocacy program to transform customer satisfaction into revenue growth.

    EXECUTIVE BRIEF

    Analyst perspective

    Customer advocacy is critical to driving revenue growth

    The image contains a picture of Emily Wright.

    Customer advocacy puts the customer at the center of everything your organization does. By cultivating a deep understanding of customer needs and how they define value and by delivering positive experiences throughout the customer journey, organizations inspire and empower customers to become evangelists for their brands or products. Both the client and solution provider enjoy satisfying and ongoing business outcomes as a result.

    Focusing on customer advocacy is critical for software solutions providers. Business-to-business (B2B) buyers are increasingly looking to their peers and third-party resources to arm themselves with information on solutions they feel they can trust before they choose to engage with solution providers. Your satisfied customers are now your most trusted and powerful resource.

    Customer advocacy helps build strong relationships with your customers, nurtures brand advocacy, gives your marketing messaging credibility, and differentiates your company from the competition; it’s critical to driving revenue growth. Companies that develop mature advocacy programs can increase Customer Lifetime Value (CLV) by 16% (Wharton Business School, 2009), increase customer retention by 35% (Deloitte, 2011), and give themselves a strong competitive advantage in an increasingly competitive marketplace.

    Emily Wright
    Senior Research Analyst, Advisory
    SoftwareReviews

    Executive summary

    Your Challenge

    Ad hoc customer advocacy (CA) efforts and reference programs, while still useful, are not enough to drive growth. Providers increase their chance for success by assessing if they face the following challenges:

    • Lack of referenceable customers that can turn into passionate advocates, or a limited pool that is at risk of burnout.
    • Lack of references for all key customer types, verticals, etc., especially in new growth segments or those that are hard to recruit.
    • Lack of a consistent program for gathering customer feedback and input to make improvements and increase customer satisfaction.
    • Lack of executive and stakeholder (e.g. Sales, Customer Success, channel partners, etc.) buy-in for the importance and value of customer advocacy.

    Building a strong customer advocacy program must be a high priority for customer service/success leaders in today’s highly competitive software markets.

    Common Obstacles

    Getting started with customer advocacy is no easy task. Many customer success professionals carry out ad hoc customer advocacy activities to address immediate needs but lack a more strategic approach. What separates them from success are several nagging obstacles:

    • Efforts lack funding and buy-in from stakeholders.
    • Senior management doesn’t fully understand the business value of a customer advocacy program.
    • Duplicate efforts are taking place between Sales, Marketing, product teams, etc., because ownership, roles, and responsibilities have not been determined.
    • Relationships are guarded/hoarded by those who feel they own the relationship (e.g. Sales, Customer Success, channel partners, etc.).
    • Customer-facing staff often lack the necessary skills to foster customer advocacy.

    SoftwareReviews’ Approach

    This blueprint will help leaders of customer advocacy programs get started with developing a formalized pilot program that will demonstrate the value of customer advocacy and lay a strong foundation to justify rollout. Through SoftwareReviews’ approach, customer advocacy leaders will:

    • Enable the organization to identify and develop meaningful relationships with top customers and advocates.
    • Understand the concepts and benefits of CA and how CA can be used to improve marketing and sales and fuel growth and competitiveness.
    • Follow SoftwareReviews’ methodology to identify where to start to apply CA within the organization.
    • Develop a customer advocacy proof of concept/pilot program to gain stakeholder approval and funding to get started with or expand efforts around customer advocacy.

    What is customer advocacy?

    “Customer advocacy is the act of putting customer needs first and working to deliver solution-based assistance through your products and services." – Testimonial Hero, 2021

    Customer advocacy is designed to keep customers loyal through customer engagement and advocacy marketing campaigns. Successful customer advocacy leaders experience decreased churn while increasing return on investment (ROI) through retention, acquisition, and cost savings.

    Businesses that implement customer advocacy throughout their organizations find new ways of supporting customers, provide additional customer value, and ensure their brands stand unique among the competition.

    Customer Advocacy Is…

    • An integral part of any marketing and/or business strategy.
    • Essential to improving and maintaining high levels of customer satisfaction.
    • Focused on delivering value to customers.
    • Not only a set of actions, but a mindset that should be fostered and reinforced through a customer-centric culture.
    • Mutually beneficial relationships for both company and customer.

    Customer Advocacy Is Not…

    • Only referrals and testimonials.
    • Solely about what you can get from your advocates.
    • Brand advocacy. Brand advocacy is the desired outcome of customer advocacy.
    • Transactional. Brand advocates must be engaged.
    • A nice-to-have.
    • Solved entirely by software. Think about what you want to achieve and how a software solution can you help you reach those goals.

    SoftwareReviews Insight

    Customer advocacy has evolved into being a valued company asset versus a simple referral program – success requires an organization-wide customer-first mindset and the recognition that customer advocacy is a strategic growth initiative necessary to succeed in today’s competitive market.

    Customer advocacy: Essential to high retention

    When customers advocate for your company and products, they are eager to retain the value they receive

    • Customer acts of advocacy correlate to high retention.
    • Acts of advocacy won’t happen unless customers feel their interests are placed ahead of your company’s, thereby increasing satisfaction and customer success. That’s the definition of a customer-centric culture.
    • And yet your company does receive significant benefits from customer advocacy:
      • When customers advocate and renew, your costs go down and margins rise because it costs less to keep a happy customer than it does to bring a new customer onboard.
      • When renewal rates are high, customer lifetime value increases, also increasing profitability.

    Acquiring a new customer can cost five times more than retaining an existing customer (Huify, 2018).

    Increasing customer retention by 5% can increase profits by 25% to 95% (Bain & Company, cited in Harvard Business Review, 2014).

    SoftwareReviews Insight

    Don’t overlook the value of customer advocacy to retention! Despite the common knowledge that it’s far easier and cheaper to sell to an existing customer than to sell to a new prospect, most companies fail to leverage their customer advocacy programs and continue to put pressure on Marketing to focus their budgets on customer acquisition.

    Customer advocacy can also be your ultimate growth strategy

    In your marketing and sales messaging, acts of advocacy serve as excellent proof points for value delivered.

    Forty-five percent of businesses rank online reviews as a top source of information for selecting software during this (top of funnel) stage, followed closely by recommendations and referrals at 42%. These sources are topped only by company websites at 54% (Clutch, 2020).

    With referrals coming from customer advocates to prospects via your lead gen engine and through seller talk tracks, customer advocacy is central to sales, marketing, and customer experience success.

    ✓ Advocates can help your new customers learn your solution and ensure higher adoption and satisfaction.
    ✓ Advocates can provide valuable, honest feedback on new updates and features.

    The image contains a picture to demonstrate the cycle of customer advocacy. The image has four circles, with one big circle in the middle and three circles surrounding with arrows pointing in both directions in between them. The middle circle is labelled customer advocacy. The three circles are labelled: sales, customer success, marketing.

    “A customer advocacy program is not just a fancy buzz word or a marketing tool that’s nice to have. It’s a core discipline that every major brand needs to integrate into their overall marketing, sales and customer success strategies if they expect to survive in this trust economy. Customer advocacy arguably is the common asset that runs throughout all marketing, sales and customer success activities regardless of the stage of the buyer’s journey and ties it all together.” – RO Innovation, 2017

    Positive experience drives acts of advocacy

    More than price or product, experience now leads the way in customer advocacy and retention

    Advocacy happens when customers recommend your product. Our research shows that the biggest drivers of likeliness to recommend and acts of customer advocacy are the positive experiences customers have with vendors and their products, not product features or cost savings. Customers want to feel that:

    1. Their productivity and performance is enhanced and the vendor is helping them to innovate and grow as a company.
    2. Their vendor inspires them and helps them to continually improve.
    3. They can rely on the vendor and the product they purchased.
    4. They are respected by the vendor.
    5. They can trust that the vendor will be on their side and save them time.

    The image contains a graph to demonstrate the correlation of likeliness to recommend a satisfaction driver. Where anything above a 0.5 indicates a strong driver of satisfaction.

    Note that anything above 0.5 indicates a strong driver of satisfaction.
    Source: SoftwareReviews buyer reviews (based on 82,560 unique reviews).

    SoftwareReviews Insight

    True customer satisfaction comes from helping customers innovate, enhancing their performance, inspiring them to continually improve, and being reliable, respectful, trustworthy, and conscious of their time. These true drivers of satisfaction should be considered in your customer advocacy and retention efforts. The experience customers have with your product and brand is what will differentiate your brand from competitors, drive advocacy, and ultimately, power business growth. Talk to a SoftwareReviews advisor to learn how users rate your product on these satisfaction drivers in the SoftwareReviews Emotional Footprint Report.

    Yet challenges exist for customer advocacy program leaders

    Customer success leaders without a strong customer advocacy program feel numerous avoidable pains:

    • Lack of compelling stories and proof points for the sales team, causing long sales cycles.
    • Heavy reliance on a small pool of worn-out references.
    • Lack of references for all needed customer types, verticals, etc.
    • Lack of a reliable customer feedback process for solution improvements.
    • Overspending on acquiring new customers due to a lack of customer proof points.
    • Missed opportunities that could grow the business (customer lifetime value, upsell/cross-sell, etc.).

    Marketing, customer success, and sales teams experiencing any one of the above challenges must consider getting started with a more formalized customer advocacy program.

    Obstacles to customer advocacy programs

    Leaders must overcome several barriers in developing a customer advocacy program:

    • Stakeholders are often unclear on the value customer advocacy programs can bring and require proof of benefits to invest.
    • Efforts are duplicated among sales, marketing, product, and customer success teams, given ownership and collaboration practices are ill-defined or nonexistent.
    • There is a culture of guarding or hoarding customer relationships by those who feel they own the relationship, or there’s high turnover among employees who own the customer relationships.
    • The governance, technology, people, skills, and/or processes to take customer advocacy to the next level are lacking.
    • Leaders don’t know where to start with customer advocacy, what needs to be improved, or what to focus on first.

    A lack of customer centricity hurts organizations

    12% of people believe when a company says they put customers first. (Source: HubSpot, 2019)

    Brands struggle to follow through on brand promises, and a mismatch between expectations and lived experience emerges. Customer advocacy can help close this gap and help companies live up to their customer-first messaging.

    42% of companies don’t conduct any customer surveys or collect feedback. (Source: HubSpot, 2019)

    Too many companies are not truly listening to their customers. Companies that don’t collect feedback aren’t going to know what to change to improve customer satisfaction. Customer advocacy will orient companies around their customer and create a reliable feedback loop that informs product and service enhancements.

    Customer advocacy is no longer a nice-to-have but a necessity for solution providers

    B2B buyers increasingly turn to peers to learn about solutions:

    “84% of B2B decision makers start the buying process with a referral.” (Source: Influitive, Gainsight & Pendo, 2020)

    “46% of B2B buyers rely on customer references for information before purchasing.” (Source: RO Innovation, 2017)

    “91% of B2B purchasers’ buying decisions are influenced by word-of-mouth recommendations.” (Source: ReferralRock, 2022)

    “76% of individuals admit that they’re more likely to trust content shared by ‘normal’ people than content shared by brands.” (Source: TrustPilot, 2020)

    By ignoring the importance of customer advocacy, companies and brands are risking stagnation and missing out on opportunities to gain competitive advantage and achieve growth.

    Getting Started With Customer Advocacy: SoftwareReviews' Approach

    1 BUILD
    Build the business case
    Identify your key stakeholders, steering committee, and working team, understand key customer advocacy principles, and note success barriers and ways to overcome them as your first steps.

    2 DEVELOP
    Develop your advocacy requirements
    Assess your current customer advocacy maturity, identify gaps in your current efforts, and develop your ideal advocate profile.

    3 WIN
    Win executive approval and implement pilot
    Determine goals and success metrics for the pilot, establish a timeline and key project milestones, create advocate communication materials, and finally gain executive buy-in and implement the pilot.

    SoftwareReviews Insight
    Building and implementing a customer advocacy pilot will help lay the foundation for a full program and demonstrate to executives and key stakeholders the impact on revenue, retention, and CLV that can be achieved through coordinated and well-planned customer advocacy efforts.

    Customer advocacy benefits

    Our research benefits customer advocacy program managers by enabling them to:

    • Explain why having a centralized, proactive customer advocacy program is important.
    • Clearly communicate the benefits and business case for having a formalized customer advocacy program.
    • Develop a customer advocacy pilot to provide a proof of concept (POC) and demonstrate the value of customer advocacy.
    • Assess the maturity of your current customer advocacy efforts and identify what to improve and how to improve to grow your customer advocacy function.

    "Advocacy is the currency for business and the fuel for explosive growth. Successful marketing executives who understand this make advocacy programs an essential part of their go-to-market strategy. They also know that advocacy isn't something you simply 'turn on': ... ultimately, it's about making human connections and building relationships that have enduring value for everyone involved."
    - Dan Cote, Influitive, Dec. 2021

    Case Study: Advocate impact on sales at Genesys

    Genesys' Goal

    Provide sales team with compelling customer reviews, quotes, stories, videos, and references.

    Approach to Advocacy

    • Customers were able to share their stories through Genesys' customer hub GCAP as quotes, reviews, etc., and could sign up to host reference forum sessions for prospective customers.
    • Content was developed that demonstrated ROI with using Genesys' solutions, including "top-tier logos, inspiring quotes, and reference forums featuring some of their top advocates" (Influitive, 2021).
    • Leveraged customer advocacy-specific software solution integration with the CRM to easily identify reference recommendations for Sales.

    Advocate Impact on Sales

    According to Influitive (2021), the impacts were:

    • 386% increase in revenue influences from references calls
    • 82% of revenue has been influence by reference calls
    • 78 reference calls resulted in closed-won opportunities
    • 250 customers and prospects attended 7 reference forums
    • 112 reference slides created for sales enablement
    • 100+ quotes were collect and transformed into 78 quote slides

    Who benefits from getting started with customer advocacy?

    This Research Is Designed for:

    • Customer advocacy leaders and marketers who are looking to:
      • Take a more strategic, proactive, and structured approach to customer advocacy.
      • Find a more effective and reliable way to gather customer feedback and input on products and services.
      • Develop and nurture a customer-oriented mindset throughout the organization.
      • Improve marketing credibility both within the company and outside to prospective customers.

    This Research Will Help You:

    • Explain why having a centralized, proactive customer advocacy program is important.
    • Clearly communicate the benefits and business case for having a formalized customer advocacy program.
    • Develop a customer advocacy pilot to provide a proof of concept (POC) and demonstrate the value of customer advocacy.
    • Assess the maturity of your current customer advocacy efforts and identify what to improve and how to improve to grow your customer advocacy function.

    This Research Will Also Assist:

    • Customer success leaders and sales directors who are responsible for:
      • Gathering customer references and testimonials.
      • Referral or voice of the customer (VoC) programs.

    This Research Will Help Them:

    • Align stakeholders on an overall program of identifying ideal advocates.
    • Coordinate customer advocacy efforts and actions.
    • Gather and make use of customer feedback to improve products, solutions, and service provided.
    • Provide an amazing customer experience throughout the entirety of the customer journey.

    SoftwareReviews’ methodology for getting started with customer advocacy

    Phase Steps

    1. Build the business case

    1. Identify your key stakeholders, steering committee, and working team
    2. Understand the concepts and benefits of customer advocacy as they apply to your organization
    3. Outline barriers to success, risks, and risk mitigation tactics

    2. Develop your advocacy requirements

    1. Assess your customer advocacy maturity using the SoftwareReviews CA Maturity Assessment Tool
    2. Identify gaps/pains in current CA efforts and add tasks to your action plan
    3. Develop ideal advocate profile/identify target advocate segment(s)

    3. Create implementation plan and pitch CA pilot

    1. Determine pilot goals and success metrics
    2. Establish timeline and create advocate communication materials
    3. Gain executive buy-in and implement pilot

    Phase Outcomes

    1. Common understanding of CA concepts and benefits
    2. Buy-in from CEO and head of Sales
    3. List of opportunities, risks, and risk mitigation tactics
    1. Identification of gaps in current customer advocacy efforts and/or activities
    2. Understanding customer advocacy readiness
    3. Identification of ideal advocate profile/target segment
    4. Basic actions to bridge gaps in CA efforts
    1. Clear objective for CA pilot
    2. Key metrics for program success
    3. Pilot timelines and milestones
    4. Executive presentation with business case for CA

    Insight summary

    Customer advocacy is a critical strategic growth initiative
    Customer advocacy (CA) has evolved into being a highly valued company asset as opposed to a simple referral program, but not everyone in the organization sees it that way. Customer success leaders must reposition their CA program around growth instead of focusing solely on retention and communicate this to key stakeholders. The recognition that customer advocacy is a strategic growth initiative is necessary to succeed in today’s competitive market.

    Get key stakeholders on board early – especially Sales!
    Work to bring the CEO and the head of Sales on your side early. Sales is the gatekeeper – they need to open the door to customers to turn them into advocates. Clearly reposition CA for growth and communicate that to the CEO and head of Sales; wider buy-in will follow.

    Identify the highest priority segment for generating acts of advocacy
    By focusing on the highest priority segment, you accomplish a number of things: generating growth in a critical customer segment, proving the value of customer advocacy to key stakeholders (especially Sales), and setting a strong foundation for customer advocacy to build upon and expand the program out to other segments.

    Always link your CA efforts back to retention and growth
    By clearly demonstrating the impact that customer advocacy has on not only retention but also overall growth, marketers will gain buy-in from key stakeholders, secure funding for a full CA program, and gain the resources needed to expand customer advocacy efforts.

    Focus on providing value to advocates
    Many organizations take a transactional approach to customer advocacy, focusing on what their advocates can do for them. To truly succeed with CA, focus on providing your advocates with value first and put them in the spotlight.

    Make building genuine relationships with your advocates the cornerstone of your CA program
    "57% of small businesses say that having a relationship with their consumers is the primary driver of repeat business" (Factory360).

    Guided Implementation

    What does our GI on getting started with building customer advocacy look like?

    Build the Business Case

    Call #1: Identify key stakeholders. Map out motivations and anticipate any concerns or objections. Determine steering committee and working team. Plan next call – 1 week.

    Call #2: Discuss concepts and benefits of customer advocacy as they apply to organizational goals. Plan next call – 1 week.

    Call #3: Discuss barriers to success, risks, and risk mitigation tactics. Plan next call – 1 week.

    Call #4: Finalize CA goals, opportunities, and risks and develop business case. Plan next call – 2 weeks.

    Develop Your Advocacy Requirements

    Call #5: Review the SoftwareReviews CA Maturity Assessment Tool. Assess your current level of customer advocacy maturity. Plan next call – 1 week.

    Call #6: Review gaps and pains in current CA efforts. Discuss tactics and possible CA pilot program goals. Begin adding tasks to action plan. Plan next call – 2 weeks.

    Call #7: Discuss ideal advocate profile and target segments. Plan next call – 2 weeks.

    Call #8: Validate and finalize ideal advocate profile. Plan next call – 1 week.

    Win Executive Approval and Implement Pilot

    Call #9: Discuss CA pilot scope. Discuss performance metrics and KPIs. Plan next call – 3 days.

    Call #10: Determine timeline and key milestones. Plan next call –2 weeks.

    Call #11: Develop advocate communication materials. Plan next call – 3 days.

    Call #12: Review final business case and coach on executive presentation. Plan next call – 1 week.

    A Guided Implementation (GI) is series of calls with a SoftwareReviews Advisory analyst to help implement our best practices in your organization. For guidance on marketing applications, we can arrange a discussion with an Info-Tech analyst. Your engagement managers will work with you to schedule analyst calls.


    Customer Advocacy Workshop

    Pre-Workshop Day 1 Day 2 Day 3 Day 4 Day 5 Post-Workshop
    Activities Identify Stakeholders & CA Pilot Team Build the Business Case Assess Current CA Efforts Develop Advocacy Goals & Ideal Advocate Profile Develop Project Timelines, Materials, and Exec Presentation Next Steps and Wrap-Up (offsite) Pitch CA Pilot
    0.1 Identify key stakeholders to involve in customer advocacy pilot and workshop; understand their motivations and anticipate possible concerns. 1.1 Review key CA concepts and identify benefits of CA for the organization.
    1.2 Outline barriers to success, risks, and risk mitigation tactics.
    2.1 Assess your customer advocacy maturity using the SoftwareReviews CA Maturity Assessment Tool.
    2.2 Identify gaps/pains in current CA efforts.
    2.3 Prioritize gaps from diagnostic and any other critical pain points.
    3.1 Identify and document the ideal advocate profile and target customer segment for pilot.
    3.2 Determine goal(s) and success metrics for program pilot.
    4.1 Develop pilot timelines and key milestones.
    4.2 Outline materials needed and possible messaging.
    4.3 Build the executive buy-in presentation.
    5.1 Complete in-progress deliverables from the previous four days. 6.1 Present to executive team and stakeholders.
    6.2 Gain executive buy-in and key stakeholder approval.
    6.3 Execute CA pilot.
    Deliverables
    1. Rationale for CA pilot; clear benefits, and how they apply to the organization.
    2. Documented barriers to success, risks, and risk mitigation tactics.
    1. CA Maturity Assessment results.
    2. Identification of gaps in current customer advocacy efforts and/or activities.
    1. Documented ideal advocate profile/target customer segment.
    2. Clear goal(s) and success metrics for CA pilot.
    1. Documented pilot timelines and key milestones.
    2. Draft/outlines of advocate materials.
    3. Draft executive presentation with business case for CA.
    1. Finalized implementation plan for CA pilot.
    2. Finalized executive presentation with business case for CA.
    1. Buy-in from decision makers and key stakeholders.

    Contact your account representative for more information.
    workshops@infotech.com
    1-888-670-8889

    Get started!

    Know your target market and audience, deploy well-designed strategies based on shared values, and make meaningful connections with people.

    Phase 1
    Build the Business Case

    Phase 2
    Develop Your Advocacy Requirements

    Phase 3
    Win Executive Approval and Implement Pilot

    Phase 1: Build the Business Case

    Steps
    1.1 Identify your key stakeholders, steering committee, and working team
    1.2 Understand the concepts and benefits of customer advocacy as they apply to your organization
    1.3 Outline barriers to success, risks, and risk mitigation tactics

    Phase Outcome

    • Common understanding of CA concepts and benefits
    • Buy-in from CEO and head of Sales
    • List of barriers to success, risks, and risk mitigation tactics

    Build the business case

    Step 1.1 Identify your key stakeholders, steering committee, and working team

    Total duration: 2.5-8.0 hours

    Objective
    Identify, document, and finalize your key stakeholders to know who to involve and how to get them onboard by truly understanding the forces of influence.

    Output

    • Robust stakeholder list with key stakeholders identified.
    • Steering committee and working team decided.

    Participants

    • Customer advocacy lead
    • Identified stakeholders
    • Workstream leads

    MarTech
    None

    Tools

    1.1.1 Identify Stakeholders
    (60-120 min.)

    Identify
    Using the guidance on slide 28, identify all stakeholders who would be involved or impacted by your customer advocacy pilot by entering names and titles into columns A and B on slide 27 "Stakeholder List Worksheet."

    Document
    Document as much information about each stakeholder as possible in columns C, D, E, and F into the table on slide 27.

    1.1.2 Select Steering Committee & Working Team
    (60-90 min.)

    Select
    Using the guidance on slides 28 and 29 and the information collected in the table on slide 27, identify the stakeholders that are steering committee members, functional workstream leads, or operations; document in column G on slide 27.

    Document
    Open the Executive Presentation Template to slides 5 and 6 and document your final steering committee and working team selections. Be sure to note the Executive Sponsor and Program Manager on slide 5.

    Tips & Reminders

    1. It is critical to identify "key stakeholders"; a single missed key stakeholder can disrupt an initiative. A good way to ensure that nobody is missed is to first uncover as many stakeholders as possible and later decide how important they are.
    2. Ensure steering committee representation from each department this initiative would impact or that may need to be involved in decision-making or problem-solving endeavors.

    Consult Info-Tech's Manage Stakeholder Relations blueprint for additional guidance on identifying and managing stakeholders, or contact one of our analysts for more personalized assistance and guidance.

    Stakeholder List Worksheet

    *Possible Roles
    Executive Sponsor
    Program Manager
    Workstream Lead
    Functional Lead
    Steering Committee
    Operations
    A B C D E F G
    Name Position Decision Involvement
    (Driver / Approver / Contributor / Informe
    Direct Benefit?
    (Yes / No)
    Motivation Concerns *Role in Customer Advocacy Pilot
    E.g. Jane Doe VP, Customer Success A N
    • Increase customer retention
    • Customer advocate burnout
    Workstream Lead

    Customer advocacy stakeholders

    What to consider when identifying stakeholders required for CA:
    Customer advocacy should be done as a part of a cross-functional company initiative. When identifying stakeholders, consider:

    • Who can make the ultimate decision on approving the CA program?
    • Who are the senior leadership members you need buy-in from?
    • Who do you need to support the CA program?
    • Who is affected by the CA program?
    • Who will help you build the CA program?
    • Where and among who is there enthusiasm for customer advocacy?
    • Consider stakeholders from Customer Success, Marketing, Sales, Product, PR & Social, etc.
    Key Roles Supporting an Effective Customer Advocacy Pilot
    Executive Sponsor
    • Owns the function at the management/C-suite level
    • Responsible for breaking down barriers and ensuring alignment with organizational strategy
    • CMO, VP of Marketing, and in SMB providers, the CEO
    Program Manager
    • Typically, a senior member of the marketing team
    • Responsible for organizing the customer advocacy pilot, preparing summary executive-level communications, and approval requests
    • Program manages the customer advocacy pilot, and in many cases, the continued formal program
    • Product Marketing Director, or other Marketing Director, who has strong program management skills, has run large-scale marketing or product programs, and is familiar with the stakeholder roles and enabling technologies
    Functional / Workstream Leads
    • Works alongside the Program Manager on planning and implementing the customer advocacy pilot and ensures functional workstreams are aligned with pilot objectives
    • Typical customer advocacy pilots will have a team comprised of representatives from Marketing, Sales, and Customer Success
    Steering Committee
    • Comprised of C-suite/management-level individuals that guide key decisions, approve requests, and mitigate any functional conflicts
    • Responsible for validating goals and priorities, enabling adequate resourcing, and critical decision making
    • CMO, CRO/Head of Sales, Head of Customer Success
    Operations
    • Comprised of individuals whose application and tech tools knowledge and skills support integration of customer advocacy functions into existing tech stack/CRM (e.g. adding custom fields into CRM)
    • Responsible for helping select technology that enables customer advocacy program activities
    • CRM, Marketing Applications, and Analytics Managers, IT Managers

    Customer advocacy working team

    Consider the skills and knowledge required for planning and executing a customer advocacy pilot.

    Workstream leads should have strong project management and collaboration skills and deep understanding of both product and customers (persona, journeys, satisfaction, etc.).

    Required Skills Suggested Functions
    • Project management
    • CRM knowledge
    • Marketing automation experience
    • MarTech knowledge
    • Understanding of buyer persona and journey
    • Product knowledge
    • Understanding of executive-level goals for the pilot
    • Content creation
    • Customer advocacy experience, if possible
    • Customer satisfaction
    • Email and event marketing experience
    • Customer Success
    • Marketing
    • Sales
    • Product
    • PR/Corporate Comms.

    Build the business case

    Step 1.2 Understand key concepts and benefits of customer advocacy

    Total duration: 2.0-4.0 hours

    Objective
    Understand customer advocacy and what benefits you seek from your customer advocacy program, and get set up to best communicate them to executives and decision makers.

    Output

    • Documented customer advocacy benefits

    Participants

    • Customer advocacy lead

    MarTech
    None

    Tools

    1.2.1 Discuss Key Concepts
    (60-120 min.)

    Envision
    Schedule a visioning session with key stakeholders and share the Get Started With Customer Advocacy Executive Brief (slides 3-23 in this deck).

    Discuss how key customer advocacy concepts can apply to your organization and how CA can contribute to organizational growth.

    Document
    Determine the top benefits sought from the customer advocacy program pilot and record them on slides 4 and 12 in the Executive Presentation Template.

    Finalize
    Work with the Executive Sponsor to finalize the "Message from the CMO" on slide 4 in the Executive Presentation Template.

    Tips & Reminders

    Keep in mind that while we're starting off broadly, the pilot for your customer advocacy program should be narrow and focused in scope.

    Build the business case

    Step 1.3 Understand barriers to success, risks, and risk mitigation tactics

    Total duration: 2.0-8.0 hours

    Objective
    Anticipate threats to pilot success; identify barriers to success, any possible risks, and what can be done to reduce the chances of a negative pilot outcome.

    Output

    • Awareness of barriers
    • Tactics to mitigate risk

    Participants

    • Customer advocacy lead
    • Key stakeholders

    MarTech
    None

    Tools

    1.3.1 Brainstorm Barriers to Success & Possible Risks
    (60-120 min.)

    Identify
    Using slide 7 of the Executive Presentation Template, brainstorm any barriers to success that may exist and risks to the customer advocacy program pilot success. Consider the people, processes, and technology that may be required.

    Document
    Document all information on slide 7 of the Executive Presentation Template.

    1.3.2 Develop Risk Mitigation Tactics
    (60-300 min.)

    Develop
    Brainstorm different ways to address any of the identified barriers to success and reduce any risks. Consider the people, processes, and technology that may be required.

    Document
    Document all risk mitigation tactics on slide 7 of the Executive Presentation Template.

    Tips & Reminders
    There are several types of risk to explore. Consider the following when brainstorming possible risks:

    • Damage to brand (if advocate guidance not provided)
    • Legal (compliance with regulations and laws around contact, incentives, etc.)
    • Advocate burnout
    • Negative advocate feedback

    Phase 2: Develop Your Advocacy Requirements

    Steps
    2.1 Assess your customer advocacy maturity
    2.2 Identify and document gaps and pain points
    2.3 Develop your ideal advocate profile

    Phase Outcome

    • Identification of gaps in current customer advocacy efforts or activities
    • Understanding of customer advocacy readiness and maturity
    • Identification of ideal advocate profile/target segment
    • Basic actions to bridge gaps in CA efforts

    Develop your advocacy requirements

    Step 2.1 Assess your customer advocacy maturity

    Total duration: 2.0-8.0 hours

    Objective
    Use the Customer Advocacy Maturity Assessment Tool to understand your organization's current level of customer advocacy maturity and what to prioritize in the program pilot.

    Output

    • Current level of customer advocacy maturity
    • Know areas to focus on in program pilot

    Participants

    • Customer advocacy lead
    • Key stakeholders

    MarTech
    None

    Tools

    2.1.1 Diagnose Current Customer Advocacy Maturity
    (60-120 min.)

    Diagnose
    Begin on tab 1 of the Customer Advocacy Maturity Assessment Tool and read all instructions.

    Navigate to tab 2. Considering the current state of customer advocacy efforts, answer the diagnostic questions in the Diagnostic tab of the Customer Advocacy Maturity Assessment Tool.

    After completing the questions, you will receive a diagnostic result on tab 3 that will identify areas of strength and weakness and make high-level recommendations for your customer advocacy program pilot.

    2.1.2 Discuss Results
    (60-300 min.)

    Discuss
    Schedule a call to discuss your customer advocacy maturity diagnostic results with a SoftwareReviews Advisor.

    Prioritize the recommendations from the diagnostic, noting which will be included in the program pilot and which require funding and resources to advance.

    Transfer
    Transfer results into slides 8 and 11 of the Executive Presentation Template.

    Tips & Reminders
    Complete the diagnostic with a handful of key stakeholders identified in the previous phase. This will help provide a more balanced and accurate assessment of your organization’s current level of customer advocacy maturity.

    Develop your advocacy requirements

    Step 2.2 Identify and document gaps and pain points

    Total duration: 2.5-8.0 hours

    Objective
    Understand the current pain points within key customer-related processes and within any current customer advocacy efforts taking place.

    Output

    • Prioritized list of pain points that could be addressed by a customer advocacy program.

    Participants

    • Customer advocacy lead
    • Key stakeholders

    MarTech
    None

    Tools

    2.2.1 Identify Pain Points
    (60-120 min.)

    Identify
    Identify and list current pain points being experienced around customer advocacy efforts and processes around sales, marketing, customer success, and product feedback.

    Add any gaps identified in the diagnostic to the list.

    Transfer
    Transfer key information into slide 9 of Executive Presentation Template.

    2.2.2 Prioritize Pain Points
    (60-300 min.)

    Prioritize
    Indicate which pains are the most important and that a customer advocacy program could help improve.

    Schedule a call to discuss the outputs of this step with a SoftwareReviews Advisor.

    Document
    Document priorities on slide 9 of Executive Presentation Template.

    Tips & Reminders

    Customer advocacy won't solve for everything; it's important to be clear about what pain points can and can't be addressed through a customer advocacy program.

    Develop your advocacy requirements

    Step 2.3 Develop your ideal advocate profile

    Total duration: 3.0-9.0 hours

    Objective
    Develop an ideal advocate persona profile that can be used to identify potential advocates, guide campaign messaging, and facilitate advocate engagement.

    Output

    • Ideal advocate persona profile

    Participants

    • Customer advocacy lead
    • Key stakeholders
    • Sales lead
    • Marketing lead
    • Customer Success lead
    • Product lead

    MarTech
    May require the use of:

    • CRM or marketing automation platform
    • Available and up-to-date customer database

    Tools

    2.3.1 Brainstorm Session Around Ideal Advocate Persona
    (60-150 min.)

    Brainstorm
    Lead the team to prioritize an initial, single, most important persona and to collaborate to complete the template.

    Choose your ideal advocate for the pilot based on your most important audience. Start with firmographics like company size, industry, and geography.

    Next, consider satisfaction levels and behavioral attributes, such as renewals, engagement, usage, and satisfaction scores.

    Identify motivations and possible incentives for advocate activities.

    Document
    Use slide 10 of the Executive Presentation Template to complete this exercise.

    2.3.2 Review and Refine Advocate Persona
    (60-300 min.)

    Review & Refine
    Place the Executive Presentation Template in a shared drive for team collaboration. Encourage the team to share persona knowledge within the shared drive version.

    Hold any necessary follow-up sessions to further refine persona.

    Validate
    Interview advocates that best represent your ideal advocate profile on their type of preferred involvement with your company, their role and needs when it comes to your solution, ways they'd be willing to advocate, and rewards sought.

    Confirm
    Incorporate feedback and inputs into slide 10 of the Executive Presentation Template. Ensure everyone agrees on persona developed.

    Tips & Reminders

    1. When identifying potential advocates, choose based on your most important audience.
    2. Ensure you're selecting those with the highest satisfaction scores.
    3. Ideally, select candidates that have, on their own, advocated previously such as in social posts, who may have acted as a reference, or who have been highly visible as a positive influence at customer events.
    4. Knowing motivations will determine the type of acts of advocacy they would be most willing to perform and the incentives for participating in the program.

    Consider the following criteria when identifying advocates and developing your ideal advocate persona:

    Demographics Firmographics Satisfaction & Needs/Value Sought Behavior Motivation
    Role - user, decision-maker, etc. Company size: # of employees Satisfaction score Purchase frequency & repeat purchases (renewals), upgrades Career building/promotion
    Department Company size: revenue NPS score Usage Collaboration with peers
    Geography CLV score Engagement (e.g. email opens, response, meetings) Educate others
    Industry Value delivered (outcomes, occasions used, etc.) Social media interaction, posts Influence (on product, service)
    Tenure as client Benefits sought
    Account size ($) Minimal and resolved service tickets, escalations
    1. When identifying potential advocates, choose based on your most important audience/segments. 2. Ensure you're selecting those with the highest satisfaction, NPS, and CLV scores. 3. When identifying potential advocates, choose based on high engagement and interaction, regular renewals, and high usage. 4. Knowing motivations will determine the type of acts of advocacy they would be most willing to perform and incentives for participating in the program.

    Phase 3: Win Executive Approval and Implement Pilot

    Steps
    3.1 Determine pilot goals and success metrics
    3.2 Establish timeline and create advocate communication materials
    3.3 Gain executive buy-in and implement pilot

    Phase Outcome

    • Clear objective for CA pilot
    • Key metrics for program success
    • Pilot timelines and milestones
    • Executive presentation with business case for CA

    Win executive approval and implement pilot

    Step 3.1 Determine pilot goals and success metrics

    Total duration: 2.0-4.0 hours

    Objective
    Set goals and determine the scope for the customer advocacy program pilot.

    Output

    • Documented business objectives for the pilot
    • Documented success metrics

    Participants

    • Customer advocacy lead
    • Key stakeholders
    • Sales lead
    • Marketing lead
    • Customer Success lead
    • Product lead

    MarTech
    May require to use, set up, or install platforms like:

    • Register to a survey platform
    • CRM or marketing automation platform

    Tools

    3.1.1 Establish Pilot Goals
    (60-120 min.)

    Set
    Organize a meeting with department heads and review organizational and individual department goals.

    Using the Venn diagram on slide 39 in this deck, identify customer advocacy goals that align with business goals. Select the highest priority goal for the pilot.

    Check that the goal aligns with benefits sought or addresses pain points identified in the previous phase.

    Document
    Document the goals on slides 9 and 16 of the Executive Presentation Template.

    3.1.2 Establish Pilot Success Metrics
    (60-120 min.)

    Decide
    Decide how you will measure the success of your program pilot using slide 40 in this document.

    Document
    Document metrics on slide 16 of the Executive Presentation Template.

    Tips & Reminders

    1. Don't boil the ocean. Pick the most important goal that can be achieved through the customer advocacy pilot to gain executive buy-in and support or resources for a formal customer advocacy program. Once successfully completed, you'll be able to tackle new goals and expand the program.
    2. Keep your metrics simple, few in number, and relatively easy to track

    Connect customer advocacy goals with organizational goals

    List possible customer advocacy goals, identifying areas of overlap with organizational goals by taking the following steps:

    1. List organizational/departmental goals in the green oval.
    2. List possible customer advocacy program goals in the purple oval.
    3. Enter goals that are covered in both the Organizational Goals and Customer Advocacy Goals sections into the Shared Goals section in the center.
    4. Highlight the highest priority goal for the customer advocacy program pilot to tackle.
    Organizational Goals Shared Goals Customer Advocacy Goals
    Example Example: Gain customer references to help advance sales and improve win rates Example: Develop pool of customer references
    [insert goal] [insert goal] Example: Gather customer feedback
    [insert goal] [insert goal] [insert goal]
    [insert goal] [insert goal] [insert goal]

    Customer advocacy success metrics for consideration

    This table provides a starting point for measuring the success of your customer advocacy pilot depending on the goals you've set.

    This list is by no means exhaustive; the metrics here can be used, or new metrics that would better capture success measurement can be created and tracked.

    Metric
    Revenue influenced by reference calls ($ / % increase)
    # of reference calls resulting in closed-won opportunities
    # of quotes collected
    % of community growth YoY
    # of pieces of product feedback collected
    # of acts of advocacy
    % membership growth
    % product usage amongst community members
    # of social shares, clicks
    CSAT score for community members
    % of registered qualified leads
    # of leads registered
    # of member sign-ups
    # of net-new referenceable customers
    % growth rate of products used by members
    % engagement rate
    # of published third-party reviews
    % increase in fulfilled RFPs

    When selecting metrics, remember:
    When choosing metrics for your customer advocacy pilot, be sure to align them to your specific goals. If possible, try to connect your advocacy efforts back to retention, growth, or revenue.

    Do not choose too many metrics; one per goal should suffice.

    Ensure that you can track the metrics you select to measure - the data is available and measuring won't be overly manual or time-consuming.

    Win executive approval and implement pilot

    Step 3.2 Establish timeline and create advocate communication materials

    Total duration: 2.5-8.0 hours

    Objective
    Outline who will be involved in what roles and capacities and what tasks and activities need to completed.

    Output

    • Timeline and milestones
    • Advocate program materials

    Participants

    • Customer advocacy lead
    • Key stakeholders
    • Sales lead
    • Marketing lead
    • Customer Success lead
    • Product lead

    MarTech
    None

    Tools

    3.2.1 Establish Timeline & Milestones
    (30-60 min.)

    List & Assign
    List all key tasks, phases, and milestones on slides 13, 14, and 15 in the Executive Presentation Template.

    Include any activities that help close gaps or address pain points from slide 9 in the Executive Presentation Template.

    Assign workstream leads on slide 15 in the Executive Presentation Template.

    Finalize all tasks and activities with working team.

    3.2.2 Design & Build Advocate Program Materials
    (180-300 min.)

    Decide
    Determine materials needed to recruit advocates and explain the program to advocate candidates.

    Determine the types of acts of advocacy you are looking for.

    Determine incentives/rewards that will be provided to advocates, such as access to new products or services.

    Build
    Build out all communication materials.

    Obtain incentives.

    Tips & Reminders

    1. When determining incentives, use the validated ideal advocate profile for guidance (i.e. what motivates your advocates?).
    2. Ensure to leave a buffer in the timeline if the need to adjust course arises.

    Win executive approval and implement pilot

    Step 3.3 Implement pilot and gain executive buy-in

    Total duration: 2.5-8.0 hours

    Objective
    Successfully implement the customer advocacy pilot program and communicate results to gain approval for full-fledged program.

    Output

    • Deliver Executive Presentation
    • Successful customer advocacy pilot
    • Provide regular updates to stakeholders, executives

    Participants

    • Customer advocacy lead
    • Workstream leads

    MarTech
    May require the use of:

    • CRM or Marketing Automation Platform
    • Available and up-to-date customer database

    Tools

    3.3.1 Complete & Deliver Executive Presentation
    (60-120 min.)

    Present
    Finalize the Executive Presentation.

    Hold stakeholder meeting and introduce the program pilot.

    3.3.2 Gain Executive Buy-in
    (60-300 min.)

    Pitch
    Present the final results of the customer advocacy pilot using the Executive Presentation Template and gain approval.

    3.3.3 Implement the Customer Advocacy Program Pilot
    (30-60 min.)

    Launch
    Launch the customer advocacy program pilot. Follow the timelines and activities outlined in the Executive Presentation Template. Track/document all advocate outreach, activity, and progress against success metrics.

    Communicate
    Establish a regular cadence to communicate with steering committee, stakeholders. Use the Executive Presentation Template to present progress and resolve roadblocks if/as they arise.

    Tips & Reminders

    1. Continually collect feedback and input from advocates and stakeholders throughout the process.
    2. Don't be afraid to make changes on the go if it helps to achieve the end goal of your pilot.
    3. If the pilot program was successful, consider scaling it up and rolling it out to more customers.

    Summary of Accomplishment

    Mission Accomplished

    • You successfully launched your customer advocacy program pilot and demonstrated clear benefits and ROI. By identifying the needs of the business and aligning those needs with key customer advocacy activities, marketers and customer advocacy leaders can prioritize the most important tasks for the pilot while also identifying potential opportunities for expansion pending executive approval.
    • SoftwareReviews' comprehensive and tactical approach takes you through the steps to build the foundation for a strategic customer advocacy program. Our methodology ensures that a customer advocacy pilot is developed to deliver the desired outcomes and ROI, increasing stakeholder buy-in and setting up your organization for customer advocacy success.

    If you would like additional support, contact us and we'll make sure you get the professional expertise you need.

    Contact your account representative for more information.
    info@softwarereviews.com
    1-888-670-8889

    Related SoftwareReviews Research

    Measure and Manage the Customer Satisfaction Metrics That Matter the Most
    Understand what truly keeps your customer satisfied. Measure what matters to improve customer experience and increase satisfaction and advocacy.

    • Understand the true drivers of satisfaction and dissatisfaction among your customer segments.
    • Establish process and cadence for effective satisfaction measurement and monitoring.
    • Know where resources are needed most to improve satisfaction levels and increase retention.

    Develop the Right Message to Engage Buyers
    Sixty percent of marketers find it hard to produce high-quality content consistently. SaaS marketers have an even more difficult job due to the technical nature of content production.

    • Create more compelling and relevant content that aligns with a buyer's needs and journey.
    • Shrink marketing and sales cycles.
    • Increase the pace of content production.

    Create a Buyer Persona and Journey
    Get deeper buyer understanding and achieve product-market fit, with easier access to market and sales.

    • Reduce time and resources wasted chasing the wrong prospects.
    • Increase open and click-through rates.
    • Perform more effective sales discovery.
    • Increase win rate.

    Bibliography

    "15 Award-Winning Customer Advocacy Success Stories." Influitive, 2021. Accessed 8 June 2023.

    "Advocacy Marketing." Influitive, June 2016. Accessed 26 Oct. 2021.

    Andrews, Marcus. "42% of Companies Don’t Listen to their Customers. Yikes." HubSpot, June 2019. Accessed 2 Nov. 2021.

    "Before you leap! Webcast." Point of Reference, Sept. 2019. Accessed 4 Nov. 2021.

    "Brand Loyalty: 5 Interesting Statistics." Factory360, Jan. 2016. Accessed 2 Nov. 2021.

    Brenner, Michael. "The Data Driven Guide to Customer Advocacy." Marketing Insider Group, Sept. 2021. Accessed 3 Feb. 2022.

    Carroll, Brian. "Why Customer Advocacy Should Be at the Heart of Your Marketing." Marketing Insider Group, Sept. 2017. Accessed 3 Feb. 2022.

    Cote, Dan. "Advocacy Blooms and Business Booms When Customers and Employees Engage." Influitive, Dec. 2021. Accessed 3 Feb. 2022.

    "Customer Success Strategy Guide." ON24, Jan. 2021. Accessed 2 Nov. 2021.

    Dalao, Kat. "Customer Advocacy: The Revenue-Driving Secret Weapon." ReferralRock, June 2017. Accessed 7 Dec. 2021.

    Frichou, Flora. "Your guide to customer advocacy: What is it, and why is it important?" TrustPilot, Jan. 2020. Accessed 26 Oct. 2021.

    Gallo, Amy. "The Value of Keeping the Right Customers." Harvard Business Review, Oct. 2014. Accessed 10 March 2022.

    Huhn, Jessica. "61 B2B Referral Marketing Statistics and Quotes." ReferralRock, March 2022. Accessed 10 March 2022.

    Kemper, Grayson. "B2B Buying Process: How Businesses Purchase B2B Services and Software." Clutch, Feb. 2020. Accessed 6 Jan. 2022.

    Kettner, Kyle. "The Evolution of Ambassador Marketing." BrandChamp.io, Oct. 2018. Accessed 2 Nov. 2021.

    Landis, Taylor. "Customer Retention Marketing vs. Customer Acquisition Marketing." OutboundEngine, April 2022. Accessed 23 April 2022.

    Miels, Emily. "What is customer advocacy? Definition and strategies." Zendesk Blog, June 2021. Accessed 27 Oct. 2021.

    Mohammad, Qasim. "The 5 Biggest Obstacles to Implementing a Successful B2B Customer Advocacy Program." HubSpot, June 2018. Accessed 6 Jan. 2022.

    Murphy, Brandon. "Brand Advocacy and Social Media - 2009 GMA Conference." Deloitte, Dec. 2009. Accessed 8 June 2023.

    Patel, Neil. "Why SaaS Brand Advocacy is More Important than Ever in 2021." Neil Patel, Feb. 2021. Accessed 4 Nov. 2021.

    Pieri, Carl. "The Plain-English Guide to Customer Advocacy." HubSpot, Apr. 2020. Accessed 27 Oct. 2021.

    Schmitt, Philipp; Skiera, Bernd; Van den Bulte, Christophe. "Referral Programs and Customer Value." Wharton Journal of Marketing, Jan. 2011. Accessed 8 June 2023.

    "The Complete Guide to Customer Advocacy." Gray Group International, 2020. Accessed 15 Oct. 2021.

    "The Customer-powered Enterprise: Playbook." Influitive, Gainsight & Pendo. 2020. Accessed 26 Oct. 2021.

    "The Winning Case for a Customer Advocacy Solution." RO Innovation, 2017. Accessed 26 Oct. 2021.

    Tidey, Will. "Acquisition vs. Retention: The Importance of Customer Lifetime Value." Huify, Feb. 2018. Accessed 10 Mar. 2022.

    "What a Brand Advocate Is and Why Your Company Needs One." RockContent, Jan. 2021. Accessed 7 Feb. 2022.

    "What is Customer Advocacy? A Definition and Strategies to Implement It." Testimonial Hero, Oct. 2021. Accessed 26 Jan. 2022.

    Prepare for Post-Quantum Cryptography

    • Buy Link or Shortcode: {j2store}268|cart{/j2store}
    • member rating overall impact: N/A
    • member rating average dollars saved: N/A
    • member rating average days saved: N/A
    • Parent Category Name: Security Processes & Operations
    • Parent Category Link: /security-processes-and-operations
    • Fault-tolerant quantum computers, capable of breaking existing encryption algorithms and cryptographic systems, are widely expected to be available sooner than originally projected.
    • Data considered secure today may already be at risk due to the threat of harvest-now-decrypt-later schemes.
    • Many current security controls will be completely useless, including today's strongest encryption techniques.

    Our Advice

    Critical Insight

    The advent of quantum computing is closer than you think: some nations have already demonstrated capability with the potential to break current asymmetric-key encryption. Traditional encryption methods will no longer provide sufficient protection. You need to act now to begin your transformation to quantum-resistant encryption.

    Impact and Result

    • Developing quantum-resistant cryptography capabilities is crucial to maintaining data security and integrity for critical applications.
    • Organizations need to act now to begin their transformation to quantum-resistant encryption.
    • Data security (especially for sensitive data) should be an organization’s top priority. Organizations with particularly critical information need to be on top of this quantum movement.

    Prepare for Post-Quantum Cryptography Research & Tools

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. Prepare for Post-Quantum Cryptography Storyboard – Research to help organizations to prepare and implement quantum-resistance cryptography solutions.

    Developing quantum-resistant cryptography capabilities is crucial to maintaining data security and integrity for critical applications. Organizations need to act now to begin their transformation to quantum-resistant encryption.

    • Prepare for Post-Quantum Cryptography Storyboard
    [infographic]

    Further reading

    Prepare for Post-Quantum Cryptography

    It is closer than you think, and you need to act now.

    Analyst Perspective

    It is closer than you think, and you need to act now.

    The quantum realm presents itself as a peculiar and captivating domain, shedding light on enigmas within our world while pushing the boundaries of computational capabilities. The widespread availability of quantum computers is expected to occur sooner than anticipated. This emerging technology holds the potential to tackle valuable problems that even the most powerful classical supercomputers will never be able to solve. Quantum computers possess the ability to operate millions of times faster than their current counterparts.

    As we venture further into the era of quantum mechanics, organizations relying on encryption must contemplate a future where these methods no longer suffice as effective safeguards. The astounding speed and power of quantum machines have the potential to render many existing security measures utterly ineffective, including the most robust encryption techniques used today. To illustrate, a task that currently takes ten years to crack through a brute force attack could be accomplished by a quantum computer in under five minutes.

    Amid this transition into a quantum future, the utmost priority for organizations remains data security, particularly safeguarding sensitive information. Organizations must proactively prepare for the development of countermeasures and essential resilience measures to attain a state of being "quantum safe."

    This is a picture of Alan Tang

    Alan Tang
    Principal Research Director, Security and Privacy
    Info-Tech Research Group

    Executive Summary

    Your Challenge

    • Anticipated advancements in fault-tolerant quantum computers, surpassing existing encryption algorithms and cryptographic systems, are expected to materialize sooner than previously projected. The timeframe for their availability is diminishing daily.
    • Data that is presently deemed secure faces potential vulnerability due to the emergence of harvest-now-decrypt-later strategies.
    • Numerous contemporary security controls, including the most robust encryption techniques, have become obsolete and offer little efficacy.

    Common Obstacles

    • The complexity involved makes it challenging for organizations to incorporate quantum-resistant cryptography into their current IT infrastructure.
    • The endeavor of transitioning to quantum-resilient cryptography demands significant effort and time, with the specific requirements varying for each organization.
    • A lack of comprehensive understanding regarding the cryptographic technologies employed in existing IT systems poses difficulties in identifying and prioritizing systems for upgrading to post-quantum cryptography.

    Info-Tech's Approach

    • The development of quantum-resistant cryptography capabilities is essential for safeguarding the security and integrity of critical applications.
    • Organizations must proactively initiate their transition toward quantum-resistant encryption to ensure data protection.
    • Ensuring the security of corporate data assets should be of utmost importance for organizations, with special emphasis on those possessing highly critical information in light of the advancements in quantum technology.

    Info-Tech Insight

    The advent of quantum computing (QC) is closer than you think: some nations have demonstrated capability with the potential to break current asymmetric-key encryption. Traditional encryption methods will no longer be sufficient as a means of protection. You need to act now to begin your transformation to quantum-resistant encryption.

    Evolvement of QC theory and technologies

    1900-1975

    1976-1997

    1998-2018

    2019-Now

    1. 1900: Max Planck – The energy of a particle is proportional to its frequency: E = hv, where h is a relational constant.
    2. 1926: Erwin Schrödinger – Since electrons can affect each other's states, their energies change in both time and space. The total energy of a particle is expressed as a probability function.
    1. 1976: Physicist Roman Stanisław Ingarden publishes the paper "Quantum Information Theory."
    2. 1980: Paul Benioff describes the first quantum mechanical model of a computer.
    3. 1994: Peter Shor publishes Shor's algorithm.
    1. 1998: A working 2-qubit NMR quantum computer is used to solve Deutsch's problem by Jonathan A. Jones and Michele Mosca at Oxford University.
    2. 2003: DARPA Quantum Network becomes fully operational.
    3. 2011: D-Wave claims to have developed the first commercially available quantum computer, D-Wave One.
    4. 2018: the National Quantum Initiative Act was signed into law by President Donald Trump.
    1. 2019: A paper by Google's quantum computer research team was briefly available, claiming the project has reached quantum supremacy.
    2. 2020: Chinese researchers claim to have achieved quantum supremacy, using a photonic peak 76-qubit system known as Jiuzhang.
    3. 2021: Chinese researchers reported that they have built the world's largest integrated quantum communication network.
    4. 2022: The Quantinuum System Model H1-2 doubled its performance claiming to be the first commercial quantum computer to pass quantum volume 4096.

    Info-Tech Insight

    The advent of QC will significantly change our perception of computing and have a crucial impact on the way we protect our digital economy using encryption. The technology's applicability is no longer a theory but a reality to be understood, strategized about, and planned for.

    Fundamental physical principles and business use cases

    Unlike conventional computers that rely on bits, quantum computers use quantum bits or qubits. QC technology surpasses the limitations of current processing powers. By leveraging the properties of superposition, interference, and entanglement, quantum computers have the capacity to simultaneously process millions of operations, thereby surpassing the capabilities of today's most advanced supercomputers.

    A 2021 Hyperion Research survey of over 400 key decision makers in North America, Europe, South Korea, and Japan showed nearly 70% of companies have some form of in-house QC program.

    Three fundamental QC physical principles

    1. Superposition
    2. Interference
    3. Entanglement

    This is an image of two headings, Optimization; and Simulation. there are five points under each heading, with an arrow above pointing left to right, labeled Qbit Count.

    Info-Tech Insight

    Organizations need to reap the substantial benefits of QC's power, while simultaneously shielding against the same technologies when used by cyber adversaries.

    Percentage of Surveyed Companies That Have QC Programs

    • 31% Have some form of in-house QC program
    • 69% Have no QC program

    Early adopters and business value

    QC early adopters see the promise of QC for a wide range of computational workloads, including machine learning applications, finance-oriented optimization, and logistics/supply chain management.

    This is an image of the Early Adopters, and the business value drivers.

    Info-Tech Insight

    Experienced attackers are likely to be the early adopters of quantum-enabled cryptographic solutions, harnessing the power of QC to exploit vulnerabilities in today's encryption methods. The risks are particularly high for industries that rely on critical infrastructure.

    The need of quantum-safe solution is immediate

    Critical components of classical cryptography will be at risk, potentially leading to the exposure of confidential and sensitive information to the general public. Business, technology, and security leaders are confronted with an immediate imperative to formulate a quantum-safe strategy and establish a roadmap without delay.

    Case Study – Google, 2019

    In 2019, Google claimed that "Our Sycamore processor takes about 200 seconds to sample one instance of a quantum circuit a million times—our benchmarks currently indicate that the equivalent task for a state-of-the-art classical supercomputer would take approximately 10,000 years."
    Source: Nature, 2019

    Why You Should Start Preparation Now

    • The complexity with integrating QC technology into existing IT infrastructure.
    • The effort to upgrade to quantum-resilient cryptography will be significant.
    • The amount of time remaining will decrease every day.

    Case Study – Development in China, 2020

    On December 3, 2020, a team of Chinese researchers claim to have achieved quantum supremacy, using a photonic peak 76-qubit system (43 average) known as Jiuzhang, which performed calculations at 100 trillion times the speed of classical supercomputers.
    Source: science.org, 2020

    Info-Tech Insight

    The emergence of QC brings forth cybersecurity threats. It is an opportunity to regroup, reassess, and revamp our approaches to cybersecurity.

    Security threats posed by QC

    Quantum computers have reached a level of advancement where even highly intricate calculations, such as factoring large numbers into their primes, which serve as the foundation for RSA encryption and other algorithms, can be solved within minutes.

    Threat to data confidentiality

    QC could lead to unauthorized decryption of confidential data in the future. Data confidentiality breaches also impact improperly disposed encrypted storage media.

    Threat to authentication protocols and digital governance

    A recovered private key, which is derived from a public key, can be used through remote control to fraudulently authenticate a critical system.

    Threat to data integrity

    Cybercriminals can use QC technology to recover private keys and manipulate digital documents and their digital signatures.

    Example:

    Consider RSA-2048, a widely used public-key cryptosystem that facilitates secure data transmission. In a 2021 survey, a majority of leading authorities believed that RSA-2048 could be cracked by quantum computers within a mere 24 hours.
    Source: Quantum-Readiness Working Group, 2022

    Info-Tech Insight

    The development of quantum-safe cryptography capabilities is of utmost importance in ensuring the security and integrity of critical applications' data.

    US Quantum Computing Cybersecurity Preparedness Act

    The US Congress considers cryptography essential for the national security of the US and the functioning of the US economy. The Quantum Computing Cybersecurity Preparedness Act was introduced on April 18, 2022, and became a public law (No: 117-260) on December 21, 2022.

    Purpose

    The purpose of this Act is to encourage the migration of Federal Government information technology systems to quantum-resistant cryptography, and for other purposes.

    Scope and Exemption

    • Scope: Systems of government agencies.
    • Exemption: This Act shall not apply to any national security system.

    Main Obligations

    Responsibilities

    Requirements
    Inventory Establishment Not later than 180 days after the date of enactment of this Act, the Director of OMB, shall issue guidance on the migration of information technology to post-quantum cryptography.
    Agency Reports "Not later than 1 year after the date of enactment of this Act, and on an ongoing basis thereafter, the head of each agency shall provide to the Director of OMB, the Director of CISA, and the National Cyber Director— (1) the inventory described in subsection (a)(1); and (2) any other information required to be reported under subsection (a)(1)(C)."
    Migration and Assessment "Not later than 1 year after the date on which the Director of NIST has issued post-quantum cryptography standards, the Director of OMB shall issue guidance requiring each agency to— (1) prioritize information technology described under subsection (a)(2)(A) for migration to post-quantum cryptography; and (2) develop a plan to migrate information technology of the agency to post-quantum cryptography consistent with the prioritization under paragraph (1)."

    "It is the sense of Congress that (1) a strategy for the migration of information technology of the Federal Government to post-quantum cryptography is needed; and (2) the government wide and industry-wide approach to post- quantum cryptography should prioritize developing applications, hardware intellectual property, and software that can be easily updated to support cryptographic agility." – Quantum Computing Cybersecurity Preparedness Act

    The development of post-quantum encryption

    Since 2016, the National Institute of Standards and Technology (NIST) has been actively engaged in the development of post-quantum encryption standards. The objective is to identify and establish standardized cryptographic algorithms that can withstand attacks from quantum computers.

    NIST QC Initiative Key Milestones

    Date Development
    Dec. 20, 2016 Round 1 call for proposals: Announcing request for nominations for public-key post-quantum cryptographic algorithms
    Nov. 30, 2017 Deadline for submissions – 82 submissions received
    Dec. 21, 2017 Round 1 algorithms announced (69 submissions accepted as "complete and proper")
    Jan. 30, 2019 Second round candidates announced (26 algorithms)

    July 22, 2020

    Third round candidates announced (7 finalists and 8 alternates)

    July 5, 2022

    Announcement of candidates to be standardized and fourth round candidates
    2022/2024 (Plan) Draft standards available

    Four Selected Candidates to be Standardized

    CRYSTALS – Kyber

    CRYSTALS – Dilithium

    FALCON

    SPHINCS+

    NIST recommends two primary algorithms to be implemented for most use cases: CRYSTALS-KYBER (key-establishment) and CRYSTALS-Dilithium (digital signatures). In addition, the signature schemes FALCON and SPHINCS+ will also be standardized.

    Info-Tech Insight

    There is no need to wait for formal NIST PQC standards selection to begin your post-quantum mitigation project. It is advisable to undertake the necessary steps and allocate resources in phases that can be accomplished prior to the finalization of the standards.

    Prepare for post-quantum cryptography

    The advent of QC is closer than you think: some nations have demonstrated capability with the potential to break current asymmetric-key encryption. Traditional encryption methods will no longer be sufficient as a means of protection. You need to act now to begin your transformation to quantum-resistant encryption.

    This is an infographic showing the three steps: Threat is Imminent; Risks are Profound; and Take Acton Now.

    Insight summary

    Overarching Insight

    The advent of QC is closer than you think as some nations have demonstrated capability with the potential to break current asymmetric-key encryption. Traditional encryption methods will no longer be sufficient as a means of protection. You need to act now to begin your transformation to quantum-resistant encryption.

    Business Impact Is High

    The advent of QC will significantly change our perception of computing and have a crucial impact on the way we protect our digital economy using encryption. The technology's applicability is no longer a theory but a reality to be understood, strategized about, and planned for.

    It's a Collaborative Effort

    Embedding quantum resistance into systems during the process of modernization requires collaboration beyond the scope of a Chief Information Security Officer (CISO) alone. It is a strategic endeavor shaped by leaders throughout the organization, as well as external partners. This comprehensive approach involves the collective input and collaboration of stakeholders from various areas of expertise within and outside the organization.

    Leverage Industry Standards

    There is no need to wait for formal NIST PQC standards selection to begin your post-quantum mitigation project. It is advisable to undertake the necessary steps and allocate resources in phases that can be accomplished prior to the finalization of the standards.

    Take a Holistic Approach

    The advent of QC poses threats to cybersecurity. It's a time to regroup, reassess, and revamp.

    Blueprint benefits

    IT Benefits

    Business Benefits

    • This blueprint will help organizations to discover and then prioritize the systems to be upgraded to post-quantum cryptography.
    • This blueprint will enable organizations to integrate quantum-resistant cryptography into existing IT infrastructure.
    • Developing quantum-resistant cryptography capabilities is crucial to maintaining data security and integrity for critical applications.
    • This blueprint will help organizations to save effort and time needed upgrade to quantum-resilient cryptography.
    • Organizations will reap the substantial benefits of QC's power, while simultaneously shielding against the same technologies when used by cyber adversaries.
    • Avoid reputation and brand image by preventing data breach and leakage.
    • This blueprint will empower organizations to protect corporate data assets in the post-quantum era.
    • Be compliant with various security and privacy laws and regulations.

    Info-Tech Project Value

    Time, value, and resources saved to obtain buy-in from senior leadership team using our research material:

    1 FTEs*10 days*$100,000/year = $6,000

    Time, value, and resources saved to implement quantum-resistant cryptography using our research guidance:

    2 FTEs* 30 days*$100,000/year = $24,000

    Estimated cost and time savings from this blueprint:

    $6,000 + $24,000 =$30,000

    Get prepared for a post-quantum world

    The advent of sufficiently powerful quantum computers poses a risk of compromising or weakening traditional forms of asymmetric and symmetric cryptography. To safeguard data security and integrity for critical applications, it is imperative to undertake substantial efforts in migrating an organization's cryptographic systems to post-quantum encryption. The development of quantum-safe cryptography capabilities is crucial in this regard.

    Phase 1 - Prepare

    • Obtain buy-in from leadership team.
    • Educate your workforce about the upcoming transition.
    • Create defined projects to reduce risks and improve crypto-agility.

    Phase 2 - Discover

    • Determine the extent of your exposed data, systems, and applications.
    • Establish an inventory of classical cryptographic use cases.

    Phase 3 - Assess

    • Assess the security and data protection risks posed by QC.
    • Assess the readiness of transforming existing classical cryptography to quantum-resilience solutions.

    Phase 4 - Prioritize

    • Prioritize transformation plan based on criteria such as business impact, near-term technical feasibility, and effort, etc.
    • Establish a roadmap.

    Phase 5 - Mitigate

    • Implement post-quantum mitigations.
    • Decommissioning old technology that will become unsupported upon publication of the new standard.
    • Validating and testing products that incorporate the new standard.

    Phase 1 – Prepare: Protect data assets in the post-quantum era

    The rise of sufficiently powerful quantum computers has the potential to compromise or weaken conventional asymmetric and symmetric cryptography methods. In anticipation of a quantum-safe future, it is essential to prioritize crypto-agility. Consequently, organizations should undertake specific tasks both presently and in the future to adequately prepare for forthcoming quantum threats and the accompanying transformations.

    Quantum-resistance preparations must address two different needs:

    Reinforce digital transformation initiatives

    To thrive in the digital landscape, organizations must strengthen their digital transformation initiatives by embracing emerging technologies and novel business practices. The transition to quantum-safe encryption presents a unique opportunity for transformation, allowing the integration of these capabilities to evolve business transactions and relationships in innovative ways.

    Protect data assets in the post-quantum era

    Organizations should prioritize supporting remediation efforts aimed at ensuring the quantum safety of existing data assets and services. The implementation of crypto-agility enables organizations to respond promptly to cryptographic vulnerabilities and adapt to future changes in cryptographic standards. This proactive approach is crucial, as the need for quantum-safe measures existed even before the complexities posed by QC emerged.

    Preparation for the post-quantum world has been recommended by the US government and other national bodies since 2016.

    In 2016, NIST, the National Security Agency (NSA), and Central Security Service stated in their Commercial National Security Algorithm Suite and QC FAQ: "NSA believes the time is now right [to start preparing for the post-quantum world] — consistent with advances in quantum computing."
    Source: Cloud Security Alliance, 2021

    Phase 1 – Prepare: Key tasks

    Preparing for quantum-resistant cryptography goes beyond simply acquiring knowledge and conducting experiments in QC. It is vital for senior management to receive comprehensive guidance on the challenges, risks, and potential mitigations associated with the post-quantum landscape. Quantum and post-quantum education should be tailored to individuals based on their specific roles and the impact of post-quantum mitigations on their responsibilities. This customized approach ensures that individuals are equipped with the necessary knowledge and skills relevant to their respective roles.

    Leadership Buy-In

    • Get senior management commitment to post-quantum project.
    • Determine the extent of exposed data, systems, and applications.
    • Identify near-term, achievable cryptographic maturity goals, creating defined projects to reduce risks and improve crypto-agility.

    Roles and Responsibilities

    • The ownership should be clearly defined regarding the quantum-resistant cryptography program.
    • This should be a cross-functional team within which members represent various business units.

    Awareness and Education

    • Senior management needs to understand the strategic threat to the organization and needs to adequately address the cybersecurity risk in a timely fashion.
    • Educate your workforce about the upcoming transition. All training and education should seek to achieve awareness of the following items with the appropriate stakeholders.

    Info-Tech Insight

    Embedding quantum resistance into systems during the process of modernization requires collaboration beyond the scope of a CISO alone. It is a strategic endeavor shaped by leaders throughout the organization, as well as external partners. This comprehensive approach involves the collective input and collaboration of stakeholders from various areas of expertise within and outside the organization.

    Phase 2 – Discover: Establish a data protection inventory

    During the discovery phase, it is crucial to locate and identify any critical data and devices that may require post-quantum protection. This step enables organizations to understand the algorithms in use and their specific locations. By conducting this thorough assessment, organizations gain valuable insights into their existing infrastructure and cryptographic systems, facilitating the implementation of appropriate post-quantum security measures.

    Inventory Core Components

    1. Description of devices and/or data
    2. Location of all sensitive data and devices
    3. Criticality of the data
    4. How long the data or devices need to be protected
    5. Effective cryptography in use and cryptographic type
    6. Data protection systems currently in place
    7. Current key size and maximum key size
    8. Vendor support timeline
    9. Post-quantum protection readiness

    Key Things to Consider

    • The accuracy and thoroughness of the discovery phase are critical factors that contribute to the success of a post-quantum project.
    • It is advisable to conduct this discovery phase comprehensively across all aspects, not solely limited to public-key algorithms.
    • Performing a data protection inventory can be a time-consuming and challenging phase of the project. Breaking it down into smaller subtasks can help facilitate the process.
    • Identifying all information can be particularly challenging since data is typically scattered throughout an organization. One approach to begin this identification process is by determining the inputs and outputs of data for each department and team within the organization.
    • To ensure accountability and effectiveness, it is recommended to assign a designated individual as the ultimate owner of the data protection inventory task. This person should have the necessary responsibilities and authority to successfully accomplish the task.

    Phase 3 – Assess: The workflow

    Quantum risk assessment entails evaluating the potential consequences of QC on existing security measures and devising strategies to mitigate these risks. This process involves analyzing the susceptibility of current systems to attacks by quantum computers and identifying robust security measures that can withstand QC threats.

    Risk Assessment Workflow

    This is an image of the Risk Assessment Workflow

    By identifying the security gaps that will arise with the advent of QC, organizations can gain insight into the substantial vulnerabilities that core business operations will face when QC becomes a prevalent reality. This proactive understanding enables organizations to prepare and implement appropriate measures to address these vulnerabilities in a timely manner.

    Phase 4 – Prioritize: Balance business value, security risks, and effort

    Organizations need to prioritize the mitigation initiatives based on various factors such as business value, level of security risk, and the effort needed to implement the mitigation controls. In the diagram below, the size of the circle reflects the degree of effort. The bigger the size, the more effort is needed.

    This is an image of a chart where the X axis represents Security Risk level, and the Y axis is Business Value.

    QC Adopters Anticipated Annual Budgets

    This is an image of a bar graph showing the Anticipated Annual Budgets for QC Adopters.
    Source: Hyperion Research, 2022

    Hyperion's survey found that the range of expected budget varies widely.

    • The most selected option, albeit by only 38% of respondents, was US$5 million to US$15 million.
    • About one-third of respondents foresaw annual budgets that exceeded US$15 million, and one-fifth expected budgets to exceed US$25 million.

    Build your risk mitigation roadmap

    2 hours

    1. Review the quantum-resistance initiatives generated in Phase 3 – Assessment.
    2. With input from all stakeholders, prioritize the initiatives based on business value, security risks, and effort using the 2x2 grid.
    3. Review the position of all initiatives and adjust accordingly considering other factors such as dependency, etc.
    4. Place prioritized initiatives to a wave chart.
    5. Assign ownership and target timeline for each initiative.

    This is an image the Security Risk Vs. Business value graph, above an image showing Initiatives Numbered 1-7, divided into Wave 1; Wave 2; and Wave 3.

    Input

    • Data protection inventory created in phase 2
    • Risk assessment produced in phase 3
    • Business unit leaders' and champions' understanding (high-level) of challenges posed by QC

    Output

    • Prioritization of quantum-resistance initiatives

    Materials

    • Whiteboard/flip charts
    • Sticky notes
    • Pen/whiteboard markers

    Participants

    • Quantum-resistance program owner
    • Senior leadership team
    • Business unit heads
    • Chief security officer
    • Chief privacy officer
    • Chief information officer
    • Representatives from legal, risk, and governance

    Phase 5 – Mitigate: Implement quantum-resistant encryption solutions

    To safeguard against cybersecurity risks and threats posed by powerful quantum computers, organizations need to adopt a robust defense-in-depth approach. This entails implementing a combination of well-defined policies, effective technical defenses, and comprehensive education initiatives. Organizations may need to consider implementing new cryptographic algorithms or upgrading existing protocols to incorporate post-quantum encryption methods. The selection and deployment of these measures should be cost-justified and tailored to meet the specific needs and risk profiles of each organization.

    Governance

    Implement solid governance mechanisms to promote visibility and to help ensure consistency

    • Update policies and documents
    • Update existing acceptable cryptography standards
    • Update security and privacy audit programs

    Industry Standards

    • Stay up to date with newly approved standards
    • Leverage industry standards (i.e. NIST's post-quantum cryptography) and test the new quantum-safe cryptographic algorithms

    Technical Mitigations

    Each type of quantum threat can be mitigated using one or more known defenses.

    • Physical isolation
    • Replacing quantum-susceptible cryptography with quantum-resistant cryptography
    • Using QKD
    • Using quantum random number generators
    • Increasing symmetric key sizes
    • Using hybrid solutions
    • Using quantum-enabled defenses

    Vendor Management

    • Work with key vendors on a common approach to quantum-safe governance
    • Assess vendors for possible inclusion in your organization's roadmap
    • Create acquisition policies regarding quantum-safe cryptography

    Research Contributors and Experts

    This is a picture of Adib Ghubril

    Adib Ghubril
    Executive Advisor, Executive Services
    Info-Tech Research Group

    This is a picture of Erik Avakian

    Erik Avakian
    Technical Counselor
    Info-Tech Research Group

    This is a picture of Alaisdar Graham

    Alaisdar Graham
    Executive Counselor
    Info-Tech Research Group

    This is a picture of Carlos Rivera

    Carlos Rivera
    Principal Research Advisor
    Info-Tech Research Group

    This is a picture of Hendra Hendrawan

    Hendra Hendrawan
    Technical Counselor
    Info-Tech Research Group

    This is a picture of Fritz Jean-Louis

    Fritz Jean-Louis
    Principal Cybersecurity Advisor
    Info-Tech Research Group

    Bibliography

    117th Congress (2021-2022). H.R.7535 - Quantum Computing Cybersecurity Preparedness Act. congress.gov, 21 Dec 2022.
    Arute, Frank, et al. Quantum supremacy using a programmable superconducting processor. Nature, 23 Oct 2019.
    Bernhardt, Chris. Quantum Computing for Everyone. The MIT Press, 2019.
    Bob Sorensen. Quantum Computing Early Adopters: Strong Prospects For Future QC Use Case Impact. Hyperion Research, Nov 2022.
    Candelon, François, et al. The U.S., China, and Europe are ramping up a quantum computing arms race. Here's what they'll need to do to win. Fortune, 2 Sept 2022.
    Curioni, Alessandro. How quantum-safe cryptography will ensure a secure computing future. World Economic Forum, 6 July 2022.
    Davis, Mel. Toxic Substance Exposure Requires Record Retention for 30 Years. Alert presented by CalChamber, 18 Feb 2022.
    Eddins, Andrew, et al. Doubling the size of quantum simulators by entanglement forging. arXiv, 22 April 2021.
    Gambetta, Jay. Expanding the IBM Quantum roadmap to anticipate the future of quantum-centric supercomputing. IBM Research Blog, 10 May 2022.
    Golden, Deborah, et al. Solutions for navigating uncertainty and achieving resilience in the quantum era. Deloitte, 2023.
    Grimes, Roger, et al. Practical Preparations for the Post-Quantum World. Cloud Security Alliance, 19 Oct 2021.
    Harishankar, Ray, et al. Security in the quantum computing era. IBM Institute for Business Value, 2023.
    Hayat, Zia. Digital trust: How to unleash the trillion-dollar opportunity for our global economy. World Economic Forum, 17 Aug 2022.
    Mateen, Abdul. What is post-quantum cryptography? Educative, 2023.
    Moody, Dustin. Let's Get Ready to Rumble—The NIST PQC 'Competition.' NIST, 11 Oct 2022.
    Mosca, Michele, Dr. and Dr. Marco Piani. 2021 Quantum Threat Timeline Report. Global Risk Institute, 24 Jan 2022.
    Muppidi, Sridhar and Walid Rjaibi. Transitioning to Quantum-Safe Encryption. Security Intelligence, 8 Dec 2022.
    Payraudeau, Jean-Stéphane, et al. Digital acceleration: Top technologies driving growth in a time of crisis. IBM Institute for Business Value, Nov 2020.
    Quantum-Readiness Working Group (QRWG). Canadian National Quantum-Readiness- Best Practices and Guidelines. Canadian Forum for Digital Infrastructure Resilience (CFDIR), 17 June 2022.
    Rotman, David. We're not prepared for the end of Moore's Law. MIT Technology Review, 24 Feb 2020.
    Saidi, Susan. Calculating a computing revolution. Roland Berger, 2018.
    Shorter., Ted. Why Companies Must Act Now To Prepare For Post-Quantum Cryptography. Forbes.com, 11 Feb 2022.
    Sieger, Lucy, et al. The Quantum Decade, Third edition. IBM, 2022.
    Sorensen, Bob. Broad Interest in Quantum Computing as a Driver of Commercial Success. Hyperion Research, 17 Nov 2021.
    Wise, Jason. How Much Data is Created Every Day in 2022? Earthweb, 22 Sept 2022.
    Wright, Lawrence. The Plague Year. The New Yorker, 28 Dec 2020.
    Yan, Bao, et al. Factoring integers with sublinear resources on a superconducting quantum processor. arXiv, 23 Dec 2022.
    Zhong, Han-Sen, et al. Quantum computational advantage using photons. science.org, 3 Dec 2020.

    Optimize Software Pricing in a Volatile Competitive Market

    • Buy Link or Shortcode: {j2store}566|cart{/j2store}
    • member rating overall impact: N/A
    • member rating average dollars saved: N/A
    • member rating average days saved: N/A
    • Parent Category Name: Marketing Solutions
    • Parent Category Link: /marketing-solutions

    Your challenge:

    • Rising supplier costs and inflation are eroding margins and impacting customers' budgets.
    • There is pressure from management to make a gut-feeling decision because of time, lack of skills, and process limitations.
    • You must navigate competing pricing-related priorities among product, sales, and finance teams.
    • Product price increases fail because discovery lacks understanding of costs, price/value equation, and competitive price points.
    • Customers can react negatively, and results are seen much later (more than 12 months) after the price decision.

    Our Advice

    Critical Insight

    Product leaders will price products based on a deep understanding of the buyer price/value equation and alignment with financial and competitive pricing strategies, and make ongoing adjustments based on an ability to monitor buyer, competitor, and product cost changes.

    Impact and Result

    • Success for many SaaS product managers requires a reorganization and modernization of pricing tools, techniques, and assumptions. Leaders will develop the science of tailored price changes versus across-the-board price actions and account for inflation exposure and the customers’ willingness to pay.
    • This will build skills on how to price new products or adjust pricing for existing products. The disciplines using our pricing strategy methodology will strengthen efforts to develop repeatable pricing models and processes and build credibility with senior management.

    Optimize Software Pricing in a Volatile Competitive Market Research & Tools

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. Optimize Software Pricing in a Volatile Competitive Market Executive Brief - A deck to build your skills on how to price new products or adjust pricing for existing products.

    This Executive Brief will build your skills on how to price new products or adjust pricing for existing products.

    • Optimize Software Pricing in a Volatile Competitive Market Executive Brief

    2. Optimize Software Pricing in a Volatile Competitive Market Storyboard – A deck that provides key steps to complete the project.

    This blueprint will build your skills on how to price new products or adjust pricing for existing products with documented key steps to complete the pricing project and use the Excel workbook and customer presentation.

    • Optimize Software Pricing in a Volatile Competitive Market – Phases 1-3

    3. Optimize Software Pricing in a Volatile Competitive Market Workbook – A tool that enables product managers to simplify the organization and collection of customer and competitor information for pricing decisions.

    These five organizational workbooks for product pricing priorities, interview tracking, sample questions, and critical competitive information will enable the price team to validate price change data through researching the three pricing schemes (competitor, customer, and cost-based).

    • Optimize Software Pricing in a Volatile Competitive Market Workbook

    4. Optimize Software Pricing in a Volatile Competitive Market Presentation Template – A template that serves as a guide to communicating the Optimize Pricing Strategy team's results for a product or product line.

    This template includes the business case to justify product repricing, contract modifications, and packaging rebuild or removal for launch. This template calls for the critical summarized results from the Optimize Software Pricing in a Volatile Competitive Market blueprint and the Optimize Software Pricing in a Volatile Competitive Market Workbook to complete.

    • Optimize Software Pricing in a Volatile Competitive Market Presentation Template

    Infographic

    Further reading

    SoftwareReviews — A Division of INFO~TECH RESEARCH GROUP

    Optimize Software Pricing in a Volatile Competitive Market

    Leading SaaS product managers align pricing strategy to company financial goals and refresh the customer price/value equation to avoid leaving revenues uncaptured.

    Table of Contents

    Section Title Section Title
    1 Executive Brief 2 Key Steps
    3 Concluding Slides

    Optimize Software Pricing in a Volatile Competitive Market

    Leading SaaS product managers align pricing strategy to company financial goals and refresh the customer price/value equation to avoid leaving revenues uncaptured.

    EXECUTIVE BRIEF

    Analyst Perspective

    Optimized Pricing Strategy

    Product managers without well-documented and repeatable pricing management processes often experience pressure from “Agile” management to make gut-feel pricing decisions, resulting in poor product revenue results. When combined with a lack of customer, competitor, and internal cost understanding, these process and timing limitations drive most product managers into suboptimal software pricing decisions. And, adding insult to injury, the poor financial results from bad pricing decisions aren’t fully measured for months, which further compounds the negative effects of poor decision making.

    A successful product pricing strategy aligns finance, marketing, product management, and sales to optimize pricing using a solid understanding of the customer perception of price/value, competitive pricing, and software production costs.

    Success for many SaaS product managers requires a reorganization and modernization of pricing tools, techniques, and data. Leaders will develop the science of tailored price changes versus across-the-board price actions and account for inflation exposure and the customers’ willingness to pay.

    This blueprint will build your skills on how to price new products or adjust pricing for existing products. The discipline you build using our pricing strategy methodology will strengthen your team’s ability to develop repeatable pricing and will build credibility with senior management and colleagues in marketing and sales.

    Photo of Joanne Morin Correia, Principal Research Director, SoftwareReviews.

    Joanne Morin Correia
    Principal Research Director
    SoftwareReviews

    Executive Summary

    Organizations struggle to build repeatable pricing processes:
    • A lack of alignment and collaboration among finance, marketing, product development, and sales.
    • A lack of understanding of customers, competitors, and market pricing.
    • Inability to stay ahead of complex and shifting software pricing models.
    • Time is wasted without a deep understanding of pricing issues and opportunities, and revenue opportunities go unrealized.
    Obstacles add friction to the pricing management process:
    • Pressure from management to make quick decisions results in a gut-driven approach to pricing.
    • A lack of pricing skills and management processes limits sound decision making.
    • Price changes fail because discovery often lacks competitive intelligence and buyer value to price point understanding. Customers’ reactions are often observed much later, after the decision is made.
    • Economic disruptions, supplier price hikes, and higher employee salaries/benefits are driving costs higher.
    Use SoftwareReviews’ approach for more successful pricing:
    • Organize for a more effective pricing project including roles & responsibilities as well as an aligned pricing approach.
    • Work with CFO/finance partner to establish target price based on margins and key factors affecting costs.
    • Perform a competitive price assessment and understand the buyer price/value equation.
    • Arrive at a target price based on the above and seek buy-in and approvals.

    SoftwareReviews Insight

    Product leaders will price products based on a deep understanding of the buyer price/value equation and alignment with financial and competitive pricing strategies, and they will make ongoing adjustments based on an ability to monitor buyers, competitors, and product cost changes.

    What is an optimized price strategy?

    “Customer discovery interviews help reduce the chance of failure by testing your hypotheses. Quality customer interviews go beyond answering product development and pricing questions.” (Pricing Strategies, Growth Ramp, March 2022)

    Most product managers just research their direct competitors when launching a new SaaS product. While this is essential, competitive pricing intel is insufficient to create a long-term optimized pricing strategy. Leaders will also understand buyer TCO.

    Your customers are constantly comparing prices and weighing the total cost of ownership as they consider your competition. Why?

    Implementing a SaaS solution creates a significant time burden as buyers spend days learning new software, making sure tools communicate with each other, configuring settings, contacting support, etc. It is not just the cost of the product or service.

    Optimized Price Strategy Is…
    • An integral part of any product plan and business strategy.
    • Essential to improving and maintaining high levels of margins and customer satisfaction.
    • Focused on delivering the product price to your customer’s business value.
    • Understanding customer price-value for your software segment.
    • Monitoring your product pricing with real-time data to ensure support for competitive strategy.
    Price Strategy Is Not…
    • Increasing or decreasing price on a gut feeling.
    • Changing price for short-term gain.
    • Being wary of asking customers pricing-related questions.
    • Haphazardly focusing entirely on profit.
    • Just covering product costs.
    • Only researching direct competitors.
    • Focusing on yourself or company satisfaction but your target customers.
    • Picking the first strategy you see.

    SoftwareReviews Insight

    An optimized pricing strategy establishes the “best” price for a product or service that maximizes profits and shareholder value while considering customer business value vs. the cost to purchase and implement – the total cost of ownership (TCO).

    Challenging environment

    Product managers are currently experiencing the following:
    • Supplier costs and inflation are rising, eroding product margins and impacting customers’ budgets.
    • Pressure from management to make a gut-feeling decision because of time, lack of skills, and process limitations.
    • Navigating competing pricing-related priorities among product, sales, and finance.
    • Product price increases that fail because discovery lacks understanding of costs, price/value equation, and competitive price points.
    • Slowing customer demand due to poorly priced offerings may not be fully measured for many months following the price decision.
    Doing nothing is NOT an option!
    Offense Double Down

    Benefit: Leverage long-term financial and market assets

    Risk: Market may not value those assets in the future
    Fight Back

    Benefit: Move quickly

    Risk: Hard to execute and easy to get pricing wrong
    Defense Retrench

    Benefit: Reduce threats from new entrants through scale and marketing

    Risk: Causes managed decline and is hard to sell to leadership
    Move Away

    Benefit: Seize opportunities for new revenue sources

    Risk: Diversification is challenging to pull off
    Existing Markets and Customers New Markets and Customers

    Pricing skills are declining

    Among product managers, limited pricing skills are big obstacles that make pricing difficult and under-optimized.

    Visual of a bar chart with descending values, each bar has written on it: 'Limited - Limits in understanding of engineering, marketing, and sales expectations or few processes for pricing and/or cost', 'Inexperienced - Inexperience in pricing project skills and corporate training', 'Lagging - Financial lag indicators (marketing ROI, revenue, profitability, COGs)', 'Lacking - Lack of relevant competitive pricing/packaging information', 'Shifting - Shift to cloud subscription-based revenue models is challenging'.

    The top three weakest product management skills have remained constant over the past five years:
    • Competitive analysis
    • Pricing
    • End of life
    Pricing is the weakest skill and has been declining the most among surveyed product professionals every year. (Adapted from 280 Group, 2022)

    Key considerations for more effective pricing decisions

    Pricing teams can improve software product profitability by:
    • Optimizing software profit with four critical elements: properly pricing your product, giving complete and accurate quotations, choosing the terms of the sale, and selecting the payment method.
    • Implementing tailored price changes (versus across-the-board price actions) to help account for inflation exposure, customer willingness to pay, and product attribute changes.
    • Accelerating ongoing pricing decision-making with a dedicated cross-functional team ready to act quickly.
    • Resetting discounting and promotion, and revisiting service-level agreements.
    Software pricing leaders will regularly assess:

    Has it been over a year since prices were updated?

    Have customers told you to raise your prices?

    Do you have the right mix of customers in each pricing plan?

    Do 40% of your customers say they would be very disappointed if your product disappeared? (Adapted from Growth Ramp, 2021)

    Case Study

    Middleware Vendor

    INDUSTRY
    Technology Middleware
    SOURCE
    SoftwareReviews Custom Pricing Strategy Project
    A large middleware vendor, who is running on Microsoft Azure, known for quality development and website tools, needed to react strategically to the March 2022 Microsoft price increase.

    Key Initiative: Optimize New Pricing Strategy

    The program’s core objective was to determine if the vendor should implement a price increase and how the product should be packaged within the new pricing model.

    For this initiative, the company interviewed buyers using three key questions: What are the core capabilities to focus on building/selling? What are the optimal features and capabilities valued by customers that should be sold together? And should they be charging more for their products?

    Results
    This middleware vendor saw buyer support for a 10% price increase to their product line and restructuring of vertical contract terms. This enabled them to retain customers over multi-year subscription contracts, and the price increase enabled them to protect margins after the Microsoft price increase.

    The Optimize New Pricing Strategy included the following components:

    Components: 'Product Feature Importance & Satisfaction', 'Correlation of Features and Value Drivers', 'Fair Cost to Value Average for Category', 'Average Discounting for Category', 'Customer Value Is an Acceptable Multiple of Price'. First four: 'Component fails into the scope of optimizing price strategy to value'; last one: 'They are optimizing their price strategy decisions'.

    New product price approach

    As a collaborative team across product management, marketing, and finance, we see leaders taking a simple yet well-researched approach when setting product pricing.

    Iterating to a final price point is best done with research into how product pricing:

    • Delivers target margins.
    • Is positioned vs. key competitors.
    • Delivers customer value at a fair price/value ratio.
    To arrive at our new product price, we suggest iterating among 3 different views:

    New Target Price:

    • Buyer Price vs. Value
    • Cost - Plus
    • Vs. Key Competitors
    We analyzed:
    • Customer price/value equation interviews
    • Impacts of Supplier cost increases
    • Competitive pricing research
    • How product pricing delivers target margins

    Who should care about optimized pricing?

    Product managers and marketers who:

    • Support the mandate for optimizing pricing and revenue generation.
    • Need a more scientific way to plan and implement new pricing processes and methods to optimize revenues and profits.
    • Want a way to better apply customer and competitive insights to product pricing.
    • Are evaluating current pricing and cost control to support a refreshed pricing strategy.

    Finance, sales, and marketing professionals who are pricing stakeholders in:

    • Finding alternatives to current pricing and packaging approaches.
    • Looking for ways to optimize price within the shifting market momentum.

    How will they benefit from this research?

    • Refine the ability to effectively target pricing to specific market demands and customer segments.
    • Strengthen product team’s reputation for reliable and repeatable price-management capabilities among senior leadership.
    • Recognize and plan for new revenue opportunities or cost increases.
    • Allow for faster, more accurate intake of customer and competitive data. 
    • Improve pricing skills for professional development and business outcomes.
    • Create new product price, packaging, or market opportunities. 
    • Reduce financial costs and mistakes associated with manual efforts and uneducated guessing.
    • Price software products that better achieve financial goals optimizing revenue, margins, or market share.
    • Enhance the product development and sales processes with real competitive and customer expectations.

    Is Your Pricing Strategy Optimized?

    With the right pricing strategy, you can invest more money into your product, service, or growth. A 1% price increase will improv revenues by:

    Three bars: 'Customer acquisition, 3.32%', 'Customer retention, 6.71%', 'Price monetization, 12.7%'.

    Price monetization will almost double the revenue increases over customer acquisition and retention. (Pricing Strategies, Growth Ramp, March 2022)

    DIAGNOSE PRICE CHALLENGES

    Prices of today's cloud-based services/products are often misaligned against competition and customers' perceived value, leaving more revenues on the table.
    • Do you struggle to price new products with confidence?
    • Do you really know your SaaS product's costs?
    • Have you lost pricing power to stronger competitors?
    • Has cost focus eclipsed customer value focus?
    If so, you are likely skipping steps and missing key outputs in your pricing strategy.

    OPTIMIZE THESE STEPS

    ALIGNMENT
    1. Assign Team Responsibilities
    2. Set Timing for Project Deliverables
    3. Clarify Financial Expectations
    4. Collect Customer Contacts
    5. Determine Competitors
    6. BEFORE RESEARCH, HAVE YOU
      Documented your executive's financial expectations? If "No," return.

    RESEARCH & VALIDATE
    1. Research Competitors
    2. Interview Customers
    3. Test Pricing vs. Financials
    4. Create Pricing Presentation
    5. BEFORE PRESENTING, HAVE YOU:
      Clarified your customer and competitive positioning to validate pricing? If "No," return.

    BUY-IN
    1. Executive Pricing Presentation
    2. Post-Mortem of Presentation
    3. Document New Processes
    4. Monitor the Pricing Changes
    5. BEFORE RESEARCH, HAVE YOU:
      Documented your executive's financial expectations? If "No," return.

    DELIVER KEY OUTPUTS

    Sponsoring executive(s) signs-offs require a well-articulated pricing plan and business case for investment that includes:
    • Competitive features and pricing financial templates
    • Customer validation of price value
    • Optimized price presentation
    • Repeatable pricing processes to monitor changes

    REAP THE REWARDS

    • Product pricing is better aligned to achieve financial goals
    • Improved pricing skills or professional development
    • Stronger team reputation for reliable price management

    Key Insights

    1. Gain a competitive edge by using market and customer information to optimize product financials, refine pricing, and speed up decisions.
    2. Product leaders will best set software product price based on a deep understanding of buyer/price value equation, alignment with financial strategy, and an ongoing ability to monitor buyer, competitor, and product costs.

    SoftwareReviews’ methodology for optimizing your pricing strategy

    Steps

    1.1 Establish the Team and Responsibilities
    1.2 Educate/Align Team on Pricing Strategy
    1.2 Document Portfolio & Target Product(s) for Pricing Updates
    1.3 Clarify Product Target Margins
    1.4 Establish Customer Price/Value
    1.5 Identify Competitive Pricing
    1.6 Establish New Price and Gain Buy-In

    Outcomes

    1. Well-organized project
    2. Clarified product pricing strategy
    3. Customer value vs. price equation
    4. Competitive price points
    5. Approvals

    Insight summary

    Modernize your price planning

    Product leaders will price products based on a deep understanding of the buyer price/value equation and alignment with financial and competitive pricing strategies, and make ongoing adjustments based on an ability to monitor buyer, competitor, and product cost changes.

    Ground pricing against financials

    Meet and align with financial stakeholders.
    • Give finance a heads-up that you want to work with them.
    • Find out the CFO’s expectations for pricing and margins.
    • Ask for a dedicated finance team member.

    Align on pricing strategy

    Lead stakeholders in SaaS product pricing decisions to optimize pricing based on four drivers:
    • Customer’s price/value
    • Competitive strategy
    • Reflective of costs
    • Alignment with financial goals

    Decrease time for approval

    Drive price decisions, with the support of the CFO, to the business value of the suggested change:
    • Reference current product pricing guidelines
    • Compare to the competition and our strategy and weigh results against our customer’s price/value
    • Compare against the equation to business value for the suggested change
    Develop the skill of pricing products

    Increase product revenues and margins by enhancing modern processes and data monetization. Shift from intuitive to information-based pricing decisions.

    Look at other options for revenue

    Adjust product design, features, packaging, and contract terms while maintaining the functionality customers find valuable to their business.

    Blueprint deliverables

    Each step of this blueprint is accompanied by supporting deliverables to help you accomplish your goals:
    Key deliverable:

    New Pricing Strategy Presentation Template

    Capture key findings for your price strategy with the Optimize Your Pricing in a Volatile Competitive Market Strategy Presentation Template

    Sample of the 'Acme Corp New Product Pricing' blueprint.

    Optimize Software Pricing in a Volatile Competitive Market Executive Brief

    This executive brief will build your knowledge on how to price new products or adjust pricing for existing products.

    Sample of the 'Optimize Software Pricing in a Volatile Competitive Market' blueprint.

    Optimize Software Pricing in a Volatile Competitive Market Workbook

    This workbook will help you prioritize which products require repricing, hold customer interviews, and capture competitive insights.

    Sample of the 'Optimize Software Pricing in a Volatile Competitive Market' workbook.

    Guided Implementation

    A Guided Implementation (GI) is a series of calls with a SoftwareReviews analyst to help implement our best practices in your organization.

    A typical GI is 4 to 8 calls over the course of 2 to 4 months.

    What does a typical GI on optimizing software pricing look like?

    Alignment

    Research & Reprice

    Buy-in

    Call #1: Share the pricing team vision and outline activities for the pricing strategy process. Plan next call – 1 week.

    Call #2: Outline products that require a new pricing approach and steps with finance. Plan next call – 1 week.

    Call #3: Discuss the customer interview process. Plan next call – 1 week.

    Call #4 Outline competitive analysis. Plan next call – 1 week.

    Call #5: Review customer and competitive results for initial new pricing business case with finance for alignment. Plan next call – 3 weeks.

    Call #6: Review the initial business case against financial plans across marketing, sales, and product development. Plan next call – 1 week.

    Call #7 Review the draft executive pricing presentation. Plan next call – 1 week.

    Call #8: Discuss gaps in executive presentation. Plan next call – 3 days.

    SoftwareReviews Offers Various Levels of Support to Meet Your Needs

    Included in Advisory Membership Optional add-ons

    DIY Toolkit

    Guided Implementation

    Workshop

    Consulting

    "Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful." "Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track." "We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place." "Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project."

    Desire a Guided Implementation?

    • A GI is where your SoftwareReviews engagement manager and executive advisor/counselor will work with SoftwareReviews research team members to craft with you a Custom Key Initiative Plan (CKIP).
    • A CKIP guides your team through each of the major steps, outlines responsibilities between members of your team and SoftwareReviews, describes expected outcomes, and captures actual value delivered.
    • A CKIP also provides you and your team with analyst/advisor/counselor feedback on project outputs, helps you communicate key principles and concepts to your team, and helps you stay on project timelines.
    • If Guided Implementation assistance is desired, contact your engagement manager.

    Workshop overview

    Contact your account representative for more information.
    workshops@infotech.com1-888-670-8889
    Day 1 Day 2 Day 3 Day 4 Day 5
    Align Team, Identify Customers, and Document Current Knowledge
    Validate Initial Insights and Identify Competitors and Market View
    Schedule and Hold Buyer Interviews
    Summarize Findings and Provide Actionable Guidance to Stakeholders
    Present, Go Forward, and Measure Impact and Results
    Activities

    1.1 Identify Team Members, roles, and responsibilities

    1.2 Establish timelines and project workflow

    1.3 Gather current product and future financial margin expectations

    1.4 Review the Optimize Software Executive Brief and Workbook Templates

    1.4 Build prioritized pricing candidates hypothesis

    2.1 Identify customer interviewee types by segment, region, etc.

    2.2 Hear from industry analysts their perspectives on the competitors, buyer expectations, and price trends

    2.3 Research competitors for pricing, contract type, and product attributes

    3.2 Review pricing and attributes survey and interview questionnaires

    3.2 Hold interviews and use interview guides (over four weeks)

    A gap of up to 4 weeks for scheduling of interviews.

    3.3 Hold review session after initial 3-4 interviews to make adjustments

    4.1 Review all draft price findings against the market view

    4.2 Review Draft Executive Presentation

    5.1 Review finalized pricing strategy plan with analyst for market view

    5.2 Review for comments on the final implementation plan

    Deliverables
    1. Documented steering committee and working team
    2. Current and initial new pricing targets for strategy
    3. Documented team knowledge
    1. Understanding of market and potential target interviewee types
    2. Objective competitive research
    1. Initial review – “Are we going in the right direction with surveys?”
    2. Validate or adjust the pricing surveys to what you hear in the market
    1. Complete findings and compare to the market
    2. Review and finish drafting the Optimize Software Pricing Strategy presentation
    1. Final impute on strategy
    2. Review of suggested next steps and implementation plan

    Our process

    Align team, perform research, and gain executive buy-in on updated price points

    1. Establish the team and responsibilities
    2. Educate/align team on pricing strategy
    3. Document portfolio & target product(s) for pricing updates
    4. Clarify product target margins
    5. Establish customer price/value
    6. Identify competitive pricing
    7. Establish new price and gain buy-in

    Optimize Software Pricing in a Volatile Competitive Market

    Our process will help you deliver the following outcomes:

    • Well-organized project
    • Clarified product pricing strategy
    • Customer value vs. price equation
    • Competitive price points
    • Approvals

    This project involves the following participants:

    • Product management
    • Program leadership
    • Product marketing
    • CFO or finance representative/partner
    • Others
    • Representative(s) from Sales

    1.0 Assign team responsibilities

    Input: Steering committee roles and responsibilities, Steering committee interest and role

    Output: List of new pricing strategy steering committee and workstream members, roles, and timelines, Updated Software Pricing Strategy presentation

    Materials: Optimize Software Pricing in a Volatile Competitive Market Presentation Template

    Participants: CFO, sponsoring executive, Functional leads – development, product marketing, product management, marketing, sales, customer success/support

    1-2 hours
    1. The product manager/member running this pricing/repricing program should review the entire Optimize Software Pricing in a Volatile Competitive Market blueprint and each blueprint attachment.
    2. The product manager should also refer to slide 19 of the Optimize Software Pricing in a Volatile Competitive Market blueprint and decide if help via a Guided Implementation (GI) is of value. If desired, alert your SoftwareReviews engagement manager.
    1-2 hours
    1. The product manager should meet with the chief product officer/CPO and functional leaders, and set the meeting agenda to:
      1. Nominate steering committee members.
      2. Nominate work-stream leads.
      3. Establish key pricing project milestones.
      4. Schedule both the steering committee (suggest monthly) and workstream lead meetings (suggest weekly) through the duration of the project.
      5. Ask the CPO to craft, outside this meeting, his/her version of the "Message from the chief product officer.”
      6. If a Guided Implementation is selected, inform the meeting attendees that a SoftwareReviews analyst will join the next meeting to share his/her Executive Brief on Pricing Strategy.
    2. Record all above findings in the Optimize Software Pricing in a Volatile Competitive Market Presentation Template.

    Download the Optimize Software Pricing in a Volatile Competitive Market Presentation Template

    SoftwareReviews Advisory Insight:

    Pricing steering committees are needed to steer overall product, pricing, and packaging decisions. Some companies include the CEO and CFO on this committee and designate it as a permanent body that meets monthly to give go/no-go decisions to “all things product and pricing related” across all products and business units.

    2.0 Educate the team

    1 hour

    Input: Typically, a joint recognition that pricing strategies need upgrading and have not been fully documented, Steering committee and working team members

    Output: Communication of team members involved and the makeup of the steering committee and working team, Alignment of team members on a shared vision of “why a new price strategy is critical” and what key attributes define both the need and impact on business

    Materials: Optimize Your Software Strategy Executive Brief PowerPoint presentation

    Participants: Initiative manager – individual leading the new pricing strategy, CFO/sponsoring executive, Working team – typically representatives in product marketing, product management, and sales, SoftwareReviews marketing analyst (optional)

    1. Walk the team through the Optimize Software Pricing in a Volatile Competitive Market Executive Brief PowerPoint presentation.
    2. Optional – Have the SoftwareReviews Advisory (SRA) analyst walk the team through the Optimize Software Pricing in a Volatile Competitive Market Executive Brief PowerPoint presentation as part of your session. Contact your engagement manager to schedule.
    3. Walk the team through the current version of the Optimize Software Pricing in a Volatile Competitive Market Presentation Template outlining project goals, steering committee and workstream make-up and responsibilities, project timeline and key milestones, and approach to arriving at new product pricing.
    4. Set expectations among team members of their specific roles and responsibilities for this project, review the frequency of steering committee and workstream meetings to set expectations of key milestones and deliverable due dates.

    Download the Optimize Software Pricing in a Volatile Competitive Market Executive Brief

    3.0 Document portfolio and target products for pricing update

    1-3 Hours

    Input: List of entire product portfolio

    Output: Prioritized list of product candidates that should be repriced

    Materials: Optimize Software Pricing in a Volatile Competitive Market Executive Brief presentation, Optimize Software Pricing in a Volatile Competitive Market Workbook

    Participants: Initiative manager – individual leading the new pricing strategy, CFO/sponsoring executive, Working team – typically representatives in product marketing, product management, and sales

    1. Walk the team through the current version of Optimize Software Pricing in a Volatile Competitive Market workbook, tab 2: “Product Portfolio Organizer.” Modify sample attributes to match your product line where necessary.
    2. As a group, record the product attributes for your entire portfolio.
    3. Prioritize the product price optimization candidates for repricing with the understanding that it might change after meeting with finance.

    Download the Optimize Software Pricing in a Volatile Competitive Market Workbook

    4.0 Clarify product target margins

    2-3 sessions of 1 Hour each

    Input: Finance partner/CFO knowledge of target product current and future margins, Finance partner/CFO who has information on underlying costs with details that illustrate supplier contributions

    Output: Product finance markup target percentage margins and revenues

    Materials: Finance data on the product family, Optimize Software Pricing in a Volatile Competitive Market Workbook, Optimize Software Pricing in a Volatile Competitive Market Presentation Template

    Participants: Initiative manager, Finance partner/CFO

    1. Schedule a meeting with your finance partner/CFO to validate expectations for product margins. The goal is to understand the detail of underlying costs/margins and if the impacts of supplier costs affect the product family. The information will be placed into the Optimize Software Pricing in a Volatile Competitive Market Workbook on tab 2, Product Portfolio Organizer under the “Unit Margins” heading.
    2. Arrive at a final “Cost-Plus New Price” based on underlying costs and target margins for each of the products. Record results in the Optimize Software Pricing in a Volatile Competitive Market Workbook, tab 2, under the “Cost-Plus New Price” heading.
    3. Record product target finance markup price under “Cost-Plus” in Optimize Software Pricing in a Volatile Competitive Market Presentation Template, slide 9, and details in Appendix, “Cost-Plus Analysis,” slide 11.
    4. Repeat this process for any other products to be repriced.

    Download the Optimize Software Pricing in a Volatile Competitive Market Workbook

    Download the Optimize Software Pricing in a Volatile Competitive Market Presentation Template

    5.0 Establish customer price to value

    1-4 weeks

    Input: Identify segments within which you require price-to-value information, Understand your persona insight gaps, Review Sample Interview Guide using the Optimize Software Pricing in a Volatile, Competitive Market Workbook, Tab 4. Interview Guide.

    Output: List of interviewees, Updated Interview Guide

    Materials: Optimize Software Pricing in a Volatile Competitive Market Workbook, Optimize Software Pricing in a Volatile Competitive Market Presentation Template

    Participants: Initiative manager, Customer success to help identify interviewees, Customers, prospects

    1. Identify a list of customers and prospects that best represent your target persona when interviewed. Choose interviewees who will inform key differences among key segments (geographies, company size, a mix of customers and prospects, etc.) and who are decision makers and can best inform insights on price/value and competitors.
    2. Recruit interviewees and schedule 30-minute interviews.
    3. Keep track of interviewees using the Optimize Software Pricing in a Volatile Competitive Market Workbook, tab 3: “Interviewee Tracking.”
    4. Review the Optimize Software Pricing in a Volatile Competitive Market Workbook, tab 4: “Interview Guide,” and modify/update it where appropriate.
    5. Record interviewee perspectives on the “price they are willing to pay for the value received” (price/value equation) using the Optimize Software Pricing in a Volatile Competitive Market Workbook, tab 4: “Interview Guide.”
    6. Summarize findings to result in an average “customer’s value price.” Record product target ”customer’s value price” in Optimize Software Pricing in a Volatile Competitive Market Presentation Template, slide 9 and supporting details in Appendix, “Customer Pricing Analysis,” slide 12.

    Download the Optimize Software Pricing in a Volatile Competitive Market Workbook

    Download the Optimize Software Pricing in a Volatile Competitive Market Presentation Template

    6.0 Identify competitive pricing

    1-2 weeks

    Input: Identify price candidate competitors, Your product pricing, contract type, and product attribute information to compare against, Knowledge of existing competitor information, websites, and technology research sites to guide questions

    Output: Competitive product average pricing

    Materials: Optimize Software Pricing in a Volatile Competitive Market Workbook, Optimize Software Pricing in a Volatile Competitive Market Presentation Template

    Participants: Initiative manager, Customers, prospects

    1. Identify the top 3-5 competitors’ products that you most frequently compete against with your selected product.
    2. Perform competitive intelligence research on deals won or lost that contain competitive pricing insights by speaking with your sales force.
    3. Use the interviews with key customers to also inform competitive pricing insights. Include companies which you may have lost to a competitor in your customer interviewee list.
    4. Modify and add key competitive pricing, contract, or product attributes in the Optimize Software Pricing in a Volatile Competitive Market Workbook, tab 5: “Competitive Information.”
    5. Place your product’s information into the Optimize Software Pricing in a Volatile Competitive Market Workbook, tab 5: “Competitive Information.”
    6. Research your competitors’ summarized pricing and product attribute insights into the workbook.
    7. Record research in the Summarize research on competitors to arrive at an average “Competitors Avg. Price”. Record in ”Customer’s Value Price” in Optimize Software Pricing in a Volatile Competitive Market Presentation Template, slide 9, and details in Appendix, “Competitor Pricing Analysis,” slide 13.

    Download the Optimize Software Pricing in a Volatile Competitive Market Workbook

    Download the Optimize Software Pricing in a Volatile Competitive Market Presentation Template

    7.0 Establish new price and gain buy-in

    2-3 hours

    Input: Findings from competitive, cost-plus, and customer price/value analysis

    Output: Approvals for price change

    Materials: Optimize Software Pricing in a Volatile Competitive Market Presentation Template

    Participants: Initiative manager, Steering committee, Working team – typically representatives in product marketing, product management, sales

    1. Using prior recorded findings of Customer’s Value Price, Competitors’ Avg. Price, and Finance Markup Price, arrive at a recommended “New Price” and record in Optimize Software Pricing in a Volatile Competitive Market Presentation Template, slide 9 and the Appendix for Project Analysis Details.
    2. Present findings to steering committee. Be prepared to show customer interviews and competitive analysis results to support your recommendation.
    3. Plan internal and external communications and discuss the timing of when to “go live” with new pricing. Discuss issues related to migration to a new price, how to handle currently low-priced customers, and how to migrate them over time to the new pricing.
    4. Identify if it makes sense to target a date to launch the new pricing in the future, so customers can be alerted in advance and therefore take advantage of “current pricing” to drive added revenues.
    5. Confer with IT to assess times required to implement within CPQ systems and with product marketing for time to change sales proposals, slide decks, and any other affected assets and systems.

    Download the Optimize Software Pricing in a Volatile Competitive Market Presentation Template

    Summary of Accomplishment

    Problem Solved

    With the help of this blueprint, you have deepened your and your company’s understanding of how to look at new pricing opportunities and what the market and the buyer will pay for your product. You are among the minority of product and marketing leaders that have thoroughly documented their new pricing strategy and processes – congratulations!

    The benefits of having led your team through the process are significant and include the following:

    • Allow for faster, more accurate intake of customer and competitive data 
    • Refine the ability to effectively target pricing to specific market demands and customer segments 
    • Understand the association between the value proposition of products and services
    • Reduce financial costs and mistakes associated with manual efforts & uneducated guessing
    • Recognize and plan for new revenue opportunities or cost increases
    • Create new market or product packaging opportunities
    And finally, by bringing your team along with you in this process, you have also led your team to become more customer-focused while pricing your products – a strategic shift that all organizations should pursue.

    If you would like additional support, contact us and we’ll make sure you get the professional expertise you need.

    Contact your account representative for more information.

    info@softwarereviews.com
    1-888-670-8889

    Bibliography

    “Chapter 4 Reasons for Project Failure.” Kissflow's Guide to Project Management. Kissflow, n.d. Web.

    Edie, Naomi. “Microsoft Is Raising SaaS Prices, and Other Vendors Will, Too.” CIO Dive, 8 December 2021. Web.

    Gruman, Galen, Alan S. Morrison, and Terril A. Retter. “Software Pricing Trends.” PricewaterhouseCoopers, 2018. Web.

    Hargrave, Marshall. “Example of Economic Exposure.” Investopedia, 12 April 2022. Web.

    Heaslip, Emily. “7 Smart Pricing Strategies to Attract Customers.” CO—, 17 November 2021. Web.

    Higgins, Sean. “How to Price a Product That Your Sales Team Can Sell.” HubSpot, 4 April 2022. Web.

    “Pricing Strategies.” Growth Ramp, March 2022. Web.

    “Product Management Skills Benchmark Report 2021.” 280 Group, 9 November 2021. Web.

    Quey, Jason. “Price Increase: How to Do a SaaS Pricing Change in 8 Steps.” Growth Ramp, 22 March 2021. Web.

    Steenburg, Thomas, and Jill Avery. “Marketing Analysis Toolkit: Pricing and Profitability Analysis.” Harvard Business School, 16 July 2010. Web.

    “2021 State of Competitive Intelligence.” Crayon and SCIO, n.d. Web.

    Valchev, Konstantin. “Cost of Goods Sold (COGS) for Software-as-a-Service (SaaS) Business.” OpenView Venture Partners, OV Blog, 20 April 2020. Web.

    “What Is Price Elasticity?” Market Business News, n.d. Web.

    Effectively Manage CxO Relations

    • Buy Link or Shortcode: {j2store}384|cart{/j2store}
    • member rating overall impact: N/A
    • member rating average dollars saved: N/A
    • member rating average days saved: N/A
    • Parent Category Name: Manage Business Relationships
    • Parent Category Link: /manage-business-relationships

    With the exponential pace of technological change, an organization's success will depend largely on how well CIOs can evolve from technology evangelists to strategic business partners. This will require CIOs to effectively broker relationships to improve IT's effectiveness and create business value. A confidential journal can help you stay committed to fostering productive relationships while building trust to expand your sphere of influence.

    Our Advice

    Critical Insight

    Highly effective executives have in common the ability to successfully balance three things: time, personal capabilities, and relationships. Whether you are a new CIO or an experienced leader, the relentless demands on your time and unpredictable shifts in the organization’s strategy require a personal game plan to deliver business value. Rather than managing stakeholders one IT project at a time, you need an action plan that is tailored for unique work styles.

    Impact and Result

    A personal relationship journal will help you:

    • Understand the context in which key stakeholders operate.
    • Identify the best communication approach to engage with different workstyles.
    • Stay committed to fostering relationships through difficult periods.

    Effectively Manage CxO Relations Research & Tools

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. Effectively Manage CxO Relations Storyboard – A guide to creating a personal action plan to help effectively manage relationships across key stakeholders.

    Use this research to create a personal relationship journal in four steps:

    • Effectively Manage CxO Relations Storyboard

    2. Personal Relationship Management Journal Template – An exemplar to help you build your personal relationship journal.

    Use this exemplar to build a journal that is readily accessible, flexible, and easy to maintain.

    • Personal Relationship Management Journal Template

    Infographic

    Further reading

    Effectively Manage CxO Relations

    Make relationship management a daily habit with a personalized action plan.

    Analyst Perspective

    "Technology does not run an enterprise, relationships do." – Patricia Fripp

    As technology becomes increasingly important, an organization's success depends on the evolution of the modern CIO from a technology evangelist to a strategic business leader. The modern CIO will need to leverage their expansive partnerships to demonstrate the value of technology to the business while safeguarding their time and effort on activities that support their strategic priorities. CIOs struggling to transition risk obsolescence with the emergence of new C-suite roles like the Digital Transformation Officer, Chief Digital Officer, Chief Data Officer, and so on.

    CIOs will need to flex new social skills to accommodate diverse styles of work and better predict dynamic situations. This means expanding beyond their comfort level to acquire new social skills. Having a clear understanding of one's own work style (preferences, natural tendencies, motivations, and blind spots) is critical to identify effective communication and engagement tactics.

    Building trust is an art. Striking a balance between fulfilling your own goals and supporting others will require a carefully curated approach to navigate the myriad of personalities and work styles. A personal relationship journal will help you stay committed through these peaks and troughs to foster productive partnerships and expand your sphere of influence over the long term.

    Photo of Joanne Lee
    Joanne Lee
    Principal, Research Director, CIO Advisory
    Info-Tech Research Group

    Executive Summary

    Your Challenge

    In today's unpredictable markets and rapid pace of technological disruptions, CIOs need to create business value by effectively brokering relationships to improve IT's performance. Challenges they face:

    • Operate in silos to run the IT factory.
    • Lack insights into their stakeholders and the context in which they operate.
    • Competing priorities and limited time to spend on fostering relationships.
    • Relationship management programs are narrowly focused on associated change management in IT project delivery.

    Common Obstacles

    Limited span of influence.

    Mistaking formal roles in organizations for influence.

    Understanding what key individuals want and, more importantly, what they don't want.

    Lack of situational awareness to adapt communication styles to individual preferences and context.

    Leveraging different work styles to create a tangible action plan.

    Perceiving relationships as "one and done."

    Info-Tech's Approach

    A personal relationship journal will help you stay committed to fostering productive relationships while building trust to expand your sphere of influence.

    • Identify your key stakeholders.
    • Understand the context in which they operate to define a profile of their mandate, priorities, commitments, and situation.
    • Choose the most effective engagement and communication strategies for different work styles.
    • Create an action plan to monitor and measure your progress.

    Info-Tech Insight

    Highly effective executives have in common the ability to balance three things: time, personal capabilities, and relationships. Whether you are a new CIO or an experienced leader, the relentless demand on your time and unpredictable shifts in the organization's strategy will require a personal game plan to deliver business value. This will require more than managing stakeholders one IT project at a time: It requires an action plan that fosters relationships over the long term.

    Key Concepts

    Stakeholder Management
    A common term used in project management to describe the successful delivery of any project, program, or activity that is associated with organizational change management. The goal of stakeholder management is intricately tied to the goals of the project or activity with a finite end. Not the focus of this advisory research.

    Relationship Management
    A broad term used to describe the relationship between two parties (individuals and/or stakeholder groups) that exists to create connection, inclusion, and influence. The goals are typically associated with the individual's personal objectives and the nature of the interaction is seen as ongoing and long-term.

    Continuum of Commitment
    Info-Tech's framework that illustrates the different levels of commitment in a relationship. It spans from active resistance to those who are committed to actively supporting your personal priorities and objectives. This can be used to baseline where you are today and where you want the relationship to be in the future.

    Work Style
    A reference to an individual's natural tendencies and expectations that manifest itself in their communication, motivations, and leadership skills. This is not a behavior assessment nor a commentary on different personalities but observable behaviors that can indicate different ways people communicate, interact, and lead.

    Glossary
    CDxO: Chief Digital Officer
    CDO: Chief Data Officer
    CxO: C-Suite Executives

    The C-suite is getting crowded, and CIOs need to foster relationships to remain relevant

    The span of influence and authority for CIOs is diminishing with the emergence of Chief Digital Officers and Chief Data Officers.

    63% of CDxOs report directly to the CEO ("Rise of the Chief Digital Officer," CIO.com)

    44% of organizations with a dedicated CDxO in place have a clear digital strategy versus 22% of those without a CDxO (KPMG/Harvey Nash CIO Survey)

    The "good news": CIOs tend to have a longer tenure than CDxOs.

    A diagram that shows the average tenure of C-Suites in years.
    Source: "Age and Tenure of C-Suites," Korn Ferry

    The "bad news": The c-suite is getting overcrowded with other roles like Chief Data Officer.

    A diagram that shows the number of CDOs hired from 2017 to 2021.
    Source: "Chief Data Officer Study," PwC, 2022

    An image of 7 lies technology executives tell ourselves.

    Info-Tech Insight

    The digital evolution has created the emergence of new roles like the Chief Digital Officer and Chief Data Officer. They are a response to bridge the skill gap that exists between the business and technology. CIOs need to focus on building effective partnerships to better communicate the business value generated by technology or they risk becoming obsolete.

    Create a relationship journal to effectively manage your stakeholders

    A diagram of relationship journal

    Info-Tech's approach

    From managing relationships with friends to key business partners, your success will come from having the right game plan. Productive relationships are more than managing stakeholders to support IT initiatives. You need to effectively influence those who have the potential to champion or derail your strategic priorities. Understanding differences in work styles is fundamental to adapting your communication approach to various personalities and situations.

    A diagram that shows from 1.1 to 4.1

    A diagram of business archetypes

    Summary of Insights

    Insight 1: Expand your sphere of influence
    It's not just about gaining a volume of acquaintances. Figure out where you want to spend your limited time, energy, and effort to develop a network of professional allies who will support and help you achieve your strategic priorities.

    Insight 2: Know thyself first and foremost
    Healthy relationships start with understanding your own working style, preferences, and underlying motivations that drive your behavior and ultimately your expectations of others. A win/win scenario emerges when both parties' needs for inclusion, influence, and connection are met or mutually conceded.

    Insight 3: Walk a mile in their shoes
    If you want to build successful partnerships, you need to understand the context in which your stakeholder operates: their motivations, desires, priorities, commitments, and challenges. This will help you adapt as their needs shift and, moreover, leverage empathy to identify the best tactics for different working styles.

    Insight 4: Nurturing relationships is a daily commitment
    Building, fostering, and maintaining professional relationships requires a daily commitment to a plan to get through tough times, competing priorities, and conflicts to build trust, respect, and a shared sense of purpose.

    Related Info-Tech Research

    Supplement your CIO journey with these related blueprints.

    Photo of First 100 Days as CIO

    First 100 Days as CIO

    Photo of Become a Strategic CIO

    Become a Strategic CIO

    Photo of Improve IT Team Effectiveness

    Improve IT Team Effectiveness

    Photo of Become a Transformational CIO

    Become a Transformational CIO

    Executive Brief Case Study

    Logo of Multicap Limited

    • Industry: Community Services
    • Source: Scott Lawry, Head of Digital

    Conversation From Down Under

    What are the hallmarks of a healthy relationship with your key stakeholders?
    "In my view, I work with partners like they are an extension of my team, as we rely on each other to achieve mutual success. Partnerships involve a deeper, more intimate relationship, where both parties are invested in the long-term success of the business."

    Why is it important to understand your stakeholder's situation?
    "It's crucial to remember that every IT project is a business project, and vice versa. As technology leaders, our role is to demystify technology by focusing on its business value. Empathy is a critical trait in this endeavor, as it allows us to see a stakeholder's situation from a business perspective, align better with the business vision and goals, and ultimately connect with people, rather than just technology."

    How do you stay committed during tough times?
    "I strive to leave emotions at the door and avoid taking a defensive stance. It's important to remain neutral and not personalize the issue. Instead, stay focused on the bigger picture and goals, and try to find a common purpose. To build credibility, it's also essential to fact-check assumptions regularly. By following these principles, I approach situations with a clear mind and better perspective, which ultimately helps achieve success."

    Photo of Scott Lawry, Head Of Digital at Multicap Limited

    Key Takeaways

    In a recent conversation with a business executive about the evolving role of CIOs, she expressed: "It's the worst time to be perceived as a technology evangelist and even worse to be perceived as an average CIO who can't communicate the business value of technology."

    This highlights the immense pressure many CIOs face when evolving beyond just managing the IT factory.

    The modern CIO is a business leader who can forge relationships and expand their influence to transform IT into a core driver of business value.

    Stakeholder Sentiment

    Identify key stakeholders and their perception of IT's effectiveness

    1.1 Identify Key Stakeholders

    A diagram of Identify Key Stakeholders

    Identify and prioritize your key stakeholders. Be diligent with stakeholder identification. Use a broad view to identify stakeholders who are known versus those who are "hidden." If stakeholders are missed, then so are opportunities to expand your sphere of influence.

    1.2 Understand Stakeholder's Perception of IT

    A diagram that shows Info-Tech's Diagnostic Reports and Hospital Authority XYZ

    Assess stakeholder sentiments from Info-Tech's diagnostic reports and/or your organization's satisfaction surveys to help identify individuals who may have the greatest influence to support or detract IT's performance and those who are passive observers that can become your greatest allies. Determine where best to focus your limited time amid competing priorities by focusing on the long-term goals that support the organization's vision.

    Info-Tech Insight

    Understand which individuals can directly or indirectly influence your ability to achieve your priorities. Look inside and out, as you may find influencers beyond the obvious peers or executives in an organization. Influence can result from expansive connections, power of persuasion, and trust to get things done.

    Visit Info-Tech's Diagnostic Programs

    Activity: Identify and Prioritize Stakeholders

    30-60 minutes

    1.1 Identify Key Stakeholders

    Start with the key stakeholders that are known to you. Take a 360-degree view of both internal and external connections. Leverage external professional & network platforms (e.g. LinkedIn), alumni connections, professional associations, forums, and others that can help flush out hidden stakeholders.

    1.2 Prioritize Key Stakeholders

    Use stakeholder satisfaction surveys like Info-Tech's Business Vision diagnostic as a starting point to identify those who are your allies and those who have the potential to derail IT's success, your professional brand, and your strategic priorities. Review the results of the diagnostic reports to flush out those who are:

    • Resisters: Vocal about their dissatisfaction with IT's performance and actively sabotage or disrupt
    • Skeptics: Disengaged, passive observers
    • Ambassadors: Aligned but don't proactively support
    • Champions: Actively engaged and will proactively support your success

    Consider the following:

    • Influencers may not have formal authority within an organization but have relationships with your stakeholders.
    • Influencers may be hiding in many places, like the coach of your daughter's soccer team who rows with your CEO.
    • Prioritize, i.e. three degrees of separation due to potential diverse reach of influence.

    Key Output: Create a tab for your most critical stakeholders.

    A diagram that shows profile tabs

    Download the Personal Relationship Management Journal Template.

    Understand stakeholders' business

    Create a stakeholder profile to understand the context in which stakeholders operate.

    2.1 Create individual profile for each stakeholder

    A diagram that shows different stakeholder questions

    Collect and analyze key information to understand the context in which your stakeholders operate. Use the information to derive insights about their mandate, accountabilities, strategic goals, investment priorities, and performance metrics and challenges they may be facing.

    Stakeholder profiles can be used to help design the best approach for personal interactions with individuals as their business context changes.

    If you are short on time, use this checklist to gather information:

    • Stakeholder's business unit (BU) strategy goals
    • High-level organizational chart
    • BU operational model or capability map
    • Key performance metrics
    • Projects underway and planned
    • Financial budget (if available)
    • Milestone dates for key commitments and events
    • External platforms like LinkedIn, Facebook, Twitter, Slack, Instagram, Meetup, blogs

    Info-Tech Insight

    Understanding what stakeholders want (and more importantly, what they don't) requires knowing their business and the personal and social circumstances underlying their priorities and behaviors.

    Activity: Create a stakeholder profile

    30-60 minutes

    2.1.0 Understand stakeholder's business context

    Create a profile for each of your priority stakeholders to document their business context. Review all the information collected to understand their mandate, core accountability, and business capabilities. The context in which individuals operate is a window into the motivations, pressures, and vested interests that will influence the intersectionality between their expectations and yours.

    2.1.1 Document Observable Challenges as Private Notes

    Crushing demands and competing priorities can lead to tension and stress as people jockey to safeguard their time. Identify some observable challenges to create greater situational awareness. Possible underlying factors:

    • Sudden shifts/changes in mandate
    • Performance (operations, projects)
    • Finance
    • Resource and talent gaps
    • Politics
    • Personal circumstances
    • Capability gaps/limitations
    • Capacity challenges

    A diagram that shows considerations of this activity.

    Analyze Stakeholder's Work Style

    Adapt communication styles to the situational context in which your stakeholders operate

    2.2 Determine the ideal approach for engaging each stakeholder

    Each stakeholder has a preferred modality of working which is further influenced by dynamic situations. Some prefer to meet frequently to collaborate on solutions while others prefer to analyze data in solitude before presenting information to substantiate recommendations. However, fostering trust requires:

    1. Understanding your preferred default when engaging others.
    2. Knowing where you need to expand your skills.
    3. Identifying which skills to activate for different professional scenarios.

    Adapting your communication style to create productive interactions will require a diverse arsenal of interpersonal skills that you can draw upon as situations shift. The ability to adapt your work style to dial any specific trait up or down will help to increase your powers of persuasion and influence.

    "There are only two ways to influence human behavior: you can manipulate it, or you can inspire it." – Simon Sinek

    Activity: Identify Engagement Strategies

    30 minutes

    2.2.0 Establish work styles

    Every individual has a preferred style of working. Determine work styles starting with self-awareness:

    • Express myself - How you communicate and interact with others
    • Expression by others - How you want others to communicate and interact with you

    Through observation and situational awareness, we can make inferences about people's work style.

    • Observations - Observable traits of other people's work style
    • Situations - Personal and professional circumstances that influence how we communicate and interact with one another

    Where appropriate and when opportunities arise, ask individuals directly about their preferred work styles and method for communication. What is their preferred method of communication? During a normal course of interaction vs. for urgent priorities?

    2.2.1 Brainstorm possible engagement strategies

    Consider the following when brainstorming engagement strategies for different work styles.

    A table of involvement, influence, and connection.

    Think engagement strategies in different professional scenarios:

    • Meetings - Where and how you connect
    • Communicating - How and what you communicate to create connection
    • Collaborating - What degree of involved in shared activities
    • Persuading - How you influence or direct others to get things done

    Expand New Interpersonal Skills

    Use the Business Archetypes to brainstorm possible approaches for engaging with different work styles. Additional communication and engagement tactics may need to be considered based on circumstances and changing situations.

    A diagram that shows business archetypes and engagement strategies.

    Communicate Effectively

    Productive communication is a dialogue that requires active listening, tailoring messages to fluid situations, and seeking feedback to adapt.

    A diagram of elements that contributes to better align intention and impact

    Be Relevant

    • Understand why you need to communicate
    • Determine what you need to convey
    • Tailor your message to what matters to the audience and their context
    • Identify the most appropriate medium based on the situation

    Be Consistent and Accurate

    • Say what you mean and mean what you say to avoid duplicity
    • Information should be accurate and complete
    • Communicate truthfully; do not make false promises or hide bad news
    • Don't gossip

    Be Clear and Concise

    • Keep it simple and avoid excessive jargon
    • State asks upfront to set intention and transparency
    • Avoid ambiguity and focus on outcomes over details
    • Be brief and to the point or risk losing stakeholder's attention

    Be Attentive and Authentic

    • Stay engaged and listen actively
    • Be curious and inquire for clarification or explanation
    • Be flexible to adapt to both verbal and non-verbal cues
    • Be authentic in your approach to sharing yourself
    • Avoid "canned" approaches

    A diagram of listen, observe, reflect.


    "Good communication is the bridge between confusion and clarity."– Nat Turner (LinkedIn, 2020)

    Exemplar: Engaging With Jane

    A diagram that shows Exemplar: Engaging With Jane

    Exemplar: Engaging With Ali

    A diagram that shows Exemplar: Engaging With Ali

    Develop an Action Plan

    Moving from intent to action requires a plan to ensure you stay committed through the peaks and troughs.

    Create Your 120-Day Plan

    An action plan example

    Key elements of the action plan:

    • Strategic priorities – Your top focus
    • Objective – Your goals
    • 30-60-90-120 Day Topics – Key agenda items
    • Meeting Progress Notes – Key takeaways from meetings
    • Private Notes – Confidential observations

    Investing in relationships is a long-term process. You need to accumulate enough trust to trade or establish coalitions to expand your sphere of influence. Even the strongest of professional ties will have their bouts of discord. To remain committed to building the relationship during difficult periods, use an action plan that helps you stay grounded around:

    • Shared purpose
    • Removing emotion from the situation
    • Continuously learning from every interaction

    Photo of Angela Diop
    "Make intentional actions to set intentionality. Plans are good to keep you grounded and focused especially when relationship go through ups and down and there are changes: to new people and new relationships."
    – Angela Diop, Senior Director, Executive Services, Info-Tech & former VP of Information Services with Unity Health Care

    Activity: Design a Tailored Action Plan

    30-60 minutes

    3.1.0 Determine your personal expectations

    Establish your personal goals and expectations around what you are seeking from the relationship. Determine the strength of your current connection and identify where you want to move the relationship across the continuum of commitment.

    Use insights from your stakeholder's profile to explore their span of influence and degree of interest in supporting your strategic priorities.

    3.1.1 Determine what you want from the relationship

    Based on your personal goals, identify where you want to move the relationship across the continuum of commitment: What are you hoping to achieve from the relationship? How will this help create a win/win situation for both you and the key stakeholder?

    A diagram of Continuum of Commitment.

    3.1.2 Identify your metrics for progress

    Fostering relationships take time and commitment. Utilizing metrics or personal success criteria for each of your focus areas will help you stay on track and find opportunities to make each engagement valuable instead of being transactional.

    A graph that shows influence vs interest.

    Make your action plan impactful

    Level of Connection

    The strength of the relationship will help inform the level of time and effort needed to achieve your goals.

    • Is this a new or existing relationship?
    • How often do you connect with this individual?
    • Are the connections driven by a shared purpose or transactional as needs arise?

    Focus on Relational Value

    Cultivate your network and relationship with the goal of building emotional connection, understanding, and trust around your shared purpose and organization's vision through regular dialogue. Be mindful of transactional exchanges ("quid pro quo") to be strategic about its use. Treat every interaction as equally important regardless of agenda, duration, or channel of communication.

    Plan and Prepare

    Everyone's time is valuable, and you need to come prepared with a clear understanding of why you are engaging. Think about the intentionality of the conversation:

    • Gain buy-in
    • Create transparency
    • Specific ask
    • Build trust and respect
    • Provide information to clarify, clear, or contain a situation

    Non-Verbal Communication Matters

    Communication is built on both overt expressions and subtext. While verbal communication is the most recognizable form, non-lexical components of verbal communication (i.e. paralanguage) can alter stated vs. intended meaning. Engage with the following in mind:

    • Tone, pitch, speed, and hesitation
    • Facial expressions and gestures
    • Choice of channel for engagement

    Exemplar: Action Plan for VP, Digital

    A diagram that shows Exemplar: Action Plan for VP, Digital

    Make Relationship Management a Daily Habit

    Management plans are living documents and need to be flexible to adapt to changes in stakeholder context.

    Monitor and Adjust to Communicate Strategically

    A diagram that shows Principles for Effective Communication and Key Measures

    Building trust takes time and commitment. Treat every conversation with your key stakeholders as an investment in building the social capital to expand your span of influence when and where you need it to go. This requires making relationship management a daily habit. Action plans need to be a living document that is your personal journal to document your observations, feelings, and actions. Such a plan enables you to make constant adjustments along the relationship journey.

    "Without involvement, there is no commitment. Mark it down, asterisk it, circle it, underline it."– Stephen Convey (LinkedIn, 2016)

    Capture some simple metrics

    If you can't measure your actions, you can't manage the relationship.

    An example of measures: what, why, how - metrics, and intended outcome.

    While a personal relationship journal is not a formal performance management tool, identifying some tangible measures will improve the likelihood of aligning your intent with outcomes. Good measures will help you focus your efforts, time, and resources appropriately.

    Keep the following in mind:

    1. WHAT are you trying to measure?
      Specific to the situation or scenario
    2. WHY is this important?
      Relevant to your personal goals
    3. HOW will you measure?
      Achievable and quantifiable
    4. WHAT will the results tell you?
      Intended outcome that is directional

    Summary of accomplishments

    Knowledge Gained

    • Relationship management is critical to a CIO's success
    • A personal relationship journal will help build:
      • Customized approach to engaging stakeholders
      • New communication skills to adapt to different work styles

    New Concepts

    • Work style assessment framework and engagement strategies
    • Effective communication strategies
    • Continuum of commitment to establish personal goals

    Approach to Creating a Personal Journal

    • Step-by-step approach to create a personal journal
    • Key elements for inclusion in a journal
    • Exemplar and recommendations

    Related Info-Tech Research

    Photo of Tech Trends and Priorities Research Centre

    Tech Trends and Priorities Research Centre

    Access Info-Tech's Tech Trend reports and research center to learn about current industry trends, shifts in markets, and disruptions that are impacting your industry and sector. This is a great starting place to gain insights into how the ecosystem is changing your business and the role of IT within it.

    Photo of Embed Business Relationship Management in IT

    Embed Business Relationship Management in IT

    Create a business relationship management (BRM) function in your program to foster a more effective partnership with the business and drive IT's value to the organization.

    Photo of Become a Transformational CIO

    Become a Transformational CIO

    Collaborate with the business to lead transformation and leave behind a legacy of growth.

    Appendix: Framework

    Content:

    • Adaptation of DiSC profile assessment
    • DiSC Profile Assessment
    • FIRO-B Framework
    • Experience Cube

    Info-Tech's Adaption of DiSC Assessment

    A diagram of business archetypes

    Info-Tech's Business Archetypes was created based on our analysis of the DiSC Profile and Myers-Briggs FIRO-B personality assessment tools that are focused on assessing interpersonal traits to better understand personalities.

    The adaptation is due in part to Info-Tech's focus on not designing a personality assessment tool as this is neither the intent nor the expertise of our services. Instead, the primary purpose of this adaptation is to create a simple framework for our members to base their observations of behavioral cues to identify appropriate communication styles to better interact with key stakeholders.

    Cautionary note:
    Business archetypes are personas and should not be used to label, make assumptions and/or any other biased judgements about individual personalities. Every individual has all elements and aspects of traits across various spectrums. This must always remain at the forefront when utilizing any type of personality assessments or frameworks.

    Click here to learn about DiSC Profile
    Click here learn about FIRO-B
    Click here learn about Experience Cube

    DiSC Profile Assessment

    A photo of DiSC Profile Assessment

    What is DiSC?

    DisC® is a personal assessment tool that was originally developed in 1928 by psychologist William Moulton Marston, who designed it to predict job performance. The tool has evolved and is now widely used by thousands of organizations around the world, from large government agencies and Fortune 500 companies to nonprofit and small businesses, to help improve teamwork, communication, and productivity in the workplace. The tool provides a common language people can use to better understand themselves and those they interact with - and use this knowledge to reduce conflict and improve working relationships.

    What does DiSC mean?

    DiSC is an acronym that stands for the four main personality profiles described in the Everything DiSC model: (D)ominance, (i)nfluence, (S)teadiness, (C)onscientiousness

    People with (D) personalities tend to be confident and emphasize accomplishing bottom-line results.
    People with (i) personalities tend to be more open and emphasize relationships and influencing or persuading others.
    People with (S) personalities tend to be dependable and emphasize cooperation and sincerity.
    People with (C) personalities tend to emphasize quality, accuracy, expertise, and competency.

    Go to this link to explore the DiSC styles

    FIRO-B® – Interpersonal Assessment

    A diagram of FIRO framework

    What is FIRO workplace relations?

    The Fundamental Interpersonal Relations Orientation Behavior (FIRO-B®) tool has been around for forty years. The tool assesses your interpersonal needs and the impact of your behavior in the workplace. The framework reveals how individuals can shape and adapt their individual behaviors, influence others effectively, and build trust among colleagues. It has been an excellent resource for coaching individuals and teams about the underlying drivers behind their interactions with others to effectively build successful working relationships.

    What does the FIRO framework measure?

    The FIRO framework addresses five key questions that revolve around three interpersonal needs. Fundamentally, the framework focuses on how you want to express yourself toward others and how you want others to behave toward you. This interaction will ultimately result in the universal needs for (a) inclusion, (b) control, and (c) affection. The insights from the results are intended to help individuals adjust their behavior in relationships to get what they need while also building trust with others. This will allow you to better predict and adapt to different situations in the workplace.

    How can FIRO influence individual and team performance in the workplace?

    FIRO helps people recognize where they may be giving out mixed messages and prompts them to adapt their exhibited behaviors to build trust in their relationships. It also reveals ways of improving relationships by showing individuals how they are seen by others, and how this external view may differ from how they see themselves. Using this lens empowers people to adjust their behavior, enabling them to effectively influence others to achieve high performance.

    In team settings, it is a rich source of information to explore motivations, underlying tensions, inconsistent behaviors, and the mixed messages that can lead to mistrust and derailment. It demonstrates how people may approach teamwork differently and explains the potential for inefficiencies and delays in delivery. Through the concept of behavioral flexibility, it helps defuse cultural stereotypes and streamline cross-cultural teams within organizations.

    Go to this link to explore FIRO-B for Business

    Experience Cube

    A diagram of experience cube model.

    What is an experience cube?

    The Experience Cube model was developed by Gervase Bushe, a professor of Leadership and Organization at the Simon Fraser University's school of Business and a thought leader in the field of organizational behavior. The experience cube is intended as a tool to plan and manage conversations to communicate more effectively in the moment. It does this by promoting self-awareness to better reduce anxiety and adapt to evolving and uncertain situations.

    How does the experience cube work?

    Using the four elements of the experience cube (Observations, Thoughts, Feelings, and Wants) helps you to separate your experience with the situation from your potential judgements about the situation. This approach removes blame and minimizes defensiveness, facilitating a positive discussion. The goal is to engage in a continuous internal feedback loop that allows you to walk through all four quadrants in the moment to help promote self-awareness. With heightened self-awareness, you may (1) remain curious and ask questions, (2) check-in for understanding and clarification, and (3) build consensus through agreement on shared purpose and next steps.

    Observations: Sensory data (information you take in through your senses), primarily what you see and hear. What a video camera would record.

    Thoughts: The meaning you add to your observations (i.e. the way you make sense of them, including your beliefs, expectations, assumptions, judgments, values, and principles). We call this the "story you make up."

    Feelings: Your emotional or physiological response to the thoughts and observations. Feelings words such as sad, mad, glad, scared, or a description of what is happening in your body.

    Wants: Clear description of the outcome you seek. Wants go deeper than a simple request for action. Once you clearly state what you want, there may be different ways to achieve it.

    Go to this link to explore more: Experience Cube

    Research Contributors and Experts

    Photo of Joanne Lee
    Joanne Lee
    Principal, Research Director, CIO Advisory
    Info-Tech Research Group

    Joanne is a professional executive with over twenty-five years of experience in digital technology and management consulting spanning healthcare, government, municipal, and commercial sectors across Canada and globally. She has successfully led several large, complex digital and business transformation programs. A consummate strategist, her expertise spans digital and technology strategy, organizational redesign, large complex digital and business transformation, governance, process redesign, and PPM. Prior to joining Info-Tech Research Group, Joanne was a Director with KPMG's CIO Advisory management consulting services and the Digital Health practice lead for Western Canada. She brings a practical and evidence-based approach to complex problems enabled by technology.

    Joanne holds a Master's degree in Business and Health Policy from the University of Toronto and a Bachelor of Science (Nursing) from the University of British Columbia.



    Photo of Gord Harrison
    Gord Harrison
    Senior Vice President, Research and Advisory
    Info-Tech Research Group

    Gord Harrison, SVP, Research and Consulting, has been with Info-Tech Research Group since 2002. In that time, Gord leveraged his experience as the company's CIO, VP Research Operations, and SVP Research to bring the consulting and research teams together under his current role, and to further develop Info-Tech's practical, tactical, and value-oriented research product to the benefit of both organizations.

    Prior to Info-Tech, Gord was an IT consultant for many years with a focus on business analysis, software development, technical architecture, and project management. His background of educational game software development, and later, insurance industry application development gave him a well-rounded foundation in many IT topics. Gord prides himself on bringing order out of chaos and his customer-first, early value agile philosophy keeps him focused on delivering exceptional experiences to our customers.



    Photo of Angela Diop
    Angela Diop
    Senior Director, Executive Services
    Info-Tech Research Group

    Angela has over twenty-five years of experience in healthcare, as both a healthcare provider and IT professional. She has spent over fifteen years leading technology departments and implementing, integrating, managing, and optimizing patient-facing and clinical information systems. She believes that a key to a healthcare organization's ability to optimize health information systems and infrastructure is to break the silos that exist in healthcare organizations.

    Prior to joining Info-Tech, Angela was the Vice President of Information Services with Unity Health Care. She has demonstrated leadership and success in this area by fostering environments where business and IT collaborate to create systems and governance that are critical to providing patient care and sustaining organizational health.

    Angela has a Bachelor of Science in Systems Engineering and Design from the University of Illinois and a Doctorate of Naturopathic Medicine from Bastyr University. She is a Certified CIO with the College of Healthcare Information Management Executives. She is a two-time Health Information Systems Society (HIMSS) Davies winner.



    Photo of Edison Barreto
    Edison Barreto
    Senior Director, Executive Services
    Info-Tech Research Group

    Edison is a dynamic technology leader with experience growing different enterprises and changing IT through creating fast-paced organizations with cultural, modernization, and digital transformation initiatives. He is well versed in creating IT and business cross-functional leadership teams to align business goals with IT modernization and revenue growth. Over twenty-five years of Gaming, Hospitality, Retail, and F&B experience has given him a unique perspective on guiding and coaching the creation of IT department roadmaps to focus on business needs and execute successful changes.

    Edison has broad business sector experience, including:
    Hospitality, Gaming, Sports and Entertainment, IT policy and oversight, IT modernization, Cloud first programs, R&D, PCI, GRDP, Regulatory oversight, Mergers acquisitions and divestitures.



    Photo of Mike Tweedie
    Mike Tweedie
    Practice Lead, CIO Strategy
    Info-Tech Research Group

    Michael Tweedie is the Practice Lead, CIO – IT Strategy at Info-Tech Research Group, specializing in creating and delivering client-driven, project-based, practical research, and advisory. He brings more than twenty-five years of experience in technology and IT services as well as success in large enterprise digital transformations.

    Prior to joining Info-Tech, Mike was responsible for technology at ADP Canada. In that role, Mike led several large transformation projects that covered core infrastructure, applications, and services and worked closely with and aligned vendors and partners. The results were seamless and transparent migrations to current services, like public cloud, and a completely revamped end-user landscape that allowed for and supported a fully remote workforce.

    Prior to ADP, Mike was the North American Head of Engineering and Service Offerings for a large French IT services firm, with a focus on cloud adoption and complex ERP deployment and management; he managed large, diverse global teams and had responsibilities for end-to-end P&L management.

    Mike holds a Bachelor's degree in Architecture from Ryerson University.



    Photo of Carlene McCubbin
    Carlene McCubbin
    Practice Lead, People and Leadership
    Info-Tech Research Group

    Carlene McCubbin is a Research Lead for the CIO Advisory Practice at Info-Tech Research Group covering key topics in operating models & design, governance, and human capital development.

    During her tenure at Info-Tech, Carlene has led the development of Info-Tech's Organization and Leadership practice and worked with multiple clients to leverage the methodologies by creating custom programs to fit each organization's needs.

    Before joining Info-Tech, Carlene received her Master of Communications Management from McGill University, where she studied development of internal and external communications, government relations, and change management. Her education honed her abilities in rigorous research, data analysis, writing, and understanding the organization holistically, which has served her well in the business IT world.



    Photo of Anubhav Sharma
    Anubhav Sharma
    Research Director, CIO Strategy
    Info-Tech Research Group

    Anubhav is a digital strategy and execution professional with extensive experience in leading large-scale transformation mandates for organizations both in North America and globally, including defining digital strategies for leading banks and spearheading a large-scale transformation project for a global logistics pioneer across ten countries. Prior to joining Info-Tech Research Group, he held several industry and consulting positions in Fortune 500 companies driving their business and technology strategies. In 2023, he was recognized as a "Top 50 Digital Innovator in Banking" by industry peers.

    Anubhav holds an MBA in Strategy from HEC Paris, a Master's degree in Finance from IIT-Delhi, and a Bachelor's degree in Engineering.



    Photo of Kim Osborne-Rodriguez
    Kim Osborne-Rodriguez
    Research Director, CIO Strategy
    Info-Tech Research Group

    Kim is a professional engineer and Registered Communications Distribution Designer (RCDD) with over a decade of experience in management and engineering consulting spanning healthcare, higher education, and commercial sectors. She has worked on some of the largest hospital construction projects in Canada, from early visioning and IT strategy through to design, specifications, and construction administration. She brings a practical and evidence-based approach to digital transformation, with a track record of supporting successful implementations.

    Kim holds a Bachelor's degree in Mechatronics Engineering from University of Waterloo.



    Photo of Amanda Mathieson
    Amanda Mathieson
    Research Director, People and Leadership
    Info-Tech Research Group

    Amanda joined Info-Tech Research Group in 2019 and brings twenty years of expertise working in Canada, the US, and globally. Her expertise in leadership development, organizational change management, and performance and talent management comes from her experience in various industries spanning pharmaceutical, retail insurance, and financial services. She takes a practical, experiential approach to people and leadership development that is grounded in adult learning methodologies and leadership theory. She is passionate about identifying and developing potential talent, as well as ensuring the success of leaders as they transition into more senior roles.

    Amanda has a Bachelor of Commerce degree and Master of Arts in Organization and Leadership Development from Fielding Graduate University, as well as a post-graduate diploma in Adult Learning Methodologies from St. Francis Xavier University. She also has certifications in Emotional Intelligence – EQ-i 2.0 & 360, Prosci ADKAR® Change Management, and Myers-Briggs Type Indicator Step I and II.

    Bibliography

    Bacey, Christopher. "KPMG/Harvey Nash CIO Survey finds most organizations lack enterprise-wide digital strategy." Harvey Nash/KPMG CIO Survey. Accessed Jan. 6, 2023. KPMG News Perspective - KPMG.us.com

    Calvert, Wu-Pong Susanna. "The Importance of Rapport. Five tips for creating conversational reciprocity." Psychology Today Magazine. June 30, 2022. Accessed Feb. 10, 2023. psychologytoday.com/blog

    Coaches Council. "14 Ways to Build More Meaningful Professional Relationships." Forbes Magazine. September 16, 2020. Accessed Feb. 20, 2023. forbes.com/forbescoachescouncil

    Council members. "How to Build Authentic Business Relationships." Forbes Magazine. June 15, 2021. Accessed Jan. 15, 2023. Forbes.com/business council

    Deloitte. "Chief Information Officer (CIO) Labs. Transform and advance the role of the CIO." The CIO program. Accessed Feb. 5, 2021.

    Dharsarathy, Anusha et al. "The CIO challenge: Modern business needs a new kind of tech leader." McKinsey and Company. January 27, 2020. Accessed Feb 2023. Mckinsey.com

    DiSC profile. "What is DiSC?" DiSC Profile Website. Accessed Feb. 5, 2023. discprofile.com

    FIRO Assessment. "Better working relationships". Myers Brigg Website. Resource document downloaded Feb. 10, 2023. myersbriggs.com/article

    Fripp, Patricia. "Frippicisms." Website. Accessed Feb. 25, 2023. fripp.com

    Grossman, Rhys. "The Rise of the Chief Digital Officer." Russell Reynolds Insights, January 1, 2012. Accessed Jan. 5, 2023. Rise of the Chief Digital Officer - russellreynolds.com

    Kambil, Ajit. "Influencing stakeholders: Persuade, trade, or compel." Deloitte Article. August 9, 2017. Accessed Feb. 19, 2023. www2.deloitte.com/insights

    Kambil, Ajit. "Navigating the C-suite: Managing Stakeholder Relationships." Deloitte Article. March 8, 2017. Accessed Feb. 19, 2023. www2.deloitte.com/insights

    Korn Ferry. "Age and tenure in the C-suite." Kornferry.com. Accessed Jan. 6, 2023. Korn Ferry Study Reveals Trends by Title and Industry

    Kumthekar, Uday. "Communication Channels in Project". Linkedin.com, 3 March 2020. Accessed April 27, 2023. Linkedin.com/Pulse/Communication Channels

    McWilliams, Allison. "Why You Need Effective Relationships at Work." Psychology Today Magazine. May 5, 2022. Accessed Feb. 11, 2023. psychologytoday.com/blog

    McKinsey & Company. "Why do most transformations fail? A conversation with Harry Robinson." Transformation Practice. July 2019. Accessed Jan. 10, 2023. Mckinsey.com

    Mind Tools Content Team. "Building Good Work Relationships." MindTools Article. Accessed Feb. 11, 2023. mindtools.com/building good work relationships

    Pratt, Mary. "Why the CIO-CFO relationship is key to digital success." TechTarget Magazine. November 11, 2021. Accessed Feb. 2023. Techtarget.com

    LaMountain, Dennis. "Quote of the Week: No Involvement, No Commitment". Linkedin.com, 3 April 2016. Accessed April 27, 2023. Linkedin.com/pulse/quote-week-involvement

    PwC Pulse Survey. "Managing Business Risks". PwC Library. 2022. Accessed Jan. 30, 2023. pwc.com/pulse-survey

    Rowell, Darin. "3 Traits of a Strong Professional Relationship." Harvard Business Review. August 8, 2019. Accessed Feb. 20, 2023. hbr.org/2019/Traits of a strong professional relationship

    Sinek, Simon. "The Optimism Company from Simon Sinek." Website. Image Source. Accessed, Feb. 21, 2023. simonsinek.com

    Sinek, Simon. "There are only two ways to influence human behavior: you can manipulate it or you can inspire it." Twitter. Dec 9, 2022. Accessed Feb. 20, 2023. twitter.com/simonsinek

    Whitbourne, Susan Krauss. "10 Ways to Measure the Health of Relationship." Psychology Today Magazine. Aug. 7, 2021. Accessed Jan. 30, 2023. psychologytoday.com/blog

    Mitigate Machine Bias

    • Buy Link or Shortcode: {j2store}343|cart{/j2store}
    • member rating overall impact: 8.8/10 Overall Impact
    • member rating average dollars saved: $9,549 Average $ Saved
    • member rating average days saved: 5 Average Days Saved
    • Parent Category Name: Business Intelligence Strategy
    • Parent Category Link: /business-intelligence-strategy
    • AI is the new electricity. It is fundamentally and radically changing the fabric of our world, from the way we conduct business, to how we work and live, make decisions, and engage with each other, to how we organize our society, and ultimately, to who we are. Organizations are starting to adopt AI to increase efficiency, better engage customers, and make faster, more accurate decisions.
    • Like with any new technology, there is a flip side, a dark side, to AI – machine biases. If unchecked, machine biases replicate, amplify, and systematize societal biases. Biased AI systems may treat some of your customers (or employees) differently, based on their race, gender, identity, age, etc. This is discrimination, and it is against the law. It is also bad for business, including missed opportunities, lost consumer confidence, reputational risk, regulatory sanctions, and lawsuits.

    Our Advice

    Critical Insight

    • Machine biases are not intentional. They reflect the cognitive biases, preconceptions, and judgement of the creators of AI systems and the societal structures encoded in the data sets used for machine learning.
    • Machine biases cannot be prevented or fully eliminated. Early identification and diversity in and by design are key. Like with privacy and security breaches, early identification and intervention – ideally at the ideation phase – is the best strategy. Forewarned is forearmed. Prevention starts with a culture of diversity, inclusivity, openness, and collaboration.
    • Machine bias is enterprise risk. Machine bias is not a technical issue. It is a social, political, and business problem. Integrate it into your enterprise risk management (ERM).

    Impact and Result

    • Just because machine biases are induced by human behavior, which is also captured in data silos, they are not inevitable. By asking the right questions upfront during application design, you can prevent many of them.
    • Biases can be introduced into an AI system at any stage of the development process, from the data you collect, to the way you collect it, to which algorithms are used, to which assumptions are made, etc. Ask your data science team a lot of questions; leave no stone unturned.
    • Don’t wait until “Datasheets for Datasets” and “Model Cards for Model Reporting” (or similar frameworks) become standards. Start creating these documents now to identify and analyze biases in your apps. If using open-source data sets or libraries, you may need to create them yourself for now. If working with partners or using AI/ ML services, demand that they provide such information as part of the engagement. You, not your partners, are ultimately responsible for the AI-powered product or service you deliver to your customers or employees.
    • Build a culture of diversity, transparency, inclusivity, and collaboration – the best mechanism to prevent and address machine biases.
    • Treat machine bias as enterprise risk. Use your ERM to guide all decisions around machine biases and their mitigation.

    Mitigate Machine Bias Research & Tools

    Start here – read the Executive Brief

    Read our concise Executive Brief to understand the dark side of AI: algorithmic (machine) biases, how they emerge, why they are dangerous, and how to mitigate them. Review Info-Tech’s methodology and understand the four ways we can support you in completing this project.

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. Understand AI biases

    Learn about machine biases, how and where they arise in AI systems, and how they relate to human cognitive and societal biases.

    • Mitigate Machine Bias – Phase 1: Understand AI Biases

    2. Identify data biases

    Learn about data biases and how to mitigate them.

    • Mitigate Machine Bias – Phase 2: Identify Data Biases
    • Datasheets for Data Sets Template
    • Datasheets for Datasets

    3. Identify model biases

    Learn about model biases and how to mitigate them.

    • Mitigate Machine Bias – Phase 3: Identify Model Biases
    • Model Cards for Model Reporting Template
    • Model Cards For Model Reporting

    4. Mitigate machine biases and risk

    Learn about approaches for proactive and effective bias prevention and mitigation.

    • Mitigate Machine Bias – Phase 4: Mitigate Machine Biases and Risk
    [infographic]

    Workshop: Mitigate Machine Bias

    Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

    1 Prepare

    The Purpose

    Understand your organization’s maturity with respect to data and analytics in order to maximize workshop value.

    Key Benefits Achieved

    Workshop content aligned to your organization’s level of maturity and business objectives.

    Activities

    1.1 Execute Data Culture Diagnostic.

    1.2 Review current analytics strategy.

    1.3 Review organization's business and IT strategy.

    1.4 Review other supporting documentation.

    1.5 Confirm participant list for workshop.

    Outputs

    Data Culture Diagnostic report.

    2 Understand Machine Biases

    The Purpose

    Develop a good understanding of machine biases and how they emerge from human cognitive and societal biases. Learn about the machine learning process and how it relates to machine bias.

    Select an ML/AI project and complete a bias risk assessment.

    Key Benefits Achieved

    A solid understanding of algorithmic biases and the need to mitigate them.

    Increased insight into how new technologies such as ML and AI impact organizational risk.

    Customized bias risk assessment template.

    Completed bias risk assessment for selected project.

    Activities

    2.1 Review primer on AI and machine learning (ML).

    2.2 Review primer on human and machine biases.

    2.3 Understand business context and objective for AI in your organization.

    2.4 Discuss selected AI/ML/data science project or use case.

    2.5 Review and modify bias risk assessment.

    2.6 Complete bias risk assessment for selected project.

    Outputs

    Bias risk assessment template customized for your organization.

    Completed bias risk assessment for selected project.

    3 Identify Data Biases

    The Purpose

    Learn about data biases: what they are and where they originate.

    Learn how to address or mitigate data biases.

    Identify data biases in selected project.

    Key Benefits Achieved

    A solid understanding of data biases and how to mitigate them.

    Customized Datasheets for Data Sets Template.

    Completed datasheet for data sets for selected project.

    Activities

    3.1 Review machine learning process.

    3.2 Review examples of data biases and why and how they happen.

    3.3 Identify possible data biases in selected project.

    3.4 Discuss “Datasheets for Datasets” framework.

    3.5 Modify Datasheets for Data Sets Template for your organization.

    3.6 Complete datasheet for data sets for selected project.

    Outputs

    Datasheets for Data Sets Template customized for your organization.

    Completed datasheet for data sets for selected project.

    4 Identify Model Biases

    The Purpose

    Learn about model biases: what they are and where they originate.

    Learn how to address or mitigate model biases.

    Identify model biases in selected project.

    Key Benefits Achieved

    A solid understanding of model biases and how to mitigate them.

    Customized Model Cards for Model Reporting Template.

    Completed model card for selected project.

    Activities

    4.1 Review machine learning process.

    4.2 Review examples of model biases and why and how they happen.

    4.3 Identify potential model biases in selected project.

    4.4 Discuss Model Cards For Model Reporting framework.

    4.5 Modify Model Cards for Model Reporting Template for your organization.

    4.6 Complete model card for selected project.

    Outputs

    Model Cards for Model Reporting Template customized for your organization.

    Completed model card for selected project.

    5 Create Mitigation Plan

    The Purpose

    Review mitigation approach and best practices to control machine bias.

    Create mitigation plan to address machine biases in selected project. Align with enterprise risk management (ERM).

    Key Benefits Achieved

    A solid understanding of the cultural dimension of algorithmic bias prevention and mitigation and best practices.

    Drafted plan to mitigate machine biases in selected project.

    Activities

    5.1 Review and discuss lessons learned.

    5.2 Create mitigation plan to address machine biases in selected project.

    5.3 Review mitigation approach and best practices to control machine bias.

    5.4 Identify gaps and discuss remediation.

    Outputs

    Summary of challenges and recommendations to systematically identify and mitigate machine biases.

    Plan to mitigate machine biases in selected project.

    IT Project Management Lite

    • Buy Link or Shortcode: {j2store}187|cart{/j2store}
    • member rating overall impact: N/A
    • member rating average dollars saved: N/A
    • member rating average days saved: N/A
    • Parent Category Name: Project Management Office
    • Parent Category Link: /project-management-office
    • Organizations want reliable project reporting and clear, consistent project management standards, but many are unwilling or unable to allocate time for it.
    • Many IT project managers are given project management responsibilities in addition to other full-time roles – without any formal allocation of time, authority, or training.
    • Most IT project managers and stakeholders actually want clear and consistent standards but resist tools and procedures they believe are too time consuming and inflexible.
    • Standard project management procedures must be “light” enough for project managers to adapt to a wide range of projects without increasing the total time required to manage projects successfully.

    Our Advice

    Critical Insight

    • Most IT project management advice is focused on the largest 10-20% of projects – projects with large enough budgets to allocate time to project management. This leaves most IT projects (and most people who manage IT projects) in limbo between high-risk ad hoc management and high-cost project management best practices.
    • Project management success doesn’t equate to project success. While formal methodologies are a key ingredient in the success of large, complex projects, most IT projects do not require the same degree of rigorous record-keeping and planning.
    • Consistent, timely, and accurate reporting is the “linchpin” in any sustainable project and portfolio management practice.

    Impact and Result

    • Maintain timely and accurate project portfolio reporting with right-sized tools and processes.
    • Establish clear and consistent project management standards that make better use of time already spent managing projects.
    • Enable project managers to manage their projects more successfully with a set of flexible and lightweight tools and templates.

    IT Project Management Lite Research & Tools

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. Assess the value of a minimum-viable PMO strategy

    Perform a measured value assessment for building and managing a minimum-viable PMO.

    • IT Project Management Lite Storyboard

    2. Perform a project and portfolio needs assessment

    Focus on the minimum required to maintain accuracy of portfolio reporting and effectiveness in managing projects.

    • Minimum-Viable PMO Needs Assessment

    3. Establish standards for realistic, accurate, and consistent portfolio reporting

    Emphasize reporting high-level project status as a way to identify and address issues to achieve the best results with the least effort.

    • Minimum-Viable Project and Portfolio Management SOP

    4. Create a standard, right-sized project management toolkit

    Free PMs to focus on actually managing the project while still delivering accurate portfolio metrics.

    • Zero-Allocation Project Management Workbook

    5. Train PMs for zero allocation

    Ensure project manager compliance with the portfolio reporting process by incorporating activities that create value.

    • Zero-Allocation Project Manager Development Plan
    • Zero-Allocation Project Management Survival Guide

    6. Perform a post-implementation assessment

    Evaluate success and identify opportunities for further improvement.

    Infographic

    Workshop: IT Project Management Lite

    Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

    1 Preparation

    The Purpose

    Define goals and success criteria.

    Finalize agenda.

    Gather information: update project and resource lists (Info-Tech recommends using the Project Portfolio Workbook).

    Key Benefits Achieved

    More efficiently organized and executed workshop.

    Able to better customize and tailor content to your specific needs.

    Activities

    1.1 Discuss specific pain points with regards to project manager allocations

    1.2 Review project lists, tools and templates, and other documents

    1.3 Map existing strategies to Info-Tech’s framework

    Outputs

    Understanding of where efforts must be focused in workshop

    Assessment of what existing tools and templates may need to be included in zero-allocation workbook

    Revisions that need to be made based on existing strategies

    2 Make the Case and Assess Needs

    The Purpose

    Assess current state (including review of project and resource lists).

    Discuss and analyze SWOT around project and portfolio management.

    Define target state.

    Define standards / SOP / processes for project and portfolio management.

    Key Benefits Achieved

    Gain perspective on how well your processes match up with the amount of time your project managers have for their PM duties.

    Determine the value of the time and effort that your project teams are investing in project management activities.

    Begin to define resource optimized processes for zero-allocation project managers.

    Ensure consistent implementation of processes across your portfolio.

    Establish project discipline and best practices that are grounded in actual project capacity.

    Activities

    2.1 Perform and/or analyze Minimum-Viable PMO Needs Assessment

    2.2 SWOT analysis

    2.3 Identify target allocations for project management activities

    2.4 Begin to define resource optimized processes for zero-allocation project managers

    Outputs

    Current state analysis based on Minimum-Viable PMO Needs Assessment

    Overview of current strengths, weaknesses, opportunities and threats

    Target state analysis based on Minimum-Viable PMO Needs Assessment

    A refined Minimum-Viable Project and Portfolio Management SOP

    3 Establish Strategy

    The Purpose

    Select and customize project and portfolio management toolkit.

    Implement (test/pilot) toolkit and processes.

    Customize project manager training plan.

    Evaluate and refine toolkit and processes as needed.

    Key Benefits Achieved

    Ensure consistent implementation of processes across your portfolio.

    Establish project discipline and best practices that are grounded in actual project capacity.

    A customized training session that will suit the needs of your project managers.

    Activities

    3.1 Customize the Zero-Allocation Toolkit to accommodate the needs of your projects

    3.2 Test toolkit on projects currently underway

    3.3 Tweak project manager training to suit the needs of your team

    Outputs

    Customized Zero-Allocation Project Management Workbook

    A tested and standardized copy of the workbook

    A customized training session for your project managers (to take place on Day 4 of Info-Tech’s workshop)

    4 Train Your Zero-Allocation Project Managers

    The Purpose

    Communicate project and portfolio management SOP to Project Managers.

    Deliver project manager training: standards for portfolio reporting and toolkit.

    Key Benefits Achieved

    Equip project managers to improve their level of discipline and documentation without spending more time in record keeping and task management.

    Execute a successful training session that clearly and succinctly communicates your minimal and resource-optimized processes.

    Activities

    4.1 Project Manager Training, including communication of the processes and standard templates and reports that will be adopted by all project managers

    Outputs

    Educated and disciplined project managers, aware of the required processes for portfolio reporting

    5 Assess Strategy and Next Steps

    The Purpose

    Debrief from the training session.

    Plan for ongoing evaluation and improvement.

    Evaluate and refine toolkit and processes if needed.

    Answer any remaining questions.

    Key Benefits Achieved

    Assess portfolio and project manager performance in light of the strategy implemented.

    Understanding of how to keep living documents like the workbook and SOP up to date.

    Clearly defined next steps.

    Activities

    5.1 Review the customized tools and templates

    5.2 Send relevant documentation to relevant stakeholders

    5.3 Schedule review call

    5.4 Schedule follow-up call with analysts to discuss progress in six months

    Outputs

    Finalized workbook and processes

    Satisfied and informed stakeholders

    Scheduled review call

    Scheduled follow-up call

    Security Priorities 2023

    • Buy Link or Shortcode: {j2store}254|cart{/j2store}
    • member rating overall impact: 9.0/10 Overall Impact
    • member rating average dollars saved: $909 Average $ Saved
    • member rating average days saved: 1 Average Days Saved
    • Parent Category Name: Security Strategy & Budgeting
    • Parent Category Link: /security-strategy-and-budgeting
    • Most people still want a hybrid work model but there is a shortage in security workforce to maintain secure remote work, which impacts confidence in the security practice.
    • Pressure of operational excellence drives organizational modernization with the consequence of higher risks of security attacks that impact not only cyber but also physical systems.
    • The number of regulations with stricter requirements and reporting is increasing, along with high sanctions for violations.
    • Accurate assessment of readiness and benefits to adopt next-gen cybersecurity technologies can be difficult. Additionally, regulation often faces challenges to keep up with next-gen cybersecurity technologies implications and risks of adoption, which may not always be explicit.
    • Software is usually produced as part of a supply chain instead in a silo. Thus, a vulnerability in any part of the supply chain can become a threat surface.

    Our Advice

    Critical Insight

    • Secure remote work still needs to be maintained to facilitate the hybrid work model post pandemic.
    • Despite all the cybersecurity risks, organizations continue modernization plans due to the long-term overall benefits. Hence, we need to secure organization modernization.
    • Organizations should use regulatory changes to improve security practices, instead of treating them as a compliance burden.
    • Next-gen cybersecurity technologies alone are not the silver bullet. A combination of technologies with skilled talent, useful data, and best practices will give a competitive advantage.

    Impact and Result

    • Use this report to help decide your 2023 security priorities by:
      • Collecting and analyzing your own related data, such as your organization 2022 incident reports. Use Info-Tech’s Security Priorities 2023 material for guidance.
      • Identifying your needs and analyzing your capabilities. Use Info-Tech's template to explain the priorities you need to your stakeholders.
      • Determining the next steps. Refer to Info-Tech's recommendations and related research.

    Security Priorities 2023 Research & Tools

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. Security Priorities 2023 Report – A report to help decide your 2023 security priorities.

    Each organization is different, so a generic list of security priorities will not be applicable to every organization. Thus, you need to:

  • Collect and analyze your own related data such as your organization 2022 incident reports. Use Info-Tech’s Security Priorities 2023 material for guidance.
  • Identify your needs and analyze your capabilities. Use Info-Tech's template to explain the priorities you need to your stakeholders.
  • Refer to Info-Tech's recommendations and related research for guidance on the next steps.
    • Security Priorities 2023 Report

    Infographic

    Further reading

    Security Priorities 2023

    How we live post pandemic

    Each organization is different, so a generic list of priorities will not be applicable to every organization.

    During 2022, ransomware campaigns declined from quarter to quarter due to the collapse of experienced groups. Several smaller groups are developing to recapture the lost ransomware market. However, ransomware is still the most worrying cyber threat.

    Also in 2022, people returned to normal activities such as traveling and attending sports or music events but not yet to the office. The reasons behind this trend can be many fold, such as employees perceive that work from home (WFH) has positive productivity effects and time flexibility for employees, especially for those with families with younger children. On the other side of the spectrum, some employers perceive that WFH has negative productivity effects and thus are urging employees to return to the office. However, employers also understand the competition to retain skilled workers is harder. Thus, the trend is to have hybrid work where eligible employees can WFH for a certain portion of their work week.

    Besides ransomware and the hybrid work model, in 2022, we saw an evolving threat landscape, regulatory changes, and the potential for a recession by the end of 2023, which can impact how we prioritize cybersecurity this year. Furthermore, organizations are still facing the ongoing issues of insufficient cybersecurity resources and organization modernization.

    This report will explore important security trends, the security priorities that stem from these trends, and how to customize these priorities for your organization.

    In Q2 2022, the median ransom payment was $36,360 (-51% from Q1 2022), a continuation of a downward trend since Q4 2021 when the ransom payment median was $117,116.
    Source: Coveware, 2022

    From January until October 2022, hybrid work grew in almost all industries in Canada especially finance, insurance, real estate, rental and leasing (+14.7%), public administration and professional services (+11.8%), and scientific and technical services (+10.8%).
    Source: Statistics Canada, Labour Force Survey, October 2022; N=3,701

    Hybrid work changes processes and infrastructure

    Investment on remote work due to changes in processes and infrastructure

    As part of our research process for the 2023 Security Priorities Report, we used the results from our State of Hybrid Work in IT Survey, which collected responses between July 10 and July 29, 2022 (total N=745, with n=518 completed surveys). This survey details what changes in processes and IT infrastructure are likely due to hybrid work.

    Process changes to support hybrid work

    A bar graph is depicted with the following dataset: None of the above - 12%; Change management - 29%; Asset management - 34%; Service request support - 41%; Incident management - 42%

    Survey respondents (n=518) were asked what processes had the highest degree of change in response to supporting hybrid work. Incident management is the #1 result and service request support is #2. This is unsurprising considering that remote work changed how people communicate, how they access company assets, and how they connect to the company network and infrastructure.

    Infrastructure changes to support hybrid work

    A bar graph is depicted with the following dataset: Changed queue management and ticketing system(s) - 11%; Changed incident and service request processes - 23%; Addition of chatbots as part of the Service Desk intake process - 29%; Reduced the need for recovery office spaces and alternative work mitigations - 40%; Structure & day-to-day operation of Service Desk - 41%; Updated network architecture - 44%

    For 2023, we believe that hybrid work will remain. The first driver is that employees still prefer to work remotely for certain days of the week. The second driver is the investment from employers on enabling WFH during the pandemic, such as updated network architecture (44%) and the infrastructure and day-to-day operations (41%) as shown on our survey.

    Top cybersecurity concerns and organizational preparedness for them

    Concerns may correspond to readiness.

    In the Info-Tech Research Group 2023 Trends and Priorities Survey of IT professionals, we asked about cybersecurity concerns and the perception about readiness to meet current and future government legislation regarding cybersecurity requirements.

    Cybersecurity issues

    A bar graph is depicted with the following dataset: Cyber risks are not on the radar of the executive leaders or board of directors - 3.19; Organization is not prepared to respond to a cyber attack - 3.08; Supply chain risks related to cyber threats - 3.18; Talent shortages leading to capacity constraints in cyber security - 3.51; New government or industry-imposed regulations - 3.15

    Survey respondents were asked how concerned they are about certain cybersecurity issues from 1 (not concerned at all) to 5 (very concerned). The #1 concern was talent shortages. Other issues with similar concerns included cyber risks not on leadership's radar, supply chain risks, and new regulations (n=507).

    Cybersecurity legislation readiness

    A bar graph is depicted with the following dataset: 1 (Not confident at all) - 2.4%; 2 - 11.2%; 3 - 39.7%; 4 - 33.3%; 5 (Very confident) - 13.4%

    When asked about how confident organizations are about being prepared to meet current and future government legislation regarding cybersecurity requirements, from 1 (not confident at all) to 5 (very confident), the #1 response was 3 (n=499).

    Unsurprisingly, the ever-changing government legislation environment in a world emerging from a pandemic and ongoing wars may not give us the highest confidence.

    We know the concerns and readiness…

    But what is the overall security maturity?

    As part of our research process for the 2023 Security Priorities Report, we reviewed results of completed Info-Tech Research Group Security Governance and Management Benchmark diagnostics (N=912). This report details what we see in our clients' security governance maturity. Setting aside the perception on readiness – what are their actual security maturity levels?

    A bar graph is depicted with the following dataset: Security Culture - 47%; Policy and Process Governance - 47%; Event and Incident Management - 58%; Vulnerability - 57%; Auditing - 52%; Compliance Management - 58%; Risk Analysis - 52%

    Overall, assessed organizations are still scoring low (47%) on Security Culture and Policy and Process Governance. This justifies why most security incidents are still due to gaps in foundational security and security awareness, not lack of advanced controls such as event and incident management (58%).

    And how will the potential recession impact security?

    Organizations are preparing for recession, but opportunities for growth during recession should be well planned too.

    As part of our research process for the 2023 Security Priorities Report, we reviewed the results of the Info-Tech Research Group 2023 Trends and Priorities Survey of IT professionals, which collected responses between August 9 and September 9, 2022 (total N=813 with n=521 completed surveys).

    Expected organizational spending on cybersecurity compared to the previous fiscal year

    A bar graph is depicted with the following dataset: A decrease of more than 10% - 2.2%; A decrease of between 1-10% - 2.6%; About the same - 41.4%; An increase of between 1-10% - 39.6%; An increase of more than 10% - 14.3%

    Keeping the same spending is the #1 result and #2 is increasing spending up to 10%. This is a surprising finding considering the survey was conducted after the middle of 2022 and a recession has been predicted since early 2022 (n=489).

    An infographic titled Cloudy with a Chance of Recession

    Source: Statista, 2022, CC BY-ND

    US recession forecast

    Contingency planning for recessions normally includes tight budgeting; however, it can also include opportunities for growth such as hiring talent who have been laid off by competitors and are difficult to acquire in normal conditions. This can support our previous findings on increasing cybersecurity spending.

    Five Security Priorities for 2023

    This image describes the Five Security Priorities for 2023.

    Maintain Secure Hybrid Work

    PRIORITY 01

    • HOW TO STRATEGICALLY ACQUIRE, RETAIN, OR UPSKILL TALENT TO MAINTAIN SECURE SYSTEMS.

    Executive summary

    Background

    If anything can be learned from COVID-19 pandemic, it is that humans are resilient. We swiftly changed to remote workplaces and adjusted people, processes, and technologies accordingly. We had some hiccups along the way, but overall, we demonstrated that our ability to adjust is amazing.

    The pandemic changed how people work and how and where they choose to work, and most people still want a hybrid work model. However, the number of days for hybrid work itself varies. For example, from our survey in July 2022 (n=516), 55.8% of employees have the option of 2-3 days per week to work offsite, 21.0% for 1 day per week, and 17.8% for 4 days per week.

    Furthermore, the investment (e.g. on infrastructure and networks) to initiate remote work was huge, and the cost doesn't end there, as we need to maintain the secure remote work infrastructure to facilitate the hybrid work model.

    Current situation

    Remote work: A 2022 survey by WFH Research (N=16,451) reports that ~14% of full-time employees are fully remote and ~29% are in a hybrid arrangement as of Summer-Fall 2022.

    Security workforce shortage: A 2022 survey by Bridewell (N=521) reports that 68% of leaders say it has become harder to recruit the right people, impacting organizational ability to secure and monitor systems.

    Confidence in the security practice: A 2022 diagnostic survey by Info-Tech Research Group (N=55) reports that importance may not correspond to confidence; for example, the most important selected cybersecurity area, namely Data Access/Integrity (93.7%), surprisingly has the lowest confidence of the practice (80.5%).

    "WFH doubled every 15 years pre-pandemic. The increase in WFH during the pandemic was equal to 30 years of pre-pandemic growth."

    Source: National Bureau of Economic Research, 2021

    Leaders must do more to increase confidence in the security practice

    Importance may not correspond to confidence

    As part of our research process for the 2023 Security Priorities Report, we analyzed results from the Info-Tech Research Group diagnostics. This report details what we see in our clients' perceived importance of security and their confidence in existing security practices.

    Cybersecurity importance

    A bar graph is depicted with the following dataset: Importance to the Organization - 94.3%; Importance to My Department	92.2%

    Cybersecurity importance areas

    A bar graph is depicted with the following dataset: Mobility (Remote & Mobile Access) - 90.2%; Regulatory Compliance - 90.1%; Desktop Computing - 90.9%; Data Access / Integrity - 93.7%

    Confidence in cybersecurity practice

    A bar graph is depicted with the following dataset: Confidence in the Organization's Overall Security - 79.4%; Confidence in Security for My Department - 79.8%

    Confidence in cybersecurity practice areas

    A bar graph is depicted with the following dataset: Mobility (Remote & Mobile Access) - 75.8%; Regulatory Compliance - 81.5%; Desktop Computing - 80.9%; Data Access / Integrity - 80.5%

    Diagnostics respondents (N=55) were asked about how important security is to their organization or department. Importance to the overall organization is 2.1 percentage points (pp) higher, but confidence in the organization's overall security is slightly lower (-0.4 pp).

    If we break down to security areas, we can see that the most important area, Data Access/Integrity (93.7%), surprisingly has the lowest confidence of the practice: 80.5%. From this data we can conclude that leaders must build a strong cybersecurity workforce to increase confidence in the security practice.

    Use this template to explain the priorities you need your stakeholders to know about.

    Maintain secure hybrid work plan

    Provide a brief value statement for the initiative.

    Build a strong cybersecurity workforce to increase confidence in the security practice to facilitate hybrid work.

    Initiative Description:

    • Description must include what organization will undertake to complete the initiative.
    • Review your security strategy for hybrid work.
    • Identify skills gaps that hinder the successful execution of the hybrid work security strategy.
    • Use the identified skill gaps to define the technical skill requirements for current and future work roles.
    • Conduct a skills assessment on your current workforce to identify employee skill gaps.
    • Decide whether to train, hire, contract, or outsource each skill gap.

    Drivers:

    List initiative drivers.

    • Employees still prefer to WFH for certain days of the week.
    • The investment on WFH during pandemic such as updated network architecture and infrastructure and day-to-day operations.
    • Tech companies' huge layoffs, e.g. Meta laid off more than 11,000 employees.

    Risks:

    List initiative risks and impacts.

    • Unskilled workers lacking certificates or years of experience who are trained and become skilled workers then quit or are hijacked by competitors.
    • Organizational and cultural changes cause friction with work-life balance.
    • Increased attack surface of remote/hybrid workforce.

    Benefits:

    List initiative benefits and align to business benefits or benefits for the stakeholder groups that it impacts.

    • Increase perceived productivity by employees and increase retention.
    • Increase job satisfaction and work-life balance.
    • Hiring talent that has been laid off who are difficult to acquire in normal conditions.

    Related Info-Tech Research:

    Recommended Actions

    1. Identify skill requirements to maintain secure hybrid work

    Review your security strategy for hybrid work.

    Determine the skill needs of your security strategy.

    2. Identify skill gaps

    Identify skills gaps that hinder the successful execution of the hybrid work security strategy.

    Use the identified skill gaps to define the technical skill requirements for work roles.

    3. Decide whether to build or buy skills

    Conduct a skills assessment on your current workforce to identify employee skill gaps.

    Decide whether to train, hire, contract, or outsource each skill gap.

    Source: Close the InfoSec Skills Gap: Develop a Technical Skills Sourcing Plan, Info-Tech

    Secure Organization Modernization

    PRIORITY 02

    • TRENDS SUGGEST MODERNIZATION SUCH AS DIGITAL
      TRANSFORMATION TO THE CLOUD, OPERATIONAL TECHNOLOGY (OT),
      AND THE INTERNET OF THINGS (IOT) IS RISING; ADDRESSING THE RISK
      OF CONVERGING ENVIRONMENTS CAN NO LONGER BE DEFERRED.

    Executive summary

    From computerized milk-handling systems in Wisconsin farms, to automated railway systems in Europe, to Ausgrid's Distribution Network Management System (DNMS) in Australia, to smart cities and beyond; system modernization poses unique challenges to cybersecurity.

    The threats can be safety, such as the trains stopped in Denmark during the last weekend of October 2022 for several hours due to an attack on a third-party IT service provider; economics, such as a cream cheese production shutdown that occurred at the peak of cream cheese demand in October 2021 due to hackers compromising a large cheese manufacturer's plants and distribution centers; and reliability, such as the significant loss of communication for the Ukrainian military, which relied on Viasat's services.

    Despite all the cybersecurity risks, organizations continue modernization plans due to the long-term overall benefits.

    Current situation

    • Pressure of operational excellence: Competitive markets cannot keep pace with demand without modernization. For example, in automated milking systems, the labor time saved from milking can be used to focus on other essential tasks such as the decision-making process.
    • Technology offerings: Technologies are available and affordable such as automated equipment, versatile communication systems, high-performance human machine interaction (HMI), IIoT/Edge integration, and big data analytics.
    • Higher risks of cyberattacks: Modernization enlarges attack surfaces, which are not only cyber but also physical systems. Most incidents indicate that attackers gained access through the IT network, which was followed by infiltration into OT networks.

    IIoT market size is USD 323.62 billion in 2022 and projected to be around USD 1 trillion in 2028.

    Source: Statista,
    March 2022

    Modernization brings new opportunities and new threats

    Higher risks of cyberattacks on Industrial Control System (ICS)

    Target: Australian sewage plant.

    Method: Insider attack. Impact: 265,000 gallons of untreated sewage released.

    Target: Middle East energy companies.

    Method: Shamoon.

    Impact: Overwritten Windows-based systems files.

    Target: German Steel Mill

    Method: Spear-phishing

    Impact: Blast furnace control shutdown failure.

    Target: Middle East Safety Instrumented System (SIS).

    Method: TRISIS/TRITON.

    Impact: Modified safety system ladder logic.

    Target: Viasat's KA-SAT Network.

    Method: AcidRain.

    Impact: Significant loss of communication for the Ukrainian military, which relied on Viasat's services.

    A timeline displaying the years 1903; 2000; 2010; 2012; 2013; 2014; 2018; 2019; 2021; 2022 is displayed.

    Target: Marconi wireless telegraphs presentation. Method: Morse code.

    Impact: Fake message sent "Rats, rats, rats, rats. There was a young fellow of Italy, Who diddled the public quite prettily."

    Target: Iranian uranium enrichment plant.

    Method: Stuxnet.

    Impact: Compromised programmable logic controllers (PLCs).

    Target: ICS supply chain.

    Method: Havex.

    Impact: Remote Access Trojan (RAT) collected information and uploaded data to command-and-control (C&C) servers.

    Target: Ukraine power grid.

    Method: BlackEnergy.

    Impact: Manipulation of HMI View causing 1-6 hour power outages for 230,000 consumers.

    Target: Colonial Pipeline.

    Method: DarkSide ransomware.

    Impact: Compromised billing infrastructure halted the pipeline operation.

    Sources:

    • DOE, 2018
    • CSIS, 2022
    • MIT Technology Review, 2022

    Info-Tech Insight

    Most OT incidents start with attacks against IT networks and then move laterally into the OT environment. Therefore, converging IT and OT security will help protect the entire organization.

    Use this template to explain the priorities you need your stakeholders to know about.

    Secure organization modernization

    Provide a brief value statement for the initiative.

    The systems (OT, IT, IIoT) are evolving now – ensure your security plan has you covered.

    Initiative Description:

    • Description must include what organization will undertake to complete the initiative.
    • Identify the drivers to align with your organization's business objectives.
    • Build your case by leveraging a cost-benefit analysis and update your security strategy.
    • Identify people, process, and technology gaps that hinder the modernization security strategy.
    • Use the identified skill gaps to update risks, policies and procedures, IR, DR, and BCP.
    • Evaluate and enable modernization technology top focus areas and refine security processes.
    • Decide whether to train, hire, contract, or outsource to fill the security workforce gap.

    Drivers:

    List initiative drivers.

    • Pressure of operational excellence
    • Technology offerings
    • Higher risks of cyberattacks

    Risks:

    List initiative risks and impacts.

    • Complex systems with many components to implement and manage require diligent change management.
    • Organizational and cultural changes cause friction between humans and machines.
    • Increased attack surface of cyber and physical systems.

    Benefits:

    List initiative benefits and align to business benefits or benefits for the stakeholder groups that it impacts.

    • Improve service reliability through continuous and real-time operation.
    • Enhance efficiency through operations visibility and transparency.
    • Gain cost savings and efficiency to automate operations of complex and large equipment and instrumentations.

    Related Info-Tech Research:

    Recommended Actions

    1. Identify modernization business cases to secure

    Identify the drivers to align with your organization's business objectives.

    Build your case by leveraging a cost-benefit analysis, and update your security strategy.

    2. Identify gaps

    Identify people, process, and technology gaps that hinder the modernization
    security strategy.

    Use the identified skill gaps to update risks, policies and procedures, IR, DR, and BCP.

    3. Decide whether to build or buy capabilities

    Evaluate and enable modernization technology top focus areas and refine
    security processes.

    Decide whether to train, hire, contract, or outsource to fill the security workforce gap.

    Sources:

    Industrial Control System (ICS) Modernization: Unlock the Value of Automation in Utilities, Info-Tech

    Secure IT-OT Convergence, Info-Tech

    Develop a cost-benefit analysis

    Identify a modernization business case for security.

    Benefits

    Metrics

    Operational Efficiency and Cost Savings

    • Reduction in truck rolls and staff time of manual operations of equipment or instrumentation.
    • Cost reduction in energy usage such as substation power voltage level or water treatment chemical level.

    Improve Reliability and Resilience

    • Reduction in field crew time to identify the outage locations by remotely accessing field equipment to narrow down the
      fault areas.
    • Reduction in outage time impacting customers and avoiding financial penalty in service quality metrics.
    • Improve operating reliability through continuous and real-time trend analysis of equipment performance.

    Energy & Capacity Savings

    • Optimize energy usage of operation to reduce overall operating cost and contribution to organizational net-zero targets.

    Customers & Society Benefits

    • Improve customer safety for essential services such as drinkable water consumption.
    • Improve reliability of services and address service equity issues based on data.

    Cost

    Metrics

    Equipment and Infrastructure

    Upgrade existing security equipment or instrumentation or deploy new, e.g. IPS on Enterprise DMZ and Operations DMZ.

    Implement communication network equipment and labor to install and configure.

    Upgrade or construct server room including cooling/heating, power backup, and server and rack hardware.

    Software and Commission

    The SCADA/HMI software and maintenance fee as well as lifecycle upgrade implementation project cost.

    Labor cost of field commissioning and troubleshooting.

    Integration with security systems, e.g. log management and continuous monitoring.

    Support and Resources

    Cost to hire/outsource security FTEs for ongoing managing and operating security devices, e.g. SOC.

    Cost to hire/outsource IT/OT FTEs to support and troubleshoot systems and its integrations with security systems, e.g. MSSP.

    An example of a cost-benefit analysis for ICS modernization

    Sources:

    Industrial Control System (ICS) Modernization: Unlock the Value of Automation in Utilities, Info-Tech

    Lawrence Berkeley National Laboratory, 2021

    IT-OT convergence demands new security approach and solutions

    Identify gaps

    Attack Vectors

    IT

    • User's compromised credentials
    • User's access device, e.g. laptop, smartphone
    • Access method, e.g. denial-of-service to modem, session hijacking, bad data injection

    OT

    • Site operations, e.g. SCADA server, engineering workstation, historian
    • Controls, e.g. SCADA Client, HMI, PLCs, RTUs
    • Process devices, e.g. sensors, actuators, field devices

    Defense Strategies

    • Limit exposure of system information
    • Identify and secure remote access points
    • Restrict tools and scripts
    • Conduct regular security audits
    • Implement a dynamic network environment

    (Control System Defense: Know the Opponent, CISA)

    An example of a high-level architecture of an electric utility's control system and its interaction with IT systems.

    An example of a high-level architecture of an electric utility's control system and its interaction with IT systems.

    Source: ISA-99, 2007

    RESPOND TO REGULATORY CHANGES

    PRIORITY 03

    • GOVERNMENT-ENACTED POLICY CHANGES AND INDUSTRY REGULATORY CHANGES COULD BE A COMPLIANCE BURDEN … OR PREVENT YOUR NEXT SECURITY INCIDENT.

    Executive summary

    Background

    Government-enacted regulatory changes are occurring at an ever-increasing rate these days. As one example, on November 10, 2022, the EU Parliament introduced two EU cybersecurity laws: the Network and Information Security (NIS2) Directive (applicable to organizations located within the EU and organizations outside the EU that are essential within an EU country) and the Digital Operational Resilience Act (DORA). There are also industry regulatory changes such as PCI DSS v4.0 for the payment sector and the North American Electric Reliability Corporation Critical Infrastructure Protection (NERC CIP) for Bulk Electric Systems (BES).

    Organizations should use regulatory changes as a means to improve security practices, instead of treating them as a compliance burden. As said by lead member of EU Parliament Bart Groothuis on NIS2, "This European directive is going to help around 160,000 entities tighten their grip on security […] It will also enable information sharing with the private sector and partners around the world. If we are being attacked on an industrial scale, we need to respond on an industrial scale."

    Current situation

    Stricter requirements and reporting: Regulations such as NIS2 include provisions for incident response, supply chain security, and encryption and vulnerability disclosure and set tighter cybersecurity obligations for risk management reporting obligations.

    Broader sectors: For example, the original NIS directive covers 19 sectors such as Healthcare, Digital Infrastructure, Transport, and Energy. Meanwhile, the new NIS2 directive increases to 35 sectors by adding other sectors such as providers of public electronic communications networks or services, manufacturing of certain critical products (e.g. pharmaceuticals), food, and digital services.

    High sanctions for violations: For example, Digital Services Act (DSA) includes fines of up to 6% of global turnover and a ban on operating in the EU single market in case of repeated serious breaches.

    Approximately 100 cross-border data flow regulations exist in 2022.

    Source: McKinsey, 2022

    Stricter requirements for payments

    Obligation changes to keep up with emerging threats and technologies

    64 New requirements were added
    A total of 64 requirements have been added to version 4.0 of the PCI DSS.

    13 New requirements become effective March 31, 2024
    The other 51 new requirements are considered best practice until March 31, 2025, at which point they will become effective.

    11 New requirements only for service providers
    11 of the new requirements are applicable only to entities that provide third-party services to merchants.

    Defined roles must be assigned for requirements.

    Focus on periodically assessing and documenting scope.

    Entities may choose a defined approach or a customized approach to requirements.

    An example of new requirements for PCI DSS v4.0

    Source: Prepare for PCI DSS v4.0, Info-Tech

    Use this template to explain the priorities you need your stakeholders to know about.

    Respond to regulatory changes

    Provide a brief value statement for the initiative.

    The compliance obligations are evolving – ensure your security plan has you covered.

    Initiative Description:

    Description must include what organization will undertake to complete the initiative.

    • Identify relevant security and privacy compliance and conformance levels.
    • Identify gaps for updated obligations, and map obligations into control framework.
    • Review, update, and implement policies and strategy.
    • Develop compliance exception process and forms.
    • Develop test scripts.
    • Track status and exceptions

    Drivers:

    List initiative drivers.

    • Pressure of new regulations
    • Governance, risk & compliance (GRC) tool offerings
    • High administrative or criminal penalties of non-compliance

    Risks:

    List initiative risks and impacts.

    • Complex structures and a great number of compliance requirements
    • Restricted budget and lack of skilled workforce for organizations such as local municipalities and small or medium organizations compared to private counterparts
    • Personal liability for some regulations for non-compliance

    Benefits:

    List initiative benefits and align to business benefits or benefits for the stakeholder groups that it impacts.

    • Reduces compliance risk.
    • Reduces complexity within the control environment by using a single framework to align multiple compliance regimes.
    • Reduces costs and efforts related to managing IT audits through planning and preparation.

    Related Info-Tech Research:

    Recommended Actions

    1. Identify compliance obligations

    Identify relevant security and privacy obligations and conformance levels.

    Identify gaps for updated obligations, and map obligations into control framework.

    2. Implement compliance strategy

    Review, update, and implement policies and strategy.

    Develop compliance exception process.

    3. Track and report

    Develop test scripts to check your remediations to ensure they are effective.

    Track and report status and exceptions.

    Sources: Build a Security Compliance Program and Prepare for PCI DSS v4.0, Info-Tech

    Identify relevant security and privacy compliance obligations

    Identify obligations

    # Security Jurisdiction
    1 Network and Information Security (NIS2) Directive European Union (EU) and organizations outside the EU that are essential within an EU country
    2 North American Electric Reliability Corporation (NERC) Critical Infrastructure Protection (CIP) North American electrical utilities
    3 Executive Order (EO) 14028: Improving the Nation's Cybersecurity, The White House, 2021 United States

    #

    Privacy Jurisdiction
    1 General Data Protection Regulation (GDPR) EU and EU citizens
    2 Personal Information Protection and Electronic Documents Act (PIPEDA) Canada
    3 California Consumer Privacy Act (CCPA) California, USA
    4 Personal Information Protection Law of the People’s Republic of China (PIPL) China

    An example of security and privacy compliance obligations

    How much does it cost to become compliant?

    • It is important to understand the various frameworks and to adhere to the appropriate compliance obligations.
    • Many factors influence the cost of compliance, such as the size of organization, the size of network, and current security readiness.
    • To manage compliance obligations, it is important to use a platform that not only performs internal and external monitoring but also provides third-party vendors (if applicable) with visibility into potential threats in their organization.

    Adopt Next-Generation Cybersecurity Technologies

    PRIORITY 04

    • GOVERNMENTS AND HACKERS ARE RECOGNIZING THE IMPORTANCE OF EMERGING TECHNOLOGIES, SUCH AS ZERO TRUST ARCHITECTURE AND AI-BASED CYBERSECURITY. SO SHOULD YOUR ORGANIZATION.

    Executive summary

    Background

    The cat and mouse game between threat actors and defenders is continuing. The looming question "can defenders do better?" has been answered with rapid development of technology. This includes the automation of threat analysis (signature-based, specification-based, anomaly-based, flow-based, content-based, sandboxing) not only on IT but also on other relevant environments, e.g. IoT, IIoT, and OT based on AI/ML.

    More fundamental approaches such as post-quantum cryptography and zero trust (ZT) are also emerging.
    ZT is a principle, a model, and also an architecture focused on resource protection by always verifying transactions using the least privilege principle. Hopefully in 2023, ZT will be more practical and not just a vendor marketing buzzword.

    Next-gen cybersecurity technologies alone are not a silver bullet. A combination of skilled talent, useful data, and best practices will give a competitive advantage. The key concepts are explainable, transparent, and trustworthy. Furthermore, regulation often faces challenges to keep up with next-gen cybersecurity technologies, especially with the implications and risks of adoption, which may not always be explicit.

    Current situation

    ZT: Performing an accurate assessment of readiness and benefits to adopt ZT can be difficult due to ZT's many components. Thus, an organization needs to develop a ZT roadmap that aligns with organizational goals and focuses on access to data, assets, applications, and services; don't select solutions or vendors too early.

    Post-quantum cryptography: Current cryptographic applications, such as RSA for PKI, rely on factorization. However, algorithms such as Shor's show quantum speedup for factorization, which can break current crypto when sufficient quantum computing devices are available. Thus, threat actors can intercept current encrypted information and store it to decrypt in the future.

    AI-based threat management: AI helps in analyzing and correlating data extremely fast compared to humans. Millions of telemetries, malware samples, raw events, and vulnerability data feed into the AI system, which humans cannot process manually. Furthermore, AI does not get tired in processing this big data, thus avoiding human error and negligence.

    Data breach mitigation cost without AI: USD 6.20 million; and with AI: USD 3.15 million

    Source: IBM, 2022

    Traditional security is not working

    Alert Fatigue

    Too many false alarms and too many events to process. Evolving threat landscapes waste your analysts' valuable time on mundane tasks, such as evidence collection. Meanwhile, only limited time is spared for decisions and conclusions, which results in the fear of missing an incident and alert fatigue.

    Lack of Insight

    To report progress, clear metrics are needed. However, cybersecurity still lacks in this area as the system itself is complex and some systems work in silos. Furthermore, lessons learned are not yet distilled into insights for improving future accuracy.

    Lack of Visibility

    System integration is required to create consistent workflows across the organization and to ensure complete visibility of the threat landscape, risks, and assets. Also, the convergence of OT, IoT, and IT enhances this challenge.

    Source: IBM Security Intelligence, 2020

    A business case for AI-based cybersecurity

    Threat management

    Prevention

    Risk scores are generated by machine learning based on variables such as behavioral patterns and geolocation. Zero trust architecture is combined with machine learning. Asset management leverages visibility using machine learning. Comply with regulations by improving discovery, classification, and protection of data using machine learning. Data security and data privacy services use machine learning for data discovery.

    Detection

    AI, advanced machine learning, and static approaches, such as code file analysis, combine to automatically detect and analyze threats and prevent threats from spreading, assisted by threat intelligence.

    Response

    AI helps in orchestrating security technologies for organizations to reduce the number of security agents installed, which may not talk to each other or, worse, may conflict with each other.

    Recovery

    AI continuously tunes based on lessons learned, such as creating security policies for improving future accuracy. AI also does not get fatigue, and it assists humans in a faster recovery.

    Prevention; Detection; Response; Recovery

    AI has been around since the 1940s, but why is it only gaining traction now? Because supporting technologies are only now available, including faster GPUs for complex computations and cheaper storage for massive volumes of data.

    Use this template to explain the priorities you need your stakeholders to know about.

    Adopt next-gen cybersecurity technologies

    Use this template to explain the priorities you need your stakeholders to know about.

    Develop a practical roadmap that shows the business value of next-gen cybersecurity technologies investment.

    Initiative Description:

    Description must include what organization will undertake to complete the initiative.

    • Identify the stakeholders who will be affected by the next-gen cybersecurity technologies implementation and define responsibilities based on skillsets and the degree of support.
    • Adopt well-established data governance practices for cross-functional teams.
    • Conduct a maturity assessment of key processes and highlight interdependencies.
    • Develop a baseline and periodically review risks, policies and procedures, and business plan.
    • Develop a roadmap and deploy next-gen cybersecurity architecture and controls step by step, working with trusted technology partners.
    • Monitor metrics on effectiveness and efficiency.

    Drivers:

    List initiative drivers.

    • Pressure of attacks by sophisticated threat actors
    • Next-gen cybersecurity technologies tool offerings
    • High cost of traditional security, e.g. longer breach lifecycle

    Risks:

    List initiative risks and impacts.

    • Lack of transparency of the model or bias, leading to non-compliance with policies/regulations
    • Risks related with data quality and inadequate data for model training
    • Adversarial attacks, including, but not limited to, adversarial input and model extraction

    Benefits:

    List initiative benefits and align to business benefits or benefits for the stakeholder groups that it impacts.

    • Reduces the number of alerts, thus reduces alert fatigue.
    • Increases the identification of unknown threats.
    • Leads to faster detection and response.
    • Closes skills gap and increases productivity.

    Related Info-Tech Research:

    Recommended Actions

    1. People

    Identify the stakeholders who will be affected by the next-gen cybersecurity technologies implementation and define responsibilities based on skillsets and the degree of support.

    Adopt well-established data governance practices for cross-functional teams.

    2. Process

    Conduct a maturity assessment of key processes and highlight interdependencies.

    Develop a baseline and periodically review risks, policies and procedures, and business plan.

    3. Technology

    Develop a roadmap and deploy next-gen cybersecurity architecture and controls step by step, working with trusted technology partners.

    Monitor metrics on effectiveness and efficiency.

    Source: Leverage AI in Threat Management (keynote presentation), Info-Tech

    Secure Services and Applications

    PRIORITY 05

    • APIS ARE STILL THE #1 THREAT TO APPLICATION SECURITY.

    Executive summary

    Background

    Software is usually produced as part of a supply chain instead of in silos. A vulnerability in any part of the supply chain can become a threat surface. We have learned this from recent incidents such as Log4j, SolarWinds, and Kaseya where attackers compromised a Virtual System Administrator tool used by managed service providers to attack around 1,500 organizations.

    DevSecOps is a culture and philosophy that unifies development, security, and operations to answer this challenge. DevSecOps shifts security left by automating, as much as possible, development and testing. DevSecOps provides many benefits such as rapid development of secure software and assurance that, prior to formal release and delivery, tests are reliably performed and passed.

    DevSecOps practices can apply to IT, OT, IoT, and other technology environments, for example, by integrating a Secure Software Development Framework (SSDF).

    Current situation

    Secure Software Supply Chain: Logging is a fundamental feature of most software, and recently the use of software components, especially open source, are based on trust. From the Log4j incident we learned that more could be done to improve the supply chain by adopting ZT to identify related components and data flows between systems and to apply the least privilege principle.

    DevSecOps: A software error wiped out wireless services for thousands of Rogers customers across Canada in 2021. Emergency services were also impacted, even though outgoing 911 calls were always accessible. Losing such services could have been avoided, if tests were reliably performed and passed prior to release.

    OT insecure-by-design: In OT, insecurity-by-design is still a norm, which causes many vulnerabilities such as insecure protocols implementation, weak authentication schemes, or insecure firmware updates. Additional challenges are the lack of CVEs or CVE duplication, the lack of Software Bill of Materials (SBOM), and product supply chains issues such as vulnerable products that are certified because of the scoping limitation and emphasis on functional testing.

    Technical causes of cybersecurity incidents in EU critical service providers in 2019-2021 shows: software bug (12%) and faulty software changes/update (9%).

    Source: CIRAS Incident reporting, ENISA (N=1,239)

    Software development keeps evolving

    DOD Maturation of Software Development Best Practices

    Best Practices 30 Years Ago 15 Years Ago Present Day
    Lifecycle Years or Months Months or Weeks Weeks or Days
    Development Process Waterfall Agile DevSecOps
    Architecture Monolithic N-Tier Microservices
    Deployment & Packaging Physical Virtual Container
    Hosting Infrastructure Server Data Center Cloud
    Cybersecurity Posture Firewall + SIEM + Zero Trust

    Best practices in software development are evolving as shown on the diagram to the left. For example, 30 years ago the lifecycle was "Years or Months," while in the present day it is "Weeks or Days."

    These changes also impact security such as the software architecture, which is no longer "Monolithic" but "Microservices" normally built within the supply chain.

    The software supply chain has known integrity attacks that can happen on each part of it. Starting from bad code submitted by a developer, to compromised source control platform (e.g. PHP git server compromised), to compromised build platform (e.g. malicious behavior injected on SolarWinds build), to a compromised package repository where users are deceived into using the bad package by the similarity between the malicious and the original package name.

    Therefore, we must secure each part of the link to avoid attacks on the weakest link.

    Software supply chain guidance

    Secure each part of the link to avoid attacks on the weakest link.

    Guide for Developers

    Guide for Suppliers

    Guide for Customers

    Secure product criteria and management, develop secure code, verify third-party components, harden build environment, and deliver code.

    Define criteria for software security checks, protect software, produce well-secured software, and respond to vulnerabilities.

    Secure procurement and acquisition, secure deployment, and secure software operations.

    Source: "Securing the Software Supply Chain" series, Enduring Security Framework (ESF), 2022

    "Most software today relies on one or more third-party components, yet organizations often have little or no visibility into and understanding of how these software components are developed, integrated, and deployed, as well as the practices used to ensure the components' security."

    Source: NIST – NCCoE, 2022

    Use this template to explain the priorities you need your stakeholders to know about.

    Secure services and applications

    Provide a brief value statement for the initiative.

    Adopt recommended practices for securing the software supply chain.

    Initiative Description:

    Description must include what organization will undertake to complete the initiative.

    • Define and keep security requirements and risk assessments up to date.
    • Require visibility into provenance of product, and require suppliers' self-attestation of security hygiene.
    • Verify distribution infrastructure, product and individual components integrity, and SBOM.
    • Use multi-layered defenses, e.g. ZT for integration and control configuration.
    • Train users on how to detect and report anomalies and when to apply updates to a system.
    • Ensure updates from authorized and authenticated sources and verify the integrity of the updated SBOM.

    Drivers:

    List initiative drivers.

    • Cyberattacks exploit the vulnerabilities of weak software supply chain
    • Increased need to enhance software supply chain security, e.g. under the White House Executive Order (EO) 14028
    • OT insecure-by-design hinders OT modernization

    Risks:

    List initiative risks and impacts.

    Only a few developers and suppliers explicitly address software security in detail.

    Time pressure to deliver functionality over security.

    Lack of security awareness and lack of trained workforce.

    Benefits:

    List initiative benefits and align to business benefits or benefits for the stakeholder groups that it impacts.

    Customers (acquiring organizations) achieve secure acquisition, deployment, and operation of software.

    Developers and suppliers provide software security with minimal vulnerabilities in its releases.

    Automated processes such as automated testing avoid error-prone and labor-intensive manual test cases.

    Related Info-Tech Research:

    Recommended Actions

    1. Procurement and Acquisition

    Define and keep security requirements and risk assessments up to date.

    Perform analysis on current market and supplier solutions and acquire security evaluation.

    Require visibility into provenance of product, and require suppliers' self-attestation of security hygiene

    2. Deployment

    Verify distribution infrastructure, product and individual components integrity, and SBOM.

    Save and store the tests and test environment and review and verify the
    self-attestation mechanism.

    Use multi-layered defenses, e.g. ZT for integration and control configuration.

    3. Software Operations

    Train users on how to detect and report anomalies and when to apply updates to a system.

    Ensure updates from authorized and authenticated sources and verify the integrity of the updated SBOM.

    Apply supply chain risk management (SCRM) operations.

    Source: "Securing the Software Supply Chain" series, Enduring Security Framework (ESF), 2022

    Bibliography

    Aksoy, Cevat Giray, Jose Maria Barrero, Nicholas Bloom, Steven J. Davis, Mathias Dolls, and Pablo Zarate. "Working from Home Around the World." Brookings Papers on Economic Activity, 2022.
    Barrero, Jose Maria, Nicholas Bloom, and Steven J. Davis. "Why working from home will stick." WFH Research, National Bureau of Economic Research, Working Paper 28731, 2021.
    Boehm, Jim, Dennis Dias, Charlie Lewis, Kathleen Li, and Daniel Wallance. "Cybersecurity trends: Looking over the horizon." McKinsey & Company, March 2022. Accessed
    31 Oct. 2022.
    "China: TC260 issues list of national standards supporting implementation of PIPL." OneTrust, 8 Nov. 2022. Accessed 17 Nov. 2022.
    Chmielewski, Stéphane. "What is the potential of artificial intelligence to improve cybersecurity posture?" before.ai blog, 7 Aug. 2022. Accessed 15 Aug. 2022.
    Conerly, Bill. "The Recession Will Begin Late 2023 Or Early 2024." Forbes, 1 Nov. 2022. Accessed 8 Nov. 2022.
    "Control System Defense: Know the Opponent." CISA, 22 Sep. 2022. Accessed 17 Nov. 2022.
    "Cost of a Data Breach Report 2022." IBM, 2022.
    "Cybersecurity: Parliament adopts new law to strengthen EU-wide resilience." European Parliament News, 10 Nov. 2022. Press Release.
    "Cyber Security in Critical National Infrastructure Organisations: 2022." Bridewell, 2022. Accessed 7 Nov. 2022.
    Davis, Steven. "The Big Shift to Working from Home." NBER Macro Annual Session On
    "The Future of Work," 1 April 2022.
    "Digital Services Act: EU's landmark rules for online platforms enter into force."
    EU Commission, 16 Nov. 2022. Accessed 16 Nov. 2022.
    "DoD Enterprise DevSecOps Fundamentals." DoD CIO, 12 May 2022. Accessed 21 Nov. 2022.
    Elkin, Elizabeth, and Deena Shanker. "That Cream Cheese Shortage You Heard About? Cyberattacks Played a Part." Bloomberg, 09 Dec. 2021. Accessed 27 Oct. 2022.
    Evan, Pete. "What happened at Rogers? Day-long outage is over, but questions remain." CBC News, 21 April 2022. Accessed 15 Nov. 2022.
    "Fewer Ransomware Victims Pay, as Median Ransom Falls in Q2 2022." Coveware,
    28 July 2022. Accessed 18 Nov. 2022.
    "Fighting cybercrime: new EU cybersecurity laws explained." EU Commission, 10 Nov. 2022. Accessed 16 Nov. 2022.
    "Guide to PCI compliance cost." Vanta. Accessed 18 Nov. 2022.
    Hammond, Susannah, and Mike Cowan. "Cost of Compliance 2022: Competing priorities." Thomson Reuters, 2022. Accessed 18 Nov. 2022.
    Hemsley, Kevin, and Ronald Fisher. "History of Industrial Control System Cyber Incidents." Department of Energy (DOE), 2018. Accessed 29 Aug. 2022.
    Hofmann, Sarah. "What Is The NIS2 And How Will It Impact Your Organisation?" CyberPilot,
    5 Aug. 2022. Accessed 16 Nov. 2022.
    "Incident reporting." CIRAS Incident Reporting, ENISA. Accessed 21 Nov. 2022.
    "Introducing SLSA, an End-to-End Framework for Supply Chain Integrity." Google,
    16 June 2021. Accessed 25 Nov. 2022.
    Kovacs, Eduard. "Trains Vulnerable to Hacker Attacks: Researchers." SecurityWeek, 29 Dec. 2015. Accessed 15 Nov. 2022.
    "Labour Force Survey, October 2022." Statistics Canada, 4 Nov. 2022. Accessed 7 Nov. 2022.
    Malacco, Victor. "Promises and potential of automated milking systems." Michigan State University Extension, 28 Feb. 2022. Accessed 15 Nov. 2022.
    Maxim, Merritt, et al. "Planning Guide 2023: Security & Risk." Forrester, 23 Aug. 2022. Accessed 31 Oct. 2022.
    "National Cyber Threat Assessment 2023-2024." Canadian Centre for Cyber Security, 2022. Accessed 18 Nov. 2022.
    Nicaise, Vincent. "EU NIS2 Directive: what's changing?" Stormshield, 20 Oct. 2022. Accessed
    17 Nov. 2022.
    O'Neill, Patrick. "Russia hacked an American satellite company one hour before the Ukraine invasion." MIT Technology Review, 10 May 2022. Accessed 26 Aug. 2022.
    "OT ICEFALL: The legacy of 'insecure by design' and its implications for certifications and risk management." Forescout, 2022. Accessed 21 Nov. 2022.
    Palmer, Danny. "Your cybersecurity staff are burned out - and many have thought about quitting." ZDNet, 8 Aug. 2022. Accessed 19 Aug. 2022.
    Placek, Martin. "Industrial Internet of Things (IIoT) market size worldwide from 2020 to 2028 (in billion U.S. dollars)." Statista, 14 March 2022. Accessed 15 Nov. 2022.
    "Revised Proposal Attachment 5.13.N.1 ADMS Business Case PUBLIC." Ausgrid, Jan. 2019. Accessed 15 Nov. 2022.
    Richter, Felix. "Cloudy With a Chance of Recession." Statista, 6 April 2022. Web.
    "Securing the Software Supply Chain: Recommended Practices Guide for Developers." Enduring Security Framework (ESF), Aug. 2022. Accessed 22 Sep. 2022.
    "Securing the Software Supply Chain: Recommended Practices Guide for Suppliers." Enduring Security Framework (ESF), Sep. 2022. Accessed 21 Nov. 2022.
    "Securing the Software Supply Chain: Recommended Practices Guide for Customers." Enduring Security Framework (ESF), Oct. 2022. Accessed 21 Nov. 2022.
    "Security Guidelines for the Electricity Sector: Control System Electronic Connectivity."
    North American Electric Reliability Corporation (NERC), 28 Oct. 2013. Accessed 25 Nov. 2022.
    Shepel, Jan. "Schreiber Foods hit with cyberattack; plants closed." Wisconsin State Farmer,
    26 Oct. 2022. Accessed 15 Nov. 2022.
    "Significant Cyber Incidents." Center for Strategic and International Studies (CSIS). Accessed
    1 Sep. 2022.
    Souppaya, Murugiah, Michael Ogata, Paul Watrobski, and Karen Scarfone. "Software Supply Chain and DevOps Security Practices: Implementing a Risk-Based Approach to DevSecOps." NIST - National Cybersecurity Center of Excellence (NCCoE), Nov. 2022. Accessed
    22 Nov. 2022.
    "Ten Things Will Change Cybersecurity in 2023." SOCRadar, 23 Sep. 2022. Accessed
    31 Oct. 2022.
    "The Nature of Cybersecurity Defense: Pentagon To Reveal Updated Zero-Trust Cybersecurity Strategy & Guidelines." Cybersecurity Insiders. Accessed 21 Nov. 2022.
    What Is Threat Management? Common Challenges and Best Practices." IBM Security Intelligence, 2020.
    Woolf, Tim, et al. "Benefit-Cost Analysis for Utility-Facing Grid Modernization Investments: Trends, Challenges, and Considerations." Lawrence Berkeley National Laboratory, Feb. 2021. Accessed 15 Nov. 2022.
    Violino, Bob. "5 key considerations for your 2023 cybersecurity budget planning." CSO Online,
    14 July 2022. Accessed 27 Oct. 2022

    Research Contributors and Experts

    Andrew Reese
    Cybersecurity Practice Lead
    Zones

    Ashok Rutthan
    Chief Information Security Officer (CISO)
    Massmart

    Chris Weedall
    Chief Information Security Officer (CISO)
    Cheshire East Council

    Jeff Kramer
    EVP Digital Transformation and Cybersecurity
    Aprio

    Kris Arthur
    Chief Information Security Officer (CISO)
    SEKO Logistics

    Mike Toland
    Chief Information Security Officer (CISO)
    Mutual Benefit Group

    Demystify Oracle Licensing and Optimize Spend

    • Buy Link or Shortcode: {j2store}136|cart{/j2store}
    • member rating overall impact: 9.9/10 Overall Impact
    • member rating average dollars saved: $85,754 Average $ Saved
    • member rating average days saved: 10 Average Days Saved
    • Parent Category Name: Licensing
    • Parent Category Link: /licensing
    • License keys are not needed with optional features accessible upon install. Conducting quarterly checks of the Oracle environment is critical because if products or features are installed, even if they are not actively in use, it constitutes use by Oracle and requires a license.
    • Ambiguous license models and definitions abound: terminology and licensing rules can be vague, making it difficult to purchase licensing even with the best of intentions to keep compliant.
    • Oracle has aggressively started to force new Oracle License and Service Agreements (OLSA) on customers that slightly modify language and remove pre-existing allowances to tilt the contract terms in Oracle's favor.

    Our Advice

    Critical Insight

    • Focus on needs first. Conduct a thorough requirements assessment and document the results. Well-documented license needs will be your core asset in navigating Oracle licensing and negotiating your agreement.
    • Communicate effectively. Be aware that Oracle will reach out to employees at your organization at various levels. Having your executives on the same page will help send a strong message.
    • Manage the relationship. If Oracle is managing you, there is a high probability you are over paying or providing information that may result in an audit.

    Impact and Result

    • Conducting business with Oracle is not typical compared to other vendors. To emerge successfully from a commercial transaction with Oracle, customers must learn the "Oracle way" of conducting business, which includes a best-in-class sales structure, highly unique contracts and license use policies, and a hyper-aggressive compliance function.
    • Map out the process of how to negotiate from a position of strength, examining terms and conditions, discount percentages, and agreement pitfalls.
    • Develop a strategy that leverages and utilizes an experienced Oracle DBA to gather accurate information, and then optimizes it to mitigate and meet the top challenges.

    Demystify Oracle Licensing and Optimize Spend Research & Tools

    Start here – read the Executive Brief

    Read our concise Executive Brief to find out why you need to understand and document your Oracle licensing strategy, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. Establish licensing requirements

    Begin your proactive Oracle licensing journey by understanding which information to gather and assessing the current state and gaps.

    • Demystify Oracle Licensing and Optimize Spend – Phase 1: Establish Licensing Requirements
    • Oracle Licensing Purchase Reference Guide
    • Oracle Database Inventory Tool
    • Effective Licensing Position Tool
    • RASCI Chart

    2. Evaluate licensing options

    Review current licensing models and determine which licensing models will most appropriately fit your environment.

    • Demystify Oracle Licensing and Optimize Spend – Phase 2: Evaluate Licensing Options

    3. Evaluate agreement options

    Review Oracle’s contract types and assess which best fit the organization’s licensing needs.

    • Demystify Oracle Licensing and Optimize Spend – Phase 3: Evaluate Agreement Options
    • Oracle TCO Calculator

    4. Purchase and manage licenses

    Conduct negotiations, purchase licensing, and finalize a licensing management strategy.

    • Demystify Oracle Licensing and Optimize Spend – Phase 4: Purchase and Manage Licenses
    • Oracle Terms & Conditions Evaluation Tool
    • Controlled Vendor Communications Letter
    • Vendor Communication Management Plan
    [infographic]

    Workshop: Demystify Oracle Licensing and Optimize Spend

    Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

    1 Establish Licensing Requirements

    The Purpose

    Assess current state and align goals; review business feedback

    Interview key stakeholders to define business objectives and drivers

    Key Benefits Achieved

    Have a baseline for requirements

    Assess the current state

    Determine licensing position

    Examine cloud options

    Activities

    1.1 Gather software licensing data

    1.2 Conduct a software inventory

    1.3 Perform manual checks

    1.4 Reconcile licenses

    1.5 Create your Oracle licensing team

    1.6 Meet with stakeholders to discuss the licensing position, cloud offerings, and budget allocation

    Outputs

    Copy of your Oracle License Statement

    Software inventory report from software asset management (SAM) tool

    Oracle Database Inventory Tool

    RASCI Chart

    Oracle Licensing Effective License Position (ELP) Template

    Oracle Licensing Purchase Reference Guide

    2 Evaluate Licensing Options

    The Purpose

    Review licensing options

    Review licensing rules

    Key Benefits Achieved

    Understand how licensing works

    Determine if you need software assurance

    Discuss licensing rules, application to current environment.

    Examine cloud licensing

    Understand the importance of documenting changes

    Meet with desktop product owners to determine product strategies

    Activities

    2.1 Review full, limited, restricted, and AST use licenses

    2.2 Calculate license costs

    2.3 Determine which database platform to use

    2.4 Evaluate moving to the cloud

    2.5 Examine disaster recovery strategies

    2.6 Understand purchasing support

    2.7 Meet with stakeholders to discuss the licensing position, cloud offerings, and budget allocation

    Outputs

    Oracle TCO Calculator

    Oracle Licensing Purchase Reference Guide

    3 Evaluate Agreement Options

    The Purpose

    Review contract option types

    Review vendors

    Key Benefits Achieved

    Understand why a type of contract is best for you

    Determine if ULA or term agreement is best

    The benefits of other types and when you should change

    Activities

    3.1 Prepare to sign or renew your ULA

    3.2 Decide on an agreement type that nets the maximum benefit

    Outputs

    Type of contract to be used

    Oracle TCO Calculator

    Oracle Licensing Purchase Reference Guide

    4 Purchase and Manage Licenses

    The Purpose

    Finalize the contract

    Prepare negotiation points

    Discuss license management

    Evaluate and develop a roadmap for future licensing

    Key Benefits Achieved

    Negotiation strategies

    Licensing management

    Introduction of SAM

    Leverage the work done on Oracle licensing to get started on SAM

    Activities

    4.1 Control the flow of communication terms and conditions

    4.2 Use Info-Tech’s readiness assessment in preparation for the audit

    4.3 Assign the right people to manage the environment

    4.4 Meet with stakeholders to discuss the licensing position, cloud offerings, and budget allocation

    Outputs

    Controlled Vendor Communications Letter

    Vendor Communication Management Plan

    Oracle Terms & Conditions Evaluation Tool

    RASCI Chart

    Oracle Licensing Purchase Reference Guide

    Do you believe in absolute efficiency?

    Weekend read. Hence I post this a bit later on Friday.
    Lately, I've been fascinated by infinity. And in infinity, some weird algebra pops up. Yet that weirdness is very much akin to what our business stakeholders want, driven by what our clients demand, and hence our KPIs drive us. Do more with less. And that is what absolute efficiency means.

    Register to read more …

    Structure the Role of the DBA

    • Buy Link or Shortcode: {j2store}273|cart{/j2store}
    • member rating overall impact: N/A
    • member rating average dollars saved: N/A
    • member rating average days saved: N/A
    • Parent Category Name: Business Intelligence Strategy
    • Parent Category Link: /business-intelligence-strategy
    • The traditional role of Database Administrators (DBAs) is shifting due to a variety of changes such as cloud databases, increased automation, close relations with development, and the need for more integration with the business at large. All this means that organizations will have to adapt to integrate a new type of DBA into IT.
    • Organizations often have difficulty establishing a refined and effective DBA structure based on repeatable and well-grounded processes.
    • The relationship between DBAs and the rest of IT (especially development) can often be problematic due to a lack of mutual co-operation and clear communication.
    • There is often confusion in organizations as how to approach staffing DBAs.

    Our Advice

    Critical Insight

    • An organization’s relative focus on operations or development is essential in determining many DBA related decisions. This focus can determine what kinds of DBAs to hire, what staffing ratios to use, the viability of outsourcing, and the appropriate reporting structure for DBAs.
    • Utilizing technological strategies such as database automation, effective auditing, and database consolidation to bolster the DBA team helps make efficient use of DBA staff and can turn a reactive environment into a proactive one.
    • Ensuring refined and regularly assessed processes are in place for change and incident management is essential for maintaining effective and structured database administration.

    Impact and Result

    • Right-size, support, and structure your DBA team for increased cost effectiveness and optimal productivity.
    • Develop a superior level of co-operation between DBAs and the rest of IT as well as the business at large.
    • Build an environment in which DBAs will be motivated and flourish.

    Structure the Role of the DBA Research & Tools

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. Understand how Database Administrators are evolving

    Develop an effective structure for managing and supporting Database Administrators.

    • Storyboard: Structure the Role of the DBA

    2. Create the right Database Administrator roles to meet organizational needs

    Build a team that is relevant to the focus of the organization.

    • System Database Administrator
    • Application Database Administrator
    [infographic]

    Key Metrics for Every CIO

    • Buy Link or Shortcode: {j2store}119|cart{/j2store}
    • member rating overall impact: N/A
    • member rating average dollars saved: N/A
    • member rating average days saved: N/A
    • Parent Category Name: Performance Measurement
    • Parent Category Link: /performance-measurement
    • As a CIO, you are inundated with data and information about how your IT organization is performing based on the various IT metrics that exist.
    • The information we receive from metrics is often just that – information. Rarely is it used as a tool to drive the organization forward.
    • CIO metrics need to consider the goals of key stakeholders in the organization.

    Our Advice

    Critical Insight

    • The top metrics for CIOs don’t have anything to do with IT.
    • CIOs should measure and monitor metrics that have a direct impact on the business.
    • Be intentional with the metric and number of metrics that you monitor on a regular basis.
    • Be transparent with your stakeholders on what and why you are measuring those specific metrics.

    Impact and Result

    • Measure fewer metrics, but measure those that will have a significant impact on how your deliver value to your organization.
    • Focus on the metrics that you can take action against, rather than simply monitor.
    • Ensure your metrics tie to your top priorities as a CIO.

    Key Metrics for Every CIO Research & Tools

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. Key Metrics for Every CIO deck – The top metrics every CIO should measure and act on

    Leverage the top metrics for every CIO to help focus your attention and provide insight into actionable steps.

    • Key Metrics for Every CIO Storyboard
    [infographic]

    Further reading

    Key Metrics for Every CIO

    The top six metrics for CIOs – and they have very little to do with IT

    Analyst Perspective

    Measure with intention

    Be the strategic CIO who monitors the right metrics relevant to their priorities – regardless of industry or organization. When CIOs provide a laundry list of metrics they are consistently measuring and monitoring, it demonstrates a few things.

    First, they are probably measuring more metrics than they truly care about or could action. These “standardized” metrics become something measured out of expectation, not intention; therefore, they lose their meaning and value to you as a CIO. Stop spending time on these metrics you will be unable or unwilling to address.

    Secondly, it indicates a lack of trust in the IT leadership team, who can and should be monitoring these commonplace operational measures. An empowered IT leader will understand the responsibility they have to inform the CIO should a metric be derailing from the desired outcome.

    Photo of Brittany Lutes, Senior Research Analyst, Organizational Transformation Practice, Info-Tech Research Group. Brittany Lutes
    Senior Research Analyst
    Organizational Transformation Practice
    Info-Tech Research Group

    Executive Summary

    Your Challenge

    CIOs need to measure a set of specific metrics that:

    • Will support the organization’s vision, their career, and the IT function all in one.
    • Can be used as a tool to make informed decisions and take appropriate actions that will improve the IT function’s ability to deliver value.
    • Consider the influence of critical stakeholders, especially the end customer.
    • Are easily measured at any point in time.
    Common Obstacles

    CIOs often cannot define these metrics because:

    • We confuse the operational metrics IT leaders need to monitor with strategic metrics CIOs need to monitor.
    • Previously monitored metrics did not deliver value.
    • It is hard to decide on a metric that will prove both insightful and easily measurable.
    • We measure metrics without any method or insight on how to take actionable steps forward.
    Info-Tech’s Approach

    For every CIO, there are six areas that should be a focus, no matter your organization or industry. These six priorities will inform the metrics worth measuring:

    • Risk management
    • Delivering on business objectives
    • Customer satisfaction
    • Employee engagement
    • Business leadership relations
    • Managing to a budget

    Info-Tech Insight

    The top metrics for a CIO to measure and monitor have very little to do with IT and everything to do with ensuring the success of the business.

    Your challenge

    CIOs are not using metrics as a personal tool to advance the organization:
    • Metrics should be used as a tool by the CIO to help inform the future actions that will be taken to reach the organization’s strategic vision.
    • As a CIO, you need to have a defined set of metrics that will support your career, the organization, and the IT function you are accountable for.
    • CIO metrics must consider the most important stakeholders across the entire ecosystem of the organization – especially the end customer.
    • The metrics for a CIO are distinctly different from the metrics you use to measure the operational effectiveness of the different IT functions.
    “CIOs are businesspeople first and technology people second.” (Myles Suer, Source: CIO, 2019.)

    Common obstacles

    These barriers make this challenge difficult to address for many CIOs:
    • CIOs often do not measure metrics because they are not aware of what should or needs to be measured.
    • As a result of not wanting to measure the wrong thing, CIOs can often choose to measure nothing at all.
    • Or they get too focused on the operational metrics of their IT organization, leaving the strategic business metrics forgotten.
    • Moreover, narrowing the number of metrics that are being measured down to an actionable number is very difficult.
    • We rely only on physical data sets to help inform the measurements, not considering the qualitative feedback received.
    CIO priorities are business priorities

    46% of CIOs are transforming operations, focused on customer experiences and employee productivity. (Source: Foundry, 2022.)

    Finances (41.3%) and customers (28.1%) remain the top two focuses for CIOs when measuring IT effectiveness. All other focuses combine for the remaining 30.6%. (Source: Journal of Informational Technology Management, 2018.)

    Info-Tech’s approach

    Organizational goals inform CIO metrics

    Diagram with 'CIO Metrics' at the center surrounded by 'Directive Goals', 'Product/Service Goals', 'IT Goals', and 'Operations Goals', each of which are connected to eachother by 'Customers'.

    The Info-Tech difference:
    1. Every CIO has the same set of priorities regardless of their organization or industry given that these metrics are influenced by similar goals of organizations.
    2. CIO metrics are a tool to help inform the actions that will support each core area in reaching their desired goals.
    3. Be mindful of the goals different business units are using to reach the organization’s strategic vision – this includes your own IT goals.
    4. Directly or indirectly, you will always influence the ability to acquire and retain customers for the organization.

    CIO priorities

    MANAGING TO A BUDGET
    Reducing operational costs and increasing strategic IT spend.
    Table centerpiece for CIO Priorities. DELIVERING ON BUSINESS OBJECTIVES
    Aligning IT initiatives to the vision of the organization.
    CUSTOMER SATISFACTION
    Directly and indirectly impacting customer experience.
    EMPLOYEE ENGAGEMENT
    Creating an IT workforce of engaged and purpose-driven people.
    RISK MANAGEMENT
    Actively knowing and mitigating threats to the organization.
    BUSINESS LEADERSHIP RELATONS
    Establishing a network of influential business leaders.

    High-level process flow

    How do we use the CIO metrics?
    Process flow that starts at 'Consider - Identify and analyze CIO priorities', and is followed by 'Select priorities - Identify the top priorities for CIOs (see previous slide)', 'Create a measure - Determine a measure that aligns to each priority', 'Make changes & improvements - Take action to improve the measure and reach the goal you are trying to achieve', 'Demonstrate progress - Use the metrics to demonstrate progress against priorities'. Using priority-based metrics allows you to make incremental improvements that can be measured and reported on, which makes program maturation a natural process.

    Example CIO dashboard

    Example CIO dashboard.
    * Arrow indicates month-over-month trend

    Harness the value of metric data

    Metrics are rarely used accurately as a tool
    • When you have good metrics, you can:
      • Ensure employees are focused on the priorities of the organization
      • Have insight to make better decisions
      • Communicate with the business using language that resonates with each stakeholder
      • Increase the performance of your IT function
      • Continually adapt to meet changing business demands
    • Metrics are tools that quantifiably indicate whether a goal is on track to being achieved (proactive) or if the goal was successfully achieved (retroactive)
    • This is often reflected through two metric types:
      • Leading Metrics: The metric indicates if there are actions that should be taken in the process of achieving a desired outcome.
      • Lagging Metrics: Based on the desired outcome, the metric can indicate where there were successes or failures that supported or prevented the outcome from being achieved.
    • Use the data from the metrics to inform your actions. Do not collect this data if your intent is simply to know the data point. You must be willing to act.
    "The way to make a metric successful is by understanding why you are measuring it." (Jeff Neyland CIO)

    CIOs measure strategic business metrics

    Keep the IT leadership accountable for operational metrics
    • Leveraging the IT leadership team, empower and hold each leader accountable for the operational metrics specific to their functional area
    • As a CIO, focus on the metrics that are going to impact the business. These are often tied to people or stakeholders:
      • The customers who will purchase the product or service
      • The decision makers who will fund IT initiatives
      • The champions of IT value
      • The IT employees who will be driven to succeed
      • The owner of an IT risk event
    • By focusing on these priority areas, you can regularly monitor aspects that will have major business impacts – and be able to address those impacts.
    As a CIO, avoid spending time on operational metrics such as:
    • Time to deliver
    • Time to resolve
    • Project delivery (scope, time, money)
    • Application usage
    • User experiences
    • SLAs
    • Uptime/downtime
    • Resource costs
    • Ticket resolution
    • Number of phishing attempts
    Info-Tech Insight

    While operational metrics are important to your organization, IT leaders should be empowered and responsible for their management.

    SECTION 1

    Actively Managing IT Risks

    Actively manage IT risks

    The impact of IT risks to your organization cannot be ignored any further
    • Few individuals in an organization understand IT risks and can proactively plan for the prevention of those threats, making the CIO the responsible and accountable individual when it comes to IT risks – especially the components that tie into cybersecurity.
    • When the negative impacts of an IT threat event are translated into terms that can be understood and actioned by all in the organization, it increases the likelihood of receiving the sponsorship and funding support necessary.
    • Moreover, risk management can be used as a tool to drive the organization toward its vision state, enabling informed risk decisions.

    Risk management metric:

    Number of critical IT threats that were detected and prevented before impact to the organization.

    Beyond risk prevention
    Organizations that have a clear risk tolerance can use their risk assessments to better inform their decisions.
    Specifically, taking risks that could lead to a high return on investment or other key organizational drivers.

    Protect the organization from more than just cyber threats

    Other risk-related metrics:
    • Percentage of IT risks integrated into the organization’s risk management approach.
    • Number of risk management incidents that were not identified by your organization (and the potential financial impact of those risks).
    • Business satisfaction with IT actions to reduce impact of negative IT risk events.
    • Number of redundant systems removed from the organizations portfolio.
    Action steps to take:
    • Create a risk-aware culture, not just with IT folks. The entire organization needs to understand how IT risks are preventable.
    • Clearly demonstrate the financial and reputational impact of potential IT risks and ensure that this is communicated with decision-makers in the organization.
    • Have a single source of truth to document possible risk events and report prevention tactics to minimize the impact of risks.
    • Use this information to recommend budget changes and help make risk-informed decisions.

    49%

    Investing in Risk

    Heads of IT “cited increasing cybersecurity protections as the top business initiative driving IT investments this year” (Source: Foundry, 2022.)

    SECTION 2

    Delivering on Business Objectives

    Delivering on business objectives

    Deliver on initiatives that bring value to your organization and stop benchmarking
    • CIOs often want to know how they are performing in comparison to their competitors (aka where do you compare in the benchmarking?)
    • While this is a nice to know, it adds zero value in demonstrating that you understand your business, let alone the goals of your business
    • Every organization will have a different set of goals it is striving toward, despite being in the same industry, sector, or market.
    • Measuring your performance against the objectives of the organization prevents CIOs from being more technical than it would do them good.

    Business Objective Alignment Metric:

    Percentage of IT metrics have a direct line of impact to the business goals

    Stop using benchmarks to validate yourself against other organizations. Benchmarking does not provide:
    • Insight into how well that organization performed against their goals.
    • That other organizations goals are likely very different from your own organization's goals.
    • It often aggregates the scores so much; good and bad performers stop being clearly identified.

    Provide a clear line of sight from IT metrics to business goals

    Other business alignment metrics:
    • Number of IT initiatives that have a significant impact on the success of the organization's goals.
    • Number of IT initiatives that exceed the expected value.
    • Positive impact ($) of IT initiatives on driving business innovation.
    Action steps to take:
    • Establish a library or dashboard of all the metrics you are currently measuring as an IT organization, and align each of them to one or more of the business objectives your organization has.
    • Leverage the members of the organization’s executive team to validate they understand how your metric ties to the business objective.
    • Any metric that does not have a clear line of sight should be reconsidered.
    • IT metrics should continue to speak in business terms, not IT terms.

    50%

    CIOs drive the business

    The percentage of CEOs that recognize the CIO as the main driver of the business strategy in the next 2-3 years. (Source: Deloitte, 2020.)

    SECTION 3

    Impact on Customer Satisfaction

    Influencing end-customer satisfaction

    Directly or indirectly, IT influences how satisfied the customer is with their product or service
    • Now more than ever before, IT can positively influence the end-customer’s satisfaction with the product or service they purchase.
    • From operational redundancies to the customer’s interaction with the organization, IT can and should be positively impacting the customer experience.
    • IT leaders who take an interest in the customer demonstrate that they are business-focused individuals and understand the intention of what the organization is seeking to achieve.
    • With the CIO role becoming a strategic one, understanding why a customer would or would not purchase your organization’s product or service stops being a “nice to have.”

    Customer satisfaction metric:

    What is the positive impact ($ or %) of IT initiatives on customer satisfaction?

    Info-Tech Insight

    Be the one to suggest new IT initiatives that will impact the customer experience – stop waiting for other business leaders to make the recommendation.

    Enhance the end-customer experience with I&T

    Other customer satisfaction metrics:
    • Amount of time CIO spends interacting directly with customers.
    • Customer retention rate.
    • Customer attraction rate.
    Action steps to take:
    • Identify the core IT capabilities that support customer experience. Automation? Mobile application? Personal information secured?
    • Suggest an IT-supported or-led initiative that will enhance the customer experience and meet the business goals. Retention? Acquisition? Growth in spend?
    • This is where operational metrics or dashboards can have a real influence on the customer experience. Be mindful of how IT impacts the customer journey.

    41%

    Direct CX interaction

    In 2022, 41% of IT heads were directly interacting with the end customer. (Source: Foundry, 2022.)

    SECTION 4

    Keeping Employees Engaged

    Keeping employees engaged

    This is about more than just an annual engagement survey
    • As a leader, you should always have a finger on the pulse of how engaged your employees are
    • Employee engagement is high when:
      • Employees have a positive disposition to their place of work
      • Employees are committed and willing to contribute to the organization's success
    • Employee engagement comprises three types of drivers: organizational, job, and retention. As CIO, you have a direct impact on all three drivers.
    • Providing employees with a positive work environment where they are empowered to complete activities in line with their desired skillset and tied to a clear purpose can significantly increase employee engagement.

    Employee engagement metric:

    Number of employees who feel empowered to complete purposeful activities related to their job each day

    Engagement leads to increases in:
    • Innovation
    • Productivity
    • Performance
    • Teamwork
    While reducing costs associated with high turnover.

    Employees daily tasks need to have purpose

    Other employee engagement metrics:
    • Tenure of IT employees at the organization.
    • Number of employees who seek out or use a training budget to enhance their knowledge/skills.
    • Degree of autonomy employees feel they have in their work on a daily basis.
    • Number of collaboration tools provided to enable cross-organizational work.
    Action steps to take:
    • If you are not willing to take actionable steps to address engagement, don’t bother asking employees about it.
    • Identify the blockers to empowerment. Common blockers include insufficient team collaboration, bureaucracy, inflexibility, and feeling unsupported and judged.
    • Ensure there is a consistent understanding of what “purposeful” means. Are you talking about “purposeful” to the organization or the individual?
    • Provide more clarity on what the organization’s purpose is and the vision it is driving toward. Just because you understand does not mean the employees do.

    26%

    Act on engagement

    Only 26% of leaders actually think about and act on engagement every single day. (Source: SHRM, 2022.)

    SECTION 5

    Establishing Trusted Business Relationships

    Establishing trusted business partnerships

    Leverage your relationships with other C-suite executives to demonstrate IT’s value
    • Your relationship with other business peers is critical – and, funny enough, it is impacted by the use of good metrics and data.
    • The performance of your IT team will be recognized by other members of the executive leadership team (ELT) and is a direct reflection of you as a leader.
    • A good relationship with the ELT can alleviate issues if concerns about IT staff surface.
      • Of the 85% of IT leaders working on transformational initiatives, only 30% are trying to cultivate an IT/business partnership (Foundry, 2022).
    • Don’t let other members of the organizations ELT overlook you or the value IT has. Build the key relationships that will drive trust and partnerships.

    Business leadership relationship metric:

    Ability to influence business decisions with trusted partners.

    Some key relationships that are worth forming with other C-suite executives right now include:
    • Chief Sustainability Officer
    • Chief Revenue Officer
    • Chief Marketing Officer
    • Chief Data Officer

    Influence business decisions with trusted partners

    Other business relations metrics:
    • The frequency with which peers on the ELT complain about the IT organization to other ELT peers.
    • Percentage of business leaders who trust IT to make the right choices for their accountable areas.
    • Number of projects that are initiated with a desired solution versus problems with no desired solution.
    Action steps to take:
    • From lunch to the boardroom, it is important you make an effort to cultivate relationships with the other members of the ELT.
    • Identify who the most influential members of the ELT are and what their primary goals or objectives are.
    • Follow through on what you promise you will deliver – if you do not know, do not promise it!
    • What will work for one member of the ELT will not work for another – personalize your approach.

    60%

    Enterprise-wide collaboration

    “By 2023, 60% of CIOs will be primarily measured for their ability to co-create new business models and outcomes through extensive enterprise and ecosystem-wide collaboration.” (Source: IDC, 2021.)

    SECTION 6

    Managing to a Budget

    Managing to a budget

    Every CIO needs to be able to spend within budget while increasing their strategic impact
    • From security, to cloud, to innovating the organization's products and services, IT has a lot of initiatives that demand funds and improve the organization.
    • Continuing to demonstrate good use of the budget and driving value for the organization will ensure ongoing recognition in the form of increased money.
    • 29% of CIOs indicated that controlling costs and expense management was a key duty of a functional CIO (Foundry, 2022).
    • Demonstrating the ability to spend within a defined budget is a key way to ensure the business trusts you.
    • Demonstrating an ability to spend within a defined budget and reducing the cost of operational expenses while increasing spend on strategic initiatives ensures the business sees the value in IT.

    Budget management metric:

    Proportion of IT budget that is strategic versus operational.

    Info-Tech Insight

    CIOs need to see their IT function as its own business – budget and spend like a CEO.

    Demonstrate IT’s ability to spend strategically

    Other budget management metrics:
    • Cost required to lead the organization through a digital transformation.
    • Reduction in operational spend due to retiring legacy solutions.
    • Percentage of budget in the run, grow, and transform categories.
    • Amount of money spent keeping the lights on versus investing in new capabilities.

    Action steps to take:

    • Consider opportunities to automate processes and reduce the time/talent required to spend.
    • Identify opportunities and create the time for resources to modernize or even digitize the organization to enable a better delivery of the products or services to the end customer.
    • Review the previous metrics and tie it back to running the business. If customer satisfaction will increase or risk-related threats decrease through an initiative IT is suggesting, you can make the case for increased strategic spend.

    90%

    Direct CX interaction

    Ninety percent of CIOs expect their budget to increase or remain the same in their next fiscal year. (Source: Foundry, 2022.)

    Research contributors and experts

    Photo of Jeff Neyland. Jeff Neyland
    Chief Information Officer – University of Texas at Arlington
    Photo of Brett Trelfa. Brett Trelfa
    SVP and CIO – Arkansas Blue Cross Blue Shield
    Blank photo template. Lynn Fyhrlund
    Chief Information Officer – Milwaukee County Department of Administrative Services

    Info-Tech Research Group

    Vicki Van Alphen Executive Counselor Ibrahim Abdel-Kader Research Analyst
    Mary Van Leer Executive Counselor Graham Price Executive Counselor
    Jack Hakimian Vice President Research Valence Howden Principal Research Director
    Mike Tweedie CIO Practice Lead Tony Denford Organization Transformation Practice Lead

    Related Info-Tech Research

    Sample of the 'IT Metrics Library'. IT Metrics Library
    • Use this tool to review commonly used KPIs for each practice area
    • Identify KPI owners, data sources, baselines, and targets. It also suggests action and research for low-performing KPIs.
    • Use the "Action Plan" tab to keep track of progress on actions that were identified as part of your KPI review.
    Sample of 'Define Service Desk Metrics That Matter'. Define Service Desk Metrics That Matter
    • Consolidate your metrics and assign context and actions to those currently tracked.
    • Establish tension metrics to see and tell the whole story.
    • Split your metrics for each stakeholder group. Assign proper cadences for measurements as a first step to building an effective dashboard.
    Sample of 'CIO Priorities 2022'. CIO Priorities 2022
    • Understand how to respond to trends affecting your organization.
    • Determine your priorities based on current state and relevant internal factors.
    • Assign the right resources to accomplish your vision.
    • Consider what new challenges outside of your control will demand a response.

    Bibliography

    “Developing and Sustaining Employee Engagement.” SHRM, 2022.

    Dopson, Elise. “KPIs Vs. Metrics: What’s the Difference & How Do You Measure Both?” Databox, 23 Jun. 2021.

    Shirer, Michael, and Sarah Murray. “IDC Unveils Worldwide CIO Agenda 2022 Predictions.” IDC, 27 Oct. 2021.

    Suer, Myles. “The Most Important Metrics to Drive IT as a Business.” CIO, 19 Mar. 2019.

    “The new CIO: Business Savvy.” Deloitte Insights. Deloitte, 2020.

    “2022 State of the CIO: Rebalancing Act: CIO’s Operational Pandemic-Era Innovation.” Foundry, 2022.

    “Why Employee Engagement Matters for Leadership at all Levels.” Walden University, 20 Dec. 2019.

    Zhang, Xihui, et al. “How to Measure IT Effectiveness: The CIO’s Perspective.” Journal of Informational Technology Management, 29(4). 2018.

    Organizational Change Management

    • Buy Link or Shortcode: {j2store}35|cart{/j2store}
    • Related Products: {j2store}35|crosssells{/j2store}
    • member rating overall impact: 9.6/10
    • member rating average dollars saved: $19,055
    • member rating average days saved: 24
    • Parent Category Name: Project Portfolio Management and Projects
    • Parent Category Link: /ppm-and-projects
    If you don't know who is responsible for organizational change, it's you.

    Enterprise Network Design Considerations

    • Buy Link or Shortcode: {j2store}502|cart{/j2store}
    • member rating overall impact: N/A
    • member rating average dollars saved: N/A
    • member rating average days saved: N/A
    • Parent Category Name: Network Management
    • Parent Category Link: /network-management

    Security, risk, and trust models play into how networks are designed and deployed. If these models are not considered during network design, band-aids and workarounds will be deployed to achieve the needed goals, potentially bypassing network controls.

    Our Advice

    Critical Insight

    The cloud “gold rush” has made it attractive for many enterprises to migrate services off the traditional network and into the cloud. These services are now outside of the traditional network and associated controls. This shifts the split of east-west vs. north-south traffic patterns, as well as extending the network to encompass services outside of enterprise IT’s locus of control.

    Impact and Result

    Where users access enterprise data or services and from which devices dictate the connectivity needed. With the increasing shift of work that the business is completing remotely, not all devices and data paths will be under the control of IT. This shift does not allow IT to abdicate from the responsibility to provide a secure network.

    Enterprise Network Design Considerations Research & Tools

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. Enterprise Network Design Considerations Deck – A brief deck that outlines key trusts and archetypes when considering enterprise network designs.

    This blueprint will help you:

    • Enterprise Network Design Considerations Storyboard

    2. Enterprise Network Roadmap Technology Assessment Tool – Build an infrastructure assessment in an hour.

    Dispense with detailed analysis and customizations to present a quick snapshot of the road ahead.

    • Enterprise Network Roadmap Technology Assessment Tool
    [infographic]

    Further reading

    Enterprise Network Design Considerations

    It is not just about connectivity.

    Executive Summary

    Info-Tech Insight

    Connectivity and security are tightly coupled

    Security, risk, and trust models play into how networks are designed and deployed. If these models are not considered during network design, band-aids and workarounds will be deployed to achieve the needed goals, potentially bypassing network controls.

    Many services are no longer within the network

    The cloud “gold rush” has made it attractive for many enterprises to migrate services off the traditional network and into the cloud. These services are now outside of the traditional network and associated controls. This shifts the split of east-west vs. north-south traffic patterns, as well as extending the network to encompass services outside of enterprise IT’s locus of control.

    Users are demanding an anywhere, any device access model

    Where users access enterprise data or services and from which devices dictate the connectivity needed. With the increasing shift of work that the business is completing remotely, not all devices and data paths will be under the control of IT. This shift does not allow IT to abdicate from the responsibility to provide a secure network.

    Enterprise networks are changing

    The new network reality

    The enterprise network of 2020 and beyond is changing:

    • Services are becoming more distributed.
    • The number of services provided “off network” is growing.
    • Users are more often remote.
    • Security threats are rapidly escalating.

    The above statements are all accurate for enterprise networks, though each potentially to differing levels depending on the business being supported by the network. Depending on how affected the network in question currently is and will be in the near future, there are different common network archetypes that are best able to address these concerns while delivering business value at an appropriate price point.

    High-Level Design Considerations

    1. Understand Business Needs
    2. Understand what the business needs are and where users and resources are located.

    3. Define Your Trust Model
    4. Trust is a spectrum and tied tightly to security.

    5. Align With an Archetype
    6. How will the network be deployed?

    7. Understand Available Tooling
    8. What tools are in the market to help achieve design principles?

    Understand business needs

    Mission

    Never ignore the basics. Start with revisiting the mission and vision of the business to address relevant needs.

    Users

    Identify where users will be accessing services from. Remote vs. “on net” is a design consideration now more than ever.

    Resources

    Identify required resources and their locations, on net vs. cloud.

    Controls

    Identify required controls in order to define control points and solutions.

    Define a trust model

    Trust is a spectrum

    • There is a spectrum of trust, from fully trusted to not trusted at all. Each organization must decide for their network (or each area thereof) the appropriate level of trust to assign.
    • The ease of network design and deployment is directly proportional to the trust spectrum.
    • When resources and users are outside of direct IT control, the level of appropriate trust should be examined closely.

    Implicit

    Trust everything within the network. Security is perimeter based and designed to stop external actors from entering the large trusted zone.

    Controlled

    Multiple zones of trust within the network. Segmentation is a standard practice to separate areas of higher and lower trust.

    Zero

    Verify trust. The network is set up to recognize and support the principle of least privilege where only required access is supported.

    Align with an archetype

    Archetypes are a good guide

    • Using a defined archetype as a guiding principle in network design can help clarify appropriate tools or network structures.
    • Different aspects of a network can have different archetypes where appropriate (e.g. IT vs. OT [operational technology] networks).

    Traditional

    Services are provided from within the traditional network boundaries and security is provided at the network edge.

    Hybrid

    Services are provided both externally and from within the traditional network boundaries, and security is primarily at the network edge.

    Inverted

    Services are provided primarily externally, and security is cloud centric.

    Traditional networks

    Resources within network boundaries

    Moat and castle security perimeter

    Abstract

    A traditional network is one in which there are clear boundaries defined by a security perimeter. Trust can be applied within the network boundaries as appropriate, and traffic is generally routed through internally deployed control points that may be centralized. Traditional networks commonly include large firewalls and other “big iron” security and control devices.

    Network Design Tenets

    • The full network path from resource to user is designed, deployed, and controlled by IT.
    • Users external to the network must first connect to the network to gain access to resources.
    • Security, risk, and trust controls will be implemented by internal enterprise hardware/software devices.

    Control

    In the traditional network, it is assumed that all required control points can be adequately deployed across hardware/software that is “on prem” and under the control of central IT.

    Info-Tech Insight

    With increased cloud services provided to end users, this network is now more commonly used in data centers or OT networks.

    Traditional networks

    The image contains an example of what traditional networks look like, as described in the text below.

    Defining Characteristics

    • Traffic flows in a defined path under the control of IT to and from central IT resources.
    • Due to visibility into, and the control of, the traffic between the end user and resources, IT can relatively simply implement the required security controls on owned hardware.

    Common Components

    • Traditional offices
    • Remote users/road warriors
    • Private data center/colocation space

    Hybrid networks

    Resources internal and external to network

    Network security perimeter combined with cloud protection

    Abstract

    A hybrid network is one that combines elements of a traditional network with cloud resources. As some of these resources are not fully under the control of IT and may be completely “offnet” or loosely coupled to the on-premises network, the security boundaries and control points are less likely to be centralized. Hybrid networks allow the flexibility and speed of cloud deployment without leaving behind traditional network constructs. This generally makes them expensive to secure and maintain.

    Network Design Tenets

    • The network path from resource to user may not be in IT’s locus of control.
    • Users external to the network must first connect to the network to gain access to internal resources but may directly access publicly hosted ones.
    • Security, risk, and trust controls may potentially be implemented by a mixture of internal enterprise hardware/software devices and external control points.

    Control

    The hallmark of a hybrid network is the blending of public and private resources. This blending tends to necessitate both public and private points of control that may not be homogenous.

    Info-Tech Insight

    With multiple control points to address, take care in simplifying designs while addressing all concerns to ease operational load.

    Hybrid networks

    The image contains an example of what hybrid networks look like, as described in the text below.

    Defining Characteristics

    • Traffic flows to central resources across a defined path under the control of IT.
    • Traffic to cloud assets may be partially under the control of IT.
    • For central resources, the traffic to and from the end user can have the required security controls relatively simply implemented on owned hardware.
    • For public cloud assets, IT may or may not have some control over part of the path.

    Common Components

    • Traditional offices
    • Remote users/road warriors
    • Private data center/colocation space
    • Public cloud assets (IaaS/PaaS/SaaS)

    Inverted perimeter

    Resources primarily external to the network

    Security control points are cloud centric

    Abstract

    An inverted perimeter network is one in which security and control points cover the entire workflow, on or off net, from the consumer of services through to the services themselves with zero trust. Since the control plane is designed to encompass the workflow in a secure manner, much of the underlying connectivity can be abstracted. In an extreme version of this deployment, IT would abstract end-user access, and any cloud-based or on-premises resources would be securely published through the control plane with context-aware precision access.

    Network Design Tenets

    • The network path from resource to user is abstracted and controlled by IT through services like secure access service edge (SASE).
    • Users only need internet access and appropriate credentials to gain access to resources.
    • Security, risk, and trust controls will be implemented through external cloud based services.

    Control

    An inverted network abstracts the lower-layer connectivity away and focuses on implementing a cloud-based zero trust control plane.

    Info-Tech Insight

    This model is extremely attractive for organizations that consume primarily cloud services and have a large remote work force.

    Inverted networks

    The image contains an example of what inverted networks look like, as described in the text below.

    Defining Characteristics

    • The end user does not have to be in a defined location.
    • All central resources that are to be accessed are hosted on cloud resources.
    • IT has little to no control of the path between the end user and central resources.

    Common Components

    • Traditional offices
    • Regent offices/shared workspaces
    • Remote users/road warriors
    • Public cloud assets (IaaS/PaaS/SaaS)

    Understand available tooling

    Don’t buy a hammer and go looking for nails

    • A network archetype must be defined in order to understand what tools (hardware or software) are appropriate for consideration in a network build or refresh.
    • Tools are purpose built and generally designed to solve specific problems if implemented and operated correctly. Choose the tools to align with the challenges that you are solving as opposed to choosing tools and then trying to use those purchases to overcome challenges.
    • The purchase of a tool does not allow for abdication of proper design. Tools must be chosen appropriately and integrated properly to orchestrate the best solutions. Purchasing a tool and expecting the tool to solve all your issues rarely succeeds.

    “It is essential to have good tools, but it is also essential that the tools should be used in the right way.” — Wallace D. Wattles

    Software-defined WAN (SD-WAN)

    Simplified branch office connectivity

    Archetype Value: Traditional Networks

    What It Is Not

    SD-WAN is generally not a way to slash spending by lowering WAN circuit costs. Though it is traditionally deployed across lower cost access, to minimize risk and realize the most benefits from the platform many organizations install multiple circuits with greater bandwidths at each endpoint when replacing the more costly traditional circuits. Though this maximizes the value of the technology investment, it will result in the end cost being similar to the traditional cost plus or minus a small percentage.

    What It Is

    SD-WAN is a subset of software-defined networking (SDN) designed specifically to deploy a secure, centrally managed, connectivity agnostic, overlay network connecting multiple office locations. This technology can be used to replace, work in concert with, or augment more traditional costly connectivity such as MPLS or private point to point (PtP) circuits. In addition to the secure overlay, SD-WAN usually also enables policy-based, intelligent controls, based on traffic and circuit intelligence.

    Why Use It

    You have multiple endpoint locations connected by expensive lower bandwidth traditional circuits. Your target is to increase visibility and control while controlling costs if and where possible. Ease of centralized management and the ability to more rapidly turn up new locations are attractive.

    Cloud access security broker (CASB)

    Inline policy enforcement placed between users and cloud services

    Archetype Value: Hybrid Networks

    What It Is Not

    CASBs do not provide network protection; they are designed to provide compliance and enforcement of rules. Though CASBs are designed to give visibility and control into cloud traffic, they have limits to the data that they generally ingest and utilize. A CASB does not gather or report on cloud usage details, licencing information, financial costing, or whether the cloud resource usage is aligned with the deployment purpose.

    What It Is

    A CASB is designed to establish security controls beyond a company’s environment. It is commonly deployed to augment traditional solutions to extend visibility and control into the cloud. To protect assets in the cloud, CASBs are designed to provide central policy control and apply services primarily in the areas of visibility, data security, threat protection, and compliance.

    Why Use It

    You a mixture of on-premises and cloud assets. In moving assets out to the cloud, you have lost the traditional controls that were implemented in the data center. You now need to have visibility and apply controls to the usage of these cloud assets.

    Secure access service edge (SASE)

    Convergence of security and service access in the cloud

    Archetype Value: Inverted Networks

    What It Is Not

    Though the service will consist of many service offerings, SASE is not multiple services strung together. To present the value proposed by this platform, all functionality proposed must be provided by a single platform under a “single pane of glass.” SASE is not a mature and well-established service. The market is still solidifying, and the full-service definition remains somewhat fluid.

    What It Is

    SASE exists at the intersection of network-as-a-service and network-security-as-a-service. It is a superset of many network and security cloud offerings such as CASB, secure web gateway, SD-WAN, and WAN optimization. Any services offered by a SASE provider will be cloud hosted, presented in a single stack, and controlled through a single pane of glass.

    Why Use It

    Your network is inverting, and services are provided primarily as cloud assets. In a full realization of this deployment’s value, you would abstract how and where users gain initial network access yet remain in control of the communications and data flow.

    Activity

    Understand your enterprise network options

    Activity: Network assessment in an hour

    • Learn about the Enterprise Network Roadmap Technology Assessment Tool
    • Complete the Enterprise Network Roadmap Technology Assessment Tool

    This activity involves the following participants:

    • IT strategic direction decision makers.
    • IT managers responsible for network.
    • Organizations evaluating platforms for mission critical applications.

    Outcomes of this step:

    • Completed Enterprise Network Roadmap Technology Assessment Tool

    Info-Tech Insight

    Review your design options with security and compliance in mind. Infrastructure is no longer a standalone entity and now tightly integrates with software-defined networks and security solutions.

    Build an assessment in an hour

    Learn about the Enterprise Network Roadmap Technology Assessment Tool.

    This workbook provides a high-level analysis of a technology’s readiness for adoption based on your organization’s needs.

    • The workbook then places the technology on a graph that measures both the readiness and fit for your organization. In addition, it provides warnings for specific issues and lets you know if you have considerable uncertainty in your answers.
    • At a glance you can now communicate what you are doing to help the company:
      • Grow
      • Save money
      • Reduce risk
    • Regardless of your specific audience, these are important stories to be able to tell.
    The image contains three screenshots from the Enterprise Network Roadmap Technology Assessment Tool.

    Build an assessment in an hour

    Complete the Enterprise Network Roadmap Technology Assessment Tool.

    Dispense with detailed analysis and customizations to present a quick snapshot of the road ahead.

    1. Weightings: Adjust the Weighting tab to meet organizational needs. The provided weightings for the overall solution areas are based on a generic firm; individual firms will have different needs.
    2. Data Entry: For each category, answer the questions for the technology you are considering. When you have completed the questionnaire, go to the next tab for the results.
    3. Results: The Enterprise Network Roadmap Technology Assessment Tool provides a value versus readiness assessment of your chosen technology customized to your organization.

    The image contains three screenshots from the Enterprise Network Roadmap Technology Assessment Tool. It has a screenshot for each step as described in the text above.

    Related Info-Tech Research

    Effectively Acquire Infrastructure Services

    Acquiring a service is like buying an experience. Don’t confuse the simplicity of buying hardware with buying an experience.

    Outsource IT Infrastructure to Improve System Availability, Reliability, and Recovery

    There are very few IT infrastructure components you should be housing internally – outsource everything else.

    Build Your Infrastructure Roadmap

    Move beyond alignment: Put yourself in the driver’s seat for true business value.

    Drive Successful Sourcing Outcomes With a Robust RFP Process

    Leverage your vendor sourcing process to get better results.

    Research Authors

    The image contains a photo of Scott Young.

    Scott Young, Principal Research Advisor, Info-Tech Research Group

    Scott Young is a Director of Infrastructure Research at Info-Tech Research Group. Scott has worked in the technology field for over 17 years, with a strong focus on telecommunications and enterprise infrastructure architecture. He brings extensive practical experience in these areas of specialization, including IP networks, server hardware and OS, storage, and virtualization.

    The image contains a photo of Troy Cheeseman.

    Troy Cheeseman, Practice Lead, Info-Tech Research Group

    Troy has over 24 years of experience and has championed large enterprise-wide technology transformation programs, remote/home office collaboration and remote work strategies, BCP, IT DRP, IT operations and expense management programs, international right placement initiatives, and large technology transformation initiatives (M&A). Additionally, he has deep experience working with IT solution providers and technology (cloud) startups.

    Bibliography

    Ahlgren, Bengt. “Design considerations for a network of information.” ACM Digital Library, 21 Dec. 2008.

    Cox Business. “Digital transformation is here. Is your business ready to upgrade your mobile work equation?” BizJournals, 1 April 2022. Accessed April 2022.

    Elmore, Ed. “Benefits of integrating security and networking with SASE.” Tech Radar, 1 April 2022. Web.

    Greenfield, Dave. “From SD-WAN to SASE: How the WAN Evolution is Progressing.” Cato Networks, 19 May 2020. Web

    Korolov, Maria. “What is SASE? A cloud service that marries SD-WAN with security.” Network World, 7 Sept. 2020. Web.

    Korzeniowski, Paul, “CASB tools evolve to meet broader set of cloud security needs.” TechTarget, 26 July 2019. Accessed March 2022.

    Optimize Lead Generation With Lead Scoring

    • Buy Link or Shortcode: {j2store}557|cart{/j2store}
    • member rating overall impact: N/A
    • member rating average dollars saved: N/A
    • member rating average days saved: N/A
    • Parent Category Name: Marketing Solutions
    • Parent Category Link: /marketing-solutions
    • Prospective buyer traffic into digital marketing platforms has exploded.
    • Many freemium/low-cost digital marketing platforms lack lead scoring and nurturing functionality.
    • As a result, the volume of unqualified leads being delivered to outbound sellers has increased dramatically.
    • This has reduced sales productivity, frustrated prospective buyers, and raised the costs of lead generation.

    Our Advice

    Critical Insight

    • Lead scoring is a must-have capability for high-tech marketers.
    • Without lead scoring, marketers will see increased costs of lead generation and decreased SQL-to-opportunity conversion rates.
    • Lead scoring increases sales productivity and shortens sales cycles.

    Impact and Result

    • Align Marketing, Sales, and Inside Sales on your ideal customer profile.
    • Re-evaluate the assets and activities that compose your current lead generation engine.
    • Develop a documented methodology to ignore, nurture, or contact right away the leads in your marketing pipeline.
    • Deliver more qualified leads to sellers, raising sales productivity and marketing/lead-gen ROI.

    Optimize Lead Generation With Lead Scoring Research & Tools

    Start here – read the Executive Brief

    Read our concise Executive Brief to find out why you should optimize lead generation with lead scoring, review SoftwareReviews Advisory’s methodology, and understand the four ways we can support you in completing this project.

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. Drive aligned vision for lead scoring

    Outline your plan, form your team, and plan marketing tech stack support.

    • Optimize Lead Generation With Lead Scoring – Phase 1: Drive an Aligned Vision for Lead Scoring

    2. Build and test your lead scoring model

    Set lead flow thresholds, define your ideal customer profile and lead generation engine components, and weight, score, test, and refine them.

    • Optimize Lead Generation With Lead Scoring – Phase 2: Build and Test Your Lead Scoring Model
    • Lead Scoring Workbook

    3. Apply your model to marketing apps and go live with better qualified leads

    Apply your lead scoring model to your lead management app, test it, validate the results with sellers, apply advanced methods, and refine.

    • Optimize Lead Generation With Lead Scoring – Phase 3: Apply Your Model to Marketing Apps and Go Live With Better Qualified Leads
    [infographic]

    Workshop: Optimize Lead Generation With Lead Scoring

    Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

    1 Drive Aligned Vision for Lead Scoring

    The Purpose

    Drive an aligned vision for lead scoring.

    Key Benefits Achieved

    Attain an aligned vision for lead scoring.

    Identify the steering committee and project team and clarify their roles and responsibilities.

    Provide your team with an understanding of how leads score through the marketing funnel.

    Activities

    1.1 Outline a vision for lead scoring.

    1.2 Identify steering committee and project team members.

    1.3 Assess your tech stack for lead scoring and seek advice from Info-Tech analysts to modernize where needed.

    1.4 Align on marketing pipeline terminology.

    Outputs

    Steering committee and project team make-up

    Direction on tech stack to support lead generation

    Marketing pipeline definitions alignment

    2 Buyer Journey and Lead Generation Engine Mapping

    The Purpose

    Define the buyer journey and map the lead generation engine.

    Key Benefits Achieved

    Align the vision for your target buyer and their buying journey.

    Identify the assets and activities that need to compose your lead generation engine.

    Activities

    2.1 Establish a buyer persona.

    2.2 Map your buyer journey.

    2.3 Document the activities and assets of your lead generation engine.

    Outputs

    Buyer persona

    Buyer journey map

    Lead gen engine assets and activities documented

    3 Build and Test Your Lead Scoring Model

    The Purpose

    Build and test your lead scoring model.

    Key Benefits Achieved

    Gain team alignment on how leads score and, most importantly, what constitutes a sales-accepted lead.

    Develop a scoring model from which future iterations can be tested.

    Activities

    3.1 Understand the Lead Scoring Grid and set your thresholds.

    3.2 Identify your ideal customer profile, attributes, and subattribute weightings – run tests.

    Outputs

    Lead scoring thresholds

    Ideal customer profile, weightings, and tested scores

    Test profile scoring

    4 Align on Engagement Attributes

    The Purpose

    Align on engagement attributes.

    Key Benefits Achieved

    Develop a scoring model from which future iterations can be tested.

    Activities

    4.1 Weight the attributes of your lead generation engagement model and run tests.

    4.2 Apply weightings to activities and assets.

    4.3 Test engagement and profile scenarios together and make any adjustments to weightings or thresholds.

    Outputs

    Engagement attributes and weightings tested and complete

    Final lead scoring model

    5 Apply Model to Your Tech Platform

    The Purpose

    Apply the model to your tech platform.

    Key Benefits Achieved

    Deliver better qualified leads to Sales.

    Activities

    5.1 Apply model to your marketing management/campaign management software and test the quality of sales-accepted leads in the hands of sellers.

    5.2 Measure overall lead flow and conversion rates through your marketing pipeline.

    5.3 Apply lead nurturing and other advanced methods.

    Outputs

    Model applied to software

    Better qualified leads in the hands of sellers

    Further reading

    Optimize Lead Generation With Lead Scoring

    In today’s competitive environment, optimizing Sales’ resources by giving them qualified leads is key to B2B marketing success.

    EXECUTIVE BRIEF

    Analyst Perspective

    Improve B2B seller win rates with a lead scoring methodology as part of your modern lead generation engine.

    The image contains a picture of Jeff Golterman.

    As B2B organizations emerge from the lowered demands brought on by COVID-19, they are eager to convert marketing contacts to sales-qualified leads with even the slightest signal of intent, but many sales cycles are wasted when sellers receive unqualified leads. Delivering highly qualified leads to sellers is still more art than science, and it is especially challenging without a way to score a contact profile and engagement. While most marketers capture some profile data from contacts, many will pass a contact over to Sales without any engagement data or schedule a demo with a contact without any qualifying profile data. Passing unqualified leads to Sales suboptimizes Sales’ resources, raises the costs per lead, and often results in lost opportunities. Marketers need to develop a lead scoring methodology that delivers better qualified leads to Field Sales scored against both the ideal customer profile (ICP) and engagement that signals lower-funnel buyer interest. To be successful in building a compelling lead scoring solution, marketers must work closely with key stakeholders to align the ICP asset/activity with the buyer journey. Additionally, working early in the design process with IT/Marketing Operations to implement lead management and analytical tools in support will drive results to maximize lead conversion rates and sales wins.

    Jeff Golterman

    Managing Director

    SoftwareReviews Advisory

    Executive Summary

    Your Challenge

    The affordability and ease of implementation of digital marketing tools have driven global adoption to record levels. While many marketers are fine-tuning the lead generation engine components of email, social media, and web-based advertising to increase lead volumes, just 32% of companies pass well-qualified leads over to outbound marketers or sales development reps (SDRs). At best, lead gen costs stay high, and marketing-influenced win rates remain suboptimized. At worst, marketing reputation suffers when poorly qualified leads are passed along to sellers.

    Common Obstacles

    Most marketers lack a methodology for lead scoring, and some lack alignment among Marketing, Product, and Sales on what defines a qualified lead. In their rush to drive lead generation, marketers often fail to “define and align” on the ICP with stakeholders, creating confusion and wasted time and resources. In the rush to adopt B2B marketing and sales automation tools, many marketers have also skipped the important steps to 1) define the buyer journey and map content types to support, and 2) invest in a consistent content creation and sourcing strategy. The wrong content can leave prospects unmotivated to engage further and cause them to seek alternatives.

    Info-Tech’s Approach

    To employ lead scoring effectively, marketers need to align Sales, Marketing, and Product teams on the definition of the ICP and what constitutes a Sales-accepted lead. The buyer journey needs to be mapped in order to identify the engagement that will move a lead through the marketing lead generation engine. Then the project team can score prospect engagement and the prospect profile attributes against the ICP to arrive at a lead score. The marketing tech stack needs to be validated to support lead scoring, and finally Sales needs to sign off on results.

    SoftwareReviews Advisory Insight:

    Lead scoring is a must-have capability for high-tech marketers. Without lead scoring, marketers will see increased costs of lead gen, decreased SQL to opportunity conversion rates, decreased sales productivity, and longer sales cycles.

    Who benefits from a lead scoring project?

    This Research Is Designed for:

    • Marketers and especially campaign managers who are:
      • Looking for a more precise way to score leads and deploy outbound marketing resources to optimize contacts-to-MQL conversion rates.
      • Looking for a more effective way to profile contacts raised by your lead gen engine.
      • Looking to use their lead management software to optimize lead scoring.
      • Starting anew to strengthen their lead generation engine and want examples of a typical engine, ways to identify buyer journey, and perform lead nurturing.

    This Research Will Help You:

    • Explain why having a lead scoring methodology is important.
    • Identify a methodology that will call for identifying an ICP against which to score prospect profiles behind each contact that engages your lead generation engine.
    • Create a process of applying weightings to score activities during contact engagement with your lead generation engine. Apply both scores to arrive at a contact/lead score.
    • Compare your current lead gen engine to a best-in-class example in order to identify gaps and areas for improvement and exploration.

    This Research Will Also Assist:

    • CMOs, Marketing Operations leaders, heads of Product Marketing, and regional Marketing leads who are stakeholders in:
      • Finding alternatives to current lead scoring approaches.
        • Altering current or evaluating new marketing technologies to support a refreshed lead scoring approaches.

    This Research Will Help Them:

    • Align stakeholders on an overall program of identifying target customers, building common understanding of what constitutes a qualified lead, and determining when to use higher-cost outbound marketing resources.
    • Deploy high-value applications that will improve core marketing metrics.

    Insight summary

    Continuous adjustment and improvement of your lead scoring methodology is critical for long-term lead generation engine success.

    • Building a highly functioning lead generation engine is an ongoing process and one that requires continual testing of new asset types, asset design, and copy variations. Buyer profiles change over time as you launch new products and target new markets.
    • Pass better qualified leads to Field Sales and improve sales win rates by taking these crucial steps to implement a better lead generation engine and a lead scoring methodology:
      • Make the case for lead scoring in your organization.
      • Establish trigger points that separate leads to ignore, nurture, qualify, or outreach/contact.
      • Identify your buyer journey and ICP through collaboration among Sales, Marketing, and Product.
      • Assess each asset and activity type across your lead generation engine and apply a weighting for each.
      • Test lead scenarios within our supplied toolkit and with stakeholders. Adjust weightings and triggers that deliver lead scores that make sense.
      • Work with IT/Marketing Operations to emulate your lead scoring methodology within your marketing automation/campaign management application.
      • Explore advanced methods including nurturing.
    • Use the Lead Scoring Workbook collaboratively with other stakeholders to design your own methodology, test lead scenarios, and build alignment across the team.

    Leading marketers who successfully implement a lead scoring methodology develop it collaboratively with stakeholders across Marketing, Sales, and Product Management. Leaders will engage Marketing Operations, Sales Operations, and IT early to gain support for the evaluation and implementation of a supporting campaign management application and for analytics to track lead progress throughout the Marketing and Sales funnels. Leverage the Marketing Lead Scoring Toolkit to build out your version of the model and to test various scenarios. Use the slides contained within this storyboard and the accompanying toolkit as a means to align key stakeholders on the ICP and to weight assets and activities across your marketing lead generation engine.

    What is lead scoring?

    Lead scoring weighs the value of a prospect’s profile against the ICP and renders a profile score. The process then weighs the value of the prospects activities against the ideal call to action (CTA) and renders an activity score. Combining the profile and activity scores delivers an overall score for the value of the lead to drive the next step along the overall buyer journey.

    EXAMPLE: SALES MANAGEMENT SOFTWARE

    • For a company that markets sales management software the ideal buyer is the head of Sales Operations. While the ICP is made up of many attributes, we’ll just score one – the buyer’s role.
    • If the prospect/lead that we wish to score has an executive title, the lead’s profile scores “High.” Other roles will score lower based on your ICP. Alongside role, you will also score other profile attributes (e.g. company size, location).
    • With engagement, if the prospect/lead clicked on our ideal CTA, which is “request a proposal,” our engagement would score high. Other CTAs would score lower.
    The image contains a screenshot of two examples of lead scoring. One example demonstrates. Profile Scoring with Lead Profile, and the second image demonstrates Activity Scoring and Lead Engagement.

    SoftwareReviews Advisory Insight:

    A significant obstacle to quality lead production is disagreement on or lack of a documented definition of the ideal customer profile. Marketers successful in lead scoring will align key stakeholders on a documented definition of the ICP as a first step in improving lead scoring.

    Use of lead scoring is in the minority among marketers

    The majority of businesses are not practicing lead scoring!

    Up to 66% of businesses don’t practice any type of lead scoring.

    Source: LeadSquared, 2014

    “ With lead scoring, you don’t waste loads of time on unworthy prospects, and you don’t ignore people on the edge of buying.”

    Source: BigCommerce

    “The benefits of lead scoring number in the dozens. Having a deeper understanding of which leads meet the qualifications of your highest converters and then systematically communicating with them accordingly increases both ongoing engagement and saves your internal team time chasing down inopportune leads.”

    – Joey Strawn, Integrated Marketing Director, in IndustrialMarketer.com

    Key benefit: sales resource optimization

    Many marketing organizations send Sales too many unqualified leads

    • Leads – or, more accurately, contacts – are not all qualified. Some are actually nothing more than time-wasters for sellers.
    • Leading marketers peel apart a contact into at least two dimensions – “who” and “how interested.”
      • The “who” is compared to the ICP and given a score.
      • The “how interested” measures contact activity – or engagement – within our lead gen engine and gives it a score.
    • Scores are combined; a contact with a low score is ignored, medium is nurtured, and high is sent to sellers.
    • A robust ICP, together with engagement scoring and when housed within your lead management software, prioritizes for marketers which contacts to nurture and gets hot leads to sellers more quickly.

    Optimizing Sales Resources Using Lead Scoring

    The image contains a screenshot of a graph to demonstrate optimizing sales resources with lead scoring.

    Lead scoring drives greater sales effectiveness

    When contacts are scored as “qualified leads” and sent to sellers, sales win rates and ROI climb

    • Contacts can be scored properly once marketers align with Sales on the ICP and work closely with colleagues in areas like product marketing and field marketing to assign weightings to lead gen activities.
    • When more qualified leads get into the hands of the salesforce, their win rates improve.
    • As win rates improve, and sellers are producing more wins from the same volume of leads, sales productivity improves and ROI on the marketing investment increases.

    “On average, organizations that currently use lead scoring experience a 77% lift in lead generation ROI, over organizations that do not currently use lead scoring.”

    – MarketingSherpa, 2012

    Average Lead Generation ROI by Use of Lead Scoring

    The image contains a screenshot of a graph to demonstrate the average lead generation ROI by using of lead scoring. 138% are currenting using lead scoring, and 78% are not using lead scoring.
    Source: 2011 B2B Marketing Benchmark Survey, MarketingSherpa
    Methodology: Fielded June 2011, N=326 CMOs

    SoftwareReviews’ Lead Scoring Approach

    1. Drive Aligned Vision for Lead Scoring

    2. Build and Test Your Lead Scoring Model

    3. Apply to Your Tech Platform and Validate, Nurture, and Grow

    Phase
    Steps

    1. Outline a vision for lead scoring and identify stakeholders.
    2. Assess your tech stack for lead scoring and seek advice from Info-Tech analysts to modernize where needed.
    3. Align on marketing pipeline terminology, buyer persona and journey, and lead gen engine components.
    1. Understand the Lead Scoring Grid and establish thresholds.
    2. Collaborate with stakeholders on your ICP, apply weightings to profile attributes and values, and test your model.
    3. Identify the key activities and assets of your lead gen engine, weight attributes, and run tests.
    1. Apply model to your marketing management software.
    2. Test quality of sales-accepted leads by sellers and measure conversion rates through your marketing pipeline.
    3. Apply advanced methods such as lead nurturing.

    Phase Outcomes

    1. Steering committee and stakeholder selection
    2. Stakeholder alignment
    3. Team alignment on terminology
    4. Buyer journey map
    5. Lead gen engine components and asset types documented
    1. Initial lead-stage threshold scores
    2. Ideal customer profile, weightings, and tested scores
    3. Documented activities/assets across your lead generation engine
    4. Test results to drive adjusted weightings for profile attributes and engagement
    5. Final model to apply to marketing application
    1. Better qualified leads in the hands of sellers
    2. Advanced methods to nurture leads

    Key Deliverable: Lead Scoring Workbook

    The workbook walks you through a step-by-step process to:

    • Identify your team.
    • Identify the lead scoring thresholds.
    • Define your IPC.
    • Weight the activities within your lead generation engine.
    • Run tests using lead scenarios.

    Tab 1: Team Composition

    Consider core functions and form a cross-functional lead scoring team. Document the team’s details here.

    The image contains a screenshot of the Lead Scoring Workbook, Tab 1.

    Tab 2: Threshold Setting

    Set your initial threshold weightings for profile and engagement scores.

    The image contains a screenshot of the Lead Scoring Workbook, Tab 2.

    Tab 3:

    Establish Your Ideal Customer Profile

    Identify major attributes and attribute values and the weightings of both. You’ll eventually score your leads against this ICP.

    Record and Weight Lead Gen Engine Activities

    Identify the major activities that compose prospect engagement with your lead gen engine. Weight them together as a team.

    Test Lead Profile Scenarios

    Test actual lead profiles to see how they score against where you believe they should score. Adjust threshold settings in Tab 2.

    Test Activity Engagement Scores

    Test scenarios of how contacts navigate your lead gen engine. See how they score against where you believe they should score. Adjust thresholds on Tab 2 as needed.

    Review Combined Profile and Activity Score

    Review the combined scores to see where on your lead scoring matrix the lead falls. Make any final adjustments to thresholds accordingly.

    The image contains screenshots of the Lead Scoring Workbook, Tab 3.

    Several ways we help you build your lead scoring methodology

    DIY Toolkit Guided Implementation Workshop Consulting

    "Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful."

    "Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track."

    "We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place."

    "Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project."

    • Begin your project using the step-by-step process outlined in this blueprint.
    • Leverage the accompanying workbook.
    • Launch inquiries with the analyst who wrote the research.
    • Kick off your project with an inquiry with the authoring analyst and your engagement manager.
    • Additional inquiries will guide you through each step.
    • Leverage the blueprint and toolkit.
    • Reach out to your engagement manager.
    • During a half-day workshop the authoring analyst will guide you and your team to complete your lead scoring methodology.
    • Reach out to your engagement manager.
    • We’ll lead the engagement to structure the process, gather data, interview stakeholders, craft outputs, and organize feedback and final review.

    Guided Implementation

    What does a typical GI on this topic look like?

    Phase 1

    Phase 2

    Phase 3

    Call #1: Collaborate on vision for lead scoring and the overall project.

    Call #2: Identify the steering committee and the rest of the team.

    Call #3: Discuss app/tech stack support for lead scoring. Understand key marketing pipeline terminology and the buyer journey.

    Call #4: Discuss your ICP, apply weightings, and run test scenarios.

    Call #5: Discuss and record lead generation engine components.

    Call #6: Understand the Lead Scoring Grid and set thresholds for your model.

    Call #7: Identify your ICP, apply weightings to attributes, and run tests.

    Call #8: Weight the attributes of engagement activities and run tests. Review the application of the scoring model on lead management software.

    Call #9: Test quality of sales-accepted leads in the hands of sellers. Measure lead flow and conversion rates through your marketing pipeline.

    Call #10: Review progress and discuss nurturing and other advanced topics.

    A Guided Implementation (GI) is series of calls with a SoftwareReviews Advisory analyst to help implement our best practices in your organization. For guidance on marketing applications, we can arrange a discussion with an Info-Tech analyst. Your engagement managers will work with you to schedule analyst calls.

    Workshop Overview

    Accelerate your project with our facilitated SoftwareReviews Advisory workshops

    Day 1

    Day 2

    Day 3

    Day 4

    Day 5

    Drive Aligned Vision for Lead Scoring

    Buyer Journey and Lead Gen Engine Mapping

    Build and Test Your Lead Scoring Model

    Align on Engagement Attributes

    Apply to Your Tech Platform

    Activities

    1.1 Outline a vision for lead scoring.

    1.2 Identify steering committee and project team members.

    1.3 Assess your tech stack for lead scoring and seek advice from Info-Tech analysts to modernize where needed.

    1.4 Align on marketing pipeline terminology.

    2.1 Establish a buyer persona (if not done already).

    2.2 Map your buyer journey.

    2.3 Document the activities and assets of your lead gen engine.

    3.1 Understand Lead Scoring Grid and set your thresholds.

    3.2 Identify ICP attribute and sub-attribute weightings. Run tests.

    4.1 Weight the attributes of your lead gen engagement model and run tests.

    4.2 Apply weightings to activities and assets.

    4.3 Test engagement and profile scenarios together and adjust weightings and thresholds as needed.

    5.1 Apply model to your campaign management software and test quality of sales-accepted leads in the hands of sellers.

    5.2. Measure overall lead flow and conversion rates through your marketing pipeline.

    5.3 Apply lead nurturing and other advanced methods.

    Deliverables

    1. Steering committee & project team composition
    2. Direction on tech stack to support lead gen
    3. Alignment on marketing pipeline definitions
    1. Buyer (persona if needed) journey map
    2. Lead gen engine assets and activities documented
    1. Lead scoring thresholds
    2. ICP, weightings, and tested scores
    3. Test profile scoring
    1. Engagement attributes and weightings tested and complete
    2. Final lead scoring model
    1. Model applied to your marketing management/ campaign management software
    2. Better qualified leads in the hands of sellers

    Phase 1

    Drive an Aligned Vision for Lead Scoring

    Phase 1

    Phase 2

    Phase 3

    1.1 Establish a cross-functional vision for lead scoring

    1.2 Asses your tech stack for lead scoring (optional)

    1.3 Catalog your buyer journey and lead gen engine assets

    2.1 Start building your lead scoring model

    2.2 Identify and verify your IPC and weightings

    2.3 Establish key lead generation activities and assets

    3.1 Apply model to your marketing management software

    3.2 Test the quality of sales-accepted leads

    3.3 Apply advanced methods

    This phase will walk you through the following activities:

    • Solidify your vision for lead scoring.
    • Achieve stakeholder alignment.
    • Assess your tech stack.

    This phase involves the following stakeholders:

    • Field Marketing/Campaign Manager
    • CMO
    • Product Marketing
    • Product Management
    • Sales Leadership/Sales Operations
    • Inside Sales leadership
    • Marketing Operations/IT
    • Digital Platform leadership

    Step 1.1

    Establish a Cross-Functional Vision for Lead Scoring

    Activities

    1.1.1 Identify stakeholders critical to success

    1.1.2 Outline the vision for lead scoring

    1.1.3 Select your lead scoring team

    This step will walk you through the following activities:

    • Discuss the reasons why lead scoring is important.
    • Review program process.
    • Identify stakeholders and team.

    This step involves the following participants:

    • Stakeholders
    • Project sponsors and leaders

    Outcomes of this step

    • Stakeholder alignment on vision of lead scoring
    • Stakeholders described and team members recorded
    • A documented buyer journey and map of your current lead gen engine

    1.1.1 Identify stakeholders critical to success

    1 hour

    1. Meet to identify the stakeholders that should be included in the project’s steering committee.
    2. Finalize selection of steering committee members.
    3. Contact members to ensure their willingness to participate.
    4. Document the steering committee members and the milestone/presentation expectations for reporting project progress and results
    Input Output
    • Stakeholder interviews
    • List of business process owners (lead management, inside sales lead qualification, sales opportunity management, marketing funnel metric measurement/analytics)
    • Lead generation/scoring stakeholders
    • Steering committee members
    Materials Participants
    • N/A
    • Initiative Manager
    • CMO, Sponsoring Executive
    • Departmental Leads – Sales, Marketing, Product Marketing, Product Management (and others)
    • Marketing Applications Director
    • Senior Digital Business Analyst

    SoftwareReviews Advisory Insight:

    B2B marketers that lack agreement among Marketing, Sales, Inside Sales, and lead management supporting staff of what constitutes a qualified lead will squander precious time and resources throughout the customer acquisition process.

    1.1.2 Outline the vision for lead scoring

    1 hour

    1. Convene a meeting of the steering committee and initiative team members who will be involved in the lead scoring project.
    • Using slides from this blueprint, understand the definition of lead scoring, the value of lead scoring to the organization, and the overall lead scoring process.
    • Understand the teams’ roles and responsibilities and help your Marketing Operations/IT colleagues understand some of the technical requirements needed to support lead scoring.
    • This is important because as the business members of the team are developing the lead scoring approach on paper, the technical team can begin to evaluate lead management apps within which your lead scoring model will be brought to life.
    Input Output
    • Slides to explain lead scoring and the lead scoring program
    • An understanding of the project among key stakeholders
    Materials Participants
    • Slides taken from this blueprint. We suggest slides from the Executive Brief (slides 3-16) and any others depending on the team’s level of familiarity.
    • Initiative Manager
    • CMO, Sponsoring Executive
    • Departmental leads from Sales, Marketing, Product Marketing, Product Management (and others)
    • Marketing Applications Director
    • Senior Digital Business Analyst

    SoftwareReviews Advisory Insight:

    While SMBs can implement some form of lead scoring when volume is very low and leads can be scored by hand, lead scoring and effective lead management cannot be performed without investment in digital platforms and lead management software and integration with customer relationship management (CRM) applications in the hands of inside and field sales staff. Marketers should plan and budget for the right combination of applications and tools to be in place for proper lead management.

    Lead scoring stakeholders

    Developing a common stakeholder understanding of the ICP, the way contact profiles are scored, and the way activities and asset engagement in your lead generation engine are scored will strengthen alignment between Marketing, Sales and Product Management.

    Title

    Key Stakeholders Within a Lead Generation/Scoring Initiative

    Lead Scoring Sponsor

    • Owns the project at the management/C-suite level
    • Responsible for breaking down barriers and ensuring alignment with organizational strategy
    • CMO, VP of Marketing, CEO (in SMB providers)

    Lead Scoring Initiative Manager

    • Typically a senior member of the marketing team
    • Responsible for preparing and managing the project plan and monitoring the project team’s progress
    • Marketing Manager or a field marketing team member who has strong program management skills, has run large-scale B2B generation campaigns, and is familiar with the stakeholder roles and enabling technologies

    Business Leads

    • Works alongside the lead scoring initiative manager to ensure that the strategy is aligned with business needs
    • In this case, likely to be a marketing lead
    • Marketing Director

    Digital, Marketing/Sales Ops/IT Team

    • Composed of individuals whose application and technology tools knowledge and skills are crucial to lead generation success
    • Responsible for understanding the business requirements behind lead generation and the requirements in particular to support lead scoring and the evaluation, selection, and implementation of the supporting tech stack – apps, website, analytics, etc.
    • Project Manager, Business Lead, CRM Manager, Integration Manager, Marketing Application SMEs, Sales Application

    Steering Committee

    • Composed of C-suite/management-level individuals who act as the lead generation process decision makers
    • Responsible for validating goals and priorities, defining the scope, enabling adequate resourcing, and managing change especially among C-level leaders in Sales & Product
    • Executive Sponsor, Project Sponsor, CMO, Business Unit SMEs

    SoftwareReviews Advisory Insight:

    Marketers managing the lead scoring initiative must include Product Marketing, Sales, Inside Sales, and Product Management. And given that world-class B2B lead generation engines cannot run without technology enablement, Marketing Operations/IT – those that are charged with enabling marketing and sales – must also be part of the decision making and implementation process of lead scoring and lead generation.

    1.1.3 Select your lead scoring team

    30 minutes

    1. The CMO and other key stakeholders should discuss and determine who will be involved in the lead scoring project.
    • Business leaders in key areas – Product Marketing, Field Marketing, Digital Marketing, Inside Sales, Sales, Marketing Ops, Product Management, and IT – should be involved.
  • Document the members of your lead scoring team in tab 1 of the Lead Scoring Workbook.
    • The size of the team will vary depending on your initiative and size of your organization.
    InputOutput
    • Stakeholders
    • List of lead scoring team members
    MaterialsParticipants
    • Lead Scoring Workbook
    • Initiative Manager
    • CMO, Sponsoring Executive
    • Departmental Leads – Sales, Marketing, Product Marketing, Product Management (and others)
    • Marketing Applications Director
    • Senior Digital Business Analyst

    Download the Lead Scoring Workbook

    Lead scoring team

    Consider the core team functions when composing the lead scoring team. Form a cross-functional team (i.e. across IT, Marketing, Sales, Service, Operations) to create a well-aligned lead management/scoring strategy. Don’t let your core team become too large when trying to include all relevant stakeholders. Carefully limit the size of the team to enable effective decision making while still including functional business units.

    Required Skills/Knowledge

    Suggested Team Members

    Business

    • Understanding of the customer
    • Understanding of brand
    • Understanding of multichannel marketing: email, events, social
    • Understanding of lead qualification
    • Field Marketing/Campaign Lead
    • Product Marketing
    • Sales Manager
    • Inside Sales Manager
    • Content Marketer/Copywriter

    IT

    • Campaign management application capabilities
    • Digital marketing
    • Marketing and sales funnel Reporting/metrics
    • Marketing Application Owners
    • CRM/Sales Application Owners
    • Marketing Analytics Owners
    • Digital Platform Owners

    Other

    • Branding/creative
    • Social
    • Change management
    • Creative Director
    • Social Media Marketer

    Step 1.2 (Optional)

    Assess Your Tech Stack for Lead Scoring

    Our model assumes you have:

    1.2.1 A marketing application/campaign management application in place that accommodates lead scoring.

    1.2.2 Lead management software integrated with the sales automation/CRM tool in the hands of Field Sales.

    1.2.3 Reporting/analytics that spans the entire lead generation pipeline/funnel.

    Refer to the following three slides if you need guidance in these areas.

    This step will walk you through the following activities:

    • Confirm that you have your tech stack in place.
    • Set up an inquiry with an Info-Tech analyst should you require guidance on evaluating lead pipeline reporting, CRM, or analytics applications.

    This step involves the following participants:

    • Stakeholders
    • Project sponsors and leaders

    Outcomes of this step

    • Understanding of what new application and technology support is required to support lead scoring.

    SoftwareReviews Advisory Insight:

    Marketers that collaborate closely with Marketing Ops/IT early in the process of lead scoring design will be best able to assess whether current marketing applications and tools can support a full lead scoring capability.

    1.2.1 Plan technology support for marketing management apps

    Work with Marketing Ops and IT early to evaluate application enablement for lead management, including scoring

    A thorough evaluation takes months – start early

    • Work closely with Marketing Operations (or the team that manages the marketing apps and digital platforms) as early as possible to socialize your approach to lead scoring.
    • Work with them on a set of updated requirements for selecting a marketing management suite or for changes to existing apps and tools to support your lead scoring approach that includes lead tracking and marketing funnel analytics.
    • Access the Info-Tech blueprint Select a Marketing Management Suite, along with analyst inquiry support during the requirements definition, vendor evaluation, and vendor selection phases. Use the SoftwareReviews Marketing Management Data Quadrant during vendor evaluation and selection.

    SoftwareReviews Marketing Management Data Quadrant

    The image contains a screenshot of the Marketing Management Data Quadrant.

    1.2.2 Plan technology support for sales opportunity management

    Work with Marketing Ops and IT early to evaluate applications for sales opportunity management

    A thorough evaluation takes months – start early

    • Work closely with Sales Operations as early as possible to socialize your approach to lead scoring and how lead management must integrate with sales opportunity management to manage the entire marketing and sales funnel management process.
    • Work with them on a set of updated requirements for selecting a sales opportunity management application that integrates with your marketing management suite or for changes to existing apps and tools to support your lead management and scoring approach that support the entire marketing and sales pipeline with analytics.

    Access the Info-Tech blueprint Select and Implement a CRM Platform, along with analyst inquiry support during the requirements definition, vendor evaluation, and vendor selection phases. Use the SoftwareReviews CRM Data Quadrant during vendor evaluation and selection.

    SoftwareReviews Customer Relationship Management Data Quadrant

    The image contains a screenshot of the SoftwareReviews Customer Relationship Management Data Quadrant.

    1.2.3 Plan analytics support for marketing pipeline analysis

    Work with Marketing Ops early to evaluate analytics tools to measure marketing and sales pipeline conversions

    A thorough evaluation takes weeks – start early

    • Work closely with Marketing and Sales Operations as early as possible to socialize your approach to measuring the lifecycle of contacts through to wins across the entire marketing and sales funnel management process.
    • Work with them on a set of updated requirements for selecting tools that can support the measurement of conversion ratios from contact to MQL, SQL, and opportunity to wins. Having this data enables you to measure improvement in component parts to your lead generation engine.
    • Access the Info-Tech blueprint Select and Implement a Reporting and Analytics Solution, along with analyst inquiry support during the requirements definition, vendor evaluation and vendor selection phases. Use the SoftwareReviews Best Business intelligence & Analytics Software Data Quadrant as well during vendor evaluation and selection.

    SoftwareReviews Business Intelligence Data Quadrant

    The image contains a screenshot of the Software Reviews Business Intelligent Quadrant.

    Step 1.3

    Catalog Your Buyer Journey and Lead Gen Engine Assets

    Activities

    1.3.1 Review marketing pipeline terminology

    1.3.2 Describe your buyer journey

    1.3.3 Describe your awareness and lead generation engine

    This step will walk you through the following activities:

    • Discuss marketing funnel terminology.
    • Describe your buyer journey.
    • Catalog the elements of your lead generation engine.

    This step involves the following participants:

    • Stakeholders

    Outcomes of this step

    • Stakeholder alignment on terminology, your buyer journey, and elements of your lead generation engine

    1.3.1 Review marketing pipeline terminology

    30 minutes

    1. We assume for this model the following:
      1. Our primary objective is to deliver more, and more-highly qualified, sales-qualified leads (SQLs) to our salesforce. The salesforce will accept SQLs and after further qualification turn them into opportunities. Sellers work opportunities and turn them into wins. Wins that had first/last touch attribution within the lead gen engine are considered marketing-influenced wins.
      2. This model assumes the existence of sales development reps (SDRs) whose mission it is to take marketing-qualified leads (MQLs) from the lead generation engine and further qualify them into SQLs.
      3. The lead generation engine takes contacts – visitors to activities, website, etc. – and scores them based on their profile and engagement. If the contact scores at or above the designated threshold, the lead generation engine rates it as an MQL and passes it along to Inside Sales/SDRs. If the contact scores above a certain threshold and shows promise, it is further nurtured. If the contact score is low, it is ignored.
    2. If an organization does not possess a team of SDRs or Inside Sales, you would adjust your version of the model to, for example, raise the threshold for MQLs, and when the threshold is reached the lead generation engine would pass the lead to Field Sales for further qualification.

    Stage

    Characteristics

    Actions

    Contact

    • Unqualified
    • No/low activity

    Nurture

    SDR Qualify

    Send to Sales

    Close

    MQL

    • Profile scores high
    • Engagement strong

    SQL

    • Profile strengthened
    • Demo/quote/next step confirmed

    Oppt’y

    • Sales acceptance
    • Sales opportunity management

    Win

    • Deal closed

    SoftwareReviews Advisory Insight:

    Score leads in a way that makes it crystal clear whether they should be ignored, further nurtured, further qualified, or go right into a sellers’ hands as a super hot lead.

    1.3.2 Describe your buyer journey

    1. Understand the concept of the buyer journey:
      1. Typically Product Marketing is charged with establishing deep understanding of the target buyer for each product or solution through a complete buyer persona and buyer journey map. The details of how to craft both are covered in the upcoming SoftwareReviews Advisory blueprint Craft a More Comprehensive Go-to-Market Strategy. However, we share our Buyer Journey Template here (on the next slide) to illustrate the connection between the buyer journey and the lead generation and scoring processes.
      2. Marketers and campaigners developing the lead scoring methodology will work closely with Product Marketing, asking them to document the buyer journey.
      3. The value of the buyer journey is to guide asset/content creation, nurturing strategy and therefore elements of the lead generation engine such as web experience, email, and social content and other elements of engagement.
      4. The additional value of having a buyer persona is to also inform the ICP, which is an essential element of lead scoring.
      5. For the purposes of lead scoring, use the template on the next slide to create a simple form of the buyer journey. This will guide lead generation engine design and the scoring of activities later in our blueprint.

    2 hours

    On the following slide:

    1. Tailor this template to suit your buyer journey. Text in green is yours to modify. Text in black is instructional.
    2. Your objective is to use the buyer journey to identify asset types and a delivery channel that once constructed/sourced and activated within your lead gen engine will support the buyer journey.
    3. Keep your buyer journey updated based on actual journeys of sales wins.
    4. Complete different buyer journeys for different product areas. Complete these collaboratively with stakeholders for alignment.

    SoftwareReviews Advisory Insight:

    Establishing a buyer journey is one of the most valuable tools that, typically, Product Marketing produces. Its use helps campaigners, product managers, and Inside and Field Sales. Leading marketers keep journeys updated based on live deals and characteristics of wins.

    Buyer Journey Template

    Personas: [Title] e.g. “BI Director”

    The image contains a screenshot of the describe persona level as an example.

    [Persona name] ([levels it includes from arrows above]) Buyer’s Journey for [solution type] Vendor Selection

    The image contains a screenshot of the Personas Type example to demonstrate a specific IT role, end use in a relevant department.

    1.3.3 Describe Your Awareness and Lead Gen Engine

    1. Understand the workings of a typical awareness and lead generation engine. Reference the image of a lead gen engine on the following slide when reviewing our guidance below:
      1. In our lead scoring example found in the Lead Scoring Workbook, tab 3, “Weight and Test,” we use a software company selling a sales automation solution, and the engagement activities match with the Typical Awareness and Lead Gen Engine found on the following slide. Our goal is to match a visual representation of a lead gen and awareness engine with the activity scoring portion of lead scoring.
      2. At the top of the Typical Awareness and Lead Generation Engine image, the activities are activated by a team of various roles: digital manager (new web pages), campaign manager (emails and paid media), social media marketer (organic and paid social), and events marketing manager (webinars).
      3. “Awareness” – On the right, the slide shows additional awareness activities driven by the PR/Corporate Comms and Analyst Relations teams.*
      4. The calls to action (CTAs) found in the outreach activities are illustrated below the timeline. The CTAs are grouped and are designed to 1) drive profile capture data via a main sales form fill, and 2) drive engagement that corresponds to the Education, Solution, and Selection buyer journey phases outlined on the prior slide. Ensure you have fast paths to get a hot lead – request a demo – directly to Field Sales when profiles score high.

    * For guidance on best practices in engaging industry analysts, contact your engagement manager to schedule an inquiry with our expert in this area. during that inquiry, we will share best practices and recommended analyst engagement models.

    Lead Scoring Workbook

    2 hours

    On the following slide:

    1. Tailor the slide to describe your lead generation engine as you will use it when you get to latter steps to describe the activities in your lead gen engine and weight them for lead scoring.
    2. Use the template to see what makes up a typical lead gen and awareness building engine. Record your current engine parts and see what you may be missing.
    3. Note: The “Goal” image in the upper right of the slide is meant as a reminder that marketers should establish a goal for SQLs delivered to Field Sales for each campaign.

    SoftwareReviews Advisory Insight:

    Marketing’s primary mission is to deliver marketing-influenced wins (MIWs) to the company. Building a compelling awareness and lead gen engine must be done with that goal in mind. Leaders are ruthless in testing – copy, email subjects, website navigation, etc. – to fine-tune the engine and staying highly collaborative with sellers to ensure high value lead delivery.

    Typical Awareness and Lead Gen Engine

    Understand how a typical lead generation engine works. Awareness activities are included as a reference. Use as a template for campaigns.

    The image contains a screenshot of a diagram to demonstrate how a lead generation engine works.

    Phase 2

    Build and Test Your Lead Scoring Model

    Phase 1

    Phase 2

    Phase 3

    1.1 Establish a cross-functional vision for lead scoring

    1.2 Asses your tech stack for lead scoring (optional)

    1.3 Catalog your buyer journey and lead gen engine assets

    2.1 Start building your lead scoring model

    2.2 Identify and verify your IPC and weightings

    2.3 Establish key lead generation activities and assets

    3.1 Apply model to your marketing management software

    3.2 Test the quality of sales-accepted leads

    3.3 Apply advanced methods

    This phase will walk you through the following activities:

    1. Understand the Lead Scoring Grid and establish thresholds.
    2. Collaborate with stakeholders on your ICP, apply weightings to profile attributes and values, and test.
    3. Identify the key activities and assets of your lead gen engine, weight attributes, and run tests.

    This phase involves the following participants:

    • Field Marketing/Campaign Manager
    • Product Marketing
    • Sales Leadership/Sales Operations
    • Inside Sales leadership
    • Marketing Operations/IT
    • Digital Platform leadership

    Step 2.1

    Start Building Your Lead Scoring Model

    Activities

    2.1.1 Understand the Lead Scoring Grid

    2.1.2 Identify thresholds

    This step will walk you through the following activities:

    • Discuss the concept of the thresholds for scoring leads in each of the various states – “ignore,” “nurture,” “qualify,” “send to sales.”
    • Open the Lead Scoring Workbook and validate your own states to suit your organization.
    • Arrive at an initial set of threshold scores.

    This step involves the following participants:

    • Stakeholders

    Outcomes of this step

    • Stakeholder alignment on stages
    • Stakeholder alignment on initial set of thresholds

    2.1.1 Understand the Lead Scoring Grid

    30 minutes

    1. Understand how lead scoring works and our grid is constructed.
    2. Understand the two important areas of the grid and the concept of how the contact’s scores will increase as follows:
      1. Profile – as the profile attributes of the contact approaches that of the ICP we want to score the contact/prospect higher. Note: Step 1.3 walks you through creating your ICP.
      2. Engagement – as the contact/prospect engages with the activities (e.g. webinars, videos, events, emails) and assets (e.g. website, whitepapers, blogs, infographics) in our lead generation engine, we want to score the contact/prospect higher. Note: You will describe your engagement activities in this step.
    3. Understand how thresholds work:
      1. Threshold percentages, when reached, trigger movement of the contact from one state to the next – “ignore,” “nurture,” “qualify with Inside Sales,” and “send to sales.”
    The image contains a screenshot of an example of the lead scoring grid, as described in the text above.

    2.1.2 Identify thresholds

    30 minutes

    We have set up a model Lead Scoring Grid – see Lead Scoring Workbook, tab 2, “Identify Thresholds.”

    Set your thresholds within the Lead Scoring Workbook:

    • Set your threshold percentages for ”Profile” and “Engagement.”
    • You will run test scenarios for each in later steps.
    • We suggest you start with the example percentages given in the Lead Scoring Workbook and plan to adjust them during testing in later steps.
    • Define the “Send to Sales,” “Qualify With Inside Sales,” “Nurture,” and “Ignore” zones.

    SoftwareReviews Advisory Insight:

    Clarify that all-important threshold for when a lead passes to your expensive and time-starved outbound sellers.

    The image contains a screenshot of the Lead Scoring Workbook, tab 2 demonstrating the Lead Scoring Grid.

    Lead Scoring Workbook

    Step 2.2

    Identify and Verify Your Ideal Customer Profile and Weightings

    Activities

    2.2.1 Identify your ideal customer profile

    2.2.2 Run tests to validate profile weightings

    This step will walk you through the following activities:

    • Identify the attributes that compose the ICP.
    • Identify the values of each attribute and their weightings.
    • Test different contact profile scenarios against what actually makes sense.
    • Adjust weightings if needed.

    This step involves the following participants:

    • Stakeholders

    Outcomes of this step

    • Stakeholder alignment on ICP
    • Stakeholder alignment on weightings given to attributes
    • Tested results to verify thresholds and cores

    2.2.1 Identify your ideal customer profile

    Collaborate with stakeholders to understand what attributes best describe your ICP. Assign weightings and subratings.

    2 hours

    1. Choose attributes such as job role, organization type, number of employees/potential seat holders, geographical location, interest area, etc., that describe the ideal profile of a target buyer. Best practice sees marketers choosing attributes based on real wins.
    2. Some marketers compare the email domain of the contact to a target list of domains. In the Lead Scoring Workbook, tab 3, “Weight and Test,” we provide an example profile for a “Sales Automation Software” ICP.
    3. Use the workbook as a template, remove our example, and create your own ICP attributes. Then weight the attributes to add up to 100%. Add in the attribute values and weight them. In the next step you will test scenarios.

    SoftwareReviews Advisory Insight:

    Marketers who align with colleagues in areas such as Product Marketing, Sales, Inside Sales, Sales Training/Enablement, and Product Managers and document the ICP give their organizations a greater probability of lead generation success.

    The image contains a screenshot of tab 3, demonstrating the weight and test with the example profile.

    Lead Scoring Workbook

    2.2.2 Run tests to validate profile weightings

    Collaborate with stakeholders to run different profile scenarios. Validate your model including thresholds.

    The image contains a screenshot of tab 3 to demonstrate the next step of running tests to validate profile weightings.

    SoftwareReviews Advisory Insight:

    Keep your model simple in the interest of fast implementation and to drive early learnings. The goal is not to be perfect but to start iterating toward success. You will update your scoring model even after going into production.

    2 hours

    1. Choose scenarios of contact/lead profile attributes by placing a “1” in the “Attribute” box shown at left.
    2. Place your estimate of how you believe the profile should score in the box to the right of “Estimated Profile State.” How does the calculated state, beneath, compare to the estimated state?
    3. In cases where the calculated state differs from your estimated state, consider weighting the profile attribute differently to match.
    4. If you find estimates and calculated states off dramatically, consider changing previously determined thresholds in tab 2, “Identify Thresholds.” Test multiple scenarios with your team.

    Lead Scoring Workbook

    Step 2.3

    Establish Key Lead Generation Activities and Assets

    Activities

    2.3.1 Establish activities, attribute values, and weights

    2.3.2 Run tests to evaluate activity ratings

    This step will walk you through the following activities:

    • Identify the activities/asset types in your lead gen engine.
    • Weight each attribute and define values to score for each one.
    • Run tests to ensure your model makes sense.

    This step involves the following participants:

    • Stakeholders
    • Project sponsors and leaders

    Outcomes of this step

    • Final stakeholder alignment on which assets compose your lead generation engine
    • Scoring model tested

    2.3.1 Establish activities, attribute values, and weights

    2 hours

    1. Catalog the assets and activities that compose your lead generation engine outlined in Activity 1.3.3. Identify their attribute values and weight them accordingly.
    2. Consider weighting attributes and values according to how close that asset gets to conveying your ideal call to action. For example, if your ideal CTA is “schedule a demo” and the “click” was submitted in the last seven days, it scores 100%. Take time decay into consideration. If that same click was 60 days ago, it scores less – maybe 60%.
    3. Different assets convey different intent and therefore command different weightings; a video comparing your offering against the competition, considered a down funnel asset, scores higher than the company video, considered a top-of-the-funnel activity and “awareness.”
    The image contains a screenshot of the next step of establishing activities, attribute values, and weights.

    Lead Scoring Workbook

    2.3.2 Run tests to validate activity weightings

    Collaborate with stakeholders to run different engagement scenarios. Validate your model including thresholds.

    The image contains a screenshot of activity 2.3.2: run tests to validate activity weightings.

    SoftwareReviews Advisory Insight:

    Use data from actual closed deals and the underlying activities to build your model – nothing like using facts to inform your key decisions. Use common sense and keep things simple. Then update further when data from new wins appears.

    2 hours

    1. Test scenarios of contact engagement by placing a “1” in the “Attribute” box shown at left.
    2. Place your estimate of how you believe the engagement should score in the box to the right of “Estimated Engagement State.” How does the calculated state, beneath, compare to the estimated state?
    3. In cases where the calculated state differs from your estimated state, consider weighting the activity attribute differently to match.
    4. If you find that the estimates and calculated states are off dramatically, consider changing previously determined thresholds in tab 2, “Identify Thresholds.” Test multiple scenarios with your team.

    Lead Scoring Workbook

    Phase 3

    Apply Your Model to Marketing Apps and Go Live With Better Qualified Leads

    Phase 1

    Phase 2

    Phase 3

    1.1 Establish a cross-functional vision for lead scoring

    1.2 Asses your tech stack for lead scoring (optional)

    1.3 Catalog your buyer journey and lead gen engine assets

    2.1 Start building your lead scoring model

    2.2 Identify and verify your IPC and weightings

    2.3 Establish key lead generation activities and assets

    3.1 Apply model to your marketing management software

    3.2 Test the quality of sales-accepted leads

    3.3 Apply advanced methods

    This phase will walk you through the following activities:

    1. Apply model to your marketing management/campaign management software.
    2. Get better qualified leads in the hands of sellers.
    3. Apply lead nurturing and other advanced methods.

    This phase involves the following participants:

    • Field Marketing/Campaign Manager
    • Sales Leadership/Sales Operations
    • Inside Sales leadership
    • Marketing Operations/IT
    • Digital Platform leadership

    Step 3.1

    Apply Model to Your Marketing Management Software

    Activities

    3.1.1 Apply final model to your lead management software

    This step will walk you through the following activities:

    • Apply the details of your scoring model to the lead management software.

    This step involves the following participants:

    • Stakeholders
    • Project sponsors and leaders

    Outcomes of this step

    • Marketing management software or campaign management application is now set up/updated with your lead scoring approach.

    3.1.1 Apply final model to your lead management software

    Now that your model is complete and ready to go into production, input your lead scoring parameters into your lead management software.

    The image contains a screenshot of activity 3.1.1 demonstrating tab 4 of the Lead Scoring Workbook.

    3 hours

    1. Go to the Lead Scoring Workbook, tab 4, “Model Summary” for a formatted version of your lead scoring model. Double-check print formatting and print off a copy.
    2. Use the copy of your model to show to prospective technology providers when asking them to demonstrate their lead scoring capabilities.
    3. Once you have finalized your model, use the printed output from this tab to ease your process of transposing the corresponding model elements into your lead management software.

    Lead Scoring Workbook

    Step 3.2

    Test the Quality of Sales-Accepted Leads

    Activities

    3.2.1 Achieve sales lead acceptance

    3.2.2 Measure and optimize

    This step will walk you through the following activities:

    • Suggest that the Inside Sales and Field Sales teams should assess whether to sign off on quality of leads received.
    • Campaign managers and stakeholders should now be able to track lead status more effectively.

    This step involves the following participants:

    • Stakeholders
    • Project sponsors and leaders

    Outcomes of this step

    • Sales leadership should be able to sign off that leads are better qualified.
    • With marketing pipeline analytics in place, campaigners can start to measure lead flow and conversion rates.

    3.2.1 Achieve sales lead acceptance

    Collaborate with sellers to validate your lead scoring approach.

    1 hour

    1. Gather a set of SQLs – leads that have been qualified by Inside Sales and delivered to Field Sales. Have Field Sales team members convey whether these leads were properly qualified.
    2. Where leads are deemed not properly qualified, determine if the issue was a) a lack of proper qualification by the Inside Sales team, or b) the lead generation engine, which should have further nurtured the lead or ignored it outright.
    3. Work collaboratively with Inside Sales to update your lead scoring model and/or Inside Sales practice.

    Stage

    Characteristics

    Actions

    Contact

    • Unqualified
    • No/low activity

    Nurture

    SDR Qualify

    Send to Sales

    Close

    MQL

    • Profile scores high
    • Engagement strong

    SQL

    • Profile strengthened
    • Demo/quote/next step confirmed

    Oppt’y

    • Sales acceptance
    • Sales opportunity management

    Win

    • Deal closed

    SoftwareReviews Advisory Insight:

    Marketers that collaborate with Sales – and in this case, a group of sellers as a sales advisory team – well in advance of sales acceptance to design lead scoring will save time during this stage, build trust with sellers, and make faster decisions related to lead management/scoring.

    3.2.2 Measure and optimize

    Leverage analytics that help you optimize your lead scoring methodology.

    Ongoing

    1. Work with Marketing Ops/IT team to design and implement analytics that enable you to:
    2. Meet frequently with your stakeholder team to review results.
    3. Learn from the wins: see how they actually scored and adjust thresholds and/or asset/activity weightings.
    4. Learn from losses: fix ineffective scoring, activities, assets, form-fill strategies, and engagement paths.
    5. Test from both wins and losses if demographic weightings are delivering accurate scores.
    6. Analyze those high scoring leads that went right to sellers but did not close. This could point to a sales training or enablement challenge.
    The image contains a screenshot of the lead scoring dashboard.

    Analytics will also drive additional key insights across your lead gen engine:

    • Are volumes increasing or decreasing? What percentage of leads are in what status (A1-D4)?
    • What nurturing will re-engage stalled leads that score high in profile but low in engagement (A3, B3)?
    • Will additional profile data capture further qualify leads with high engagement (C1, C2)?
    • And beyond all of the above, what leads move to Inside Sales and convert to SQLs, opportunities, and eventually marketing-influenced wins?

    Step 3.3

    Apply Advanced Methods

    Activities

    3.3.1 Employ lead nurturing strategies

    3.3.2 Adjust your model over time to accommodate more advanced methods

    This step will walk you through the following activities:

    • Apply lead nurturing to your lead gen engine.
    • Adjust your engine over time with more advanced methods.

    This step involves the following participants:

    • Stakeholders
    • Project sponsors and leaders

    Outcomes of this step

    • Marketers can begin to test lead nurturing strategies and other advanced methods.

    3.3.1 Employ lead nurturing strategies

    A robust content marketing competence with compelling assets and the capture of additional profile data for qualification are key elements of your nurturing strategy.

    The image contains a screenshot of the Lead Scoring Grid with a focus on Nurture.

    SoftwareReviews Advisory Insight:

    Nurturing success combines the art of crafting engaging copy/experiences and the science of knowing just where a prospect is within your lead gen engine. Great B2B marketers demonstrate the discipline of knowing when to drive engagement and/or additional profile attribute capture using intent while not losing the prospect to over-profiling.

    Ongoing

    1. The goal of lead nurturing is to move the collection of contacts/leads that are scoring, for example, in the A3, B3, C1, C2, and C3 cells into A2, B2, and B1 cells.
    2. How is this best done? To nurture leads that are A3 and B3, entice the prospect with engagement that leads to the bottom of funnel – e.g. “schedule a demo” or “schedule a consultation” via a compelling asset. See the example on the following slide.
    3. To nurture C1 and C2, we need to qualify them further, so entice with an asset that leads to deeper profile knowledge.
    4. For C3 leads, we need both profile and activity nurturing.

    Lead nurturing example

    The image contains an example of a lead nurturing example.

    SoftwareReviews Advisory Insight:

    When nurturing, choose/design content as to what “intent” it satisfies. For example, a head-to-head comparison with a key competitor signals “Selection” phase of the buyer journey. Content that helps determine what app-type to buy signals “Solution”. A company video, or a webinar replay, may mean your buyer is “educating themselves.

    3.3.2 Adjust your model over time to accommodate more advanced methods

    When getting started or within a smaller marketing team, focus on the basics outlined thus far in this blueprint. Larger and/or more experienced teams are able to employ more advanced methods.

    Ongoing

    Advanced Methods

    • Invest in technologies that interpret lead scores and trigger next-step actions, especially outreach by Inside and/or Field Sales.
    • Use the above to route into nurturing environments where additional engagement will raise scores and trigger action.
    • Recognize that lead value decays with time to time additional outreach/activities and to reduce lead scores over time.
    • Always be testing different engagement, copy, and subsequent activities to optimize lead velocity through your lead gen engine.
    • Build intent sensitivity into engagement activities; e.g. test if longer demo video engagement times imply ”contact me for a demo” via a qualification outreach. Update scores manually to drive learnings.
    • Vary engagement paths by demographics to deliver unique digital experiences. Use firmographics/email domain to drive leads through a more tailored account-based marketing (ABM) experience.
    • Reapply learnings from closed opportunities/wins to drive updates to buyer journey mapping and your ICP.

    Frequently used acronyms

    ABM

    Account-Based Marketing

    B2B

    Business to Business

    CMO

    Chief Marketing Officer

    CRM

    Customer Relationship Management

    ICP

    Ideal Customer Profile

    MIW

    Marketing-Influenced Win

    MQL

    Marketing-Qualified Lead

    SDR

    Sales Development Representative

    SQL

    Sales-Qualified Lead

    Works cited

    Arora, Rajat. “Mining the Real Gems from you Data – Lead Scoring and Engagement Scoring.” LeadSquared, 27 Sept. 2014. Web.

    Doyle, Jen. “2012 B2B Marketing Benchmark Report: Research and insights on attracting and converting the modern B2B buyer.” MarketingSherpa, 2012. Web.

    Doyle, Jen, and Sergio Balegno. “2011 MarketingSherpa B2B Marketing Benchmark Survey: Research and Insights on Elevating Marketing Effectiveness from Lead Generation to Sales Conversion.” MarketingSherpa, 2011.

    Kirkpatrick, David. “Lead Scoring: CMOs realize a 138% lead gen ROI … and so can you.” marketingsherpa blog, 26 Jan 2012. Web.

    Moser, Jeremy. “Lead Scoring Is Important for Your Business: Here’s How to Create Scoring Model and Hand-Off Strategy.” BigCommerce, 25 Feb. 2019. Web.

    Strawn, Joey. “Why Lead Scoring Is Important for B2Bs (and How You Can Implement It for Your Company.” IndustrialMarketer.com, 17 Aug. 2016. Web.

    Incident Management for Small Enterprise

    • Buy Link or Shortcode: {j2store}482|cart{/j2store}
    • member rating overall impact: 10.0/10 Overall Impact
    • member rating average dollars saved: $6,531 Average $ Saved
    • member rating average days saved: 3 Average Days Saved
    • Parent Category Name: Incident & Problem Management
    • Parent Category Link: /incident-and-problem-management
    • Technical debt and disparate systems are big constraints for most small enterprise (SE) organizations. What may have worked years ago is no longer fit for purpose or the business is growing faster than the current tools in place can handle.
    • Super specialization of knowledge is also a common factor in smaller teams caused by complex architectures. While helpful, if that knowledge isn’t documented it can walk out the door with the resource and the rest of the team is left scrambling.
    • Lessons learned may be gathered for critical incidents but often are not propagated, which impacts the ability to solve recurring incidents.
    • Over time, repeated incidents can have a negative impact on the customer’s perception that the service desk is a credible and essential service to the business.

    Our Advice

    Critical Insight

    • Go beyond the blind adoption of best-practice frameworks. No simple formula exists for improving incident management maturity. Identify the challenges in your incident lifecycle and draw on best-practice frameworks pragmatically to build a structured response to those challenges.
    • Track, analyze, and review results of incident response regularly. Without a comprehensive understanding of incident trends and patterns you can be susceptible to recurring incidents that increase in damage over time. Make the case for problem management, and successfully reduce the volume of unplanned work by scheduling it into regular IT activity.
    • Recurring incidents will happen; use runbooks for a consistent response each time. Save your organization response time and confusion by developing your own specific incident use cases. Incident response should follow a standard process, but each incident will have its own escalation process or call tree that identifies key participants.

    Impact and Result

    • Effective and efficient management of incidents involves a formal process of identifying, classifying, categorizing, responding, resolving, and closing of each incident. The key for smaller organizations, where technology or resources is a constraint, is to make the best practices usable for your unique environment.
    • Develop a plan that aligns with your organizational needs, and adapt best practices into light, sustainable processes, with the goal to improve time to resolve, cost to serve, and ultimately, end-user satisfaction.
    • Successful implementation of incident management will elevate the maturity of the service desk to a controlled state, preparing you for becoming proactive with problem management.

    Incident Management for Small Enterprise Research & Tools

    Start here – read the Executive Brief

    Read our concise Executive Brief to find out why you should implement incident management, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. Identify and log incidents

    This phase will provide an overview of the incident lifecycle and an activity on how to classify the various types of incidents in your environment.

    • Service Desk Standard Operating Procedure
    • Incident Management Workflow Library (Visio)
    • Incident Management Workflow Library (PDF)

    2. Prioritize and define SLAs

    This phase will help you develop a categorization scheme for incident handling that ensures success and keeps it simple. It will also help you identify the most important runbooks necessary to create first.

    • Service Desk Ticket Categorization Schemes
    • IT Incident Runbook Prioritization Tool
    • IT Incident Management Runbook Blank Template

    3. Respond, recover, and close incidents

    This phase will help you identify how to use a knowledgebase to resolve incidents quicker. Identify what needs to be answered during a post-incident review and identify the criteria needed to invoke problem management.

    • Knowledgebase Article Template
    • Root-Cause Analysis Template
    • Post-Incident Review Questions Tracking Tool
    [infographic]

    Workshop: Incident Management for Small Enterprise

    Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

    1 Assess the Current State

    The Purpose

    Assess the current state of the incident management lifecycle within the organization.

    Key Benefits Achieved

    Understand the incident lifecycle and how to classify them in your environment.

    Identify the roles and responsibilities of the incident response team.

    Document the incident workflows to identify areas of opportunities.

    Activities

    1.1 Outline your incident lifecycle challenges.

    1.2 Identify and classify incidents.

    1.3 Identify roles and responsibilities for incident handling.

    1.4 Design normal and critical incident workflows for target state.

    Outputs

    List of incident challenges for each phase of the incident lifecycle

    Incident classification scheme mapped to resolution team

    RACI chart

    Incident Workflow Library

    2 Define the Target State

    The Purpose

    Design or improve upon current incident and ticket categorization schemes, priority, and impact.

    Key Benefits Achieved

    List of the most important runbooks necessary to create first and a usable template to go forward with

    Activities

    2.1 Improve incident categorization scheme.

    2.2 Prioritize and define SLAs.

    2.3 Understand the purpose of runbooks and prioritize development.

    2.4 Develop a runbook template.

    Outputs

    Revised ticket categorization scheme

    Prioritization matrix based on impact and urgency

    IT Incident Runbook Prioritization Tool

    Top priority incident runbook

    3 Bridge the Gap

    The Purpose

    Respond, recover, and close incidents with root-cause analysis, knowledgebase, and incident runbooks.

    Key Benefits Achieved

    This module will help you to identify how to use a knowledgebase to resolve quicker.

    Identify what needs to be answered during a post-incident review.

    Identify criteria to invoke problem management.

    Activities

    3.1 Build a targeted knowledgebase.

    3.2 Build a post-incident review process.

    3.3 Identify metrics to track success.

    3.4 Build an incident matching process.

    Outputs

    Working knowledgebase template

    Root-cause analysis template and post-incident review checklist

    List of metrics

    Develop criteria for problem management

    Hire or Develop a World-Class CISO

    • Buy Link or Shortcode: {j2store}243|cart{/j2store}
    • member rating overall impact: N/A
    • member rating average dollars saved: N/A
    • member rating average days saved: N/A
    • Parent Category Name: Security Strategy & Budgeting
    • Parent Category Link: /security-strategy-and-budgeting
    • It is difficult to find a “unicorn”: a candidate who is already fully developed in all areas.
    • The role of the CISO has changed so much in the past three years, it is unclear what competencies are most important.
    • Current CISOs need to scope out areas of future development.

    Our Advice

    Critical Insight

    The new security leader must be strategic, striking a balance between being tactical and taking a proactive security stance. They must incorporate security into business practices from day one and enable secure adoption of new technologies and business practices.

    Impact and Result

    • Clarify the competencies that are important to your organizational needs and use them to find a candidate with those specific strengths.
    • If you are a current CISO, complete a self-assessment and identify your high-priority competency gaps so you can actively work to develop those areas.
    • Create an actionable plan to develop the CISO’s capabilities and regularly reassess these items to ensure constant improvement.

    Hire or Develop a World-Class CISO Research & Tools

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. Hire of Develop a World-Class CISO Deck – A step-by-step guide on finding or developing the CISO that best fits your organization.

    Use this blueprint to hire or develop a world-class Chief Information Security Officer (CISO) with the competencies that suit your specific organizational needs. Once you have identified the right candidate, create a plan to develop your CISO.

    • Hire or Develop a World-Class CISO – Phases 1-4

    2. CISO Core Competency Evaluation Tool – Determine which competencies your organization needs and which competencies your CISO needs to work on.

    This tool will help you determine which competencies are a priority for your organizational needs and which competencies your CISO needs to develop.

    • CISO Core Competency Evaluation Tool

    3. CISO Stakeholder Power Map Template – Visualize stakeholder and CISO relationships.

    Use this template to identify stakeholders who are key to your security initiatives and to understand your relationships with them.

    • CISO Stakeholder Power Map Template

    4. CISO Stakeholder Management Strategy Template – Develop a strategy to improve stakeholder and CISO relationships.

    Create a strategy to cultivate your stakeholder relationships and manage each relationship in the most effective way.

    • CISO Stakeholder Management Strategy Template

    5. CISO Development Plan Template – Develop a plan to support a world-class CISO.

    This tool will help you create and implement a plan to remediate competency gaps.

    • CISO Development Plan Template

    Infographic

    Further reading

    Hire or Develop a World-Class CISO

    Find a strategic and security-focused champion for your business.

    Analyst Perspective

    Create a plan to become the security leader of tomorrow

    The days are gone when the security leader can stay at a desk and watch the perimeter. The rapidly increasing sophistication of technology, and of attackers, has changed the landscape so that a successful information security program must be elastic, nimble, and tailored to the organization’s specific needs.

    The Chief Information Security Officer (CISO) is tasked with leading this modern security program, and this individual must truly be a Chief Officer, with a finger on the pulses of the business and security processes at the same time. The modern, strategic CISO must be a master of all trades.

    A world-class CISO is a business enabler who finds creative ways for the business to take on innovative processes that provide a competitive advantage and, most importantly, to do so securely.

    Cameron Smith, Research Lead, Security and Privacy

    Cameron Smith
    Research Lead, Security & Privacy
    Info-Tech Research Group

    Executive Summary

    Your Challenge

    • CEOs/CXOs are looking to hire or develop a senior security leader and aren’t sure where to start.
    • Conversely, security practitioners are looking to upgrade their skill set and are equally stuck in terms of what an appropriate starting point is.
    • Organizations are looking to optimize their security plans and move from a tactical position to a more strategic one.

    Common Obstacles

    • It is difficult to find a “unicorn”: a candidate who is already fully developed in all areas.
    • The role of the CISO has changed so much in the past three years, it is unclear what competencies are most important.
    • You are a current CISO and need to scope out your areas of future development.

    Info-Tech’s Approach

    • Clarify the competencies that are important to your organizational needs and use them to find a candidate with those specific strengths.
    • If you are a current CISO, complete a self-assessment and identify your high-priority competency gaps so you can actively work to develop those areas.
    • Create an actionable plan to develop the CISO’s capabilities and regularly reassess these items to ensure constant improvement.

    Info-Tech Insight
    The new security leader must be strategic, striking a balance between being tactical and taking a proactive security stance. They must incorporate security into business practices from day one and enable secure adoption of new technologies and business practices.

    Your challenge

    This Info-Tech blueprint will help you hire and develop a strategic CISO

    • Security without strategy is a hacker’s paradise.
    • The outdated model of information security is tactical, where security acts as a watchdog and responds.
    • The new security leader must be strategic, striking a balance between being tactical and taking a proactive security stance. They must incorporate security into business practices from day one and enable secure adoption of new technologies and business practices.

    Around one in five organizations don’t have an individual with the sole responsibility for security1

    1 Navisite

    Info-Tech Insight
    Assigning security responsibilities to departments other than security can lead to conflicts of interest.

    Common obstacles

    It can be difficult to find the right CISO for your organization

    • The smaller the organization, the less likely it will have a CISO or equivalent position.
    • Because there is a shortage of qualified candidates, qualified CISOs can demand high salaries and many CISO positions will go unfilled.
    • It is easier for larger companies to attract top CISO talent, as they generally have more resources available.

    Source: Navisite

    Only 36% of small businesses have a CISO (or equivalent position).

    48% of mid-sized businesses have a CISO.

    90% of large organizations have a CISO.

    Source: Navisite

    Strategic versus tactical

    CISOs should provide leadership based on a strategic vision 1

    Strategic CISO Tactical CISO

    Proactive

    Focus is on protecting hyperdistributed business processes and data

    Elastic, flexible, and nimble

    Engaged in business design decisions

    Speaks the language of the audience (e.g. business, financial, technical)

    Reactive

    Focus is on protecting current state

    Perimeter and IT-centric approach

    Communicates with technical jargon

    1 Journal of Computer Science and Information Technology

    Info-Tech has identified three key behaviors of the world-class CISO

    To determine what is required from tomorrow’s security leader, Info-Tech examined the core behaviors that make a world-class CISO. These are the three areas that a CISO engages with and excels in.

    Later in this blueprint, we will review the competencies and skills that are required for your CISO to perform these behaviors at a high level.

    Align

    Aligning security enablement with business requirements

    Enable

    Enabling a culture of risk management

    Manage

    Managing talent and change

    Info-Tech Insight
    Through these three overarching behaviors, you can enable a security culture that is aligned to the business and make security elastic, flexible, and nimble to maintain the business processes.

    Info-Tech’s approach

    Understand what your organization needs in a CISO: Consider the core competencies of a CISO. Assess: Assess candidates' core competencies and the CISO's stakeholder relationships. Plan improvements: Identify resources to close competency gaps and an approach to improve stakeholder relationships. Executive development: Decide next steps to support your CISO moving forward and regularly reassess to measure progress.

    Info-Tech’s methodology to Develop or Hire a World-Class CISO

    1. Launch 2. Assess 3. Plan 4. Execute
    Phase Steps
    1. Understand the core competencies
    2. Measure security and business satisfaction and alignment
    1. Assess stakeholder relationships
    2. Assess core competencies
    1. Identify resources to address your CISO’s competency gaps
    2. Plan an approach to improve stakeholder relationships
    1. Decide next actions and support your CISO moving forward
    2. Regularly reassess to measure development and progress
    Phase Outcomes

    At the end of this phase, you will have:

    • Determined the current gaps in satisfaction and business alignment for your IT security program.
    • Identified the desired qualities in a security leader, specific to your current organizational needs.

    At the end of this phase, you will have:

    • Used the core competencies to help identify the ideal candidate.
    • Identified areas for development in your new or existing CISO.
    • Determined stakeholder relationships to cultivate.

    At the end of this phase, you will have:

    • Created a high-level plan to address any deficiencies.
    • Improved stakeholder relations.

    At the end of this phase, you will have:

    • Created an action-based development plan, including relevant metrics, due dates, and identified stakeholders. This plan is the beginning, not the end. Continually reassessing your organizational needs and revisiting this blueprint’s method will ensure ongoing development.

    Blueprint deliverables

    Each step of this blueprint is accompanied by supporting deliverables to help you accomplish your goals:

    CISO Core Competency Evaluation Tool

    Assess the competency levels of a current or prospective CISO and identify areas for improvement.

    Stakeholder Power Map Template

    Visualize the importance of various stakeholders and their concerns.

    Stakeholder Management Strategy Template

    Document a plan to manage stakeholders and track actions.

    Key deliverable:

    CISO Development Plan Template

    The CISO Development Plan Template is used to map specific activities and time frames for competency development to address gaps and achieve your goal.

    Strategic competencies will benefit the organization and the CISO

    Career development should not be seen as an individual effort. By understanding the personal core competencies that Info-Tech has identified, the individual wins by developing relevant new skills and the organization wins because the CISO provides increased value.

    Organizational Benefits Individual Benefits
    • Increased alignment between security and business objectives
    • Development of information security that is elastic, nimble, and flexible for the business
    • Reduction in wasted efforts and resources, and improvement in efficiency of security and the organization as a whole
    • True synergy between security and business stakeholders, where the goals of both groups are being met
    • Increased opportunity as you become a trusted partner within your organization
    • Improved relationships with peers and stakeholders
    • Less resistance and more support for security initiatives
    • More involvement and a stronger role for security at all levels of the organization

    Measured value of a world-class CISO

    Organizations with a CISO saw an average of $145,000 less in data breach costs.1

    However, we aren’t talking about hiring just any CISO. This blueprint seeks to develop your CISO’s competencies and reach a new level of effectiveness.

    Organizations invest a median of around $375,000 annually in their CISO.2 The CISO would have to be only 4% more effective to represent $15,000 more value from this position. This would offset the cost of an Info-Tech workshop, and this conservative estimate pales in comparison to the tangible and intangible savings as shown below.

    Your specific benefits will depend on many factors, but the value of protecting your reputation, adopting new and secure revenue opportunities, and preventing breaches cannot be overstated. There is a reason that investment in information security is on the rise: Organizations are realizing that the payoff is immense and the effort is worthwhile.

    Tangible cost savings from having a world-class CISO Intangible cost savings from having a world-class CISO
    • Cost savings from incident reduction.
    • Cost savings achieved through optimizing information security investments, resulting in savings from previously misdiagnosed issues.
    • Cost savings from ensuring that dollars spent on security initiatives support business strategy.
    • More opportunities to create new business processes through greater alignment between security and business.
    • Improved reputation and brand equity achieved through a proper evaluation of the organization’s security posture.
    • Continuous improvement achieved through a good security assessment and measurement strategy.
    • Ability to plan for the future since less security time will be spent firefighting and more time will be spent engaged with key stakeholders.

    1 IBM Security
    2 Heidrick & Struggles International, Inc.

    Case Study

    In the middle of difficulty lies opportunity

    SOURCE
    Kyle Kennedy
    CISO, CyberSN.com

    Challenge
    The security program identified vulnerabilities at the database layer that needed to be addressed.

    The decision was made to move to a new vendor. There were multiple options, but the best option in the CISO’s opinion was a substantially more expensive service that provided more robust protection and more control features.

    The CISO faced the challenge of convincing the board to make a financial investment in his IT security initiative to implement this new software.

    Solution
    The CISO knew he needed to express this challenge (and his solution!) in a way that was meaningful for the executive stakeholders.

    He identified that the business has $100 million in revenue that would move through this data stream. This new software would help to ensure the security of all these transactions, which they would lose in the event of a breach.

    Furthermore, the CISO identified new business plans in the planning stage that could be protected under this initiative.

    Results
    The CISO was able to gain support for and implement the new database platform, which was able to protect current assets more securely than before. Also, the CISO allowed new revenue streams to be created securely.

    This approach is the opposite of the cautionary tales that make news headlines, where new revenue streams are created before systems are put in place to secure them.

    This proactive approach is the core of the world-class CISO.

    Info-Tech offers various levels of support to best suit your needs

    Guided Implementation

    What does a typical GI on this topic look like?

    Launch Assess Plan Execute

    Call #1: Review and discuss CISO core competencies.

    Call #2: Discuss Security Business Satisfaction and Alignment diagnostic results.

    Call #3: Discuss the CISO Stakeholder Power Map Template and the importance of relationships.

    Call #4: Discuss the CISO Core Competency Evaluation Tool.

    Call #5: Discuss results of the CISO Core Competency Evaluation and identify resources to close gaps.

    Call #6: Review organizational structure and key stakeholder relationships.

    Call #7: Discuss and create your CISO development plan and track your development

    A Guided Implementation (GI) is a series of calls with an Info-Tech analyst to help implement our best practices in your organization.

    A typical GI is 6 to 10 calls over the course of 3 to 6 months.

    Phase 1

    Launch

    Phase 1
    1.1 Understand Core Competencies
    1.2 Measure Security and Business Satisfaction and Alignment

    Phase 2
    2.1 Assess Stakeholder Relationships
    2.2 Assess the Core Competencies

    Phase 3
    3.1 Identify Resources to Address Competency Gaps
    3.2 Plan Approach to Improve Stakeholder Relationships

    Phase 4
    4.1 Decide Next Actions and Support Your CISO Moving Forward
    4.2 Regularly Reassess to Measure Development and Progress

    This phase will walk you through the following activities:

    • Review and understand the core competencies of a world-class CISO.
    • Launch your diagnostic survey.
    • Evaluate current business satisfaction with IT security.
    • Determine the competencies that are valuable to your IT security program’s needs.

    Hire or Develop a World-Class CISO

    Case study

    Mark Lester
    InfoSec Manager, SC Ports Authority

    An organization hires a new Information Security Manager into a static and well-established IT department.

    Situation: The organization acknowledges the need for improved information security, but there is no framework for the Security Manager to make successful changes.

    Challenges Next Steps
    • The Security Manager is an outsider in a company with well-established habits and protocols. He is tasked with revamping the security strategy to create unified threat management.
    • Initial proposals for information security improvements are rejected by executives. It is a challenge to implement changes or gain support for new initiatives.
    • The Security Manager will engage with individuals in the organization to learn about the culture and what is important to them.
    • He will assess existing misalignments in the business so that he can target problems causing real pains to individuals.

    Follow this case study throughout the deck to see this organization’s results

    Step 1.1

    Understand the Core Competencies of a World-Class CISO

    Activities

    Review core competencies the security leader must develop to become a strategic business partner

    This step involves the following participants:

    • CEO or other executive seeking to hire/develop a CISO

    or

    • Current CISO seeking to upgrade capabilities

    Outcomes of this step
    Analysis and understanding of the eight strategic CISO competencies required to become a business partner

    Launch

    Core competencies

    Info-Tech has identified eight core competencies affecting the CISO’s progression to becoming a strategic business partner.

    Business Acumen
    A CISO must focus primarily on the needs of the business.

    Leadership
    A CISO must be a security leader and not simply a practitioner.

    Communication
    A CISO must have executive communication skills

    Technical Knowledge
    A CISO must have a broad technical understanding.

    Innovative Problem Solving
    A good CISO doesn’t just say “no,” but rather finds creative ways to say “yes.”

    Vendor Management
    Vendor and financial management skills are critical to becoming a strategic CISO.

    Change Management
    A CISO improves security processes by being an agent of change for the organization.

    Collaboration
    A CISO must be able to use alliances and partnerships strategically.

    1.1 Understand the core competencies a CISO must focus on to become a strategic business partner

    < 1 hour

    Over the next few slides, review each world-class CISO core competency. In Step 1.2, you will determine which competencies are a priority for your organization.

    CISO Competencies Description
    Business Acumen

    A CISO must focus primarily on the needs of the business and how the business works, then determine how to align IT security initiatives to support business initiatives. This includes:

    • Contributing to business growth with an understanding of the industry, core functions, products, services, customers, and competitors.
    • Understanding the business’ strategic direction and allowing it to securely capitalize on opportunities.
    • Understanding the key drivers of business performance and the use of sound business practice.
    Leadership

    A CISO must be a security leader, and not simply a practitioner. This requires:

    • Developing a holistic view of security, risk, and compliance for the organization.
    • Fostering a culture of risk management.
    • Choosing a strong team. Having innovative and reliable employees who do quality work is a critical component of an effective department.
      • This aspect involves identifying talent, engaging your staff, and managing their time and abilities.

    1.1 Understand the core competencies (continued)

    CISO Competencies Description
    Communication

    Many CISOs believe that using technical jargon impresses their business stakeholders – in fact, it only makes business stakeholders become confused and disinterested. A CISO must have executive communication skills. This involves:

    • Clearly communicating with business leaders in meaningful language (i.e. business, financial, social) that they understand by breaking down the complexities of IT security into simple and relatable concepts.
    • Not using acronyms or technological speak. Easy-to-understand translations will go a long way.
    • Strong public speaking and presentation abilities.
    Technical Knowledge

    A CISO must have a broad technical understanding of IT security to oversee a successful security program. This includes:

    • Understanding key security and general IT technologies and processes.
    • Assembling a complementary team, because no individual can have deep knowledge in all areas.
    • Maintaining continuing education to stay on top of emerging technologies and threats.

    1.1 Understand the core competencies (continued)

    CISO Competencies Description
    Innovative Problem Solving

    A good CISO doesn’t just say “no,” but rather finds creative ways to say “yes.” This can include:

    • Taking an active role in seizing opportunities created by emerging technologies.
    • Facilitating the secure implementation of new, innovative revenue models.
    • Developing solutions for complex business problems that require creativity and ingenuity.
    • Using information and technology to drive value around the customer experience.
    Vendor Management

    With the growing use of “anything as a service,” negotiation, vendor, and financial management skills are critical to becoming a strategic CISO.

    • The CISO must be able to evaluate service offerings and secure favorable contracts with the right provider. It is about extracting the maximum value from vendors for the dollars you are spending.
    • Vendor products must be aligned with future business plans to create maximum ongoing value.
    • The CISO must develop financial management skills. This includes the ability to calculate total cost of ownership, return on investment, and project spending over multiyear business plans.

    1.1 Understand the core competencies (continued)

    CISO Competencies Description
    Change Management

    A world-class CISO improves security processes by being an agent of change for the organization. This involves:

    • Leading, guiding, and motivating teams to adopt a responsible risk management culture.
    • Communicating important and complex ideas in a persuasive way.
    • Demonstrating an ability to change themselves and taking the initiative in adopting more efficient behaviors.
    • Handling unplanned change, such as unforeseen attacks or personnel changes, in a professional and proactive manner.
    Collaboration

    A CISO must be able to use alliances and partnerships strategically to benefit both the business and themselves. This includes:

    • Identifying formal and informal networks and constructive relationships to enable security development.
    • Leveraging stakeholders to influence positive outcomes for the organization.
    • Getting out of the IT or IT security sphere and engaging relationships in diverse areas of the organization.

    Step 1.2

    Evaluate satisfaction and alignment between the business and IT security

    Activities

    • Conduct the Information Security Business Satisfaction and Alignment diagnostic
    • Use your results as input into the CISO Core Competency Evaluation Tool

    This step involves the following participants:

    • CEO or other executive seeking to hire/develop a CISO

    or

    • Current CISO seeking to upgrade capabilities

    Outcomes of this step
    Determine current gaps in satisfaction and alignment between information security and your organization.

    If seeking to hire/develop a CISO: Your diagnostic results will help develop a profile of the ideal CISO candidate to use as a hiring and interview guide.

    If developing a current CISO, use your diagnostic results to identify existing competency gaps and target them for improvement.

    For the CISO seeking to upgrade capabilities: Use the core competencies guide to self-assess and identify competencies that require improvement.

    Launch

    1.2 Get started by conducting Info-Tech’s Information Security Business Satisfaction and Alignment diagnostic

    Suggested Time: One week for distribution, completion, and collection of surveys
    One-hour follow-up with an Info-Tech analyst

    The primary goal of IT security is to protect the organization from threats. This does not simply mean bolting everything down, but it means enabling business processes securely. To do this effectively requires alignment between IT security and the overall business.

    • Once you have completed the diagnostic, call Info-Tech to review your results with one of our analysts.
    • The results from this assessment will provide insights to inform your entries in the CISO Core Competency Evaluation Tool.

    Call an analyst to review your results and provide you with recommendations.

    Info-Tech Insight
    Focus on the high-priority competencies for your organization. You may find a candidate with perfect 10s across the board, but a more pragmatic strategy is to find someone with strengths that align with your needs. If there are other areas of weakness, then target those areas for development.

    1.2 Use Info-Tech’s CISO Core Competency Evaluation Tool to understand your organizational needs

    After completing the Info-Tech diagnostic, use the CISO Core Competency Evaluation Tool to determine which CISO competencies are a priority for your organization.

    • Your diagnostic results will indicate where your information security program is aligned well or poorly with your business.
    • For example, the diagnostic may show significant misalignment between information security and executives over the level of external compliance. The CISO behavior that would contribute to solving this is aligning security enablement with business requirements.
      • This misalignment may be due to a misunderstanding by either party. The competencies that will contribute to resolving this are communication, technical knowledge, and business acumen.
      • This mapping method is what will be used to determine which competencies are most important for your needs at the present moment.

    Download the CISO Core Competency Evaluation Tool

    1.2 Use Info-Tech’s CISO Core Competency Evaluation Tool to understand your organizational needs

    After completing the Info-Tech diagnostic, use the CISO Core Competency Evaluation Tool to determine which CISO competencies are a priority for your organization.

    1. Starting on Tab 2: CISO Core Competencies, use your understanding of each competency from section 1.1 along with the definitions described in the tool.
      • For each competency, assign a degree of importance using the drop-down menu in the second column from the right.
      • Importance ratings will range from not at all important at the low end to critically important at the high end.
      • Your importance score will be influenced by several factors, including:
        • The current alignment of your information security department.
        • Your organizational security posture.
        • The size and structure of your organization.
        • The existing skills and maturity within your information security department.

    Download the CISO Core Competency Evaluation Tool

    1.2 Use Info-Tech’s CISO Core Competency Evaluation Tool to understand your organizational needs

    After completing the Info-Tech diagnostic, use the CISO Core Competency Evaluation Tool to determine which CISO competencies are a priority for your organization.

    1. Still on Tab 2. CISO Core Competencies, you will now assign a current level of effectiveness for each competency.
      • This will range from foundational at a low level of effectiveness up to capable, then inspirational, and at the highest rating, transformational.
      • Again, this rating will be very specific to your organization, depending on your structure and your current employees.
      • Fundamentally, these scores will reflect what you want to improve in the area of information security. This is not an absolute scale, and it will be influenced by what skills you want to support your goals and direction as an organization.

    Download the CISO Core Competency Evaluation Tool

    Phase 2

    Assess

    Phase 1
    1.1 Understand Core Competencies
    1.2 Measure Security and Business Satisfaction and Alignment

    Phase 2
    2.1 Assess Stakeholder Relationships
    2.2 Assess the Core Competencies

    Phase 3
    3.2 Plan Approach to Improve Stakeholder Relationships

    Phase 4
    4.1 Decide Next Actions and Support Your CISO Moving Forward
    4.2 Regularly Reassess to Measure Development and Progress

    This phase will walk you through the following activities:

    • Use the CISO Core Competency Evaluation Tool to create and implement an interview guide.
    • Assess and analyze the core competencies of your prospective CISOs. Or, if you are a current CISO, use the CISO Core Competency Evaluation Tool as a self-analysis and identify areas for personal development.
    • Evaluate the influence, impact, and support of key executive business stakeholders using the CISO Stakeholder Power Map Template.

    Hire or Develop a World-Class CISO

    Case study

    Mark Lester
    InfoSec Manager, SC Ports Authority

    The new Security Manager engages with employees to learn the culture.

    Outcome: Understand what is important to individuals in order to create effective collaboration. People will engage with a project if they can relate it to something they value.

    Actions Next Steps
    • The Security Manager determines that he must use low-cost small wins to integrate with the organizational culture and create trust and buy-in and investment will follow.
    • The Security Manager starts a monthly newsletter to get traction across the organization, create awareness of his mandate to improve information security, and establish himself as a trustworthy partner.
    • The Security Manager will identify specific ways to engage and change the culture.
    • Create a persuasive case for investing in information security based on what resonates with the organization.

    Follow this case study throughout the deck to see this organization’s results

    Step 2.1

    Identify key stakeholders for the CISO and assess current relationships

    Activities

    Evaluate the power, impact, and support of key stakeholders

    This step involves the following participants:

    • CEO or other executive seeking to hire/develop a CISO

    or

    • Current CISO seeking to upgrade capabilities

    Outcomes of this step

    • Power map of executive business stakeholders
    • Evaluation of each stakeholder in terms of influence, impact, and current level of support

    Assess

    Identify key stakeholders who own business processes that intersect with security processes

    Info-Tech Insight
    Most organizations don’t exist for the sole purpose of doing information security. For example, if your organization is in the business of selling pencils, then information security is in business to enable the selling of pencils. All the security in the world is meaningless if it doesn’t enable your primary business processes. The CISO must always remember the fundamental goals of the business.

    The above insight has two implications:

    1. The CISO needs to understand the key business processes and who owns them, because these are the people they will need to collaborate with. Like any C-level, the CISO should be one of the most knowledgeable people in the organization regarding business processes.
    2. Each of these stakeholders stands to win or lose depending on the performance of their process, and they can act to either block or enable your progress.
      • To work effectively with these stakeholders, you must learn what is important to them, and pose your initiatives so that you both benefit.

    When people are not receptive to the CISO, it’s usually because the CISO has not been part of the discussion when plans were being made. This is the heart of proactivity.

    You need to be involved from the start … from the earliest part of planning.

    The job is not to come in late and say “No” ... the job is to be involved early and find creative and intelligent ways to say “Yes.”

    The CISO needs to be the enabling security asset that drives business.

    – Elliot Lewis, CEO at Keyavi Data

    Evaluate the importance of business stakeholders and the support necessary from them

    The CISO Stakeholder Power Map Template is meant to provide a visualization of the CISO’s relationships within the organization. This should be a living document that can be updated throughout the year as relationships develop and the structure of an organization changes.

    At a glance, this tool should show:

    • How influential each stakeholder is within the company.
    • How supportive they currently are of the CISO’s initiatives.
    • How strongly each person is impacted by IT security activities.

    Once this tool has been created, it provides a good reference as the CISO works to develop lagging relationships. It shows the landscape of influence and impact within the organization, which may help to guide the CISO’s strategy in the future.

    Evaluate the importance of business stakeholders and the support necessary from them

    Download the CISO Stakeholder Power Map Template

    Evaluate the importance of business stakeholders and the support necessary from them

    1. Identify key stakeholders.
      1. Focus on owners of important business processes.
    2. Evaluate and map each stakeholder in terms of:
      1. Influence (up/down)
      2. Support (left/right)
      3. Impact (size of circle)
      4. Involvement (color of circle)
    3. Decide whether the level of support from each stakeholder needs to change to facilitate success.

    Evaluate the importance of business stakeholders and the support necessary from them

    Info-Tech Insight
    Some stakeholders must work closely with your incoming CISO. It is worth consideration to include these individuals in the interview process to ensure you will have partners that can work well together. This small piece of involvement early on can save a lot of headache in the future.

    Where can you find your desired CISO?

    Once you know which competencies are a priority in your new CISO, the next step is to decide where to start looking. This person may already exist in your company.

    Internal

    Take some time to review your current top information security employees or managers. It may be immediately clear that certain people will or will not be suitable for the CISO role. For those that have potential, proceed to Step 2.2 to map their competencies.

    Recruitment

    If you do not have any current employees that will fit your new CISO profile, or you have other reasons for wanting to bring in an outside individual, you can begin the recruitment process. This could start by posting the position for applications or by identifying and targeting specific candidates.

    Ready to start looking for your ideal candidate? You can use Info-Tech’s Chief Information Security Officer job description template.

    Use the CISO job description template

    Alternatives to hiring a CISO

    Small organizations are less able to muster the resources required to find and retain a CISO,

    Technical Counselor Seat

    In addition to having access to our research and consulting services, you can acquire a Technical Counselor Seat from our Security & Risk practice, where one of our senior analysts would serve with you on a retainer. You may find that this option saves you the expense of having to hire a new CISO altogether.

    Virtual CISO

    A virtual CISO, or vCISO, is essentially a “CISO as a service.” A vCISO provides an organization with an experienced individual that can, on a part-time basis, lead the organization’s security program through policy and strategy development.

    Why would an organization consider a vCISO?

    • A vCISO can provide services that are flexible, technical, and strategic and that are based on the specific requirements of the organization.
    • They can provide a small organization with program maturation within the organization’s resources.
    • They can typically offer depth of experience beyond what a small business could afford if it were to pursue a full-time CISO.

    Source: InfoSec Insights by Sectigo Store

    Why would an organization not consider a vCISO?

    • The vCISO’s attention is divided among their other clients.
    • They won’t feel like a member of your organization.
    • They won’t have a deep understanding of your systems and processes.

    Source: Georgia State University

    Step 2.2

    Assess CISO candidates and evaluate their current competency

    Activities

    Assess CISO candidates in terms of desired core competencies

    or

    Self-assess your personal core competencies

    This step involves the following participants:

    • CEO or other executive seeking to hire/develop a CISO

    or

    • Current CISO seeking to upgrade capabilities

    and

    • Any key stakeholders or collaborators you choose to include in the assessment process

    Outcomes of this step

    • You have assessed your requirements for a CISO candidate.
    • The process of hiring is under way, and you have decided whether to hire a CISO, develop a CISO, or consider a Counselor Seat as another option.

    Assess

    2.2 Use Info-Tech’s CISO Core Competency Evaluation Tool to assess your CISO candidate

    Use Info-Tech’s CISO Core Competency Evaluation Tool to assess your CISO candidate

    Download the CISO Core Competency Evaluation Tool

    Info-Tech Insight
    The most important competencies should be your focus. Unless you are lucky enough to find a candidate that is perfect across the board, you will see some areas that are not ideal. Don’t forget the importance you assigned to each competency. If a candidate is ideal in the most critical areas, you may not mind that some development is needed in a less important area.

    2.2 Use Info-Tech’s CISO Core Competency Evaluation Tool to evaluate your candidates

    After deciding the importance of and requirements for each competency in Phase 1, assess your CISO candidates.

    Your first pass on this tool will be to look at internal candidates. This is the develop a CISO option.

    1. In the previous phase, you rated the Importance and Current Effectiveness for each competency in Tab 2. CISO Core Competencies. In this step, use Tab 3. Gap Analysis to enter a Minimum Level and a Desired Level for each competency. Keep in mind that it may be unrealistic to expect a candidate to be fully developed in all aspects.
    2. Next, enter a rating for your candidate of interest for each of the eight competencies.
    3. This scorecard will generate an overall suitability score for the candidate. The color of the output (from red to green) indicates the suitability, and the intensity of the color indicates the importance you assigned to that competency.

    Download the CISO Core Competency Evaluation Tool

    2.2 Use Info-Tech’s CISO Core Competency Evaluation Tool to evaluate your candidates

    • If the internal search does not identify a suitable candidate, you will want to expand your search.
    • Repeat the scoring process for external candidates until you find your new CISO.
    • You may want to skip your external search altogether and instead contact Info-Tech for more information on our Counselor Seat options.

    Download the CISO Core Competency Evaluation Tool

    Phase 3

    Plan

    Phase 1
    1.1 Understand Core Competencies
    1.2 Measure Security and Business Satisfaction and Alignment

    Phase 2
    2.1 Assess Stakeholder Relationships
    2.2 Assess the Core Competencies

    Phase 3
    3.1 Identify Resources to Address Competency Gaps
    3.2 Plan Approach to Improve Stakeholder Relationships

    Phase 4
    4.1 Decide Next Actions and Support Your CISO Moving Forward
    4.2 Regularly Reassess to Measure Development and Progress

    This phase will walk you through the following activities:

    • Create a plan to develop your competency gaps.
    • Construct and consider your organizational model.
    • Create plan to cultivate key stakeholder relationships.

    Hire or Develop a World-Class CISO

    Case study

    Mark Lester
    InfoSec Manager, SC Ports Authority

    The new Security Manager changes the security culture by understanding what is meaningful to employees.

    Outcome: Engage with people on their terms. The CISO must speak the audience’s language and express security terms in a way that is meaningful to the audience.

    Actions Next Steps
    • The Security Manager identifies recent events where ransomware and social engineering attacks were successful in penetrating the organization.
    • He uses his newsletter to create organization-wide discussion on this topic.
    • This very personal example makes employees more receptive to the Security Manager’s message, enabling the culture of risk management.
    • The Security Manager will leverage his success in improving the information security culture and awareness to gain support for future initiatives.

    Follow this case study throughout the deck to see this organization’s results

    Step 3.1

    Identify resources for your CISO to remediate competency gaps

    Activities

    Create a plan to remediate competency gaps

    This step involves the following participants:

    • CEO or other executive seeking to hire/develop a CISO
    • The newly hired CISO

    or

    • Current CISO seeking to upgrade capabilities

    Outcomes of this step

    • Identification of core competency deficiencies
    • A plan to close the gaps

    Plan

    3.1 Close competency gaps with Info-Tech’s Cybersecurity Workforce Development Training

    Resources to close competency gaps

    Info-Tech’s Cybersecurity Workforce Training develops critical cybersecurity skills missing within your team and organization. The leadership track provides the same deep coverage of technical knowledge as the analyst track but adds hands-on support and has a focus on strategic business alignment, program management, and governance.

    The program builds critical skills through:

    • Standardized curriculum with flexible projects tailored to business needs
    • Realistic cyber range scenarios
    • Ready-to-deploy security deliverables
    • Real assurance of skill development

    Info-Tech Insight
    Investing in a current employee that has the potential to be a world-class CISO may take less time, effort, and money than finding a unicorn.

    Learn more on the Cybersecurity Workforce Development webpage

    3.1 Identify resources for your CISO to remediate competency gaps

    < 2 hours

    CISO Competencies Description
    Business Acumen

    Info-Tech Workshops & Blueprints

    Actions/Activities

    • Take a business acumen course: Acumen Learning, What the CEO Wants You to Know: Building Business Acumen.
    • Meet with business stakeholders. Ask them to take you through the strategic plan for their department and then identify opportunities where security can provide support to help drive their initiatives.
    • Shadow another C-level executive. Understand how they manage their business unit and demonstrate an eagerness to learn.
    • Pursue an MBA or take a business development course.

    3.1 Identify resources for your CISO to remediate competency gaps (continued)

    < 2 hours

    CISO Competencies Description
    Leadership

    Info-Tech Training and Blueprints

    Action/Activities

    • Communicate your vision for security to your team. You will gain buy-in from your employees by including them in the creation of your program, and they will be instrumental to your success.

    Info-Tech Insight
    Surround yourself with great people. Insecure leaders surround themselves with mediocre employees that aren’t perceived as a threat. Great leaders are supported by great teams, but you must choose that great team first.

    3.1 Identify resources for your CISO to remediate competency gaps (continued)

    < 2 hours

    CISO Competencies Description
    Communication

    Info-Tech Workshops & Blueprints

    Build and Deliver an Optimized IT Update Presentation: Show IT’s value and relevance by dropping the technical jargon and speaking to the business in their terms.

    Master Your Security Incident Response Communications Program: Learn how to talk to your stakeholders about what’s going on when things go wrong.

    Develop a Security Awareness and Training Program That Empowers End Users: Your weakest link is between the keyboard and the chair, so use engaging communication to create positive behavior change.

    Actions/Activities

    Learn to communicate in the language of your audience (whether business, finance, or social), and frame security solutions in terms that are meaningful to your listener.

    Technical Knowledge

    Actions/Activities

    • In many cases, the CISO is progressing from a strong technical background, so this area is likely a strength already.
    • However, as the need for executive skills are being recognized, many organizations are opting to hire a business or operations professional as a CISO. In this case, various Info-Tech blueprints across all our silos (e.g. Security, Infrastructure, CIO, Apps) will provide great value in understanding best practices and integrating technical skills with the business processes.
    • Pursue an information security leadership certification: GIAC, (ISC)², and ISACA are a few of the many organizations that offer certification programs.

    3.1 Identify resources for your CISO to remediate competency gaps (continued)

    < 2 hours

    CISO Competencies Description
    Innovative Problem Solving

    Info-Tech Workshops & Blueprints

    Actions/Activities

    Vendor Management

    Info-Tech Blueprints & Resources

    Actions/Activities

    3.1 Identify resources for your CISO to remediate competency gaps (continued)

    < 2 hours

    CISO Competencies Description
    Change Management

    Info-Tech Blueprints

    Actions/Activities

    • Start with an easy-win project to create trust and support for your initiatives.
    Collaboration

    Info-Tech Blueprints

    Actions/Activities

    • Get out of your office. Have lunch with people from all areas of the business. Understanding the goals and the pains of employees throughout your organization will help you to design effective initiatives and cultivate support.
    • Be clear and honest about your goals. If people know what you are trying to do, then it is much easier for them to work with you on it. Being ambiguous or secretive creates confusion and distrust.

    3.1 Create the CISO’s personal development plan

    • Use Info-Tech’s CISO Development Plan Template to document key initiatives that will close previously identified competency gaps.
    • The CISO Development Plan Template is used to map specific actions and time frames for competency development, with the goal of addressing competency gaps and helping you become a world-class CISO. This template can be used to document:
      • Core competency gaps
      • Security process gaps
      • Security technology gaps
      • Any other career/development goals
    • If you have a coach or mentor, you should share your plan and report progress to that person. Alternatively, call Info-Tech to speak with an executive advisor for support and advice.
      • Toll-Free: 1-888-670-8889

    What you will need to complete this exercise

    • CISO Core Competency Evaluation Tool results
    • Information Security Business Satisfaction and Alignment diagnostic results
    • Insights gathered from business stakeholder interviews

    Step 3.2

    Plan an approach to improve your relationships

    Activities

    • Review engagement strategies for different stakeholder types
    • Create a stakeholder relationship development plan

    This step involves the following participants:

    • CEO or other executive seeking to hire/develop a CISO
    • The newly hired CISO

    or

    • Current CISO seeking to upgrade capabilities

    Outcomes of this step

    • Stakeholder relationship strategy deliverable

    Plan

    Where should the CISO sit?

    Where the CISO sits in the organization can have a big impact on the security program.

    • Organizations with CISOs in the C-suite have a fewer security incidents.1
    • Organizations with CISOs in the C-suite generally have better IT ability.1
    • An organization whose CISO reports to the CIO risks conflict of interest.1
    • 51% of CISOs believe their effectiveness can be hampered by reporting lines.2
    • Only half of CISOs feel like they are in a position to succeed.2

    A formalized security organizational structure assigns and defines the roles and responsibilities of different members around security. Use Info-Tech’s blueprint Implement a Security Governance and Management Program to determine the best structure for your organization.

    Who the CISO reports to, by percentage of organizations3

    Who the CISO reports to, by percentage of organizations

    Download the Implement a Security Governance and Management Program blueprint

    1. Journal of Computer Science and Information
    2. Proofpoint
    3. Heidrick & Struggles International, Inc

    3.2 Make a plan to manage your key stakeholders

    Managing stakeholders requires engagement, communication, and relationship management. To effectively collaborate and gain support for your initiatives, you will need to build relationships with your stakeholders. Take some time to review the stakeholder engagement strategies for different stakeholder types.

    Influence Mediators
    (Satisfy)
    Key Players
    (Engage)
    Spectators
    (Monitor)
    Noisemakers
    (Inform)
    Support for you

    When building relationships, I find that what people care about most is getting their job done. We need to help them do this in the most secure way possible.

    I don’t want to be the “No” guy, I want to enable the business. I want to find to secure options and say, “Here is how we can do this.”

    – James Miller, Information Security Director, Xavier University

    Download the CISO Stakeholder Management Strategy Template

    Key players – Engage

    Goal Action
    Get key players to help champion your initiative and turn your detractors into supporters. Actively involve key players to take ownership.
    Keep It Positive Maintain a Close Relationship
    • Use their positive support to further your objectives and act as your foundation of support.
    • Key players can help you build consensus among other stakeholders.
    • Get supporters to be vocal in your town halls.
    • Ask them to talk to other stakeholders over whom they have influence.
    • Get some quick wins early to gain and maintain stakeholder support and help convert them to your cause.
    • Use their influence and support to help persuade blockers to see your point of view.
    • Collaborate closely. Key players are tuned in to information streams that are important. Their advice can keep you informed and save you from being blindsided.
    • Keep them happy. By definition, these individuals have a stake in your plans and can be affected positively or negatively. Going out of your way to maintain relationships can be well worth the effort.

    Info-Tech Insight
    Listen to your key players. They understand what is important to other business stakeholders, and they can provide valuable insight to guide your future strategy.

    Mediators – Satisfy

    Goal Action
    Turn mediators into key players Increase their support level.
    Keep It Positive Maintain a Close Relationship
    • Make stakeholders part of the conversation by consulting them for input on planning and strategy.
    • Sample phrases:
      • “I’ve heard you have experience in this area. Do you have time to answer a few questions?”
      • “I’m making some decisions and I would value your thoughts. Can I get your perspective on this?”
    • Enhance their commitment by being inclusive. Encourage their support whenever possible.
    • Make them feel acknowledged and solicit feedback.
    • Listen to blockers with an open mind to understand their point of view. They may have valuable insight.
    • Approach stakeholders on their individual playing fields.
      • They want to know that you understand their business perspective.
    • Stubborn mediators might never support you. If consulting doesn’t work, keep them informed of important decision-making points and give them the opportunity to be involved if they choose to be.

    Info-Tech Insight
    Don’t dictate to stakeholders. Make them feel like valued contributors by including them in development and decision making. You don’t have to incorporate all their input, but it is essential that they feel respected and heard.

    Noisemakers – Inform

    Goal Action
    Have noisemakers spread the word to increase their influence. Encourage noisemakers to influence key stakeholders.
    Keep It Positive Maintain a Close Relationship
    • Identify noisemakers who have strong relationships with key stakeholders and focus on them.
      • These individuals may not have decision-making power, but their opinions and advice may help to sway a decision in your favor.
    • Look for opportunities to increase their influence over others.
    • Put effort into maintaining the positive relationship so that it doesn’t dwindle.
    • You already have this group’s support, but don’t take it for granted.
    • Be proactive, pre-emptive, and transparent.
    • Address issues or bad news early and be careful not to exaggerate their significance.
    • Use one-on-one meetings to give them an opportunity to express challenges in a private setting.
    • Show individuals in this group that you are a problem-solver:
      • “The implementation was great, but we discovered problems afterward. Here is what we’re doing about it.”

    Spectators – Monitor

    Goal Action
    Keep spectators content and avoid turning them into detractors. Keep them well informed.
    Keep It Positive Maintain a Close Relationship
    • A hands-on approach is not required with this group.
    • Keep them informed with regular, high-altitude communications and updates.
    • Use positive, exciting announcements to increase their interest in your initiatives.
    • Select a good venue for generating excitement and assessing the mood of spectators.
    • Spectators may become either supporters or blockers. Monitor them closely and keep in touch with them to stop these individuals from becoming blockers.
    • Listen to questions from spectators carefully. View any engagement as an opportunity to increase participation from this group and generate a positive shift in interest.

    3.2 Create the CISO’s stakeholder management strategy

    Develop a strategy to manage key stakeholders in order to drive your personal development plan initiatives.

    • The purpose of the CISO Stakeholder Management Strategy Template is to document the results of the power mapping exercise, create a plan to proactively manage stakeholders, and track the actions taken.
    • Use this in concert with Info-Tech’s CISO Stakeholder Power Map Template to help visualize the importance of key stakeholders to your personal development. You will document:
      • Stakeholder role and type.
      • Current relationship with the stakeholder.
      • Level of power/influence and degree of impact.
      • Current and desired level of support.
      • Initiatives that require the stakeholder’s engagement.
      • Actions to be taken – along with the status and results.

    What you will need to complete this exercise

    • Completed CISO Stakeholder Power Map
    • Security Business Satisfaction and Alignment Diagnostic results

    Download the CISO Stakeholder Management Strategy Template

    Phase 4

    Execute

    Phase 1
    1.1 Understand Core Competencies
    1.2 Measure Security and Business Satisfaction and Alignment

    Phase 2
    2.1 Assess Stakeholder Relationships
    2.2 Assess the Core Competencies

    Phase 3
    3.1 Identify Resources to Address Competency Gaps
    3.2 Plan Approach to Improve Stakeholder Relationships

    Phase 4
    4.1 Decide Next Actions and Support Your CISO Moving Forward
    4.2 Regularly Reassess to Measure Development and Progress

    This phase will walk you through the following activities:

    • Populate the CISO Development Plan Template with appropriate targets and due dates.
    • Set review and reassess dates.
    • Review due dates with CISO.

    Hire or Develop a World-Class CISO

    Case study

    Mark Lester
    InfoSec Manager, SC Ports Authority

    The new Security Manager leverages successful cultural change to gain support for new security investments.

    Outcome: Integrating with the business on a small level and building on small successes will lead to bigger wins and bigger change.

    Actions Next Steps
    • By fostering positive relationships throughout the organization, the Security Manager has improved the security culture and established himself as a trusted partner.
    • In an organization that had seen very little change in years, he has used well developed change management, business acumen, leadership, communication, collaboration, and innovative problem-solving competencies to affect his initiatives.
    • He can now return to the board with a great deal more leverage in seeking support for security investments.
    • The Security Manager will leverage his success in improving the information security culture and awareness to gain support for future initiatives.

    Step 4.1

    Decide next actions and support your CISO moving forward

    Activities

    • Complete the Info-Tech CISO Development Plan Template
    • Create a stakeholder relationship development plan

    This step involves the following participants:

    • CEO or other executive seeking to hire/develop a CISO
    • The newly hired CISO

    or

    • Current CISO seeking to upgrade capabilities

    Outcomes of this step

    Next actions for each of your development initiatives

    Execute

    Establish a set of first actions to set your plan into motion

    The CISO Development Plan Template provides a simple but powerful way to focus on what really matters to execute your plan.

    • By this point, the CISO is working on the personal competency development while simultaneously overseeing improvements across the security program, managing stakeholders, and seeking new business initiatives to engage with. This can be a lot to juggle effectively.
    • Disparate initiatives like these can hinder progress by creating confusion.
    • By distilling your plan down to Subject > Action > Outcome, you immediately restore focus and turn your plans into actionable items.
    • The outcome is most valuable when it is measurable. This makes progress (or lack of it) very easy to track and assess, so choose a meaningful metric.
    Item to Develop
    (competency/process/tech)
    First Action Toward Development
    Desired Outcome, Including a Measurable Indicator

    Download the CISO Development Plan Template

    4.1 Create a CISO development plan to keep all your objectives in one place

    Use Info-Tech’s CISO Development Plan Template to create a quick and simple yet powerful tool that you can refer to and update throughout your personal and professional development initiatives. As instructed in the template, you will document the following:

    Your Item to Develop The Next Action Required The Target Outcome
    This could be a CISO competency, a security process item, a security technology item, or an important relationship (or something else that is a priority). This could be as simple as “schedule lunch with a stakeholder” or “email Info-Tech to schedule a Guided Implementation call.” This part of the tool is meant to be continually updated as you progress through your projects. The strength of this approach is that it focuses your project into simple actionable steps that are easily achieved, rather than looking too far down the road and seeing an overwhelming task ahead. This will be something measurable like “reduce spending by 10%” or “have informal meeting with leaders from each department.”

    Info-Tech Insight
    A good plan doesn’t require anything that is outside of your control. Good measurable outcomes are behavior based rather than state based.
    “Increase the budget by 10%” is a bad goal because it is ultimately reliant on someone else and can be derailed by an unsupportive executive. A better goal is “reduce spending by 10%.” This is something more within the CISO’s control and is thus a better performance indicator and a more achievable goal.

    4.1 Create a CISO development plan to keep all your objectives in one place

    Below you will find sample content to populate your CISO Development Plan Template. Using this template will guide your CISO in achieving the goals identified here.

    The template itself is a metric for assessing the development of the CISO. The number of targets achieved by the due date will help to quantify the CISO’s progress.

    You may also want to include improvements to the organization’s security program as part of the CISO development plan.

    Area for Development Item for Development Next Action Required Key Stakeholders/ Owners Target Outcome Due Date Completed
    Core Competencies:
    Communication
    Executive
    communication
    Take economics course to learn business language Course completed [Insert date] [Y/N]
    Core Competencies:
    Communication
    Improve stakeholder
    relationships
    Email Bryce from finance to arrange lunch Improved relationship with finance department [Insert date] [Y/N]
    Technology Maturity: Security Prevention Identity and access management (IAM) system Call Info-Tech to arrange call on IAM solutions 90% of employees entered into IAM system [Insert date] [Y/N]
    Process Maturity: Response & Recovery Disaster recovery Read Info-Tech blueprint on disaster recovery Disaster recovery and backup policies in place [Insert date] [Y/N]

    Check out the First 100 Days as CISO blueprint for guidance on bringing improvements to the security program

    4.1 Use your action plan to track development progress and inform stakeholders

    • As you progress toward your goals, continually update the CISO development plan. It is meant to be a living document.
    • The Next Action Required should be updated regularly as you make progress so you can quickly jump in and take meaningful actions without having to reassess your position every time you open the plan. This is a simple but very powerful method.
    • To view your initiatives in customizable ways, you can use the drop-down menu on any column header to sort your initiatives (i.e. by due date, completed status, area for development). This allows you to quickly and easily see a variety of perspectives on your progress and enables you to bring upcoming or incomplete projects right to the top.
    Area for Development Item for Development Next Action Required Key Stakeholders/ Owners Target Outcome Due Date Completed
    Core Competencies:
    Communication
    Executive
    communication
    Take economics course to learn business language Course completed [Insert date] [Y/N]
    Core Competencies:
    Communication
    Improve stakeholder
    relationships
    Email Bryce from finance to arrange lunch Improved relationship with finance department [Insert date] [Y/N]
    Technology Maturity: Security Prevention Identity and access management (IAM) system Call Info-Tech to arrange call on IAM solutions 90% of employees entered into IAM system [Insert date] [Y/N]
    Process Maturity: Response & Recovery Disaster recovery Read Info-Tech blueprint on disaster recovery Disaster recovery and backup policies in place [Insert date] [Y/N]

    Step 4.2

    Regularly reassess to track development and progress

    Activities

    Create a calendar event for you and your CISO, including which items you will reassess and when

    This step involves the following participants:

    • CEO or other executive seeking to hire/develop a CISO
    • The newly hired CISO

    or

    • Current CISO seeking to upgrade capabilities

    Outcomes of this step

    Scheduled reassessment of the CISO’s competencies

    Execute

    4.2 Regularly evaluate your CISO’s progress

    < 1 day

    As previously mentioned, your CISO development plan is meant to be a living document. Your CISO will use this as a companion tool throughout project implementation, but periodically it will be necessary to re-evaluate the entire program to assess your progress and ensure that your actions are still in alignment with personal and organizational goals.

    Info-Tech recommends performing the following assessments quarterly or twice yearly with the help of our executive advisors (either over the phone or onsite).

    1. Sit down and re-evaluate your CISO core competencies using the CISO Core Competency Evaluation Tool.
    2. Analyze your relationships using the CISO Stakeholder Power Map Template.
    3. Compare all of these against your previous results to see what areas you have strengthened and decide if you need to focus on a different area now.
    4. Consider your CISO Development Plan Template and decide whether you have achieved your desired outcomes. If not, why?
    5. Schedule your next reassessment, then create a new plan for the upcoming quarter and get started.
    Materials
    • Laptop
    • CISO Development Plan Template
    Participants
    • CISO
    • Hiring executive (possibly)
    Output
    • Complete CISO and security program development plan

    Summary of Accomplishment

    Knowledge Gained

    • Understanding of the competencies contributing to a successful CISO
    • Strategic approach to integrate the CISO into the organization
    • View of various CISO functions from a variety of business and executive perspectives, rather than just a security view

    Process Optimized

    • Hiring of the CISO
    • Assessment and development of stakeholder relationships for the CISO
    • Broad planning for CISO development

    Deliverables Completed

    • IT Security Business Satisfaction and Alignment Diagnostic
    • CISO Core Competency Evaluation Tool
    • CISO Stakeholder Power Map Template
    • CISO Stakeholder Management Strategy Template
    • CISO Development Plan Template

    If you would like additional support, have our analysts guide you through an Info-Tech workshop or Guided Implementation

    Contact your account representative for more information

    workshop@infotech.com
    1-888-670-8889

    Related Info-Tech Research

    Build an Information Security Strategy
    Your security strategy should not be based on trying to blindly follow best practices but on a holistic risk-based assessment that is risk aware and aligns with your business context.

    The First 100 Days as CISO
    Every CISO needs to follow Info-Tech’s five-step approach to truly succeed in their new position. The meaning and expectations of a CISO role will differ from organization to organization and person to person, but the approach to the new position will be relatively the same.

    Implement a Security Governance and Management Program
    Business and security goals should be the same. Businesses cannot operate without security, and security's goal is to enable safe business operations.

    Research Contributors

    • Mark Lester, Information Security Manager, South Carolina State Ports Authority
    • Kyle Kennedy, CISO, CyberSN.com
    • James Miller, Information Security Director, Xavier University
    • Elliot Lewis, Vice President Security & Risk, Info-Tech Research Group
    • Andrew Maroun, Enterprise Security Lead, State of California
    • Brian Bobo, VP Enterprise Security, Schneider National
    • Candy Alexander, GRC Security Consultant, Towerall Inc.
    • Chad Fulgham, Chairman, PerCredo
    • Ian Parker, Head of Corporate Systems Information Security Risk and Compliance, Fujitsu EMEIA
    • Diane Kelly, Information Security Manager, Colorado State Judicial Branch
    • Jeffrey Gardiner, CISO, Western University
    • Joey LaCour, VP & Chief Security, Colonial Savings
    • Karla Thomas, Director IT Global Security, Tower Automotive
    • Kevin Warner, Security and Compliance Officer, Bridge Healthcare Providers
    • Lisa Davis, CEO, Vicinage
    • Luis Brown, Information Security & Compliance Officer, Central New Mexico Community College
    • Peter Clay, CISO, Qlik
    • Robert Banniza, Senior Director IT Center Security, AMSURG
    • Tim Tyndall, Systems Architect, Oregon State

    Bibliography

    Dicker, William. "An Examination of the Role of vCISO in SMBs: An Information Security Governance Exploration." Dissertation, Georgia State University, May 2, 2021. Accessed 30 Sep. 2022.

    Heidrick & Struggles. "2022 Global Chief Information Security Officer (CISO) Survey" Heidrick & Struggles International, Inc. September 6, 2022. Accessed 30 Sep. 2022.

    IBM Security. "Cost of a Data Breach Report 2022" IBM. August 1, 2022. Accessed 9 Nov. 2022.

    Mehta, Medha. "What Is a vCISO? Are vCISO Services Worth It?" Infosec Insights by Sectigo, June 23, 2021. Accessed Nov 22. 2022.

    Milica, Lucia. “Proofpoint 2022 Voice of the CISO Report” Proofpoint. May 2022. Accessed 6 Oct. 2022.

    Navisite. "The State of Cybersecurity Leadership and Readiness" Navisite. November 9, 2021. Accessed 9 Nov. 2022.

    Shayo, Conrad, and Frank Lin. “An Exploration of the Evolving Reporting Organizational Structure for the Chief Information Security Officer (CISO) Function” Journal of Computer Science and Information Technology, vol. 7, no. 1, June 2019. Accessed 28 Sep. 2022.

    Threat Preparedness Using MITRE ATT&CK®

    • Buy Link or Shortcode: {j2store}252|cart{/j2store}
    • member rating overall impact: N/A
    • member rating average dollars saved: N/A
    • member rating average days saved: N/A
    • Parent Category Name: Security Strategy & Budgeting
    • Parent Category Link: /security-strategy-and-budgeting
    • To effectively protect your business interests, you need to be able to address what the most pressing vulnerabilities in your network are. Which attack vectors should you model first? How do you adequately understand your threat vectors when attacks continually change and adapt?
    • Security can often be asked the world but given a minimal budget with which to accomplish it.
    • Security decisions are always under pressure from varying demands that pull even the most well-balanced security team in every direction.
    • Adequately modeling any and every possible scenario is ineffective and haphazard at best. Hoping that you have chosen the most pressing attack vectors to model will not work in the modern day of threat tactics.

    Our Advice

    Critical Insight

    • Precision is critical to being able to successfully defend against threats.
      • Traditional threat modeling such as STRIDE or PASTA is based on a spray-and-pray approach to identifying your next potential threat vector. Instead, take a structured risk-based approach to understanding both an attacker’s tactics and how they may be used against your enterprise. Threat preparedness requires precision, not guesswork.
    • Knowing is half the battle.
      • You may be doing better than you think. Undoubtedly, there is a large surface area to cover with threat modeling. By preparing beforehand, you can separate what’s important from what’s not and identify which attack vectors are the most pressing for your business.
    • Be realistic and measured.
      • Do not try to remediate everything. Some attack vectors and approaches are nearly impossible to account for. Take control of the areas that have reasonable mitigation methods and act on those.
    • Identify blind spots.
      • Understand what is out there and how other enterprises are being attacked and breached. See how you stack up to the myriad of attack tactics that have been used in real-life breaches and how prepared you are. Know what you’re ready for and what you’re not ready for.
    • Analyze the most pressing vectors.
      • Prioritize the attack vectors that are relevant to you. If an attack vector is an area of concern for your business, start there. Do not cover the entire tactics list if certain areas are not relevant.
    • Detection and mitigation lead to better remediation.
      • For each relevant tactic and techniques, there are actionable detection and mitigation methods to add to your list of remediation efforts.

    Impact and Result

    Using the MITRE ATT&CK® framework, Info-Tech’s approach helps you understand your preparedness and effective detection and mitigation actions.

    • Learn about potential attack vectors and the techniques that hostile actors will use to breach and maintain a presence on your network.
    • Analyze your current protocols versus the impact of an attack technique on your network.
    • Discover detection and mitigation actions.
    • Create a prioritized series of security considerations, with basic actionable remediation items. Plan your next threat model by knowing what you’re vulnerable to.
    • Ensure business data cannot be leaked or stolen.
    • Maintain privacy of data and other information.
    • Secure the network connection points.
    • Mitigate risks with the appropriate services.

    This blueprint and associated tool are scalable for all types of organizations within various industry sectors, allowing them to know what types of risk they are facing and what security services are recommended to mitigate those risks.

    Threat Preparedness Using MITRE ATT&CK® Research & Tools

    Start here – read the Executive Brief

    Read our concise Executive Brief to find out why threat preparedness is a crucial first step in defending your network against any attack type. Review Info-Tech’s methodology and understand the ways we can support you in completing this project.

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. Attack tactics and techniques

    Review a breakdown of each of the various attack vectors and their techniques for additional context and insight into the most prevalent attack tactics.

    • Threat Preparedness Using MITRE ATT&CK® – Phase 1: Attack Tactics and Techniques

    2. Threat Preparedness Workbook mapping

    Map your current security protocols against the impacts of various techniques on your network to determine your risk preparedness.

    • Threat Preparedness Using MITRE ATT&CK® – Phase 2: Threat Preparedness Workbook Mapping
    • Enterprise Threat Preparedness Workbook

    3. Execute remediation and detective measures

    Use your prioritized attack vectors to plan your next threat modeling session with confidence that the most pressing security concerns are being addressed with substantive remediation actions.

    • Threat Preparedness Using MITRE ATT&CK® – Phase 3: Execute Remediation and Detective Measures
    [infographic]

    2023-Q1 Research Agenda

    This 2023-Q1 research agenda slide deck provides you with a comprehensive overview of our most up-to-date published research. Each piece offers you valuable insights, allowing you to take effective decisions and informed actions. All TY|Info-tech research is backed by our team of expert analysts who share decades of IT and industry experience.

    Register to read more …

    Responsibly Resume IT Operations in the Office

    • Buy Link or Shortcode: {j2store}423|cart{/j2store}
    • member rating overall impact: N/A
    • member rating average dollars saved: N/A
    • member rating average days saved: N/A
    • Parent Category Name: DR and Business Continuity
    • Parent Category Link: /business-continuity

    Having shifted operations almost overnight to a remote work environment, and with the crisis management phase of the COVID-19 pandemic winding down, IT leaders and organizations are faced with the following issues:

    • A reduced degree of control with respect to the organization’s assets.
    • Increased presence of unapproved workaround methods, including applications and devices not secured by the organization.
    • Pressure to resume operations at pre-pandemic cadence while still operating in recovery mode.
    • An anticipated game plan for restarting the organization’s project activities.

    Our Advice

    Critical Insight

    An organization’s shift back toward the pre-pandemic state cannot be carried out in isolation. Things have changed. Budgets, resource availability, priorities, etc., will not be the same as they were in early March. Organizations must ensure that all departments work collaboratively to support office repatriation. IT must quickly identify the must-dos to allow safe return to the office, while prioritizing tasks relating to the repopulation of employees, technical assets, and operational workloads via an informed and streamlined roadmap.

    As employees return to the office, PMO and portfolio leaders must sift through unclear requirements and come up with a game plan to resume project activities mid-pandemic. You need to develop an approach, and fast.

    Impact and Result

    Responsibly resume IT operations in the office:

    • Evaluate risk tolerance
    • Prepare to repatriate people to the office
    • Prepare to repatriate assets to the office
    • Prepare to repatriate workloads to the office
    • Prioritize your tasks and build your roadmap

    Quickly restart the engine of your PPM:

    • Restarting the engine of the project portfolio won’t be as simple as turning a key and hitting the gas. The right path forward will differ for every project portfolio practice.
    • Therefore, in this publication we put forth a multi-pass approach that PMO and portfolio managers can follow depending on their unique situations and needs.
    • Each approach is accompanied by a checklist and recommendations for next steps to get you on right path fast.

    Responsibly Resume IT Operations in the Office Research & Tools

    Start here – read the Executive Brief

    As the post-pandemic landscape begins to take shape, ensure that IT can effectively prepare and support your employees as they move back to the office.

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. Evaluate your new risk tolerance

    Identify the new risk landscape and risk tolerance for your organization post-pandemic. Determine how this may impact the second wave of pandemic transition tasks.

    • Responsibly Resume IT Operations in the Office – Phase 1: Evaluate Your New Risk Tolerance
    • Resume Operations Information Security Pressure Analysis Tool

    2. Repatriate people to the office

    Prepare to return your employees to the office. Ensure that IT takes into account the health and safety of employees, while creating an efficient and sustainable working environment

    • Responsibly Resume IT Operations in the Office – Phase 2: Repatriate People to the Office
    • Mid-Pandemic IT Prioritization Tool

    3. Repatriate assets to the office

    Prepare the organization's assets for return to the office. Ensure that IT takes into account the off-license purchases and new additions to the hardware family that took place during the pandemic response and facilitates a secure reintegration to the workplace.

    • Responsibly Resume IT Operations in the Office – Phase 3: Repatriate Assets to the Office

    4. Repatriate workloads to the office

    Prepare and position IT to support workloads in order to streamline office reintegration. This may include leveraging pre-existing solutions in different ways and providing additional workstreams to support employee processes.

    • Responsibly Resume IT Operations in the Office – Phase 4: Repatriate Workloads to the Office

    5. Prioritize your tasks and build the roadmap

    Once you've identified IT's supporting tasks, it's time to prioritize. This phase walks through the activity of prioritizing based on cost/effort, alignment to business, and security risk reduction weightings. The result is an operational action plan for resuming office life.

    • Responsibly Resume IT Operations in the Office – Phase 5: Prioritize Your Tasks and Build the Roadmap

    6. Restart the engine of your project portfolio

    Restarting the engine of the project portfolio mid-pandemic won’t be as simple as turning a key and hitting the gas. Use this concise research to find the right path forward for your organization.

    • Restart the Engine of Your Project Portfolio
    [infographic]

    IT Talent Trends 2022

    • Buy Link or Shortcode: {j2store}541|cart{/j2store}
    • member rating overall impact: 8.0/10 Overall Impact
    • member rating average dollars saved: After each Info-Tech experience, we ask our members to quantify the real-time savings, monetary impact, and project improvements our research helped them achieve.
    • member rating average days saved: Read what our members are saying
    • Parent Category Name: People & Leadership
    • Parent Category Link: /people-and-leadership

    Business and IT leaders aiming to build and keep successful teams in 2022 must:

    • Optimize IT in the face of a competitive labor market.
    • Build or maintain a culture of diversity, equity, and inclusion.
    • Manage the monumental shift to the new normal of remote work.
    • Weather the Great Resignation and come out on top.
    • Correctly assess development areas for their teams.
    • Justify investing in IT talent.

    Our Advice

    Critical Insight

    • If 2021 was about beginning to act on employee needs, 2022 will be about strategically examining each trend to ensure that the organization's promises to take action are more than lip service.
    • Employees have always been able to see through disingenuous attempts to engage them, but in 2022 the stakes are higher due to increased talent mobility.

    Impact and Result

    This report includes:

    • A concise, executive-ready trend report.
    • Data and insights from IT organizations from around the world.
    • Steps to take for each of the trends depending on your current maturity level.
    • Examples and case studies.
    • Links to in-depth Info-Tech research and tools.

    IT Talent Trends 2022 Research & Tools

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. IT Talent Trends Report for 2022 – A report to help you incorporate new ways of working into your business to build and keep the best team.

    Discover Info-Tech’s 2022 talent trends for IT leaders, which will provide insight into taking a strategic approach to navigate the post-pandemic IT talent landscape.

    • IT Talent Trends Report for 2022

    Infographic

    Further reading

    IT Talent Trends 2022

    The last two years have been a great experiment … but it’s not over yet.

    Incorporate new ways of working into your business to build and keep the best team.

    Over the past two years, organizations have ventured into unprecedented ways of working and supporting their employees, as they tried to maintain productivity through the pandemic. This experiment has made lasting changes to both business models and employee expectations, and these effects will continue to be seen long after we return to a “new normal.”

    While the pandemic forced us to work differently for the past two years, looking forward, successful organizations will incorporate new ways of working into their business models – beyond simply having a remote work policy.

    How we work, source roles, and develop talent continue to evolve as we navigate a different world with employees being more vocal in their desires, and leaders continue to play a key role.

    The IT talent market will never be the same, and organizations must reevaluate their employee experience from the bottom up to successfully weather the shift to the new normal.

    IT Talent Trends 2022

    Strategic Recruiting Finds Good Talent

    Finding talent in a strained talent market requires a marketing approach. Posting a job description isn’t enough.

    The (Not So) Great Resignation

    IT is faring better than other functions; however, specific industries need to pay attention.

    Grow Your DEI Practices Into Meaningful Actions

    Good intentions are not enough.

    Remote Work Is Here – Can Your Culture Adapt?

    The Great Experiment is over. Are leaders equipped to capitalize on its promises?

    Management Skills Drive Success in a Remote World

    Despite the need for remote team management training, it is still not happening.

    The pandemic has clarified employees’ needs and amplified their voices

    If 2021 was about beginning to act on employee needs, 2022 will be about strategically examining each trend to ensure that the actions taken by the organization are more than lip service.

    Employees have always been able to see through disingenuous attempts to engage them, but in 2022 the stakes are higher due to increased talent mobility.

    Trends that were just starting to come into focus last year have established themselves as critical determinants of the employee experience in 2022.

    2021

    DEI: A Top Talent ObjectiveRemote Work Is Here to StayUncertainty Unlocks PerformanceA Shift in Skills PrioritiesA Greater Emphasis on Wellbeing
    Arrow pointing down.Joiner pointing down.Joiner pointing down.

    2022

    Strategic Recruiting Finds Good Talent

    Finding talent in a strained talent market requires a marketing approach. Posting a job description isn’t enough.

    The (Not So) Great Resignation

    IT is faring better than other functions; however, specific industries need to pay attention.

    Grow Your DEI Practices Into Meaningful Actions

    Good intentions are not enough.

    Remote Work Is Here – Can Your Culture Adapt?

    The Great Experiment is over. Are leaders equipped to capitalize on its promises?

    Management Skills Drive Success in a Remote World

    Despite the need for remote team management training, it is still not happening.

    What employees are looking for is changing

    Superficial elements of traditional office culture were stripped away by the quick shift to a remote environment, giving employees the opportunity to reevaluate what truly matters to them in a job.

    The biggest change from 2019 (pre-pandemic) to today is increases in the importance of culture, flexible/remote work, and work-life balance.

    Organizations that fail to keep up with this shift in priorities will see the greatest difficulty in hiring and retaining staff.

    As an employee, which of the following would be important to you when considering a potential employer?

    2019 2021
    Flexible Work Pie graph representing response percentages from employees regarding importance of these factors. Flexible Work: 2019, Very 46%, Somewhat 49%, Not at All 5%.
    n=275
    Arrow pointing right. Pie graph representing response percentages from employees regarding importance of these factors. Flexible Work: 2021, Very 76%, Somewhat 21%, Not at All 2%.
    n=206
    Work-Life Balance Pie graph representing response percentages from employees regarding importance of these factors. Work-Life Balance: 2019, Very 67%, Somewhat 30%, Not at All 3%.
    n=277
    Arrow pointing right. Pie graph representing response percentages from employees regarding importance of these factors. Work-Life Balance: 2021, Very 80%, Somewhat 18%, Not at All 1%.
    n=206
    Culture Pie graph representing response percentages from employees regarding importance of these factors. Culture: 2019, Very 68%, Somewhat 31%, Not at All 1%.
    n=277
    Arrow pointing right. Pie graph representing response percentages from employees regarding importance of these factors. Culture: 2021, Very 81%, Somewhat 19%, Not at All 0%.
    n=206
    Source: Info-Tech Talent Trends Survey data collected in 2019 and 2021 Purple Very Important
    Blue Somewhat Important
    Green Not at All Important

    IT’s top talent priorities in 2022

    IT’s top Talent priorities reflect a post-pandemic focus on optimizing talent to fulfill strategic objectives: Top challenges for IT departments, by average rank, with 1 being the top priority.

    Important

    In the 2022 IT Talent Trends Survey, IT departments’ top priorities continue to be learning and innovation in support of organizational objectives. —› Enabling leaning and development within IT
    —› Enabling departmental innovation
    5.01
    5.54
    With employees being clearer and more vocal about their needs than ever before, employee experience has risen to the forefront of IT’s concern as a key enabler of strategic objectives. —› Providing a great employee experience for IT 5.66
    Supporting departmental change 6.01
    With organizations finally on the way to financial stability post pandemic, recruiting is a major focus. —› Recruiting (e.g. quickly filling vacant roles in IT with quality external talent) 6.18
    However, IT’s key efforts are threatened by critical omissions: Fostering a positive employee relations climate in the department 6.32
    Despite a focus on learning and development, leadership skills are not yet a top focus. —› Developing the organization's IT leaders 6.33
    Rapidly moving internal IT employees to staff strategic priorities 6.96
    Facilitating data-driven people decisions within IT 7.12
    Controlling departmental labor costs and maximizing the value of the labor spend 7.13
    Despite the need to provide a great employee experience, the focus on diversity, equity, and inclusion is low. —› Fostering an environment of diversity, equity, and inclusion in the department 7.31
    Despite prioritizing recruiting, IT departments see candidate experience as a last priority, either not focusing on it or relegating it to HR. —› Providing a great candidate experience for IT candidates 8.43
    (n=227)

    IT Talent Trends 2022

    Look beneath the surface of the trends to navigate them successfully

    Above Ground
    Focusing on what you see 'Above the line" won't solve the problem.

    Talent isn't a checklist.

    Strategic Recruiting Finds Good Talent

    Finding talent in a strained talent market requires a marketing approach. Posting a job description isn't enough.
    • The number of job openings increased to 11.4 million on the last business day of October, up from 10.6 million in September (US Bureau of Labor Statistics, Dec. 2021)

    The (Not So) Great Resignation

    IT is faring better than other functions; however, specific industries need to pay attention.
    • In September, in the US, 4.4 million people left their jobs. That number dropped to 4.2 million in October. (US Labor Stats, Dec. 2021)
    • 30% of workers will likely switch jobs if they have to return to the office full time. (McKinsey, Dec. 2021)

    Grow Your DEI Practices Into Meaningful Actions

    Good intentions are not enough.
    • 95% of organizations are focusing on DEI. (2022 HR Trends Report)
    • 48% of IT departments have delivered training on DEI over the past year.

    Remote Work is Here. Can Your Culture Adapt?

    The Great Experiment is over. Are you equipped to capitalize on its promises?
    • 85% of organizations saw the same or higher productivity during the pandemic.
    • 91% of organizations are continuing remote work.

    Management Skills Drive Success in a Remote World

    Despite the need for remote team management training, it is still not happening.
    • 72% of IT departments report high effectiveness at managing remote staff.
    • Learning and development is IT's top priority.
    Cross-section of the Earth and various plants with their root systems, highlighting the world above ground and below.
    Beneath the Surface
    For each trend, a strategic approach to get "under the line" will help form your response.

    Talent needs a holistic approach, as under the line everything is connected. If you are experiencing challenges in one area, analyzing data (e.g. engagement, exit surveys, effectiveness of DEI program and leader training) can help drive overall experience.

    • 100% of job seekers cite culture as somewhat to very important.
    • Only 40% of employers advertise culture in job postings.
    • 70% of IT departments state voluntary turnover is less than 10%
    • Top reasons for resignation are salary, development, and opportunity for innovative work.
    • Resignation rates were higher in fields that had experienced extreme stress due to the pandemic (HBR, Dec. 2021)
    • Senior leadership is overestimating their own commitment to DEI.
    • Most IT departments are not driving their own DEI initiatives.
    • Without effectively measuring DEI practices, organizations will see 1.6x more turnover. (2022 HR Trends Report)
    • Senior leadership is not open to remote work in 23% of organizations.
    • Without leadership support, employees will not buy into remote work initiatives.
    • A remote work policy will not bring organizational benefits without employee buy-in.
    • 75% of senior managers believe remote team management is highly effective, but only 60% of frontline staff agree.
    • Training focuses on technical skills, to the exclusion of soft skills, including management and leadership.
    Solutions
    Recommendations depending on your department's maturity level.
    Attention is required for candidate experience underpinned by a realistic employee value proposition. Gather and review existing data (e.g. early retirements, demographics) to understand your turnover rate. Use employee engagement tools to gauge employee sentiment among impacted groups and build out an engagement strategy to meet those needs. Conduct a cultural assessment to reveal hidden biases that may stand in the way of remote work efficacy. Provide management training on performance management and development coaching.

    Logo for Info-Tech.Logo for ITRG.

    This report is based on organizations just like yours

    Survey timeline = October 2021
    Total respondents = 245 IT professionals

    Geospatial map of survey responses shaded in accordance with the percentages listed below.
    01 United States 45% 08 Middle East 2%
    02 Canada 23% 09 Other (Asia) 2%
    03 Africa 8% 10 Germany 1%
    04 Great Britain 6% 11 India 1%
    05 Latin America, South America or Caribbean 4% 12 Netherlands 1%
    06 Other (Europe) 4% 13 New Zealand 1%
    07 Australia 2% (N-245)

    A bar chart titled 'Please estimate your organization's revenue in US$ (Use operating budget if you are a public-sector organization)' measuring survey responses. '$0 - less than 1M, 7%', '$1M - less than 5M, 4%', '$5M - less than 10M, 4%', '$10M - less than 25M, 6%', '$25M - less than 50M, 5%', '$50M - less than 100M, 13%', '$100M - less than 500M, 24%', '$500M - less than 1B, 9%', '1B - less than 5B, 22%', '$5B+, 8%'. (n=191)

    This report is based on organizations just like yours

    Industry

    Bar chart measuring percentage of survey respondents by industry. The largest percentages are from 'Government', 'Manufacturing', 'Media, information, Telecom & Technology', and 'Financial Services (including banking & insurance)'.

    Info-Tech IT Maturity Model

    Stacked bar chart measuring percentage of survey respondents by IT maturity level. Innovator is 7.11%, Business Partner is 16.44%, Trusted Operator is 24.89%, Firefighter is 39.11%, and Unstable is 12.44%.
    (n=225)

    Innovator – Transforms the Business
    Reliable Technology Innovation

    Business Partner – Expands the Business
    Effective Execution Projects, Strategic Use of Analytics and Customer Technology

    Trusted Operator – Optimizes Business
    Effective Fulfillment of Work Orders, Functional Business Applications, and Reliable Data Quality

    Firefighter – Supports the Business
    Reliable Infrastructure and IT Service Desk

    Unstable – Struggles to Support
    Inability to Provide Reliable Business Services

    This report is based on people just like you

    Which of the following ethnicities (ethnicity refers to a group with a shared or common identity, culture, and/or language) do you identify with? Select all that apply. What gender do you identify most with?
    A pie chart measuring percentage of survey respondents by ethnicity. Answers are 'White (e.g. European, North America), 59%', 'Asian (e.g. Japan, India, Philippines, Uzbekistan), 12%', 'Black (e.g. Africa, Caribbean, North America), 12%', 'Latin/Hispanic (e.g. Cuba, Guatemala, Spain, Brazil), 7%', 'Middle Eastern (e.g. Lebanon, Libya, Iran), 4%', 'Indigenous (e.g. First Nations, Inuit, Metis, Maori), 3%', 'Indo-Caribbean (e.g. Trinidad & Tobago, Guyana, St. Vincent), 3%'.
    (N=245)
    A pie chart measuring percentage of survey respondents by gender. Answers are 'Male, 67%', 'Female, 24%', 'Prefer not to answer, 5%', 'No Specification, 4%', 'Intersex, 0%'.
    (n=228)

    This report is based on people just like you

    What is your sub-department of IT? Which title best describes your position?
    Bar chart measuring percentage of survey respondents by sub-department. The top three answers are 'Senior Leadership', 'Infrastructure and Operations', and 'Application Development'.
    (n=227)
    Bar chart measuring percentage of survey respondents by title. The top four answers are 'Director-level, 29%', 'Manager, 22%', 'C-Level Officer, 18%', and 'VP-level, 11%.'
    (N=245)

    IT Talent Trends 2022

    Each trend is introduced with key questions you can ask yourself to see how your department fares in that area.

    The report is based on statistics from a survey of 245 of your peers.

    It includes recommendations of next steps and a key metric to track your success.

    It lists Info-Tech resources that you, as a member, can leverage to begin your journey to improve talent management in your department.

    Strategic Recruiting Finds Good Talent

    Finding talent in a strained talent market requires a marketing approach. Posting a job description isn’t enough.

    The (Not So) Great Resignation

    IT is faring better than other functions; however, specific industries need to pay attention.

    Grow Your DEI Practices Into Meaningful Actions

    Good intentions are not enough.

    Remote Work Is Here – Can Your Culture Adapt?

    The Great Experiment is over. Are leaders equipped to capitalize on its promises?

    Management Skills Drive Success in a Remote World

    Despite the need for remote team management training, it is still not happening.

    The report is based on data gathered from Info-Tech Research Group’s 2022 IT Talent Trends Survey. The data was gathered in September and October of 2021.

    Strategic Recruiting Finds Good Talent

    Trend 1 | The Battle to Find and Keep Talent

    As the economy has stabilized, more jobs have become available, creating a job seeker’s market. This is a clear sign of confidence in the economy, however fragile, as new waves of the pandemic continue.

    Info-Tech Point of View

    Recruiting tactics are an outcome of a well-defined candidate experience and employee value proposition.

    Introduction

    Cross-section of a plant and its roots, above and below ground. During our interviews, members that focused on sharing their culture with a strong employee value proposition were more likely to be successful in hiring their first-choice candidates.
    Questions to ask yourself
    • Do you have a well-articulated employee value proposition?
    • Are you using your job postings to market your company culture?
    • Have you explored multiple channels for posting jobs to increase your talent pool of candidates?

    47% of respondents are hiring external talent to fill existing gaps, with 40% using external training programs to upgrade current employees. (Info-Tech IT Talent Trends 2022 Survey)

    In October, the available jobs (in the USA) unexpectedly rose to 11 million, higher than the 10.4 million experts predicted. (CNN Business, 2021)

    Where has all the talent gone?

    IT faces multiple challenges when recruiting for specialized talent

    Talent scarcity is focused in areas with specialized skill sets such as security and architecture that are dynamic and evolving faster than other skill sets.

    “It depends on what field you work in,” said ADP chief economist Nela Richardson. “There were labor shortages in those fields pre-pandemic and two years forward, there is even more demand for people with those skills” (CNBC, 19 Nov. 2021).

    37% of IT departments are outsourcing roles to fill internal skill shortages. (Info-Tech Talent Trends 2022 Survey)

    Roles Difficult to Fill

    Horizontal bar chart measuring percentage of survey responses about which roles are most difficult to fill. In order from most difficult to least they are 'Security (n=177)', 'Enterprise Architecture (n=172)', 'Senior Leadership (n=169)', 'Data & Business Intelligence (n=171)', 'Applications Development (n=177)', 'Infrastructure & Operations (n=181)', 'Business Relationship Management (n=149)', 'Project Management (n=175)', 'Vendor Management (n=133)', 'Service Desk (n=184)'.(Info-Tech Talent Trends 2022 Survey)

    Case Study: Using culture to drive your talent pool

    This case study is happening in real time. Please check back to learn more as Goddard continues to recruit for the position.

    Recruiting at NASA

    Goddard Space Center is the largest of NASA’s space centers with approximately 11,000 employees. It is currently recruiting for a senior technical role for commercial launches. The position requires consulting and working with external partners and vendors.

    NASA is a highly desirable employer due to its strong culture of inclusivity, belonging, teamwork, learning, and growth. Its culture is anchored by a compelling vision, “For the betterment of Humankind,” and amplified by a strong leadership team that actively lives their mission and vision daily.

    Firsthand lists NASA as #1 on the 50 most prestigious internships for 2022.

    Rural location and no flexible work options add to the complexity of recruiting

    The position is in a rural area of Eastern Shore Virginia with a population of approximately 60,000 people, which translates to a small pool of candidates. Any hire from outside the area will be expected to relocate as the senior technician must be onsite to support launches twice a month. Financial relocation support is not offered and the position is a two-year assignment with the option of extension that could eventually become permanent.

    Photo of Steve Thornton, Acting Division Chief, Solutions Division, Goddard Space Flight Center, NASA.

    “Looking for a Talent Unicorn; a qualified, experienced candidate with both leadership skills and deep technical expertise that can grow and learn with emerging technologies.”

    Steve Thornton
    Acting Division Chief, Solutions Division,
    Goddard Space Flight Center, NASA

    Case Study: Using culture to drive your talent pool

    A good brand overcomes challenges

    Culture takes the lead in NASA's job postings, which attract a high number of candidates. Postings begin with a link to a short video on working at NASA, its history, and how it lives its vision. The video highlights NASA's diversity of perspectives, career development, and learning opportunities.

    NASA's company brand and employer brand are tightly intertwined, providing a consistent view of the organization.

    The employer vision is presented in the best place to reach NASA's ideal candidate: usajobs.gov, the official website of the United States Government and the “go-to” for government job listings. NASA also extends its postings to other generic job sites as well as LinkedIn and professional associations.

    Photo of Robert Leahy, Chief Information Officer, Goddard Space Flight Center, NASA.

    Interview with Robert Leahy
    Chief Information Officer
    Goddard Space Flight Center, NASA

    “Making sure we have the tools and mechanisms are two hiring challenges we are going to face in the future as how we work evolves and our work environment changes. What will we need to consider with our job announcements and the criteria for selecting employees?”

    Liteshia Dennis,
    Office Chief, Headquarter IT Office, Goddard Space Flight Center, NASA

    The ability to attract and secure candidates requires a strategy

    Despite prioritizing recruiting, IT departments see candidate experience as THE last Priority, either not focusing on it or relegating it to HR

    Candidate experience is listed as one of the bottom IT challenges, but without a positive experience, securing the talent you want will be difficult.

    Candidate experience starts with articulating your unique culture, benefits, and opportunities for development and innovative work as well as outlining flexible working options within an employer brand. Defining an employee value proposition is key to marketing your roles to potential employees.

    81% of respondents' rate culture as very important when considering a potential employer. (Info-Tech IT Talent Trends 2022 Survey)

    Tactics Used in Job Postings to Position the Organization Favorably as a Potential Employer

    Horizontal bar chart measuring percentage of survey responses about tactics used in job postings. The top tactics are 'Culture, 40%', 'Benefits, 40%', 'Opportunity for Innovative Work, 30%', and 'Professional Development, 30%'.(Info-Tech IT Talent Trends 2022 Survey)

    Case Study: Increasing talent pool at Info-Tech Research Group

    Strong sales leads to growth in operation capacity

    Info-Tech Research Group is an IT research & advisory firm helping IT leaders make strategic, timely, and well-informed decisions. Our actionable tools and analyst guidance ensure IT organizations achieve measurable results.

    The business has grown rapidly over the last couple of years, creating a need to recruit additional talent who were highly skilled in technical applications and approaches.

    In response, approval was given to expand headcount within Research for fiscal year 2022 and to establish a plan for continual expansion as revenue continues to grow.

    Looking for deep technical expertise with a passion for helping our members

    Hiring for our research department requires talent who are typically subject matter experts within their own respective IT domains and interested in and capable of developing research and advising clients through calls and workshops.

    This combination of skills, experience, and interest can be challenging to find, especially in an IT labor market that is more competitive than ever.

    Photo of Tracy-Lynn Reid, Practice Lead.

    Interview with Practice Lead Tracy-Lynn Reid

    Focus on Candidate Experience increases successful hire rate

    The senior leadership team established a project to focus on recruiting for net-new and open roles. A dedicated resource was assigned and used guidance from our research to enhance our hiring process to reduce time to hire and expand our candidate pool. Senior leaders stayed actively involved to provide feedback.

    The hiring process was improved by including panel interviews with interview protocols and a rubric to evaluate all candidates equitably.

    The initial screening conversation now includes a discussion on benefits, including remote and flexible work offerings, learning and development budget, support for post-secondary education, and our Buy-a-Book program.

    As a result, about 70% of the approved net-new headcount was hired within 12 weeks, with recruitment ongoing.

    Implement and Optimize Application Integration Governance

    • Buy Link or Shortcode: {j2store}361|cart{/j2store}
    • member rating overall impact: N/A
    • member rating average dollars saved: N/A
    • member rating average days saved: N/A
    • Parent Category Name: Enterprise Integration
    • Parent Category Link: /enterprise-integration
    • Enterprises begin integrating their applications without recognizing the need for a managed and documented governance model.
    • Application Integration (AI) is an inherently complex concept, involving the communication among multiple applications, groups, and even organizations; thus developing a governance model can be overwhelming.
    • The options for AI Governance are numerous and will vary depending on the size, type, and maturity of the organization, adding yet another layer of complexity.

    Our Advice

    Critical Insight

    • Governance is essential with integrated applications. If you are planning to integrate your applications, you should already be considering a governance model.
    • Proper governance requires oversight into chains of responsibility, policy, control mechanisms, measurement, and communication.
    • People and process are key. Technology options to aid in governance of integrated apps exist, but will not greatly contribute to the success of AI.

    Impact and Result

    • Assess your capabilities and determine which area of governance requires the most attention to achieve success in AI.
    • Form an Integration Center of Competency to oversee AI governance to ensure compliance and increase success.
    • Conduct ongoing training with your personnel to ensure up-to-date skills and end user understanding.
    • Frequently revisit your AI governance strategy to ensure alignment with business goals.

    Implement and Optimize Application Integration Governance Research & Tools

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. Implement and optimize Application Integration Governance

    Know where to start and where to focus your attention in the implementation of an AI governance strategy.

    • Storyboard: Implement and Optimize Application Integration Governance

    2. Assess the organization's capabilities in AI Governance

    Assess your current and target states in AI Governance.

    • Application Integration Governance Gap Analysis Tool

    3. Create an Integration Center of Competency

    Have a governing body to oversee AI Governance.

    • Integration Center of Competency Charter Template

    4. Establish AI Governance principles and guidelines

    Create a basis for the organization’s AI governance model.

    • Application Integration Policy and Principles Template

    5. Create an AI service catalog

    Keep record of services and interfaces to reduce waste.

    • Integration Service Catalog Template
    [infographic]

    Purchase Storage Without Buyer's Remorse

    • Buy Link or Shortcode: {j2store}505|cart{/j2store}
    • member rating overall impact: N/A
    • member rating average dollars saved: N/A
    • member rating average days saved: N/A
    • Parent Category Name: Storage & Backup Optimization
    • Parent Category Link: /storage-and-backup-optimization
    • Storage is a big ticket item that often only gets purchased every three to five years. Many buyers focus on capital costs and rely on vendors for scoping of requirements leading to overspending and buyer’s remorse.
    • Three-quarters of storage buyers are dissatisfied with at least one aspect of their most recent storage purchase, and over 40% of organizations switched vendors, making it critical to understand the market and the important factors to avoiding buyer’s remorse.

    Our Advice

    Critical Insight

    • Know where to negotiate on price. Many organizations spend as much or more effort on negotiating a better price as they do on assessing current and future requirements; yet, more than 35% of organizations report dissatisfaction with hardware, software, and/or maintenance and support costs from their most recent purchase.
    • Understand support agreements and vendor offerings. Organizations satisfied with their storage purchase spent more effort evaluating support capabilities of vendors and assessing current and future requirements.
    • Determine costs to scale-up your storage. More than 35% of organizations report dissatisfaction with costs to scale their solutions by adding disks or disk trays, following their initial contract, making it crucial to establish scaling costs with your vendor.

    Impact and Result

    • Get peace of mind knowing that the quote you’re about to sign delivers the solution and capabilities around software and support that you think you are getting.
    • Understand contract discounting levels and get advice around where further discounting can be negotiated with the reseller.
    • Future-proof your purchase by capitalizing on Info-Tech’s exposure to other clients’ past experiences.

    Purchase Storage Without Buyer's Remorse Research & Tools

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. Purchase storage without buyer's remorse

    Ensure the purchase is the lowest cost with fewest future headaches.

    • Storyboard: Purchase Storage Without Buyer's Remorse

    2. Evaluate storage vendors and their product capabilities

    Select the most appropriate offering for business needs at a competitive price point.

    3. Ensure vendors reveal all details regarding strengths and weaknesses

    Get the lowest priced feature set for the selected product.

    • Storage Reseller Interrogation Script
    [infographic]

    Tymans Group Consulting

    IT resilience, carefree entrepreneurship.

    Discover and implement all the ingredients that make your IT perform fast and rock solid.

    Yes, I want stable and performant IT Operations

    We are multidisciplinary infrastructure and IT Operations experts.
    We bring passion, focus, and results to our work and your company.

    TY innovates resilience embedding in your organization

    Let's have a chat

    • TY as your advisor

      This gives you our expertise on tap. Do you have an issue? Call us. You want to have a sparring partner to solve a problem? Call us. Do you need a sounding board? Call us.

      TY provides advisory services as well as traditional consulting. We also execute study and revision services for your policies, standards, procedures, and guidelines to ensure compliance with DORA, NIS2 and corporate requirements of both your own company and that of your clients. And we also check against our internal best ways of working.

      Book a conversation

    • Focused Consulting and Implementing

      This is where you have our undivided attention, and we work with you one on one until resolution. Note that there is a waiting period for this service at this time.

      If you are interested, please first book a call so that we can determine if we are a good fit together.

      Book a conversation

    What our relations tell us

    • Citigroup Manager

      As a technical consultant, Gert is an All-Star performer...  He has got many wins under his belt... His willingness to work hard, knowledge of regional systems (especially Tokyo) and Microsoft Office is well respected within the Group 

    • Sandra

      Tx for all the efforts done! Great Job! And good luck for the ones amongst you that still need to work tomorrow Grtz Sandra VB
    • Patrick A.

      Hi Gert, I'm busy documenting .... Thanks for your real friendly and careful, yet effective support :-) Patrick A.
    • Lucie VH

      During my vacation, Gert took over the management of a number of ongoing problems. Even before I actually left for my trip, he took action and proposed a number of improvements. Gert coordinated between the different stakeholders and PTA's and resolved a number of acute issues. And he did this in a very pleasant, yet effective way.
    • Dawn

      No worries. It only freaked me out for a few minutes, then I saw that the system had blocked them from doing any real damage. Thanks for the cleanup and extra measures, though! As always, you rock!
    • After a successful DRP

      Thanks for all the efforts done ans special Tx Gert for Coordinating this again!
    • A CIO

      Yet again Gert, Thanks for handling this in such a top way!
    • A Sales Manager

      Awesome Gert, I will let the team know we can close this issue!
    • Investment bank manager

      Flexibility, Adaptability, problem Solving are Gert's strong points, Exceptionally beneficial in "crisis." I can attest that Gert will always see a problem through. if he needs to hand it off, it will aways have good handoff notes. His business knowledge is good and will part of the next project.

    • Wall Street Performance Review

      As with the classes for SFC, Gert organised formal classes for all of the Research IT teams.... I would class this job as well done, given everything that was going on with Rsearch IT. 

    • Stuart B on Gert Taeymans

      Excellent technical resource. Quick help on issues and provide explanations to regional teams. Often covers for us in the evenings or when things get particularly busy.

    • Asia support to roll out global system

      Gert time in Japan was a great success. He really helped the IT group through a really difficult tume during the roll out of {the global research publishing system} and had to cover all the bases that had not been properly coverd by the previous person in Japan. Gert's visit also coincided with Stuart's joining into the Asia IT Research group. Gert was very flexible  in the hours that he worked and the lenght of time he was out in Tokyo (in the end more than 4 weeks.)

      The feedback from both the users and the IT group was VERY positive on Gertt's contribution. He was more than capabable to put across technical points to the IT team, in their language.

    • IT Director

      Gert is a knowledgeable individual who takes on additional responsibility... rapidly addressng end-user issues and developing custom solutions when needed.

    Benefits of working with Tymans Group

    • We focus on actual deliverables

      TY delivers on the IT resilience what and how. Get actionable IT, management, governance, and productivity research, insights, blueprints with templates, easy-to-use tools, and clear instructions to help you execute effectively and become IT resilient.

    • Get insights from top IT professionals

      Our TY network base constantly informs us about our IT resilience research and validates it through client experiences. TY adds to that by applying this research to real-world situations in Belgium, the Netherlands, Germany, Europe and the US.

    • Data-driven insights

      It is tempting to use your gut instinct. Don't. Everything TY does, is data-driven. From our research to our interactions with you, we use an analytical approach to help you move forward with your key IT resilience projects.

    Frequently asked questions

    • How does Tymans Group IT Operations advisory work?

      TY believes strongly in leveraging technology and personal delivery. That is why TY uses one on one calling sessions using Teams and Zoom. When needed I do on site delivery.

      Every advisory option has a set number of interactive contact points in addition to email and chat options. Every contact request is answered by me personally. 

      Through the use of technology, I ensure that instead of you having to drive to your coach, the coach “comes” to you!

    • What are Tymans Group advisory service timings?

      TY is available on European time from 09:00 until 17:00 and US EST 09:00-17:00 (depending on already booked appointments). 

    • How much to Tymans Group programs cost?

      While this is a difficult question to answer, let's give it a shot.

      Ideally I work value-based. But this is more for well-defined projects where the ROI is quantifiable rather than qualifiable.

      Often advisory services are a discovery and we obtain results together. You may even only need an experienced sounding board. This type of pricing starts from €4,500.

    • Does Tymans Group have a "pick your brain" option?

      By popular demand, yes, I added this. It is not the cheapest way to use me, but it may be the most effective for you.

    • How are Tymans Group advisory services delivered?

      TY believes strongly in leveraging technology and personal delivery. That is why TY uses one on one calling sessions using Teams and Zoom. When needed I do on site delivery.

      This way I ensure that instead of you having to drive to your coach, the coach “comes” to you!

      You are allowed to record the sessions and use them internally in your organization, including as part of your internal training. You are not allowed to resell these without a resale agreement.

    • Tymans Group is delivered online via calls? Isn't on-site better?

      Interestingly, in the majority of advisory services the answer is no.

      Purely on-site automatically limits the time we can spend together. Thus, typically, the interactions are of a shorter duration. Even when this is done over a longer timeframe, like 5 to 10 days, this is really too short for effective advising, coaching and mentoring. 

      We stay away from accelerated programs, where I can send a lot of information, and most of it will not stick.

      Terry Sejnowski  a neuroscientist, actually states that cramming does not help you remember. It gets you, maybe, through the next exam, but the information is not retained. The way to integrate and remember information is to spread out the study and repeat. This is called the spacing effect.

      This is why I employ the online delivery method. When you record our sessions, you can come back and again repeat it, note down your questions and fire them off to me. I respond and you go back into the talk. Then you apply, possibly fail, and come back again until it succeeds, and then you make it your own.

      That is why time-pressured, on-site delivery does not work. Our method makes you effective because you internalized the material and feedback. This can then be rounded-off by on-site finalization.

      10-15 years ago, this was not possible, as the web-based tools were simply not fast enough. Today, unless you are taking classes like carpentry or other topics that require on-site delivery, online delivery is the way to go.

    • Can I pay by wire transfer?

      We actually prefer wire transfer. It cuts down on the financial fees and it is the norm in the European Union. Our US customer can also use this feature and pay into our US bank.

    • Where is Tymans Group located?

      Tymans Group has two locations:

      In Europe, Belgium and in Greenville, DE, United States, 

      The HQ is in Belgium.

    • Does this work for less than 25 employees?

      Resilience is not size-dependent. That said, if you are supplying critical services to financial services firms, you may not have a choice. In that case, be prepared to up your game. Call TY in this case. We can help you fulfill third-party requirements, such as the DORA regulation.

      In other cases, if you plan to grow your company beyond 25 employees, then yes. Start with the basics, though. Make sure you have a good understanding of your current challenges. Schedule a chat with me to determine the right baseline.

      If you are just starting out and want to ensure that your company's processes are correct right out of the gate, it's better to give me a call. We can start you off in the right direction without spending too much.

      Our guides are only available to existing advisory clients. Let's chat informally if we are a fit for you.

    • I'm a small business owner, can I do all this by myself?

      Our guides are only available to existing advisory clients.

      But also see the above question about company size and target clients. If you have fewer than 25 employees and you are not supplying critical services to financial institutions, then maybe some of our guides are not for you. We can still help you organize your resilience, but it may be more cost-effective to use only our TY Advisory services.

      Once you grow beyond 25 employees, you will benefit from our processes. Just implement what you need. How do you know what you require? You probably already have an inkling of what is lacking in your organization. If you are unsure, please get in touch with us.

      In short, the answer is yes, and TY can help you. Once you know what you are looking for, that guide allows you to handle it yourself. If you require help selecting the right guide, please get in touch with us.

    • Do you provide refunds?

      Before buying the DIY guides, available only to existing advisory clients,, please refer to the free Executive Summary when available. If there is no Executive summary available, please contact me with any questions you have. 

      As these are downloadable products, I cannot provide any refunds, but I will help you with any exchange where you have a good reason. 

    • I bought the wrong item

      If you bought the wrong item, please contact me and we'll be happy to provide an alternative item.

    • I want more assistance

      Yes, more assistance is available.  Tymans Group can provide you with any assistance you require within the parameters of your contract.

      Per-guide assistance ranges from a single phone or video consultation to guided implementation or a workshop. Alternatively we can go to do-it-for-you implementation or even full-time consulting.

      Note that our guides are only available to existing advisory clients.

      Please contact me for a talk.

    I want more information to become more resilient.

    Continue reading

    Modernize Your Microsoft Licensing for the Cloud Era

    • Buy Link or Shortcode: {j2store}304|cart{/j2store}
    • member rating overall impact: 9.1/10 Overall Impact
    • member rating average dollars saved: $102,414 Average $ Saved
    • member rating average days saved: 10 Average Days Saved
    • Parent Category Name: Licensing
    • Parent Category Link: /licensing
    • Microsoft licensing is complicated. Often, the same software can be licensed a number of ways. It’s difficult to know which edition and licensing model is best.
    • Licensing and features often change with the release of new software versions, compounding the problem by making it difficult to stay current.
    • In tough economic times, IT is asked to reduce capital and operating expenses wherever possible. As one of the top five expense items in most enterprise software budgets, Microsoft licensing is a primary target for cost reduction.

    Our Advice

    Critical Insight

    • Focus on needs first. Conduct a thorough needs assessment and document the results. Well-documented needs will be your best asset in navigating Microsoft licensing and negotiating your agreement.
    • Beware the bundle. Be aware when purchasing the M365 suite that there is no way out. Negotiating a low price is critical, as all leverage swings to Microsoft once it is on your agreement.
    • If the cloud doesn’t fit, be ready to pay up or start making room. Microsoft has drastically reduced discounting for on-premises products, support has been reduced, and product rights have been limited. If you are planning to remain on premises, be prepared to pay up.

    Impact and Result

    • Understand what your organization needs and what your business requirements are. It’s always easier to purchase more later than try to reduce your spend.
    • Complete cost calculations carefully, as the cloud might end up costing significantly more for the desired feature set. However, in some scenarios, it may be more cost efficient for organizations to license in the cloud.
    • If there are significant barriers to cloud adoption, discuss and document them. You’ll need this documentation in three years when it’s time to renew your agreement.

    Modernize Your Microsoft Licensing for the Cloud Era Research & Tools

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. Modernize Your Microsoft Licensing Deck – A deck to help you build a strategy for your Microsoft licensing renewal.

    This storyboard will help you build a strategy for your Microsoft licensing renewal from conducting a thorough needs assessment to examining your licensing position, evaluating Microsoft's licensing options, and negotiations.

    • Modernize Your Microsoft Licensing for the Cloud Era – Phases 1-4

    2. Microsoft Cloud Products Cost Modeler – A tool to model estimated costs for Microsoft's cloud products.

    The Microsoft Cloud Products Cost Modeler will provide a rough estimate of what you can expect to pay for Office 365 or Dynamics CRM licensing, before you enter into negotiations. This is not your final cost, but it will give you an idea.

    • Microsoft Cloud Products Cost Modeler

    3. Microsoft Licensing Purchase Reference Guide - A template to capture licensing stakeholder information, proposed changes to licensing, and negotiation items.

    The Microsoft Licensing Purchase Reference Guide can be used throughout the process of licensing review: from initial meetings to discuss compliance state and planned purchases, to negotiation meetings with resellers. Use it in conjunction with Info-Tech's Microsoft Licensing Effective License Position Template.

    • Microsoft Licensing Purchase Reference Guide

    4. Negotiation Timeline for Microsoft – A template to navigate your negotiations with Microsoft.

    This tool will help you plot out your negotiation timeline, depending on where you are in your contract negotiation process.

  • 6-12 months
  • Less than 3 months
    • Negotiation Timeline for Microsoft – Visio
    • Negotiation Timeline for Microsoft – PDF

    5. Effective Licensing Position Tool – A template to help you create an effective licensing position and determine your compliance position.

    This template helps organizations to determine the difference between the number of software licenses they own and the number of software copies deployed. This is known as the organization’s effective license position (ELP).

    • Effective Licensing Position Tool
    [infographic]

    Configuration management

    • Buy Link or Shortcode: {j2store}4|cart{/j2store}
    • Related Products: {j2store}4|crosssells{/j2store}
    • Up-Sell: {j2store}4|upsells{/j2store}
    • Download01-Title: Harness the power of Configuration Management Executive Brief
    • Download-01: Visit Link
    • member rating overall impact: 8.0/10
    • member rating average dollars saved: N/A
    • member rating average days saved: N/A
    • Parent Category Name: Infra and Operations
    • Parent Category Link: /infra-and-operations
    Configuration management is all about being able to manage your assets within the support processes. That means to record what you need. Not less than that, and not more either.

    Asset Management, Configuration Management, Lifecycle Management

    Drive Real Business Value with an HRIS Strategy

    • Buy Link or Shortcode: {j2store}586|cart{/j2store}
    • member rating overall impact: 9.1/10 Overall Impact
    • member rating average dollars saved: $43,457 Average $ Saved
    • member rating average days saved: 36 Average Days Saved
    • Parent Category Name: Human Resource Systems
    • Parent Category Link: /human-resource-systems
    • In most organizations, the HR application portfolio has evolved tactically on an as-needed basis, resulting in un-integrated systems and significant effort spent on manual workarounds.
    • The relationship between HR and IT is not optimal for technology decision making. System-related decisions are made by HR and IT is typically involved only post-purchase to fix issues as they arise and offer workarounds.
    • IT systems for HR are not viewed as a strategic differentiator or business enabler, thereby leading to a limited budget and resources for HR IT systems and subsequently hindering the adoption of a strategic, holistic perspective.
    • Some organizations overinvest, while others underinvest in lightweight, point-to-point solutions. Finding the sweet spot between a full suite and lightweight functionality is no easy task.

    Our Advice

    Critical Insight

    • Align HRIS goals with the business. Organizations must position HR as a partner prior to embarking on an HRIS initiative, aligning technology goals with organizational objectives before looking at software.
    • Communication is key. Often, HR and IT speak different languages. Maintain a high degree of communication by engaging stakeholder groups early.
    • Plan where you want to go. Designing a roadmap based on clear requirements, alignment with the business, and an understanding of priorities will contribute to success.

    Impact and Result

    • Evaluate the current state of HRIS, understand the pain points, and visualize your ideal processes prior to choosing a solution.
    • Explore the different solution alternatives: maintain current system, integrate and consolidate, augment, or replace system entirely.
    • Create a plan to engage IT and HR throughout the project. Equip HR with the decision-making tools to meet business objectives and drive business strategy. Establish a common language for IT and HR to effectively communicate.
    • Develop a practical and actionable roadmap that the entire organization can buy into.

    Drive Real Business Value with an HRIS Strategy Research & Tools

    Start here – read the Executive Brief

    Read our concise Executive Brief to find out why you should develop an HRIS strategy, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. Conduct an environmental scan

    Create a clear project vision that outlines the goals and objectives for the HRIS strategy. Subsequently, construct an HRIS business model that is informed by enablers, barriers, and the organizational, IT, and HR needs.

    • Drive Real Business Value with an HRIS Strategy – Phase 1: Conduct an Environmental Scan
    • Establish an HRIS Strategy Project Charter Template
    • HRIS Readiness Assessment Checklist

    2. Design the future state

    Gather high-level requirements to determine the ideal future state. Explore solution alternatives and choose the path that is best aligned with the organization's needs.

    • Drive Real Business Value with an HRIS Strategy – Phase 2: Design the Future State
    • HRIS Strategy Stakeholder Interview Guide
    • Process Owner Assignment Guide

    3. Finalize the roadmap

    Identify roadmap initiatives. Prioritize initiatives based on importance and effort.

    • Drive Real Business Value with an HRIS Strategy – Phase 3: Finalize the Roadmap
    • Initiative Roadmap Tool
    • HRIS Stakeholder Presentation Template
    [infographic]

    Workshop: Drive Real Business Value with an HRIS Strategy

    Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

    1 Conduct an Environmental Scan

    The Purpose

    Understand the importance of creating an HRIS strategy before proceeding with software selection and implementation.

    Learn why a large percentage of HRIS projects fail and how to avoid common mistakes.

    Set expectations for the HRIS strategy and understand Info-Tech’s HRIS methodology.

    Complete a project charter to gain buy-in, build a project team, and track project success.   

    Key Benefits Achieved

    A go/no-go decision on the project appropriateness.

    Project stakeholders identified.

    Project team created with defined roles and responsibilities.

    Finalized project charter to gain buy-in.  

    Activities

    1.1 Set a direction for the project by clarifying the focus.

    1.2 Identify the right stakeholders for your project team.

    1.3 Identify HRIS needs, barriers, and enablers.

    1.4 Map the current state of your HRIS.

    1.5 Align your business goals with your HR goals and objectives.

    Outputs

    Project vision

    Defined project roles and responsibilities

    Completed HRIS business model

    Completed current state map and thorough understanding of the HR technology landscape

    Strategy alignment between HR and the business

    2 Design the Future State

    The Purpose

    Gain a thorough understanding of the HRIS-related pains felt throughout the organization.

    Use stakeholder-identified pains to directly inform the HRIS strategy and long-term solution.

    Visualize your ideal processes and realize the art of the possible.  

    Key Benefits Achieved

    Requirements to strengthen the business case and inform the strategy.

    The art of the possible.

    Activities

    2.1 Requirements gathering.

    2.2 Sketch ideal future state processes.

    2.3 Establish process owners.

    2.4 Determine guiding principles.

    2.5 Identify metrics.

    Outputs

    Pain points classified by data, people, process, and technology

    Ideal future process vision

    Assigned process owners, guiding principles, and metrics for each HR process in scope

    3 Create Roadmap and Finalize Deliverable

    The Purpose

    Brainstorm and prioritize short- and long-term HRIS tasks.

    Key Benefits Achieved

    Understand next steps for the HRIS project.

    Activities

    3.1 Create a high-level implementation plan that shows dependencies.

    3.2 Identify risks and mitigation efforts.

    3.3 Finalize stakeholder presentation.

    Outputs

    Completed implementation plan

    Completed risk management plan

    HRIS stakeholder presentation

    Master the Public Cloud IaaS Acquisition Models

    • Buy Link or Shortcode: {j2store}228|cart{/j2store}
    • member rating overall impact: 10.0/10 Overall Impact
    • member rating average dollars saved: $3,820 Average $ Saved
    • member rating average days saved: 2 Average Days Saved
    • Parent Category Name: Vendor Management
    • Parent Category Link: /vendor-management

    Understanding the differences in IaaS platform agreements, purchasing options, associated value, and risks. What are your options for:

    • Upfront or monthly payments
    • Commitment discounts
    • Support options
    • Migration planning and support

    Our Advice

    Critical Insight

    IaaS platforms offer similar technical features, but they vary widely on their procurement model. By fully understanding the procurement differences and options, you will be able to purchase wisely, save money both long and short term, and mitigate investment risk.

    Most vendors have similar processes and options to buy. Finding a transparent explanation and summary of each platform in a side-by-side review is difficult.

    • Are vendor reps being straight forward?
    • What are the licensing requirements?
    • What discounts or incentives can I negotiate?
    • How much do I have to commit to and for how long?

    Impact and Result

    This project will provide several benefits for both IT and the business. It includes:

    • Best IaaS platform to support current and future procurement requirements.
    • Right-sized cloud commitment tailored to the organization’s budget.
    • Predictable and controllable spend model.
    • Flexible and reliable IT infrastructure that supports the lines of business.
    • Reduced financial and legal risk.

    Master the Public Cloud IaaS Acquisition Models Research & Tools

    Start here – read the Executive Brief

    Read our concise Executive Brief to learn how the public cloud IaaS procurement models compare. Review Info-Tech’s methodology and understand the top three platforms, features, and benefits to support and inform the IaaS vendor choice.

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. Educate

    Learn the IaaS basics, terminologies, purchasing options, licensing requirements, hybrid options, support, and organization requirements through a checklist process.

    • Master the Public Cloud IaaS Acquisition Models – Phase 1: Educate
    • Public Cloud Procurement Checklist
    • Microsoft Public Cloud Licensing Guide

    2. Evaluate

    Review and understand the features, downsides, and differences between the big three players.

    • Master the Public Cloud IaaS Acquisition Models – Phase 2: Evaluate
    • Public Cloud Procurement Comparison Summary

    3. Execute

    Decide on a primary vendor that meets requirements, engage with a reseller, negotiate pricing incentives, migration costs, review, and execute the agreement.

    • Master the Public Cloud IaaS Acquisition Models – Phase 3: Execute
    • Public Cloud Acquisition Executive Summary Template

    Infographic

    Harness Configuration Management Superpowers

    • Buy Link or Shortcode: {j2store}303|cart{/j2store}
    • member rating overall impact: 8.5/10 Overall Impact
    • member rating average dollars saved: $12,999 Average $ Saved
    • member rating average days saved: 10 Average Days Saved
    • Parent Category Name: Asset Management
    • Parent Category Link: /asset-management
    • Configuration management databases (CMDB) are a lot of work to build and maintain. Starting down this process without the right tools, processes, and buy-in is a lot of work with very little reward.
    • If you decide to just build it and expect they will come, you may find it difficult to articulate the value, and you will be disappointed by the lack of visitors.
    • Relying on manual entry or automated data collection without governance may result in data you can’t trust, and if no one trusts the data, they won’t use it.

    Our Advice

    Critical Insight

    • The right mindset is just as important as the right tools. By involving everyone early, you can ensure the right data is captured and validated and you can make maintenance part of the culture. This is critical to reaching early and continual value with a CMDB.

    Impact and Result

    • Define your use cases: Identify the use cases and prioritize those objectives into phases. Define what information will be needed to meet the use cases and how that information will be populated.
    • Understand and design the CMDB data model: Define services and undiscoverable configuration items (CI) and map them to the discoverable CIs.
    • Operationalize configuration record updates: Define data stewards and governance processes and integrate your configuration management practice with existing practices and lifecycles.

    Harness Configuration Management Superpowers Research & Tools

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. Harness Configuration Management Superpowers Deck – A step-by-step document that walks you through creating a configuration management program.

    Use this blueprint to create a configuration management program that provides immediate value.

    • Harness Configuration Management Superpowers – Phases 1-4

    2. Configuration Management Project Charter Template – A project charter template to help you build a concise document for communicating appropriate project details to stakeholders.

    Use this template to create a project charter to launch the configuration management project.

    • Configuration Management Project Charter

    3. Configuration Control Board Charter Template – A board charter template to help you define the roles and responsibilities of the configuration control board.

    Use this template to create your board charter for your configuration control board (CCB). Define roles and responsibilities and mandates for the CCB.

    • Configuration Control Board Charter

    4. Configuration Management Standard Operating Procedures (SOP) Template – An SOP template to describe processes and procedures for ongoing maintenance of the CMDB under the configuration management program.

    Use this template to create and communicate your SOP to ensure ongoing maintenance of the CMDB under the configuration management program.

    • Configuration Management Standard Operation Procedures

    5. Configuration Management Audit and Validation Checklist Template – A template to be used as a starting point to meet audit requirements under NIST and ITIL programs.

    Use this template to assess capability to pass audits, adding to the template as needed to meet internal auditors’ requirements.

    • Configuration Management Audit and Validation Checklist

    6. Configuration Management Policy Template – A template to be used for building out a policy for governance over the configuration management program.

    Use this template to build a policy for your configuration management program.

    • Configuration Management Policy

    7. Use Cases and Data Worksheet – A template to be used for validating data requirements as you work through use cases.

    Use this template to determine data requirements to meet use cases.

    • Use Cases and Data Worksheet

    8. Configuration Management Diagram Template Library – Examples of process workflows and data modeling.

    Use this library to view sample workflows and a data model for the configuration management program.

    • Configuration Management Diagram Template Library (Visio)
    • Configuration Management Diagram Template Library (PDF)

    9. Configuration Manager Job Description – Roles and responsibilities for the job of Configuration Manager.

    Use this template as a starting point to create a job posting, identifying daily activities, responsibilities, and required skills as you create or expand your configuration management program.

    • Configuration Manager

    Infographic

    Workshop: Harness Configuration Management Superpowers

    Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

    1 Configuration Management Strategy

    The Purpose

    Define the scope of your service configuration management project.

    Design the program to meet specific stakeholders needs

    Identify project and operational roles and responsibilities.

    Key Benefits Achieved

    Designed a sustainable approach to building a CMDB.

    Activities

    1.1 Introduction

    1.2 Define challenges and goals.

    1.3 Define and prioritize use cases.

    1.4 Identify data needs to meet these goals.

    1.5 Define roles and responsibilities.

    Outputs

    Data and reporting use cases based on stakeholder requirements

    Roles and responsibility matrix

    2 CMDB Data Structure

    The Purpose

    Build a data model around the desired use cases.

    Identify the data sources for populating the CMDB.

    Key Benefits Achieved

    Identified which CIs and relationships will be captured in the CMDB.

    Activities

    2.1 Define and prioritize your services.

    2.2 Evaluate CMDB default classifications.

    2.3 Test configuration items against existing categories.

    2.4 Build a data model diagram.

    Outputs

    List of CI types and relationships to be added to default settings

    CMDB data model diagram

    3 Processes

    The Purpose

    Key Benefits Achieved

    Built a right-sized approach to configuration record updates and data validation.

    Activities

    3.1 Define processes for onboarding, offboarding, and maintaining data in the CMDB.

    3.2 Define practices for configuration baselines.

    3.3 Build a data validation and auditing plan.

    Outputs

    Documented processes and workflows

    Data validation and auditing plan

    4 Communications & Roadmap

    The Purpose

    Key Benefits Achieved

    Metrics program defined

    Communications designed

    Activities

    4.1 Define key metrics for configuration management.

    4.2 Define metrics for supporting services.

    4.3 Build configuration management policies.

    4.4 Create a communications plan.

    4.5 Build a roadmap

    Outputs

    Policy for configuration management

    Communications documents

    Roadmap for next steps

    Further reading

    Harness Configuration Management Superpowers

    Create a configuration management practice that will provide ongoing value to the organization.

    EXECUTIVE BRIEF

    Analyst Perspective

    A robust configuration management database (CMDB) can provide value to the business and superpowers to IT. It's time to invest smartly to reap the rewards.

    IT environments are becoming more and more complex, and balancing demands for stability and demands for faster change requires visibility to make the right decisions. IT needs to know their environment intimately. They need to understand dependencies and integrations and feel confident they are making decisions with the most current and accurate view.

    Solutions for managing operations rely on the CMDB to bring visibility to issues, calculate impact, and use predictive analytics to fix performance issues before they become major incidents. AIOps solutions need accurate data, but they can also help identify configuration drift and flag changes or anomalies that need investigation.

    The days of relying entirely on manual entry and updates are all but gone, as the functionality of a robust configuration management system requires daily updates to provide value. We used to rely on that one hero to make sure information was up to date, but with the volume of changes we see in most environments today, it's time to improve the process and provide superpowers to the entire IT department.

    This is a picture of Sandi Conrad

    Sandi Conrad, ITIL Managing Professional
    Principal Research Director, IT Infrastructure & Operations, Info-Tech Research Group

    Executive Summary

    Your Challenge

    • Build a configuration management database (CMDB): You need to implement a CMDB, populate it with records and relationships, and integrate it with discovery and management tools.
    • Identify the benefits of a CMDB: Too many CMDB projects fail because IT tries to collect everything. Base your data model on the desired use cases.
    • Define roles and responsibilities: Keeping data accurate and updated is difficult. Identify who will be responsible for helping

    Common Obstacles

    • Significant process maturity is required: Service configuration management (SCM) requires high maturity in change management, IT asset management, and service catalog practices.
    • Large investment: Building a CMDB takes a large amount of effort, process, and expertise.
    • Tough business case: Configuration management doesn't directly provide value to the business, but it requires a lot of investment from IT.

    Info-Tech's Approach

    • Define your scope and objectives: Identify the use cases for SCM and prioritize those objectives into phases.
    • Design the CMDB data model: Align with your existing configuration management system's data model.
    • Operationalize configuration record updates: Integrate your SCM practice with existing practices and lifecycles.

    Start small

    Scope creep is a serial killer of configuration management databases and service configuration management practices.

    Insight summary

    Many vendors are taking a CMDB-first approach to enable IT operations or sometimes asset management. It's important to ensure processes are in place immediately to ensure the data doesn't go stale as additional modules and features are activated.

    Define processes early to ensure success

    The right mindset is just as important as the right tools. By involving everyone early, you can ensure the right data is captured and validated and you can make maintenance part of the culture. This is critical to reaching early and continual value with a CMDB.

    Identify use cases

    The initial use case will be the driving force behind the first assessment of return on investment (ROI). If ROI can be realized early, momentum will increase, and the team can build on the initial successes.

    If you don't see value in the first year, momentum diminishes and it's possible the project will never see value.

    Keep the initial scope small and focused

    Discovery can collect a lot of data quickly, and it's possible to be completely overwhelmed early in the process.

    Build expertise and troubleshoot issues with a smaller scope, then build out the process.

    Minimize customizations

    Most CMDBs have classes and attributes defined as defaults. Use of the defaults will enable easier implementation and faster time to value, especially where automations and integrations depend on standard terms for field mapping.

    Automate as much as possible

    In large, complex environments, the data can quickly become unmanageable. Use automation as much as possible for discovery, dependency mapping, validation, and alerts. Minimize the amount of manual work but ensure everyone is aware of where and how these manual updates need to happen to see continual value.

    Info-Tech's Harness Configuration Management Superpowers.

    Configuration management will improve functionality of all surrounding processes

    A well-functioning CMDB empowers almost all other IT management and governance practices.

    Service configuration management is about:

    • Building a system of record about IT services and the components that support those services.
    • Continuously reconciling and validating information to ensure data accuracy.
    • Ensuring the data lifecycle is defined and well understood and can pass data and process audits.
    • Accessing information in a variety of ways to effectively serve IT and the business.
    An image of Info-Tech's CMDB Configuration Management tree, breaking down aspects into the following six categories: Strategic Partner; Service Provider; Proactive; Stabilize; Core; and Foundational.

    Configuration management most closely impacts these practices

    Info-Tech Research Group sees a clear relationship.

    When an IT department reports they are highly effective at configuration management, they are much more likely to report they are highly effective at these management and governance processes:

    The following management and governance processes are listed: Quality Management; Asset Management; Performance Measurement; Knowledge Management; Release Management; Incident and Problem Management; Service Management; Change Management.

    The data is clear

    Service configuration management is about more than just doing change management more effectively.

    Source: Info-Tech Research Group, IT Management and Governance Diagnostic; N=684 organizations, 2019 to July 2022.

    Make the case to use configuration management to improve IT operations

    Consider the impact of access to data for informing innovations, optimization efforts, and risk assessments.

    75% of Uptime's 2021 survey respondents who had an outage in the past three years said the outage would have been prevented if they'd had better management or processes.(1)

    75%

    75% of Uptime's 2021 survey respondents who had an outage in the past three years said the outage would have been prevented if they'd had better management or processes.(1)

    42%

    of publicly reported outages were due to software or configuration issues. (1)

    58%

    of networking-related IT outages were due to configuration and change management failure.(1)

    It doesn't have to be that way!

    Enterprise-grade IT service management (ITSM) tools require a CMDB for the different modules to work together and to enable IT operations management (ITOM), providing greater visibility.

    Decisions about changes can be made with accurate data, not guesses.

    The CMDB can give the service desk fast access to helpful information about the impacted components, including a history of similar incidents and resolutions and the relationship between the impacted components and other systems and components.

    Turn your team into IT superheroes.

    CMDB data makes it easier for IT Ops groups to:

    • Avoid change collisions.
    • Eliminate poor changes due to lack of visibility into complex systems.
    • Identify problematic equipment.
    • Troubleshoot incidents.
    • Expand the services provided by tier 1 and through automation.

    Benefits of configuration management

    For IT

    • Configuration management will supercharge processes that have relied on inherent knowledge of the IT environment to make decisions.
    • IT will more quickly analyze and understand issues and will be positioned to improve and automate issue identification and resolution.
    • Increase confidence and reduce risks for decisions involving release and change management with access to accurate data, regardless of the complexity of the environment.
    • Reduce or eliminate unplanned work related to poor outcomes due to decisions made with incorrect or incomplete data.

    For the Business

    • Improve strategic planning for business initiatives involving IT solutions, which may include integrations, development, or security concerns.
    • More quickly deploy new solutions or updates due to visibility into complex environments.
    • Enable business outcomes with reliable and stable IT systems.
    • Reduce disruptions caused by planning without accurate data and improve resolution times for service interruptions.
    • Improve access to reporting for budgeting, showbacks, and chargebacks as well as performance metrics.

    Measure the value of this blueprint

    Fast-track your planning and increase the success of a configuration management program with this blueprint

    Workshop feedback
    8.1/10

    $174,000 savings

    30 average days saved

    Guided Implementation feedback

    8.7/10

    $31,496 average savings

    41 average days saved

    "The workshop was well run, with good facilitation, and gained participation from even the most difficult parts of the audience. The best part of the experience was that if I were to find myself in the same position in the future, I would repeat the workshop."

    – University of Exeter

    Info-Tech offers various levels of support to best suit your needs

    DIY Toolkit

    “Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful.”

    Guided Implementation

    “Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track.”

    Workshop

    “We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place.”

    Consulting

    “Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project.”

    Diagnostics and consistent frameworks used throughout all four options

    Guided Implementation

    What does a typical GI on this topic look like?

    Phase 1 Phase 2 Phase 3 Phase 4

    Call #1: Scope requirements, objectives, and your specific challenges.

    Call #2: Prioritize services and use cases.

    Call #3: Identify data needed to meet goals.

    Call #4: Define roles and responsibilities.

    Call #5: Define and prioritize your services.

    Call #6: Evaluate and test CMDB default classifications.

    Call #7: Build a data model diagram.

    Call #8: Define processes for onboarding, offboarding, and maintaining data.

    Call #9: Discuss configuration baselines.

    Call #10: Build a data validation and audit plan.

    Call #11: Define key metrics.

    Call #12: Build a configuration management policy and communications plan.

    Call #13: Build a roadmap.

    A Guided Implementation (GI) is a series of calls with an Info-Tech analyst to help implement our best practices in your organization.

    A typical GI is between 8 to 12 calls over the course of 4 to 9 months.

    Workshop Overview

    Contact your account representative for more information.
    workshops@infotech.com 1-888-670-8889

    Day 1 Day 2 Day 3 Day 4

    Configuration Management Strategy

    CMDB Data Structure

    Process Design

    Communications & Roadmap

    Activities
    • Introduction
    • Define challenges and goals.
    • Define and prioritize use cases.
    • Identify data needed to meet goals.
    • Define roles and responsibilities.
    • Define and prioritize your services.
    • Evaluate CMDB default classifications.
    • Test configuration items against existing categories.
    • Build a data model diagram.
    • Define processes for onboarding, offboarding, and maintaining data in the CMDB.
    • Define practices for configuration baselines.
    • Build a data validation and auditing plan.
    • Define key metrics for configuration management.
    • Define metrics for supporting services.
    • Build configuration management policies.
    • Create a communications plan.
    • Build a roadmap.

    Deliverables

    • Roles and responsibility matrix
    • Data and reporting use cases based on stakeholder requirements
    • List of CI types and relationships to be added to default settings
    • CMDB data model diagram
    • Documented processes and workflows
    • Data validation and auditing plan
    • Policy for configuration management
    • Roadmap for next steps
    • Communications documents

    Blueprint deliverables

    Each step of this blueprint is accompanied by supporting deliverables to help you accomplish your goals:

    Configuration Management Project Charter

    Detail your approach to building an SCM practice and a CMDB.

    Screenshot from the Configuration Management Project Charter

    Use Cases and Data Worksheet

    Capture the action items related to your SCM implementation project.

    Screenshot from the Use Cases and Data Worksheet

    Configuration Manager Job Description

    Use our template for a job posting or internal job description.

    Screenshot from the Configuration Manager Job Description

    Configuration Management Diagram Template Library

    Use these diagrams to simplify building your SOP.

    Screenshot from the Configuration Management Diagram Template Library

    Configuration Management Policy

    Set expectations for configuration control.

    screenshot from the Configuration Management Policy

    Configuration Management Audit and Validation Checklist

    Use this framework to validate controls.

    Screenshot from the Configuration Management Audit and Validation Checklist

    Configuration Control Board Charter

    Define the board's responsibilities and meeting protocols.

    Screenshot from the Configuration Management Audit and Validation Checklist

    Key deliverable:

    Configuration Management Standard Operating Procedures Template

    Outlines SCM roles and responsibilities, the CMDB data model, when records are expected to change, and configuration baselines.

    Four Screenshots from the Configuration Management Standard Operating Procedures Template

    Phase 1

    Configuration Management Strategy

    Strategy Data Structure Processes Roadmap
    • Challenges and Goals
    • Use Cases and Data
    • Roles and Responsibilities
    • Services
    • Classifications
    • Data Modeling
    • Lifecycle Processes
    • Baselines
    • Audit and Data Validation
    • Metrics
    • Communications Plan
    • Roadmap

    This phase will walk you through the following aspects of a configuration management system:

    • Scope
    • Use Cases
    • Reports and Analytics

    This phase involves the following participants:

    • IT and business service owners
    • Business/customer relationship managers
    • Enterprise architects
    • Practice owners and managers
    • SCM practice manager
    • SCM project manager
    • SCM project sponsor

    Harness Service Configuration Management Superpowers

    Establish clear definitions

    Ensure everyone is using the same terms.

    Term Definition
    Configuration Management

    The purpose of configuration management is to:

    • "Ensure that accurate and reliable information about the configuration of services, and the CIs that support them, is available when and where it is needed. This includes information on how CIs are configured and the relationships between them" (AXELOS).
    • "Provide sufficient information about service assets to enable the service to be effectively managed. Assess the impact of changes and deal with service incidents" (ISACA, 2018).
    Configuration Management System (CMS) A set of tools and databases used to manage, update, and present data about all configuration items and their relationships. A CMS may maintain multiple federated CMDBs and can include one or many discovery and dependency mapping tools.
    Configuration Management Database (CMDB) A repository of configuration records. It can be as simple as a spreadsheet or as complex as an integrated database populated through multiple autodiscovery tools.
    Configuration Record Detailed information about a configuration item.
    Configuration Item (CI)

    "Any component that needs to be managed in order to deliver an IT service" (AXELOS).

    These components can include everything from IT services and software to user devices, IT infrastructure components, and documents (e.g. maintenance agreements).
    Attributes Characteristics of a CI included in the configuration record. Common attributes include name, version, license expiry date, location, supplier, SLA, and owner.
    Relationships Information about the way CIs are linked. A CI can be part of another CI, connect to another CI, or use another CI. A CMDB is significantly more valuable when relationships are recorded. This information allows CMDB users to identify dependencies between components when investigating incidents, performing root-cause analysis, assessing the impact of changes before deployment, and much more.

    What is a configuration management database (CMDB)?

    The CMDB is a system of record of your services and includes a record for everything you need to track to effectively manage your IT services.

    Anything that is tracked in your CMDB is called a configuration item (CI). Examples of CIs include:

    • User-Facing Services
    • IT-Facing Services
    • Business Capabilities
    • Relationships
    • IT Infrastructure Components
    • Enterprise Software
    • End-User Devices
    • Documents

    Other systems of record can refer to CIs, such as:

    • Ticket database: Tickets can refer to which CI is impacted by an incident or provided as part of a service request.
    • Asset management database (AMDB): An IT asset is often also a CI. By associating asset records with CI records, you can leverage your IT asset data in your reporting.
    • Financial systems: If done well, the CMDB can supercharge your IT financial cost model.

    CMDBs can allow you to:

    • Query multiple databases simultaneously (so long as you have the CI name field in each database).
    • Build automated workflows and chatbots that interact with data across multiple databases.
    • More effectively identify the potential impact of changes and releases.

    Do not confuse asset with configuration

    Asset and configuration management look at the same world through different lenses

    • IT asset management (ITAM) tends to focus on each IT asset in its own right: assignment or ownership, lifecycle, and related financial obligations and entitlements.
    • Configuration management is focused on configuration items (CIs) that must be managed to deliver a service and the relationships and integrations with other CIs.
    • ITAM and configuration management teams and practices should work closely together. Though asset and configuration management focus on different outcomes, they may use overlapping tools and data sets. Each practice, when working effectively, can strengthen the other.
    • Many objects will exist in both the CMDB and AMDB, and the data on those shared objects will need to be kept in sync.

    A comparison between Asset and Configuration Management Databases

    *Discovery, dependency mapping, and data normalization are often features or modules of configuration management, asset management, or IT service management tools.

    Start with ITIL 4 guiding principles to make your configuration management project valuable and realistic

    Focus on where CMDB data will provide value and ensure the cost of bringing that data in will be reasonable for its purpose. Your end goal should be not just to build a CMDB but to use a CMDB to manage workload and workflows and manage services appropriately.

    Focus on value

    Include only the relevant information required by stakeholders.

    Start where you are

    Use available sources of information. Avoid adding new sources and tools unless they are justified.

    Progress iteratively with feedback

    Regularly review information use and confirm its relevance, adjusting the CMDB scope if needed.

    Collaborate and promote visibility

    Explain and promote available sources of configuration information and the best ways to use them, then provide hints and tips for more efficient use.

    Think and work holistically

    Consider other sources of data for decision making. Do not try to put everything in the CMDB.

    Keep it simple and practical

    Provide relevant information in the most convenient way; avoid complex interfaces and reports.

    Optimize and automate

    Continually optimize resource-consuming practice activities. Automate CDMB verification, data collection, relationship discovery, and other activities.

    ITIL 4 guiding principles as described by AXELOS

    Step 1.1

    Identify use cases and desired benefits for service configuration management

    Activities

    1.1.1 Brainstorm data collection challenges

    1.1.2 Define goals and how you plan to meet them

    1.1.3 Brainstorm and prioritize use cases

    1.1.4 Identify the data needed to reach your goals

    1.1.5 Record required data sources

    This step will walk you through the following aspects of a configuration management system:

    • Scope
    • Use cases

    This phase involves the following participants:

    • IT and business service owners
    • Business/customer relationship managers
    • Enterprise architects
    • Practice owners and managers
    • SCM practice manager
    • Project sponsor
    • Project manager

    Identify potential obstacles in your organization to building and maintaining a CMDB

    Often, we see multiple unsuccessful attempts to build out a CMDB, with teams eventually losing faith and going back to spreadsheets. These are common obstacles:

    • Significant manual data collection, which is rarely current and fully accurate.
    • Multiple discovery solutions creating duplicate records, with no clear path to deduplicate records.
    • Manual dependency mapping that isn't accurate because it's not regularly assessed and updated.
    • Hybrid cloud and on-premises environment with discovery solutions only partially collecting as the right discovery and dependency mapping solutions aren't in place.
    • Dynamic environments (virtual, cloud, or containers) that may exist for a very short time, but no one knows how they should be managed.
    • Lack of expertise to maintain and update the CMDB or lack of an assigned owner for the CMDB. If no one owns the process and is assigned as a steward of data, it will not be maintained.
    • Database that was designed with other purposes in mind and is heavily customized, making it difficult to use and maintain.

    Understanding the challenges to accessing and maintaining quality data will help define the risks created through lack of quality data.

    This knowledge can drive buy-in to create a configuration management practice that benefits the organization.

    1.1.1 Brainstorm data collection challenges

    Involve stakeholders.
    Allot 45 minutes for this discussion.

    1. As a group, brainstorm the challenges you have with data:
    2. Accuracy and trustworthiness: What challenges do you have with getting accurate data on IT services and systems?
      1. Access: Where do you have challenges with getting data to people when they need it?
      2. Manually created data: Where are you relying on data that could be automatically collected?
      3. Data integration: Where do you have issues with integrating data from multiple sources?
      4. Impact: What is the result of these challenges?
    3. Group together these challenges into similar issues and identify what goals would help overcome them.
    4. Record these challenges in the Configuration Management Project Charter, section 1.2: Project Purpose.

    Download the Configuration Management Project Charter

    Input

    Output

    • None
    • List of high-level desired benefits for SCM
    Materials Participants
    • Whiteboard/flip charts
    • Sticky notes
    • Markers/pens
    • Configuration Management Project Charter
    • IT and business service owners
    • Business/customer relationship managers
    • Practice owners and managers
    • SCM practice manager
    • SCM project sponsor

    Info-Tech Maturity Ladder

    Identify your current and target state

    INNOVATOR

    • Characteristics of business partner
    • Integration with orchestration tools

    BUSINESS PARTNER

    Data collection and validation is fully automated

    Integrated with several IT processes

    Meets the needs of IT and business use cases

    TRUSTED OPERATOR

    • Data collection and validation is partially or fully automated
    • Trust in data accuracy is high, meets the needs of several IT use cases

    FIREFIGHTER

    • Data collection is partially or fully automated, validation is ad hoc
    • Trust in data accuracy is variable, used for decision making

    UNSTABLE

    INNOVATOR

    • Characteristics of business partner
    • Integration with orchestration tools

    BUSINESS PARTNER

    • Data collection and validation is fully automated
    • Integrated with several IT processes
    • Meets the needs of IT and business use cases

    TRUSTED OPERATOR

    • Data collection and validation is partially or fully automated
    • Trust in data accuracy is high, meets the needs of several IT use cases

    FIREFIGHTER

    • Data collection is partially or fully automated, validation is ad hoc
    • Trust in data accuracy is variable, used for decision making

    UNSTABLE

    A tower is depicted, with arrows pointing to Current (orange) and Target(blue)

    Define goals for your CMDB to ensure alignment with all stakeholders

    • How are business or IT goals being hindered by not having the right data available?
    • If the business isn't currently asking for service-based reporting and accountability, start with IT goals. This will help to develop goals that will be most closely aligned to the IT teams' needs and may help incentivize the right behavior in data maintenance.
    • Configuration management succeeds by enabling its stakeholders to achieve their outcomes. Set goals for configuration management based on the most important outcomes expected from this project. Ask your stakeholders:
      1. What are the business' or IT's planned transformational initiatives?
      2. What are your highest priority goals?
      3. What should the priorities of the configuration management practice be?
    • The answers to these questions will shape your approach to configuration management. Direct input from your leadership and executives, or their delegates, will help ensure you're setting a solid foundation for your practice.
    • Identify which obstacles will need to be overcome to meet these goals.

    "[T]he CMDB System should be viewed as a 'system of relevance,' rather than a 'single source of truth.' The burdens of relevance are at once less onerous and far more meaningful in terms of action, analysis, and automation. While 'truth' implies something everlasting or at least stable, relevance suggests a far more dynamic universe."

    – CMDB Systems, Making Change Work in the Age of Cloud and Agile, Drogseth et al

    Identify stakeholders to discuss what they need from a CMDB; business and IT needs will likely differ

    Define your audience to determine who the CMDB will serve and invite them to these conversations. The CMDB can aid the business and IT and can be structured to provide dashboards and reports for both.

    Nondiscoverable configuration items will need to be created for both audiences to organize CIs in a way that makes sense for all uses.

    Integrations with other systems may be required to meet the needs of your audience. Note integrations for future planning.

    Business Services

    Within the data sets, service configuration models can be used for:

    • Impact analysis
    • Cause and effect analysis
    • Risk analysis
    • Cost allocation
    • Availability analysis and planning

    Technical Services

    Connect to IT Finance for:

    • Service-based consumption and costing
    • Financial awareness through showback
    • Financial recovery through chargeback
    • Support IT strategy through financial transparency
    • Cost optimization
    • Reporting for depreciation, location-related taxation, and capitalization (may also use asset management for these)

    Intersect with IT Processes to:

    • Reduce time to restore services through incident management
    • Improve stability through change management
    • Reduce outages through problem management
    • Optimize assets through IT asset management
    • Provide detailed reporting for audit/governance, risk, and compliance

    1.1.2 Define goals and how you plan to meet them

    Involve stakeholders.

    Allot 45 minutes for this discussion.

    As a group, identify current goals for building and using a CMDB.

    Why are we doing this?

    • How do you hope to use the data within the CMDB?
    • What processes will be improved through use of this data and what are the expected outcomes?

    How will we improve the process?

    • What processes will be put in place to ensure data integrity?
    • What tools will be put in place to improve the methods used to collect and maintain data?

    Record these goals in the Configuration Management Project Charter, section 1.3: Project Objectives.

    Input

    Output

    • None
    • List of high-level desired benefits for SCM
    Materials Participants
    • Whiteboard/flip charts
    • Sticky notes
    • Markers/pens
    • Configuration Management Project Charter
    • IT and business service owners
    • Business/customer relationship managers
    • Practice owners and managers
    • SCM practice manager
    • SCM project sponsor

    It's easy to think that if you build it, they will come, but CMDBs rarely succeed without solid use cases

    Set expectations for your organization that defined and fulfilled use cases will factor into prioritization exercises, functional plans, and project milestones to achieve ROI for your efforts.

    A good use case:

    • Justifies resource allocation
    • Gains funding for the right tools
    • Builds stakeholder support
    • Drives interest and excitement
    • Gains support from anyone in a position to help build out and validate the data
    • Helps to define success

    In the book CMDB Systems, Making Change Work in the Age of Cloud and Agile, authors Drogseth, Sturm, and Twing describe the secrets of success:

    A documented evaluation of CMDB System vendors showed that while most "best case" ROI fell between 6 and 9 months for CMDB deployments, one instance delivered ROI for a significant CMDB investment in as little as 2 weeks!

    If there's a simple formula for quick time to value for a CMDB System, it's the following:

    Mature levels of process awareness
    + Strong executive level support
    + A ready and willing team with strongly supportive stakeholders
    + Clearly defined and ready phase one use case
    + Carefully selected, appropriate technologies

    All this = Powerful early-phase CMDB System results

    Define and prioritize use cases for how the CMDB will be used to drive value

    The CMDB can support several use cases and may require integration with various modules within the ITSM solution and integration with other systems.

    Document the use cases that will drive your CMDB to relevance, including the expected benefits for each use case.

    Identify the dependencies that will need to be implemented to be successful.

    Define "done" so that once data is entered, verified, and mapped, these use cases can be realized.

    "Our consulting experience suggests that more than 75% of all strategic initiatives (CMDB or not) fail to meet at least initial expectations across IT organizations. This is often due more to inflated expectations than categorical failure."

    – CMDB Systems, Making Change Work in the Age of Cloud and Agile, Drogseth et al.

    This image demonstrates how CMBD will be used to drive value.

    After identifying use cases, determine the scope of configuration items required to feed the use cases

    On-premises software and equipment will be critical to many use cases as the IT team and partners work on network and data-center equipment, enterprise software, and integrations through various means, including APIs and middleware. Real-time and near real-time data collection and validation will ensure IT can act with confidence.

    Cloud use can include software as a service (SaaS) solutions as well as infrastructure and platform as a service (IaaS and PaaS), and this may be more challenging for data collection. Tools must be capable of connecting to cloud environments and feeding the information back into the CMDB. Where on-premises and cloud applications show dependencies, you might need to validate data if multiple discovery and dependency mapping solutions are used to get a complete picture. Tagging will be crucial to making sense of the data as it comes into the CMDB.

    In-house developed software would be beneficial to have in the CMDB but may require more manual work to identify and classify once discovered. A combination of discovery and tagging may be beneficial to input and classification.

    Highly dynamic environments may require data collection through integration with a variety of solutions to manage and record continuous deployment models and verifications, or they may rely on tags and activity logs to record historical activity. Work with a partner who specializes in CI/CD to help architect this use case.

    Containers will require an assessment of the level of detail required. Determine if the container is a CI and if the content will be described as attributes. If there is value to your use case to map the contents of each container as separate CIs within the container CI, then you can map to that level of detail, but don't map to that depth unless the use case calls for it.

    Internet of Things (IoT) devices and applications will need to match a use case as well. IoT device asset data will be useful to track within an asset database but may have limited value to add to a CMDB. If there are connections between IoT applications and data warehouses, the dependencies should likely be mapped to ensure continued dataflow.

    Out of scope

    A single source of data is highly beneficial, but don't make it a catchall for items that are not easily stored in a CMDB.

    Source code should be stored in a definitive media library (DML). Code can be linked to the CMDB but is generally too big to store in a CMDB and will reduce performance for data retrieval.

    Knowledge articles and maintenance checklists are better suited to a knowledge base. They can also be linked to the CDMB if needed but this can get messy where many-to-many relationships between articles and CIs exist.

    Fleet (transportation) assets and fixed assets should be in fleet management systems and accounting systems, respectively. Storing these types of data in the CMDB doesn't provide value to the support process.

    1.1.3 Brainstorm and prioritize use cases

    Which IT practices will you supercharge?

    Focus on improving both operations and strategy.

    1. Brainstorm the list of relevant use cases. What do you want to do with the data from the CMDB? Consider:
      1. ITSM management and governance practices
      2. IT operations, vendor orchestration, and service integration and management (SIAM) to improve vendor interactions
      3. IT finance and business service reporting needs
    2. Identify which use cases are part of your two- to three-year plan, including the purpose for adding configuration data into that process. Prioritize one or two of these use cases to accomplish in your first year.
    3. Identify dependencies to manage as part of the solution and define a realistic timeline for implementing integrations, modules, or data sources.
    4. Document this table in the Configuration Management Project Charter, section 2.2: Use Cases.
    Audience Use Case Goal/Purpose Project/Solution Dependencies Proposed Timeline Priority
    • IT
    • Change Management

    Stabilize the process by seeing:

    Change conflict reporting

    Reports of CI changes without change records

    System availability

    RFC mapping requires discovered CIs

    RFC review requires criticality, technical and business owners

    Conflict reporting requires dependency mapping

    • Discovery and manual information entered by October
    • Dependency mapping implemented by December

    High

    Determine what additional data will be needed to achieve your use cases

    Regardless of which use cases you are planning to fulfill with the CMDB, it is critical to not add data and complexity with the plan of resolving every possible inquiry. Ensure the cost and effort of bringing in the data and maintaining it is justified. The complexity of the environment will impact the complexity of data sources and integrations for discovery and dependency mapping.

    Before bringing in new data, consider:

    • Is this information available in other maintained databases now?
    • Will this data be critical for decision making? If it is nice to have or optional, can it be automatically moved into the database and maintained using existing integrations?
    • Is there a cost to bringing the data into the CMDB and maintaining it? Is that cost reasonable for its purpose?
    • How frequently will this information be accessed, and can it be updated in an adequate cadence to meet these needs?
    • When does this information need to be available?

    Info-Tech Insight

    If data will be used only occasionally upon request, determine if it will be more efficient to maintain it or to retrieve it from the CMDB or another data source as needed.

    Remember, within the data sets, service configuration models can be used for:

    • Impact analysis
    • Cause and effect analysis
    • Risk analysis
    • Cost allocation
    • Availability analysis and planning

    1.1.4 Expand your use cases by identifying the data needed to reach your goals

    Involve stakeholders.

    Allot 60 minutes for this discussion.

    Review use cases and their goals.

    Identify what data will be required to meet those goals and determine whether it will be mandatory or optional/nice-to-have information.

    Identify sources of data for each type of data. Color code or sort.

    Italicize data points that can be automatically discovered.

    Gain consensus on what information will be manually entered.

    Record the data in the Use Cases and Data Worksheet.

    Download the Use Cases and Data Worksheet

    Input

    Output

    • None
    • List of data requirements
    MaterialsParticipants
    • Whiteboard/flip charts
    • Sticky notes
    • Markers/pens
    • Use Cases and Data Worksheet
    • IT and business service owners
    • Business/customer relationship managers
    • Practice owners and managers
    • SCM practice manager
    • SCM project sponsor

    Use discovery and dependency mapping tools to automatically update the CMDB

    Avoid manual data entry whenever possible.

    Consider these features when looking at tools:

    • Application dependency mapping: Establishing and tracking the relationships and dependencies between system components, applications, and IT services. The ideal tool will be able to generate maps automatically.
    • Agentless and agent discovery: Scanning systems with both agent and agentless approaches. Agent-based scanning provides comprehensive information on applications used in individual endpoints, which is helpful in minimizing its IT footprint. However, agents require endpoint access. Agentless-based scanning provides a broader and holistic view of deployed applications without the need to install an agent on end devices, which can be good enough for inventory awareness.
    • Data export capability: Easy exporting of application inventory information to be used in reports and other tools.
    • Dashboards and chart visualization: Detailed list of the application inventory, including version number, number of users, licenses, deployment location, and other application details. These details will inform decision makers of each application's health and its candidacy for further rationalization activities.
    • Customizable scanning scripts: Tailor your application discovery approach by modifying the scripts used to scan your systems.
    • Integration with third-party tools: Easy integration with other systems with out-of-the-box plugins or customizable APIs.

    Determine which data collection methods will be used to populate the CMDB

    The effort-to-value ratio is an important factor in populating a CMDB. Manual efforts require a higher process focus, more intensive data validation, and a constant need to remind team members to act on every change.

    Real-Time Data AIOps continual scans Used for event and incident management
    Near Real-Time Data Discovery and dependency mapping run on a regular cycle Used for change and asset management
    Historical Data Activity log imports, manual data entry Used for IT finance, audit trail
    • Determine what amount of effort is appropriate for each data grouping and use case. As decisions are made to expand data within the CMDB, the effort-to-value ratio should always factor in. To be usable, data must be accurate, and every piece of data that needs to be manually entered runs the risk of becoming obsolete.
    • Identify which data sources will bring in each type of data. Where there is a possibility of duplicate records being created, one of the data sources will need to be identified as the primary.
    • If the decision is to manually enter configuration items early in the process, be aware that automation may create duplicates of the CIs that will need to be deduplicated at some point in the process to make the information more usable.
    • Typically, items are discovered, validated, then mapped, but there will be variations depending on the source.
    • Active Directory or LDAP may be used to bring users and technicians into the CMDB. Data may be imported from spreadsheets. Identify efforts where data cleanup may have to happen before transferring into the CMDB.
    • Identify how often manual imports will need to be conducted to make sure data is usable.

    Identify other nondiscoverable data that will need to be added to or accessed by the CMDB

    Foundational data, such as technicians, end users and approvers, roles, location, company, agency, department, building, or cost center, may be added to tables that are within or accessed by the CMDB. Work with your vendor to understand structure and where this information resides.

    • These records can be imported from CSV files manually, but this will require manual removal or edits as information changes.
    • Integration with the HRIS, Active Directory, or LDAP will enable automatic updates through synchronization or scheduled imports.
    • If synchronization is fully enabled, new data can be added and removed from the CMDB automatically.
    • Identify which nondiscoverable attributes will be needed, such as system criticality, support groups, groups it is managed by, location.
    • If partially automating the process, identify where manual updates will need to occur.
    • If fully automating the process, notifications will need to be set up when business owner or product or technical owner fields become empty to prompt defining a replacement within the CMDB.
    • Determine who will manage these updates.
    • Work with your CMDB implementation vendor to determine the best option for bringing this information in.

    1.1.5 Record required data sources

    Allot 15 minutes for this discussion.

    1. Where do you track the work involved in providing services? Typically, your ticket database tracks service requests and incidents. Additional data sources can include:
      • Enterprise resource planning tools for tracking purchase orders
      • Project management information system for tracking tasks
    2. What trusted data sources exist for the technology that supports these services? Examples include:
      • Management tools (e.g. Microsoft Endpoint Configuration Manager)
      • Architectural diagrams and network topology diagrams
      • IT asset management database
      • Spreadsheets
      • Other systems of record
    3. What other data sources can help you gather the data you identified in activity 1.1.4?
    4. Record the relevant data sources for each use case in the Configuration Management Standard Operating Procedures, section 6: Data Collection and Updates.

    Info-Tech Insight

    Improve the trustworthiness of your CMDB as a system of record by relying on data that is already trusted.

    Input

    Output

    • Use cases
    • List of data requirements
    MaterialsParticipants
    • Use Cases and Data Worksheet
    • Configuration Management Standard Operating Procedures
    • IT and business service owners
    • Practice owners and managers
    • SCM practice manager
    • SCM project sponsor

    Step 1.2

    Define roles and responsibilities

    Activities

    1.2.1 Record the project team and stakeholders

    1.2.2 Complete a RACI chart to define who will be accountable and responsible for configuration tasks

    This step will walk you through the following aspects of a configuration management system:

    • Roles and responsibilities

    This phase involves the following participants:

    • IT service owners
    • Enterprise architects
    • Practice owners and managers
    • SCM practice manager
    • Project manager

    Identify the roles you need in your SCM project

    Determine which roles will need to be involved in the initial project and how to source these roles.

    Leadership Roles
    Oversee the SCM implementation

    1. Configuration Manager – The practice owner for SCM. This is a long-term role.
    2. Configuration Control Board (CCB) Chair – An optional role that oversees proposed alterations to configuration plans. If a CCB is implemented, this is a long-term role.
    3. Project Sponsor or Program Sponsor – Provides the necessary resources for building the CMDB and SCM practices.
    4. Architecture Roles
      Plan the program to build strong foundation
      1. Configuration Management Architect – Technical leader who defines the overall CM solution, plans the scope, selects a tool, and leads the technical team that will implement the solution.
      2. Requirements Analyst – Gathers and manages the requirements for CM.
      3. Process Engineer – Defines, documents, and implements the entire process.

    Architecture Roles
    Plan the program to build strong foundation

    1. Configuration Management Architect – Technical leader who defines the overall CM solution, plans the scope, selects a tool, and leads the technical team that will implement the solution.
    2. Requirements Analyst – Gathers and manages the requirements for CM.
    3. Process Engineer – Defines, documents, and implements the entire process.

    Engineer Roles
    Implement the system

    1. Logical Database Analyst (DBA) Designs the structure to hold the configuration management data and oversees implementation.
    2. Communications and Trainer – Communicates the goals and functions of CM and teaches impacted users the how and why of the process and tools.

    Administrative Roles
    Permanent roles involving long-term ownership

    1. Technical Owner – The system administrator responsible for their system's uptime. These roles usually own the data quality for their system.
    2. Configuration Management Integrator – Oversees regular transfer of data into the CMDB.
    3. Configuration Management Tool Support – Selects, installs, and maintains the CM tool.
    4. Impact Manager – Analyzes configuration data to ensure relationships between CIs are accurate; conducts impact analysis.

    1.2.1 Record the project team and stakeholders

    Allocate 25 minutes to this discussion.

    1. Record the project team.
      1. Identify the project manager who will lead this project.
      2. Identify key personnel that will need to be involved in design of the configuration management system and processes.
      3. Identify where vendors/outsourcers may be required to assist with technical aspects.
      4. Document the project team in the Configuration Management Project Charter, section 1.1: Project Team.
    1. Record a list of stakeholders.
      1. Identify stakeholders internal and external to IT.
      2. Build the stakeholder profile. For each stakeholder, identify their role, interest in the project, and influence on project success. You can score these criteria high/medium/low or score them out of ten.
      3. If managed service providers will need to be part of the equation, determine who will be the liaison and how they will provide or access data.
    Input

    Output

    • Project team members
    • Project plan resources
    MaterialsParticipants
    • Configuration Management Project Charter
    • List of project stakeholders and participants
    • IT service owners
    • Practice owners and managers
    • SCM practice manager
    • SCM project sponsor

    Even with full automation, this cannot be a "set it and forget it" project if it is to be successful long-term

    Create a team to manage the process and data updates and to ensure data is always usable.

    • Services may be added and removed.
    • Technology will change as technical debt is reduced.
    • Vendors may change as contract needs develop.
    • Additional use cases may be introduced by IT and the business as approaches to management evolve.
    • AIOps can reduce the level of effort and improve visibility as configuration items change from the baseline and notifications are automated.
    • Changes can be checked against requests for changes through automated reconciliations, but changes will still need to be investigated where they do not meet expectations.
    • Manual data changes will need to be made regularly and verified.

    "We found that everyone wanted information from the CMDB, but no one wanted to pay to maintain it. People pointed to the configuration management team and said, 'It's their responsibility.'

    Configuration managers, however, cannot own the data because they have no way of knowing if the data is accurate. They can own the processes related to checking accuracy, but not the data itself."
    – Tim Mason, founding director at TRM Associates
    (Excerpt from Viewpoint: Focus on CMDB Leadership)

    Include these roles in your CMDB practice to ensure continued success and continual improvement

    These roles can make up the configuration control board (CCB) to make decisions on major changes to services, data models, processes, or policies. A CCB will be necessary in complex environments.

    Configuration Manager

    This role is focused on ensuring everyone works together to build the CMDB and keep it up to date. The configuration manager is responsible to:

    • Plan and manage the standards, processes, and procedures and communicate all updates to appropriate staff. Focused on continual improvement.
    • Plan and manage population of the CMDB and ensure data included meets criteria for cost effectiveness and reasonable effort for the value it brings.
    • Validate scope of services and CIs to be included and controlled within the CMDB and manage exceptions.
    • Audit data quality to ensure it is valid, is current, and meets defined standards.
    • Evaluate and recommend tools to support processes, data collection, and integrations.
    • Ensure configuration management processes interface with all other service and business management functions to meet use cases.
    • Report on configuration management performance and take appropriate action on process adherence and quality issues.

    Configuration Librarian

    This role is most important where manual data entry is prevalent and where many nonstandard configurations are in place. The librarian role is often held by the tool administrator. The librarian focuses specifically on data within the CMDB, including:

    • Manual updates to configuration data.
    • CMDB data verification on a regular schedule.
    • Processing ad hoc requests for data.

    Product/Service/Technical Owners

    The product or technical owner will validate information is correctly updating and reflects the existing data requirements as new systems are provisioned or as existing systems change.

    Interfacing Practice Owners

    All practice owners, such as change manager, incident manager, or problem manager, must work with the configuration team to ensure data is usable for each of the use cases they are responsible for.

    Download the Configuration Manager job description

    Assign configuration management responsibilities and accountabilities

    Align authority and accountability.

    • A RACI exercise will help you discuss and document accountability and responsibility for critical configuration management activities.
    • When responsibility and accountability are not well documented, it's often useful to invite a representative of the roles identified to participate in this alignment exercise. The discussion can uncover contrasting views on responsibility and governance, which can help you build a stronger management and governance model.
    • The RACI chart can help you identify who should be involved when making changes to a given activity. Clarify the variety of responsibilities assigned to each key role.
    • In the future, you may need to define roles in more detail as you change your configuration management procedures.

    Responsible: The person who actually gets the job done.
    Different roles may be responsible for different aspects of the activity relevant to their role.

    Accountable: The one role accountable for the activity (in terms of completion, quality, cost, etc.)
    Must have sufficient authority to be held accountable; responsible roles are often accountable to this role.

    Consulted: Those who need the opportunity to provide meaningful input at certain points in the activity; typically, subject matter experts or stakeholders. The more people you must consult, the more overhead and time you'll add to a process.

    Informed: Those who receive information regarding the task but do not need to provide feedback.
    Information might relate to process execution, changes, or quality.

    Complete a RACI chart to define who will be accountable and responsible for configuration tasks

    Determine what roles will be in place in your organization and who will fulfill them, and create your RACI chart to reflect what makes sense for your organization. Additional roles may be involved where there is complexity.

    R = responsible, A = accountable, C = consulted, I = informed CCB Configuration Manager Configuration Librarian Technical Owner(s) Interfacing Practice Owners Tool Administrator
    Plan and manage the standards, processes, and procedures and communicate all updates to appropriate staff. Focused on continual improvement. A R
    Plan and manage population of the CMDB and ensure data included meets criteria for cost effectiveness and reasonable effort for the value it brings. A R
    Validate scope of services and CIs to be included and controlled within the CMDB and manage exceptions. A R
    Audit data quality to ensure it is valid, is current, and meets defined standards. A,R
    Evaluate and recommend tools to support processes, data collection, and integrations. A,R
    Ensure configuration management processes interface with all other service and business management functions to meet use cases. A
    Report on configuration management performance and take appropriate action on process adherence and quality issues. A
    Make manual updates to configuration data. A
    Conduct CMDB data verification on a regular schedule. A
    Process ad hoc requests for data. A
    Enter new systems into the CMDB. A R
    Update CMDB as systems change. A R
    Identify new use cases for CMDB data. R A
    Validate data meets the needs for use cases and quality. R A
    Design reports to meet use cases. R
    Ensure integrations are configured as designed and are functional. R

    1.2.2 Complete a RACI chart to define who will be accountable and responsible for configuration tasks

    Allot 60 minutes for this discussion.

    1. Open the Configuration Management Standard Operating Procedures, section 4.1: Responsibility Matrix. In the RACI chart, review the top row of roles. Smaller organizations may not need a configuration control board, in which case the configuration manager may have more authority.
    2. Modify or expand the process tasks in the left column as needed.
    3. For each role, identify what that person is responsible for, accountable for, consulted on, or informed of. Fill out each column.
    4. Document in the SOP. Schedule a time to share the results with organization leads.
    5. Distribute the chart among all teams in your organization.
    6. Describe additional roles as needed in the documentation.
    7. Add accountabilities and responsibilities for the CCB into the Configuration Control Board Charter.
    8. If appropriate, add auxiliary roles to the Configuration Management Standard Operating Procedures, section 4.2: Configuration Management Auxiliary Role Definitions.

    Notes:

    1. Assign one Accountable for each task.
    2. Have one or more Responsible for each task.
    3. Avoid generic responsibilities such as "team meetings."
    4. Keep your RACI definitions in your documents for quick reference.

    Refer back to the RACI chart when building out the communications plan to ensure accountable and responsible team members are on board and consulted and informed people are aware of all changes.

    Input

    Output

    • Task assignments
    • RACI chart with roles and responsibilities
    MaterialsParticipants
    • Configuration Management Standard Operating Procedures, RACI chart
    • Configuration Control Board Charter, Responsibilities section
    • IT service owners
    • Practice owners and managers
    • SCM practice manager
    • SCM project sponsor

    Phase 2

    Configuration Management Data Model

    StrategyData StructureProcessesRoadmap
    • Challenges and Goals
    • Use Cases and Data
    • Roles and Responsibilities
    • Services
    • Classifications
    • Data Modeling
    • Lifecycle Processes
    • Baselines
    • Audit and Data Validation
    • Metrics
    • Communications Plan
    • Roadmap

    This phase will walk you through the following aspects of a configuration management system:

    • Data Model
    • Customer-Facing and Supporting Services
    • Business Capabilities
    • Relationships
    • IT Infrastructure Components
    • Enterprise Software
    • End-User Devices
    • Documents

    This phase involves the following participants:

    • IT service owners
    • Enterprise architects
    • Practice owners and managers
    • CM practice manager
    • CM project manager

    Step 2.1

    Build a framework for CIs and relationships

    Activities

    Document services:

    2.1.1 Define and prioritize your services

    2.1.2 Test configuration items against existing categories

    2.1.3 Create a configuration control board charter to define the board's responsibilities and protocols

    This step will walk you through the following aspects of a configuration management system:

    • Data model
    • Configuration items
    • Relationships

    This phase involves the following participants:

    • IT service owners
    • Enterprise architects
    • Practice owners and managers
    • CM practice manager
    • Project manager

    Making sense of data daily will be key to maintaining it, starting with services

    As CIs are discovered and mapped, they will automatically map to each other based on integrations, APIs, queries, and transactions. However, CIs also need to be mapped to a conceptional model or service to present the service and its many layers in an easily consumable way.

    These services will need to be manually created or imported into the CMDB and manually connected to the application services. Services can be mapped to technical or business services or both.

    If business services reporting has been requested, talk to the business to develop a list of services that will be required. Use terms the business will be expecting and identify which applications and instances will be mapped to those services.

    If IT is using the CMDB to support service usage and reporting, develop the list of IT services and identify which applications and instances will be mapped to those services.

    This image show the relationship between Discoverable and Nondiscoverable CIs. The discoverable CIs are coloured in purple, and the nondiscoverables are blue.

    Work with your stakeholders to ensure catalog items make sense to them

    There isn't a definitive right or wrong way to define catalog items. For example, the business and IT could both reference application servers, but only IT may need to see technical services broken down by specific locations or device types.

    Refer back to your goals and use cases to think through how best to meet those objectives and determine how to categorize your services.

    Define the services that will be the top-level, nondiscoverable services, which will group together the CIs that make up the complete service. Identify which application(s) will connect into the technical service.

    When you are ready to start discovery, this list of services will be connected to the discovered data to organize it in a way that makes sense for how your stakeholders need to see the data.

    While working toward meeting the goals of the first few use cases, you will want to keep the structure simple. Once processes are in place and data is regularly validated, complexities of different service types and names can be integrated into the data.

    This image show the relationship between Discoverable and Nondiscoverable CIs. Both Discoverable and nondiscoverable CIs are blue.

    Application Service(blue); Technical Service(Purple); IT Shared Services(Orange); Billable Services(green); Service Portfolio(red)

    Define the service types to manage within the CMDB to logically group CIs

    Determine which method of service groupings will best serve your audience for your prioritized use cases. This will help to name your service categories. Service types can be added as the CMDB evolves and as the audience changes.

    Application Service

    Technical Service

    IT Shared Services

    Billable Services

    Service Portfolio

    A set of interconnected applications and hosts configured to offer a service to the organization.

    Example: Financial application service, which may include email, web server, application server, databases, and middleware.

    A logical grouping of CIs based on common criteria.

    Example: Toronto web services, which may include several servers, web applications, and databases.

    A logical grouping of IT and business services shared and used across the organization.

    Example: VoIP/phone services or networking or security services.

    A group of services that will be billed out to departments or customers and would require logical groupings to enable invoicing.

    A group of business and technical service offerings with specific performance reporting levels. This may include multiple service levels for different customer audiences for the same service.

    2.1.1 Define and prioritize your services

    Prioritize your starting point. If multiple audiences need to be accommodated, work with one group at a time.

    Timing: will vary depending on number of services, and starting point

    1. Create your list of services, referencing an existing service catalog, business continuity or disaster recovery plan, list of applications, or brainstorming sessions. Use the terminology that makes the most sense for the audience and their reporting requirements.
    2. If this list is already in place, assess for relevance and reduce the list to only those services that will be managed through the CMDB.
    3. Determine what data will be relevant for each service based on the exercises done in 1.1.4 and 1.1.5. For example, if priority was a required attribute for use case data, ensure each service lists the priority of that service.
    4. For each of these, identify the supporting services. These items can come from your technical service catalog or list of systems and software.
    5. Document this table in the Use Cases and Data Worksheet, tab 3: Service Catalog.

    Service Record Example

    Service: Email
    Supporting Services: M365, Authentication Services

    Service Attributes

    Availability: 24/7 (99.999%)
    Priority: Critical
    Users: All
    Used for: Collaboration
    Billable: Departmental
    Support: Unified Support Model, Account # 123456789

    The CMDB will be organized by services and will enable data analysis through multiple categorization schemes

    To extract maximum service management benefit from a CMDB, the highest level of CI type should be a service, as demonstrated below. While it is easier to start at the system or single-asset level, taking the service mapping approach will provide you with a useful and dynamic view of your IT environment as it relates to the services you offer, instead of a static inventory of components.

    Level 1: Services

    • Business Service Offering: A business service is an IT service that supports a business process, or a service that is delivered to business customers. Business service offerings typically are bound by service-level agreements.
    • IT Service Offering: An IT service supports the customer's business processes and is made up of people, processes, and technology. IT service offerings typically are bound by service-level agreements.

    Level 2: Infrastructure CIs

    • IT Component Set: An IT service offering consists of one of more sets of IT components. An IT component set allows you to group or bundle IT components with other components or groupings.
    • IT Component: An IT system is composed of one or more supporting components. Many components are shared between multiple IT systems.

    Level 3: Supporting CIs

    • IT Subcomponent: Any IT asset that is uniquely identifiable and a component of an IT system.
    • IT components can have subcomponents, and those components can have subcomponents, etc.

    Two charts, showing Enterprise Architect Model and Configuration Service Model. Each box represents a different CI.

    Assess your CMDB's standard category offerings against your environment, with a plan to minimize customization

    Standard categorization schemes will allow for easier integration with multiple tools and reporting and improve results if using machine learning to automate categorization. If the CMDB chosen includes structured categories, use that as your starting point and focus only on gaps that are not addressed for CIs unique to your environment.

    There is an important distinction between a class and a type. This concept is foundational for your configuration data model, so it is important that you understand it.

    • Types are general groupings, and the things within a type will have similarities. For attributes that you want to collect on a type, all children classes and CIs will have those attribute fields.
    • Classes are a more specific grouping within a type. All objects within a class will have specific similarities. You can also use subclasses to further differentiate between CIs.
    • Individual CIs are individual instances of a class or subclass. All objects in a class will have the same attribute fields and behave the same, although the values of their attributes will likely differ.
    • Attributes may be discovered or nondiscoverable and manually added to CIs. The attributes are properties of the CI such as serial number, version, memory, processor speed, or asset tag.

    Use inheritance structures to simplify your configuration data model.

    An example CM Data Model is depicted.

    Assess the list of classes of configuration items against your requirements

    Types are general groupings, and the things within a type will have similarities. Each type will have its own table within the CMDB. Classes within a type are a more specific grouping of configuration items and may include subclasses.

    Review your vendor's CMDB documentation. Find the list of CI types or classes. Most CMDBs will have a default set of classes, like this standard list. If you need to build your own, use the table below as a starting point. Define anything required for unique classes. Create a list and consult with your installation partner.

    Sample list of classes organized by type

    Types Services Network Hardware Storage Compute App Environment Documents
    Classes
    • Application Service
    • Technical Service
    • IT Shared Service
    • Billable Service
    • Service Portfolio
    • Switch
    • Router
    • Firewall
    • Modem
    • SD-WAN
    • Load Balancer
    • UPS
    • Computer
    • Laptop
    • Server
    • Tablet
    • Database
    • Network-Attached Storage
    • Storage Array Network
    • Blob
    • Operating System
    • Hypervisor
    • Virtual Server
    • Virtual Desktop
    • Appliance
    • Virtual Application
    • Enterprise Application
    • Line of Business Application Software
    • Development
    • Test
    • Production
    • Contract
    • Business Impact Analysis
    • Requirements

    Review relationships to determine which ones will be most appropriate to map your dependencies

    Your CMDB should include multiple relationship types. Determine which ones will be most effective for your environment and ensure everyone is trained on how to use them. As CIs are mapped, verify they are correct and only manually map what is incorrect or not mapping through automation.

    Manually mapping CMDB relationships may be time consuming and prone to error, but where manual mapping needs to take place, ensure the team has a common view of the dependency types available and what is important to map.

    Use automated mapping whenever possible to improve accuracy, provide functional visualizations, and enable dynamic updates as the environment changes.

    Where a dependency maps to external providers, determine where it makes sense to discover and map externally provided CIs.

    • Only connect where there is value in mapping to vendor-owned systems.
    • Only connect where data and connections can be trusted and verified.

    Most common dependency mapping types

    A list of the most common dependency mapping types.

    2.1.2 Test configuration items against existing categories

    Time to complete: 1-2 hours

    1. Select a service to test.
    2. Identify the various components that make up the service, focusing on configuration items, not attributes
    3. Categorize configuration items against types and classes in the default settings of the CMDB.
    4. Using the default relationships within the CMDB, identify the relationships between the configuration items.
    5. Identify types, classes, and relationships that do not fit within the default settings. Determine if there are common terms for these items or determine most appropriate name.
    6. Validate these exceptions with the publisher.
    7. Document exceptions in the Configuration Management Standard Operating Procedures, Appendix 2: Types and Classes of Configuration Items
    Input

    Output

    • List of default settings for classes, types, and relationships
    • Small list of services for testing
    • List of CIs to map to at least one service
    • List of categories to add to the CMDB solution.
    MaterialsParticipants
    • Use Cases and Data Worksheet
    • Configuration Management Standard Operating Procedures
    • IT service owners
    • Practice owners and managers
    • SCM practice manager
    • SCM project sponsor

    2.1.3 Create a configuration control board charter to define the board's responsibilities and protocols

    A charter will set the tone for meetings, ensure purpose is defined and meeting cadence is set for regular reviews.

    1. Open the Configuration Control Board Charter. Review the document and modify as appropriate for your CCB. This will include:
      • Purpose and mandate of the committee – Reference objectives from the project charter.
      • Team composition – Determine the right mix of team members. A team of six to ten people can provide a good balance between having a variety of opinions and getting work done.
      • Voting option – Determine the right quorum to approve changes.
      • Responsibilities – List responsibilities, starting with RACI chart items.
      • Authority – Define the control board's span of control.
      • Governing laws and regulations – List any regulatory requirements that will need to be met to satisfy your auditors.
      • Meeting preparation – Set expectations to ensure meetings are productive.
    2. Distribute the charter to CCB members.
    Input

    Output

    • Project team members
    • Project plan resources
    MaterialsParticipants
    • Configuration Control Board Charter
    • IT service owners
    • Practice owners and managers
    • SCM practice manager
    • SCM project sponsor

    Assess the default list of statuses for each state

    Align this list with your CMDB

    Minimize the number of customizations that will make it difficult to update the platform.

    1. Review the default status list within the tool.
    2. Identify which statuses will be most used. Write a definition for each status.
    3. Update this list as you update process documentation in Step 3.1. After initial implementation, this list should only be modified through change enablement.
    4. Record this list of statuses in the Configuration Management Standard Operating Procedures, Appendix 4: Statuses
    State Status Description
    Preparation Ordered Waiting delivery from the vendor
    In Planning Being created
    Received Vendor has delivered the item, but it is not ready for deployment
    Production In Stock Available to be deployed
    In Use Deployed
    On Loan Deployed to a user on a temporary basis
    For Removal Planning to be phased out but still deployed to an end user
    Offline In Transit Moving to a new location
    Under Maintenance Temporarily offline while a patch or change is applied
    Removed Decommissioned Item has been retired and is no longer in production
    Disposed Item has been destroyed and we are no longer in possession of it
    Lost Item has been lost
    Stolen Item has been stolen

    Step 2.2

    Document statuses, attributes, and data sources

    Activities

    2.2.1 Follow the packet and map out the in-scope services and data centers

    2.2.2 Build data model diagrams

    2.2.3 Determine access rights for your data

    This step will walk you through the following aspects of a configuration management system:

    • Statuses
    • Attributes for each class of CI

    This phase involves the following participants:

    • IT service owners
    • Enterprise architects
    • Practice owners and managers
    • SCM practice manager
    • Project manager

    Outcomes of this step

    • Framework for approaching CI statuses
    • Attributes for each class of CI
    • Data sources for those attributes

    Service mapping approaches

    As you start thinking about dependency mapping, it's important to understand the different methods and how they work, as well as your CMDB's capabilities. These approaches may be all in the same tool, or the tool may only have the top-down options.

    Top down, most common

    Pattern-based

    Most common option, which includes indicators of connections such as code, access rights, scripting, host discovery, and APIs.

    Start with pattern-based, then turn on traffic-based for more detail. This combination will provide the most accuracy.

    Traffic-based

    Map against traffic patterns involving connection rules to get more granular than pattern-based.

    Traffic-based can add a lot of overhead with extraneous data, so you may not want to run it continuously.

    Tag-based

    Primarily used for cloud, containers, and virtual machines and will attach the cloud licenses to their dependent services and any related CIs.

    Tags work well with cloud but will not have the same hierarchical view as on-premises dependency mapping.

    Machine learning

    Machine learning will look for patterns in the traffic-based connections, match CIs to categories and help organize the data.

    Machine learning (ML) may not be in every solution, but if you have it, use it. ML will provide many suggestions to make the life of the data manager easier.

    Model hierarchy

    Automated data mapping will be helpful, but it won't be foolproof. It's critical to understand the data model to validate and map nondiscoverable CIs correctly.

    The framework consists of the business, enterprise, application, and implementation layers.

    The business layer encodes real-world business concepts via the conceptual model.

    The enterprise layer defines all enterprise data assets' details and their relationships.

    The application layer defines the data structures as used by a specific application.

    The implementation layer defines the data models and artifacts for use by software tools.

    An example of Model Hierarchy is depicted.

    Learn how to create data models with Info-Tech's blueprint Create and Manage Enterprise Data Models

    2.2.1 Follow the packet and map out the in-scope services and data centers

    Reference your network topology and architecture diagrams.

    Allot 1 hour for this activity.

    1. Start with a single service that is well understood and documented.
    2. Identify the technical components (hardware and applications) that make up the service.
    3. Determine if there is a need to further break down services into logical service groupings. For example, the email service to the right is broken down into authentication and mail flow.
    4. If you don't have a network diagram to follow, create a simple one to identify workflows within the service and components the service uses.
    5. Record the apps and underlying components in the Configuration Management Standard Operating Procedures, Appendix 1: Configuration Data Model Structure.

    This information will be used for CM project planning and validating the contents of the CMDB.

    an example of a Customer-facing service is shown, for Email sample topology.

    Download the Configuration Management Diagram Template Library to see an example.

    Build your configuration data model

    Rely on out-of-the-box functionality where possible and keep a narrow focus in the early implementation stages.

    1. If you have an enterprise architecture, then your configuration management data model should align with it.
    2. Keep a narrow focus in the early implementation stages. Don't fill up your CMDB until you are ready to validate and fix the data.
    3. Rely on out-of-the-box (OOTB) functionality where possible. If your configuration management database (CMDB) and platform do not have a data model OOTB, then rely on a publicly available data model.
    4. Map your business or IT service offering to the first few layers.

    Once this is built out in the system, you can let the automated dependency mapping take over, but you will still need to validate the accuracy of the automated mapping and investigate anything that is incorrect.

    Sample Configuration Data Model

    Every box represents a CI, and every line represents a relationship

    A sample configuration Data model is shown.

    Example: Data model and CMDB visualization

    Once the data model is entered into the CMDB, it will provide a more dynamic and complex view, including CIs shared with other services.

    An example of a Data Model Exercise

    CMDB View

    An example of a CMDB View of the Data Model Exercise

    2.2.2 Build data model diagrams

    Visualize the expected CI classes and relationships.

    Allot 45 minutes.

    1. Identify the different data model views you need. Use multiple diagrams to keep the information simple to read and understand. Common diagrams include:
      1. Network level: Outline expected CI classes and relationships at the network level.
      2. Application level: Outline the expected components and relationships that make up an application.
      3. Services level: Outline how business capability CIs and service CIs relate to each other and to other types of CIs.
    1. Use boxes to represent CI classes.
    2. Use lines to represent relationships. Include details such as:
      1. Relationship name: Write this name on the arrow.
      2. Direction: Have an arrow point to each child.

    Review samples in Configuration Management Diagram Template Library.
    Record these diagrams in the Configuration Management Standard Operating Procedures, Appendix 1: Configuration Data Model Structure.

    Input

    Output

    • List of default settings for classes, types, and relationships
    • Small list of services for testing
    • List of CIs to map to at least one service
    • List of additions of categories to add to the CMDB solution.
    MaterialsParticipants
    • Configuration Management Standard Operating Procedures
    • Configuration Management Diagram Template Library
    • IT service owners
    • Practice owners and managers
    • SCM practice manager
    • SCM project sponsor

    Download the Configuration Management Diagram Template Library to see examples.

    Determine governance for data security, access, and validation

    Align CMDB access to the organization's access control policy to maintain authorized and secure access for legitimate staff performing their role.

    Data User Type Access Role
    Data consumers
    • View-only access
    • Will need to view and use the data but will not need to make modifications to it
    • Service desk
    • Change manager
    • Major incident manager
    • Finance
    CMDB owner
    • Read/write access with the ability to update and validate data as needed
    • Configuration manager
    Domain owner
    • Read/write access for specific domains
    • Data owner within their domain, which includes validating that data is in the database and that it is correctly categorized.
    • Enterprise architect
    • Application owner
    Data provider
    • Read/write access for specific domains
    • Ensures automated data has been added and adds nondiscoverable assets and attributes as needed
    • Server operations
    • Database management
    • Network teams
    CMDB administrator
    • View-only access for data
    • Will need to have access for modifying the structure of the product, including adding fields, as determined by the CCB
    • ITSM tool administrator

    2.2.3 Determine access rights for your data

    Allot 30 minutes for this discussion.

    1. Open the Configuration Management Standard Operating Procedures, section 5: Access Rights.
    2. Review the various roles from an access perspective.
      1. Who needs read-only access?
      2. Who needs read/write access?
      3. Should there be restrictions on who can delete data?
    1. Fill in the chart and communicate this to your CMDB installation vendor or your CMDB administrator.
    Input

    Output

    • Task assignments
    • Access rights and roles
    MaterialsParticipants
    • Configuration Management Standard Operating Procedures
    • IT service owners
    • Practice owners and managers
    • SCM practice manager
    • SCM project sponsor

    Phase 3

    Configuration Record Updates

    StrategyData StructureProcessesRoadmap
    • Challenges and Goals
    • Use Cases and Data
    • Roles and Responsibilities
    • Services
    • Classifications
    • Data Modeling
    • Lifecycle Processes
    • Baselines
    • Audit and Data Validation
    • Metrics
    • Communications Plan
    • Roadmap

    This phase will walk you through the following aspects of a configuration management system:

    • ITSM Practices and Workflows
    • Discovery and Dependency Mapping Tools
    • Auditing and Data Validation Practices

    This phase involves the following participants:

    • IT service owners
    • Enterprise architects
    • Practice owners and managers
    • SCM practice manager
    • SCM project manager
    • IT audit

    Harness Service Configuration Management Superpowers

    Step 3.1

    Keep CIs and relationships up to date through lifecycle process integrations

    Activities

    3.1.1 Define processes to bring new services into the CMDB

    3.1.2 Determine when each type of CI will be created in the CMDB

    3.1.3 Identify when each type of CI will be retired in the CMDB

    3.1.4 Record when and how attributes will change

    3.1.5 Institute configuration control and configuration baselines

    This step will walk you through the following aspects of a configuration management system:

    1. ITSM Practices and Workflows
    2. Discovery and Dependency Mapping Tools

    This phase involves the following participants:

    1. IT service owners
    2. Enterprise architects
    3. Practice owners and managers
    4. SCM practice manager
    5. Project manager

    Outcomes of this step

    • List of action items for updating interfacing practices and processes
    • Identification of where configuration records will be manually updated

    Incorporate CMDB updates into IT operations

    Determine which processes will prompt changes to the CMDB data

    Onboard new services - Offboard Redundant Services. Onboard new CIs - Offboard Redundant CIs; Maintain CIs - Update Attributes.

    Change enablement

    Identify which process are involved in each stage of data input, maintenance, and removal to build out a process for each scenario.

    Project management

    Change enablement

    Asset management

    Security controls

    Project management

    Incident management

    Deployment management

    Change enablement

    Asset management

    Security controls

    Project management

    Incident management

    Service management

    Formalize the process for adding new services to the CMDB

    As new services and products are introduced into the environment, you can improve your ability to correctly cost the service, design integrations, and ensure all operational capabilities are in place, such as data backup and business continuity plans.
    In addition, attributes such as service-level agreements (SLAs), availability requirements, and product, technical, and business owners should be documented as soon as those new systems are made live.

    • Introduce the technical team and CCB to the product early to ensure the service record is created before deployment and to quickly map the services once they are moved into the production environment.
    • Engage with project managers or business analysts to define the process to include security and technical reviews early.
    • Engage with the security and technical reviewers to start documenting the service as soon as it is approved.
    • Determine which practices will be involved in the creation and approval of new services and formalize the process to streamline entry of the new service, onboarding corresponding CIs and mapping dependencies.

    an example of the review and approval process for new service or products is shown.

    3.1.1 Define processes to bring new services into the CMDB

    Start with the most frequent intake methods, and if needed, use this opportunity to streamline the process.

    1. Discuss the methods for new services to be introduced to the IT environment.
    2. Critique existing methods to assess consistency and identify issues that could prevent the creation of services in the CMDB in a timely manner.
    3. Create a workflow for the existing processes, with an eye to improvement. Identify any changes that will need to be introduced and managed appropriately.
    4. Identify where additional groups may need to be engaged to ensure success. For example, if project managers are not interfacing early with IT, discuss process changes with them.
    5. Discuss the validation process and determine where control points are. Document these on the workflows.
    6. Complete the Configuration Management Standard Operating Procedures, section 8.1: Introduce New Service and Data Model.

    Possible intake opportunities:

    • Business-driven project intake process
    • IT-driven project intake process
    • Change enablement reviews
    • Vendor-driven product changes
    Input

    Output

    • Discussion
    • Intake processes
    MaterialsParticipants
    • Configuration Management Standard Operating Procedures
    • Configuration Management Diagram Template Library
    • Configuration control board
    • Configuration manager
    • Project sponsor
    • IT stakeholders

    Identify scenarios where CIs are added and removed in the configuration management database

    New CIs may be introduced with new services or may be introduced and removed as part of asset refreshes or through service restoration in incident management. Updates may be done by your own services team or a managed services provider.
    Determine the various ways the CIs may be changed and test with various CI types.
    Review attributes such as SLAs, availability requirements, and product, technical, and business owners to determine if changes are required.

    • Identify what will be updated automatically or manually. Automation could include discovery and dependency mapping or synchronization with AMDB or AIOps tools.
    • Engage with relevant program managers to define and validate processes.
    • Identify control points and review audit requirements.

    An example of New or refresh CI from Procurement.

    Info-Tech Insight

    Data deemed no longer current may be archived or deleted. Retained data may be used for tracing lifecycle changes when troubleshooting or meeting audit obligations. Determine what types of CIs and use cases require archived data to meet data retention policies. If none do, deletion of old data may be appropriate.

    3.1.2 Identify when each type of CI will be created in the CMDB

    Allot 45 minutes for discussion.

    1. Discuss the various methods for new CIs to be introduced to the IT environment.
    2. Critique existing methods to assess consistency and identify issues that could prevent the creation of CIs in the CMDB in a timely manner.
    3. Create a workflow for the existing processes, with an eye to improvement. Identify any changes that will need to be introduced and managed appropriately.
    4. Identify where additional groups may need to be engaged to ensure success. For example, if project managers are not interfacing early with IT, discuss process changes with them.
    5. Discuss the validation process and determine where control points are. Document these on the workflows.
    6. Complete Configuration Management Standard Operating Procedures, section 8.2: Introduce New Configuration Items to the CMDB

    Possible intake opportunities:

    • Business-driven project intake process
    • IT-driven project intake process
    • Change enablement reviews
    • Vendor-driven product changes
    • Incident management
    • Asset management, lifecycle refresh
    Input

    Output

    • Discussion
    • Retirement processes
    MaterialsParticipants
    • Configuration Management Standard Operating Procedures
    • Configuration Management Diagram Template Library
    • Configuration control board
    • Configuration manager
    • Project sponsor
    • IT stakeholders

    3.1.3 Identify when each type of CI will be retired in the CMDB

    Allot 45 minutes for discussion.

    1. Discuss the various methods for CIs to be removed from the IT environment.
    2. Critique existing methods to assess consistency and identify issues that could prevent the retirement of CIs in the CMDB in a timely manner.
    3. Create a workflow for the existing processes, with an eye to improvement. Identify any changes that will need to be introduced and managed appropriately.
    4. Identify where additional groups may need to be engaged to ensure success. For example, if project managers are not interfacing early with IT, discuss process changes with them.
    5. Discuss the validation process and determine where control points are. Document these on the workflows.
    6. Discuss data retention. How long will retired information need to be archived? What are the potential scenarios where legacy information may be needed for analysis?
    7. Complete the Configuration Management Standard Operating Procedures, section 8.4: Retire and Archive Configuration Records.

    Possible retirement scenarios:

    • Change enablement reviews
    • Vendor-driven product changes
    • Incident management
    • Asset management, lifecycle refresh
    Input

    Output

    • Discussion
    • Intake processes
    MaterialsParticipants
    • Configuration Management Standard Operating Procedures
    • Configuration Management Diagram Template Library
    • Configuration control board
    • Configuration manager
    • Project sponsor
    • IT stakeholders

    Determine appropriate actions for detecting new or changed CIs through discovery

    Automated detection will provide the most efficient way of recording planned changes to CIs as well as detected unplanned changes. Check with the tool to determine what reports or notifications are available for the configuration management process and define what actions will be appropriate.

    As new CIs are detected, identify the process by which they should have been introduced into configuration management and compare against those records. If your CMDB can automatically check for documentation, this may be easier. Weekly reporting will allow you to catch changes quickly, and alerts on critical CIs could enable faster remediation, if the tool allows for alerting. AIOps could identify, notify of, and process many changes in a highly dynamic environment.

    Type of Change

    Impacted Process

    Validation

    Findings

    Actions

    Configuration change to networking equipment or software

    Change management

    Check for request for change

    No RFC

    Add to CAB agenda, notify technical owner

    Configuration change to end-user device or software

    Asset management

    Check for service ticket

    No ticket

    Escalate to asset agenda, notify service manager

    New assets coming into service

    Security incident and event management

    Check for SIEM integration

    No SIEM integration

    Notify security operations team to investigate

    The configuration manager may not have authority to act but can inform the process owners of unauthorized changes for further action. Once the notifications are forwarded to the appropriate process owner, the configuration manager will note the escalation and follow up on data corrections as deemed appropriate by the associated process owner.

    3.1.4 Record when and how attributes will change

    These lists will help with configuration control plans and your implementation roadmap.

    1. List each attribute that will change in that CI type's life.
    2. Write all the times that each attribute will change. Identify:
      1. The name of the workflow, service request, process, or practice that modifies the attribute.
      2. Whether the update is made automatically or manually.
      3. The role or tool that updates the CMDB.
    1. Update the relevant process or procedure documentation. Explicitly identify when the configuration records are updated.

    Document these tables in Configuration Management Standard Operation Procedures, Section 8.7: Practices That Modify CIs.

    Network Equipment
    Attributes

    Practices That Modify This Attribute

    Status
    • Infra Deployment (updated manually by Network Engineering)
    • Change Enablement (updated manually by CAB or Network Engineering)
    Assigned User
    • IT Employee Offboarding or Role Change (updated manually by Network Engineering)
    Version
    • Patch Deployment (updated automatically by SolarWinds)
    End-User Computers
    Attributes
    Practices That Modify This Attribute
    Status
    • Device Deployment (updated manually by Desktop Support)
    • Device Recovery (updated manually by Desktop Support)
    • Employee Offboarding and Role Change (updated manually by Service Desk)
    Assigned User
    • Device Deployment (updated manually by Desktop Support)
    • Device Recovery (updated manually by Desktop Support)
    • Employee Offboarding and Role Change (updated manually by Service Desk)
    Version
    • Patch Deployment (updated automatically by ConfigMgr)

    Institute configuration control and configuration baselines where appropriate

    A baseline enables an assessment of one or more systems against the desired state and is useful for troubleshooting incidents or problems and validating changes and security settings.

    Baselines may be used by enterprise architects and system engineers for planning purposes, by developers to test their solution against production copies, by technicians to assess configuration drift that may be causing performance issues, and by change managers to assess and verify the configuration meets the target design.

    Configuration baselines are a snapshot of configuration records, displaying attributes and first-level relationships of the CIs. Standard configurations may be integral to the success of automated workflows, deployments, upgrades, and integrations, as well as prevention of security events. Comparing current CIs against their baselines will identify configuration drift, which could cause a variety of incidents. Configuration baselines are updated through change management processes.
    Configuration baselines can be used for a variety of use cases:

    • Version control – Management of software and hardware versions, https://dj5l3kginpy6f.cloudfront.net/blueprints/harness-configuration-management-superpowers-phases-1-4/builds, and releases.
    • Access control – Management of access to facilities, storage areas, and the CMS.
    • Deployment control – Take a baseline of CIs before performing a release so you can use this to check against actual deployment.
    • Identify accidental changes Everyone makes mistakes. If someone installs software on the wrong server or accidentally drops a table in a database, the CMS can alert IT of the unauthorized change (if the CI is included in configuration control).

    Info-Tech Insight

    Determine the appropriate method for evaluating and approving changes to baselines. Delegating this to the CCB every time may reduce agility, depending on volume. Discuss in CCB meetings.

    A decision tree for deploying requested changes.

    3.1.5 Institute configuration control and configuration baselines where appropriate

    Only baseline CIs and relationships that you want to control through change enablement.

    1. Determine criteria for capturing configuration baselines, including CI type, event, or processes.
    2. Identify who will use baselines and how they will use the data. Identify their needs.
    3. Identify CIs that will be out of scope and not have baselines created.
    4. Document requirements in the SOP.
    5. Ensure appropriate team members have training on how to create and capture baselines in the CMDB.
    6. Document in the Configuration Management Standard Operating Procedures, section 8.5: Establish and Maintain Configuration Baselines.
    Process Criteria Systems
    Change Enablement & Deployment All high-risk changes must have the baseline captured with version number to revert to stable version in the event of an unsuccessful change
    • Servers (physical and virtual)
    • Enterprise software
    • IaaS
    • Data centers
    Security Identify when configuration drift may impact risk mitigation strategies
    • Servers (physical and virtual)
    • Enterprise software
    • IaaS
    • Data centers
    Input

    Output

    • Discussion
    • Baseline configuration guidelines
    MaterialsParticipants
    • Configuration Management Standard Operating Procedures
    • Configuration control board
    • Configuration manager
    • Project sponsor
    • IT stakeholders

    Step 3.2

    Validate data within the CMDB

    Activities

    3.2.1 Build an audit plan and checklist

    This step will walk you through the following aspects of a configuration management system:

    • Data validation and audit

    This phase involves the following participants:

    • IT service owners
    • Enterprise architects
    • Practice owners and managers
    • SCM practice manager
    • Project manager
    • IT audit

    Outcomes of this step

    • Updates to processes for data validation
    • Plan for auditing and validating the data in the CMDB

    Audit and validate the CMDB

    Review the performance of the supporting technologies and processes to validate the accuracy of the CMDB.

    A screenshot of the CM Audit Plan.

    CM Audit Plan

    • CM policies
    • CM processes and procedures
    • Interfacing processes
    • Content within the CMDB

    "If the data in your CMDB isn't accurate, then it's worthless. If it's wrong or inaccurate, it's going to drive the wrong decisions. It's going to make IT worse, not better."
    – Valence Howden, Research Director, Info-Tech Research Group

    Ensure the supporting technology is working properly

    Does the information in the database accurately reflect reality?

    Perform functional tests during audits and as part of release management practices.

    Audit results need to have a clear status of "compliant," "noncompliant," or "compliant with conditions," and conditions need to be noted. The conditions will generally offer a quick win to improve a process, but don't use these audit results to quickly check off something as "done." Ensure the fix is useful and meaningful to the process.
    The audit should cover three areas:

    • Process: Are process requirements for the program well documented? Are the processes being followed? If there were updates to the process, were those updates to the process documented and communicated? Has behavior changed to suit those modified processes?
    • Physical: Physical configuration audits (PCAs) are audits conducted to verify that a configuration item, as built, conforms to the technical documentation that defines and describes it.
    • Functional: Functional configuration audits (FCAs) are audits conducted to verify that the development of a configuration item has been completed satisfactorily, the item has achieved the functional attributes specified in the functional or allocated baseline, and its technical documentation is complete and satisfactory.

    Build auditing and validation of processes whenever possible

    When technicians and analysts are working on a system, they should check to make sure the data about that system is correct. When they're working in the CMDB, they should check that the data they're working with is correct.

    More frequent audits, especially in the early days, may help move toward process adoption and resolving data quality issues. If audits are happening more frequently, the audits can include a smaller scope, though it's important to vary each one to ensure many different areas have been audited through the year.

    • Watch for data duplication from multiple discovery tools.
    • Review mapping to ensure all relevant CIs are attached to a product or service.
    • Ensure report data is logical.

    Ensure the supporting technology is working properly

    Does the information in the database accurately reflect reality?

    Perform functional tests during audits and as part of release management practices.

    Audit results need to have a clear status of "compliant," "noncompliant," or "compliant with conditions," and conditions need to be noted. The conditions will generally offer a quick win to improve a process, but don't use these audit results to quickly check off something as "done." Ensure the fix is useful and meaningful to the process.
    The audit should cover three areas:

    • Process: Are process requirements for the program well documented? Are the processes being followed? If there were updates to the process, were those updates to the process documented and communicated? Has behavior changed to suit those modified processes?
    • Physical: Physical configuration audits (PCAs) are audits conducted to verify that a configuration item, as built, conforms to the technical documentation that defines and describes it.
    • Functional: Functional configuration audits (FCAs) are audits conducted to verify that the development of a configuration item has been completed satisfactorily, the item has achieved the functional attributes specified in the functional or allocated baseline, and its technical documentation is complete and satisfactory.

    More frequent audits, especially in the early days, may help move toward process adoption and resolving data quality issues. If audits are happening more frequently, the audits can include a smaller scope, though it's important to vary each one to ensure many different areas have been audited through the year.

    • Watch for data duplication from multiple discovery tools.
    • Review mapping to ensure all relevant CIs are attached to a product or service.
    • Ensure report data is logical.

    Identify where processes break down and data is incorrect

    Once process stops working, data becomes less accurate and people find workarounds to solve their own data needs.

    Data within the CMDB often becomes incorrect or incomplete where human work breaks down

    • Investigate processes that are performed manually, including data entry.
    • Investigate if the process executors are performing these processes uniformly.
    • Determine if there are opportunities to automate or provide additional training.
    • Select a sample of the corresponding data in the CMS. Verify if the data is correct.

    Non-CCB personnel may not be completing processes fully or consistently

    • Identify where data in the CMS needs to be updated.
    • Identify whether the process practitioners are uniformly updating the CMS.
    • Discuss options for improving the process and driving consistency for data that will benefit the whole organization.

    Ensure that the data entered in the CMDB is correct

    • Confirm that there is no data duplication. Data duplication is very common when there are multiple discovery tools in your environment. Confirm that you have set up your tools properly to avoid duplication.
    • Build a process to respond to baseline divergence when people make changes without following change processes and when updates alter settings.
    • Audit the system for accuracy and completeness.

    3.2.1 Build an audit plan and checklist

    Use the audit to identify areas where processes are breaking down.

    Audits present you with the ability to address these pain points before they have greater negative impact.

    1. Identify which regulatory requirements and/or auditing bodies will be relevant to audit processes or findings.
    2. Determine frequency of practice audits and how they relate to internal audits or external audits.
    3. Determine audit scope, including requirements for data spot checks.
    4. Determine who will be responsible for conducting audits and validate this is consistent with the RACI chart.
    5. Record audit procedures in the Configuration Management Standard Operating Procedures section 8.6: Verify and Review the Quality of Information Through Auditing.
    6. Review the Configuration Management Audit and Validation Checklist and modify to suit your needs.

    Download the Configuration Management Audit and Validation Checklist

    Input

    Output

    • Discussion
    • Baseline configuration guidelines
    MaterialsParticipants
    • Configuration Management Standard Operating Procedures
    • Configuration control board
    • Configuration manager
    • Project sponsor
    • IT stakeholders

    Phase 4

    Service Configuration Roadmap

    StrategyData StructureProcessesRoadmap
    • Challenges and Goals
    • Use Cases and Data
    • Roles and Responsibilities
    • Services
    • Classifications
    • Data Modeling
    • Lifecycle Processes
    • Baselines
    • Audit and Data Validation
    • Metrics
    • Communications Plan
    • Roadmap

    This phase will walk you through the following aspect of a configuration management system:
    Roadmap
    This phase involves the following participants:

    • IT service owners
    • Enterprise architects
    • Practice owners and managers
    • SCM practice manager
    • SCM project manager

    Harness Service Configuration Management Superpowers

    Step 4.1

    Define measures of success

    Activities

    4.1.1 Identify key metrics to define configuration management success
    4.1.2 Brainstorm and record desired reports, dashboards, and analytics
    4.1.3 Build a configuration management policy

    This phase will walk you through the following aspects of a configuration management system:

    • Metrics
    • Policy

    This phase involves the following participants:

    • IT service owners
    • Enterprise architects
    • Practice owners and managers
    • SCM practice manager
    • SCM project manager

    The value of metrics can be found in IT efficiency increases

    When determining metrics for configuration management, be sure to separate metrics needed to gauge configuration management success and those that will use data from the CMDB to provide metrics on the success of other practices.

    • Metrics provide accurate indicators for IT and business decisions.
    • Metrics help you identify IT efficiencies and problems and solve issues before they become more serious.
    • Active metrics tracking makes root cause analysis of issues much easier.
    • Proper application of metrics helps IT services identification and prioritization.
    • Operational risks can be prevented by identifying and implementing metrics.
    • Metrics analysis increases the confidence of the executive team and ensures that IT is working well.

    A funnel is shown. The output is IT Performance. The inputs are: Service Desk Metrics; Incident Metrics; Asset Mgmt. Metrics; Release Mgmt. Metrics; Change Mgmt. Metrics; Infra. Metrics

    4.1.1 Identify key metrics to define configuration management success

    Determine what metrics are specifically related to the practice and how and when metrics will be accessed.

    Success factors

    Key metrics

    Source

    Product and service configuration data is relevant

    • Stakeholder satisfaction with data access, accuracy, and usability
    • Stakeholder satisfaction with service configuration management interface, procedures, and reports

    Stakeholder discussions

    • Number of bad decisions made due to incorrect or insufficient data
    • Impact of bad decisions made due to incorrect or insufficient data

    Process owner discussions

    • Number and impact of data identified as incorrect
    • % of CMDB data verified over the period

    CMDB

    Cost and effort are continually optimized

    • Effort devoted to service configuration management
    • Cost of tools directly related to the process

    Resource management or scheduling

    ERP

    Progress reporting

    • Communication execution
    • Process
    • Communications and feedback

    Communications team and stakeholder discussions

    Data – How many products are in the CMDB and are fully and accurately discovered and mapped?

    CMDB

    Ability to meet milestones on time and with appropriate quality

    Project team

    Document metrics in the Configuration Management Standard Operating Procedures, section 7: Success Metrics

    Use performance metrics to identify areas to improve service management processes using CMDB data

    Metrics can indicate a problem with service management processes but cannot provide a clear path to a solution on their own.

    • The biggest challenge is defining and measuring the process and people side of the equation.
    • Expected performance may also need to be compared to actual performance in planning, budgeting, and improvements.
    • The analysis will need to include critical success factors (CSFs), data collection procedures, office routines, engineering practices, and flow diagrams including workflows and key relationships.
    • External benchmarking may also prove useful in identifying how similar organizations are managing aspects of their infrastructure, processing transactions/requests, or staffing. If using external benchmarking for actual process comparisons, clearly defining your internal processes first will make the data collection process smoother and more informative.

    Info-Tech Insight

    Using a service framework such as ITIL, COBIT, or ISO 20000 may make this job easier, and subscribing to benchmarking partners will provide some of the external data needed for comparison.

    4.1.2 Brainstorm and record desired reports, dashboards, and analytics with related practices

    The project team will use this list as a starting point

    Allot 45 minutes for this discussion.

    1. Create a table for each service or business capability.
      1. Have one column for each way of consuming data: reports, dashboards, and ad hoc analytics.
      2. Have one row for each stakeholder group that will consume the information.
    2. Use the challenges and use cases to brainstorm reports, dashboards, and ad hoc analytic capabilities that each stakeholder group will find useful.
    3. Record these results in your Configuration Management Standard Operating Procedures, section 7: Aligned Processes' Desired Analytical Capabilities.
    Stakeholder Groups Reports Dashboards
    Change Management
    • CI changes executed without an RFC
    • RFCs grouped by service
    • Potential collisions in upcoming changes
    Security
    • Configuration changes that no longer match the baseline
    • New configuration items discovered
    Finance
    • Service-based costs
    • Service consumption by department

    Download the blueprint Take Control of Infrastructure and Operations Metrics to create a complete metrics program.

    Create a configuration management policy and communicate it

    Policies are important documents to provide definitive guidelines and clarity around data collection and use, process adherence, and controls.

    • A configuration management policy will apply to IT as the audience, and participants in the program will largely be technical.
    • Business users will benefit from a great configuration management program but will not participate directly.
    • The policy will include objectives and scope, use of data, security and integrity of data, data models and criteria, and baseline configurations.
    • Several governing regulations and practices may intersect with configuration management, such as ITIL, COBIT, and NIST frameworks, as well as change enablement, quality management, asset management, and more.
    • As the policy is written, review processes to ensure policies and processes are aligned. The policy should enable processes, and it may require modifications if it hinders the collection, security, or use of data required to meet proposed use cases.
    • Once the policy is written and approved, ensure all stakeholders understand the importance, context, and repercussions of the policy.

    The approvals process is about appropriate oversight of the drafted policies. For example:

    • Do the policies satisfy compliance and regulatory requirements?
    • Do the policies work with the corporate culture?
    • Do the policies address the underlying need?

    If the draft is approved:

    • Set the effective date and a review date.
    • Begin communication, training, and implementation.

    Employees must know that there are new policies and understand the steps they must take to comply with the policies in their work.

    Employees must be able to interpret, understand, and know how to act upon the information they find in the policies.

    Employees must be informed on where to get help or ask questions and who to request policy exceptions from.

    If the draft is rejected:

    • Acquire feedback and make revisions.
    • Resubmit for approval.

    4.1.3 Build a configuration management policy

    This policy provides the foundation for configuration control.

    Use this template as a starting point.

    The Configuration Management Policy provides the foundation for a configuration control board and the use of configuration baselines.
    Instructions:

    1. Review and modify the policy statements. Ensure that the policy statements reflect your organization and the expectations you wish to set.
    2. If you don't have a CCB: The specified responsibilities can usually be assigned to either the configuration manager or the governing body for change enablement.
    3. Determine if you should apply this policy beyond SCM. As written, this policy may provide a good starting point for practices such as:
      • Secure baseline configuration management
      • Software configuration management

    Two screenshots from the Configuration Management Policy template

    Download the Configuration Management Policy template

    Step 4.2

    Build communications and a roadmap

    Activities

    4.2.1 Build a communications plan
    4.2.2 Identify milestones

    This phase will walk you through the following aspects of a configuration management system:

    • Communications plan
    • Roadmap

    This phase involves the following participants:

    • IT service owners
    • Enterprise architects
    • Practice owners and managers
    • SCM practice manager
    • SCM project manager

    Outcomes of this step

    • Documented expectations around configuration control
    • Roadmap and action items for the SCM project

    Do not discount the benefits of a great communications plan as part of change management

    Many configuration management projects have failed due to lack of organizational commitment and inadequate communications.

    • Start at the top to ensure stakeholder buy-in by verifying alignment and use cases. Without a committed project sponsor who believes in the value of configuration management, it will be difficult to draw the IT team into the vision.
    • Clearly articulate the vision, strategy, and goals to all stakeholders. Ensure the team understands why these changes are happening, why they are happening now, and what outcomes you hope to achieve.
    • Gain support from technical teams by clearly expressing organizational and departmental benefits – they need to know "what's in it for me."
    • Clearly communicate new responsibilities and obligations and put a feedback process in place to hear concerns, mitigate risk, and act on opportunities for improvement. Be prepared to answer questions as this practice is rolled out.
    • Be consistent in your messaging. Mixed messages can easily derail progress.
    • Communicate to the business how these efforts will benefit the organization.
    • Share documents built in this blueprint or workshop with your technical teams to ensure they have a clear picture of the entire configuration management practice.
    • Share your measures and view of success and communicate wins throughout building the practice.

    30%

    When people are truly invested in change, it is 30% more likely to stick.
    McKinsey

    82%

    of CEOs identify organizational change management as a priority.
    D&B Consulting

    6X

    Initiatives with excellent change management are six times more likely to meet objectives than those with poor change management.
    Prosci

    For a more detailed program, see Drive Technology Adoption

    Formulate a communications plan to ensure all stakeholders and impacted staff will be aware of the plan

    Communication is key to success in process adoption and in identifying potential risks and issues with integration with other processes. Engage as often as needed to get the information you need for the project and for adoption.

    Identify Messages

    Distinct information that needs to be sent at various times. Think about:

    • Who will be impacted and how.
    • What the goals are for the project/new process.
    • What the audience needs to know about the new process and how they will interface with each business unit.
    • How people can request configuration data.

    Identify Audiences

    Any person or group who will be the target of the communication. This may include:

    • Project sponsors and stakeholders.
    • IT staff who will be involved in the project.
    • IT staff who will be impacted by the project (i.e. who will benefit from it or have obligations to fulfill because of it).
    • Business sponsors and product owners.

    Document and Track

    Document messaging, medium, and responsibility, working with the communications team to refine messages before executing.

    • Identify where people can send questions and feedback to ensure they have the information they need to make or accept the changes.
    • Document Q&A and share in a central location.

    Determine Timing

    Successful communications plans consider timing of various messages:

    • Advanced high-level notice of improvements for those who need to see action.
    • Advanced detailed notice for those who will be impacted by workload.
    • Advanced notice for who will be impacted (i.e. who will benefit from it or have obligations to fulfill because of it) once the project is ready to be transitioned to daily life.

    Determine Delivery

    Work with your communications team, if you have one, to determine the best medium, such as:

    • Meeting announcement for stakeholders and IT.
    • Newsletter for those less impacted.
    • Intranet announcements: "coming soon!"
    • Demonstrations with vendors or project team.

    4.2.1 Build a communications plan

    The communications team will use this list as a starting point.

    Allot 45 minutes for this discussion.

    Identify stakeholders.

    1. Identify everyone who will be affected by the project and by configuration management.

    Craft key messages tailored to each stakeholder group.

    1. Identify the key messages that must be communicated to each group.

    Finalize the communication plan.

    1. Determine the most appropriate timing for communications with each group to maximize receptivity.
    2. Identify any communication challenges you anticipate and incorporate steps to address them into your communication plan.
    3. Identify multiple methods for getting the messages out (e.g. newsletters, emails, meetings).
    1. Identify how feedback will be collected (i.e. through interviews or surveys) to measure whether the changes were communicated well.
    Audience Message Medium Timing Feedback Mechanism
    Configuration Management Team Communicate all key processes, procedures, policies, roles, and responsibilities In-person meetings and email communications Weekly meetings Informal feedback during weekly meetings
    Input

    Output

    • Discussion
    • Rough draft of messaging for communications team
    MaterialsParticipants
    • Project plan
    • Configuration manager
    • Project sponsor
    • IT director
    • Communications team

    Build a realistic, high-level roadmap including milestones

    Break the work into manageable pieces

    1. Plan to have multiple phases with short-, medium-, and long-term goals/timeframes. Building a CMDB is not easy and should be broken into manageable sections.
    2. Set reasonable milestones. For each phase, document goals to define "done" and ensure they're reasonable for the resources you have available. If working with a vendor, include them in your discussions of what's realistic.
    3. Treat the first phase as a pilot. Focus on items you understand well:
      1. Well-understood user-facing and IT services
      2. High-maturity management and governance practices
      3. Trusted data sources
    4. Capture high-value, high-criticality services early. Depending on the complexity of your systems, you may need to split this phase into multiple phases.

    Document this table in the Configuration Management Project Charter, section 3.0: Milestones

    Timeline/Owner Milestone/Deliverable Details
    First four weeks Milestone: Plan defined and validated with ITSM installation vendor Define processes for intake, maintenance, and retirement.
    Rebecca Roberts Process documentation written, approved, and ready to communicate Review CI categories

    4.2.2 Identify milestones

    Build out a high-level view to inform the project plan

    Open the Configuration Management Project Charter, section 3: Milestones.
    Instructions:

    1. Identify high-level milestones for the implementation of the configuration management program. This may include tool evaluation and implementation, assignment of roles, etc.
    2. Add details to fill out the milestone, keeping to a reasonable level of detail. This may inform vendor discussion or further development of the project plan.
    3. Add target dates to the milestones. Validate they are realistic with the team.
    4. Add notes to the assumptions and constraints section.
    5. Identify risks to the plan.

    Two Screenshots from the Configuration Management Project Charter

    Download the Configuration Management Project Charter

    Workshop Participants

    R = Recommended
    O = Optional

    Participants Day 1 Day 2 Day 3 Day 4
    Configuration Management Strategy CMDB Data Structure Processes Communications & Roadmap
    Morning Afternoon Morning Afternoon Morning Afternoon Morning Afternoon
    Head of IT R O
    Project Sponsor R R O O O O O O
    Infrastructure, Enterprise Apps Leaders R R O O O O O O
    Service Manager R R O O O O O O
    Configuration Manager R R R R R R R R
    Project Manager R R R R R R R R
    Representatives From Network, Compute, Storage, Desktop R R R R R R R R
    Enterprise Architecture R R R R O O O O
    Owner of Change Management/Change Control/Change Enablement R R R R R R R R
    Owner of In-Scope Apps, Use Cases R R R R R R R R
    Asset Manager R R R R R R R R

    Related Info-Tech Research

    Research Contributors and Experts

    Thank you to everyone who contributed to this publication

    Brett Johnson, Senior Consultant, VMware

    Yev Khovrenkov, Senior Consultant, Solvera Solutions

    Larry Marks, Reviewer, ISACA New Jersey

    Darin Ohde, Director of Service Delivery, GreatAmerica Financial Services

    Jim Slick, President/CEO, Slick Cyber Systems

    Emily Walker, Sr. Digital Solution Consultant, ServiceNow

    Valence Howden, Principal Research Director, Info-Tech Research Group

    Allison Kinnaird, Practice Lead, IT Operations, Info-Tech Research Group

    Robert Dang, Principal Research Advisor, Security, Info-Tech Research Group

    Monica Braun, Research Director, IT Finance, Info-Tech Research Group

    Jennifer Perrier, Principal Research Director, IT Finance, Info-Tech Research Group

    Plus 13 anonymous contributors

    Bibliography

    An Introduction to Change Management, Prosci, Nov. 2019.
    BAI10 Manage Configuration Audit Program. ISACA, 2014.
    Bizo, Daniel, et al, "Uptime Institute Global Data Center Survey 2021." Uptime Institute, 1 Sept. 2021.
    Brown, Deborah. "Change Management: Some Statistics." D&B Consulting Inc. May 15, 2014. Accessed June 14, 2016.
    Cabinet Office. ITIL Service Transition. The Stationery Office, 2011.
    "COBIT 2019: Management and Governance Objectives. ISACA, 2018.
    "Configuration Management Assessment." CMStat, n.d. Accessed 5 Oct. 2022.
    "Configuration Management Database Foundation." DMTF, 2018. Accessed 1 Feb. 2021.
    Configuration Management Using COBIT 5. ISACA, 2013.
    "Configuring Service Manager." Product Documentation, Ivanti, 2021. Accessed 9 Feb. 2021.
    "Challenges of Implementing configuration management." CMStat, n.d. Accessed 5 Oct. 2022.
    "Determining if configuration management and change control are under management control, part 1." CMStat, n.d. Accessed 5 Oct. 2022.
    "Determining if configuration management and change control are under management control, part 2." CMStat, n.d. Accessed 5 Oct. 2022.
    "Determining if configuration management and change control are under management control, part 3." CMStat, n.d. Accessed 5 Oct. 2022.
    "CSDM: The Recipe for Success." Data Content Manager, Qualdatrix Ltd. 2022. Web.
    Drogseth, Dennis, et al., 2015, CMDB Systems: Making Change Work in the Age of Cloud and Agile. Morgan Kaufman.
    Ewenstein, B, et al. "Changing Change Management." McKinsey & Company, 1 July 2015. Web.
    Farrell, Karen. "VIEWPOINT: Focus on CMDB Leadership." BMC Software, 1 May 2006. Web.
    "How to Eliminate the No. 1 Cause of Network Downtime." SolarWinds, 4 April 2014. Accessed 9 Feb. 2021.
    "ISO 10007:2017: Quality Management -- Guidelines for Configuration Management." International Organization for Standardization, 2019.
    "IT Operations Management." Product Documentation, ServiceNow, version Quebec, 2021. Accessed 9 Feb. 2021.
    Johnson, Elsbeth. "How to Communicate Clearly During Organizational Change." Harvard Business Review, 13 June 2017. Web.
    Kloeckner, K. et al. Transforming the IT Services Lifecycle with AI Technologies. Springer, 2018.
    Klosterboer, L. Implementing ITIL Configuration Management. IBM Press, 2008.
    Norfolk, D., and S. Lacy. Configuration Management: Expert Guidance for IT Service Managers and Practitioners. BCS Learning & Development Limited, revised ed., Jan. 2014.
    Painarkar, Mandaar. "Overview of the Common Data Model." BMC Documentation, 2015. Accessed 1 Feb. 2021.
    Powers, Larry, and Ketil Been. "The Value of Organizational Change Management." Boxley Group, 2014. Accessed June 14, 2016.
    "Pulse of the Profession: Enabling Organizational Change Throughout Strategic Initiatives." PMI, March 2014. Accessed June 14, 2016.
    "Service Configuration Management, ITIL 4 Practice Guide." AXELOS Global Best Practice, 2020
    "The Guide to Managing Configuration Drift." UpGuard, 2017.

    Voka 2025 Resilience Scores

     

    Test uw digitale slagkracht!

    Jammer! U bent te laat.

    De VOKA Bedrijven Contact Dagen 2025 zijn voorbij en onze winnaars zijn bekend!

    Liguris: 80 points
    Keiretsu: 71 points
    Staffler: 69 points
    Xpo group: 67 points
    Actief: 66 points

    Continue reading

    Effectively Recognize IT Employees

    • Buy Link or Shortcode: {j2store}547|cart{/j2store}
    • member rating overall impact: 8.0/10 Overall Impact
    • member rating average dollars saved: $100 Average $ Saved
    • member rating average days saved: 5 Average Days Saved
    • Parent Category Name: Engage
    • Parent Category Link: /engage
    • Even when organizations do have recognition programs, employees want more recognition than they currently receive.
    • In a recent study, McLean & Company found that 69% of IT employees surveyed felt they were not adequately praised and rewarded for superior work.
    • In a lot of cases, the issue with recognition programs isn’t that IT departments haven’t thought about the importance but rather that they haven’t focused on proper execution.

    Our Advice

    Critical Insight

    • You’re busy – don’t make your recognition program more complicated than it needs to be. Focus on day-to-day ideas and actively embed recognition into your IT team’s culture.
    • Recognition is impactful independent of rewards (i.e. items with a monetary value), but rewarding employees without proper recognition can be counterproductive. Put recognition first and use rewards as a way to amplify its effectiveness.

    Impact and Result

    • Info-Tech tools and guidance will help you develop a successful and sustainable recognition program aligned to strategic goals and values.
    • By focusing on three key elements – customization, alignment, and transparency – you can improve your recognition culture within four weeks, increasing employee engagement and productivity, improving relationships, and reducing turnover.

    Effectively Recognize IT Employees Research & Tools

    Start here – read the Executive Brief

    Read our concise Executive Brief to find out why you should implement an IT employee recognition program, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    • Effectively Recognize IT Employees – Executive Brief
    • Effectively Recognize IT Employees – Phases 1-3

    1. Assess the current recognition landscape

    Understand the current perceptions around recognition practices in the organization and determine the behaviors that your program will seek to recognize.

    • Effectively Recognize IT Employees – Phase 1: Assess the Current Recognition Landscape
    • IT Employee Recognition Survey Questions

    2. Design the recognition program

    Determine the structure and processes to enable effective recognition in your IT organization.

    • Effectively Recognize IT Employees – Phase 2: Design the Recognition Program
    • Employee Recognition Program Guide
    • Employee Recognition Ideas Catalog
    • Employee Recognition Nomination Form

    3. Implement the recognition program

    Rapidly build and roll out a recognition action and sustainment plan, including training managers to reinforce behavior with recognition.

    • Effectively Recognize IT Employees – Phase 3: Implement the Recognition Program
    • Recognition Action and Communication Plan
    • Manager Training: Reinforce Behavior With Recognition
    [infographic]

    Grow Your Own PPM Solution

    • Buy Link or Shortcode: {j2store}436|cart{/j2store}
    • member rating overall impact: 9.6/10 Overall Impact
    • member rating average dollars saved: $47,944 Average $ Saved
    • member rating average days saved: 29 Average Days Saved
    • Parent Category Name: Portfolio Management
    • Parent Category Link: /portfolio-management
    • As portfolio manager, you’re responsible for supporting the intake of new project requests, providing visibility into the portfolio of in-flight projects, and helping to facilitate the right approval and prioritization decisions.
    • You need a project portfolio management (PPM) tool that promotes the maintenance and flow of good data to help you succeed in these tasks. However, while throwing expensive technology at bad process rarely works, many organizations take this approach to solve their PPM problems.
    • Commercial PPM solutions are powerful and compelling, but they are also expensive, complex, and hard to use. When a solution is not properly adopted, the data can be unreliable and inconsistent, defeating the point of purchasing a tool in the first place.

    Our Advice

    Critical Insight

    • Your choice of PPM solution must be in tune with your organizational PPM maturity to ensure that you are prepared to sustain the tool use without having the corresponding PPM processes collapse under its own weight.
    • A spreadsheet-based homegrown PPM solution can provide key capabilities of an optimized PPM solution with a high level of sophistication and complexity without the prohibitive capital and labor costs demanded by commercial PPM solution.
    • Focus on your PPM decision makers that will consume the reports and insights by investigating their specific reporting needs.

    Impact and Result

    • Think outside the commercial box. Develop an affordable, adoptable, and effective PPM solution using widely available tools based on Info-Tech’s ready-to-deploy templates.
    • Make your solution sustainable. When it comes to portfolio management, high level is better. A tool that is accurate and maintainable will provide more value than one that strives for precise data yet is ultimately unmaintainable.
    • Report success. A PPM tool needs to foster portfolio visibility in order to engage and inform the executive layer and support effective decision making.

    Grow Your Own PPM Solution Research & Tools

    Start here – read the Executive Brief

    Read our concise Executive Brief to find out why you should grow your own PPM solution, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. Right-size your PPM solution

    Scope an affordable, adoptable, and effective PPM solution with Info-Tech's Portfolio Manager 2017 workbook.

    • Grow Your Own PPM Solution – Phase 1: Right-Size Your PPM Solution
    • Portfolio Manager 2017 Cost-in-Use Estimation Tool
    • None

    2. Get to know Portfolio Manager 2017

    Learn how to use Info-Tech's Portfolio Manager 2017 workbook and create powerful reports.

    • Grow Your Own PPM Solution – Phase 2: Meet Portfolio Manager 2017
    • Portfolio Manager 2017
    • Portfolio Manager 2017 (with Actuals)
    • None
    • None
    • None

    3. Implement your homegrown PPM solution

    Plan and implement an affordable, adoptable, and effective PPM solution with Info-Tech's Portfolio Manager 2017 workbook.

    • Grow Your Own PPM Solution – Phase 3: Implement Your PPM Solution
    • Portfolio Manager 2017 Operating Manual
    • Stakeholder Engagement Workbook
    • Portfolio Manager Debut Presentation for Portfolio Owners
    • Portfolio Manager Debut Presentation for Data Suppliers

    4. Outgrow your own PPM solution

    Develop an exit strategy from your home-grown solution to a commercial PPM toolset. In this video, we show a rapid transition from the Excel dataset shown on this page to a commercial solution from Meisterplan. Christoph Hirnle of Meisterplan is interviewed starting at 9 minutes.

    • None
    [infographic]

    Workshop: Grow Your Own PPM Solution

    Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

    1 Scope a Homegrown PPM Solution for Your Organization

    The Purpose

    Assess the current state of project portfolio management capability at your organization. The activities in this module will inform the next modules by exploring your organization’s current strengths and weaknesses and identifying areas that require improvement.

    Set up the workbook to generate a fully functional project portfolio workbook that will give you a high-level view into your portfolio.

    Key Benefits Achieved

    A high-level review of your current project portfolio capability is used to decide whether a homegrown PPM solution is an appropriate choice

    Cost-benefit analysis is done to build a business case for supporting this choice

    Activities

    1.1 Review existing PPM strategy and processes.

    1.2 Perform a cost-benefit analysis.

    Outputs

    Confirmation of homegrown PPM solution as the right choice

    Expected benefits for the PPM solution

    2 Get to Know Portfolio Manager 2017

    The Purpose

    Define a list of requirements for your PPM solution that meets the needs of all stakeholders.

    Key Benefits Achieved

    A fully customized PPM solution in your chosen platform

    Activities

    2.1 Introduction to Info-Tech's Portfolio Manager 2017: inputs, outputs, and the data model.

    2.2 Gather requirements for enhancements and customizations.

    Outputs

    Trained project/resource managers on the homegrown solution

    A wish list of enhancements and customizations

    3 Implement Your Homegrown PPM Solution

    The Purpose

    Determine an action plan regarding next steps for implementation.

    Implement your homegrown PPM solution. The activities outlined in this step will help to promote adoption of the tool throughout your organization.

    Key Benefits Achieved

    A set of processes to integrate the new homegrown PPM solution into existing PPM activities

    Plans for piloting the new processes, process improvement, and stakeholder communication

    Activities

    3.1 Plan to integrate your new solution into your PPM processes.

    3.2 Plan to pilot the new processes.

    3.3 Manage stakeholder communications.

    Outputs

    Portfolio Manager 2017 operating manual, which documents how Portfolio Manager 2017 is used to augment the PPM processes

    Plan for a pilot run and post-pilot evaluation for a wider rollout

    Communication plan for impacted PPM stakeholders

    Tactics to Retain IT Talent

    • Buy Link or Shortcode: {j2store}549|cart{/j2store}
    • member rating overall impact: N/A
    • member rating average dollars saved: N/A
    • member rating average days saved: N/A
    • Parent Category Name: Engage
    • Parent Category Link: /engage
    • Regrettable turnover is impacting organizational productivity and leading to significant costs associated with employee departures and the recruitment required to replace them.
    • Many organizations focus on increasing engagement to improve retention, but this approach doesn’t address the entire problem.

    Our Advice

    Critical Insight

    • Engagement surveys mask the volatility of the employee experience and hide the reason why individual employees leave. You must also talk to employees to understand the moments that matter and engage managers to understand turnover triggers.

    Impact and Result

    • Build the case for creating retention plans by leveraging employee data and feedback to identify the key reasons for turnover that need to be addressed.
    • Target employee segments and work with management to develop solutions to retain top talent.

    Tactics to Retain IT Talent Research & Tools

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. Tactics to Retain IT Talent Storyboard – Use this storyboard to develop a targeted talent retention plan to retain top and core talent in the organization.

    Integrate data from exit surveys and interviews, engagement surveys, and stay interviews to understand the most commonly cited reasons for employee departure in order to select and prioritize tactics that improve retention. This blueprint will help you identify reasons for regrettable turnover, select solutions, and create an action plan.

    • Tactics to Retain IT Talent Storyboard

    2. Retention Plan Workbook – Capture key information in one place as you work through the process to assess and prioritize solutions.

    Use this tool to document and analyze turnover data to find suitable retention solutions.

    • Retention Plan Workbook

    3. Stay Interview Guide – Managers will use this guide to conduct regular stay interviews with employees to anticipate and address turnover triggers.

    The Stay Interview Guide helps managers conduct interviews with current employees, enabling the manager to understand the employee's current engagement level, satisfaction with current role and responsibilities, suggestions for potential improvements, and intent to stay with the organization.

    • Stay Interview Guide

    4. IT Retention Solutions Catalog – Use this catalog to select and prioritize retention solutions across the employee lifecycle.

    Review best-practice solutions to identify those that are most suitable to your organizational culture and employee needs. Use the IT Retention Solutions Catalog to explore a variety of methods to improve retention, understand their use cases, and determine stakeholder responsibilities.

    • IT Retention Solutions Catalog
    [infographic]

    Workshop: Tactics to Retain IT Talent

    Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

    1 Identify Reasons for Regrettable Turnover

    The Purpose

    Identify the main drivers of turnover at the organization.

    Key Benefits Achieved

    Find out what to explore during focus groups.

    Activities

    1.1 Review data to determine why employees join, stay, and leave.

    1.2 Identify common themes.

    1.3 Prepare for focus groups.

    Outputs

    List of common themes/pain points recorded in the Retention Plan Workbook.

    2 Conduct Focus Groups

    The Purpose

    Conduct focus groups to explore retention drivers.

    Key Benefits Achieved

    Explore identified themes.

    Activities

    2.1 Conduct four 1-hour focus groups with the employee segment(s) identified in the pre-workshop activities.

    2.2 Info-Tech facilitators independently analyze results of focus groups and group results by theme.

    Outputs

    Focus group feedback.

    Focus group feedback analyzed and organized by themes.

    3 Identify Needs and Retention Initiatives

    The Purpose

    Home in on employee needs that are a priority.

    Key Benefits Achieved

    A list of initiatives to address the identified needs

    Activities

    3.1 Create an empathy map to identify needs.

    3.2 Shortlist retention initiatives.

    Outputs

    Employee needs and shortlist of initiatives to address them.

    4 Prepare to Communicate and Launch

    The Purpose

    Prepare to launch your retention initiatives.

    Key Benefits Achieved

    A clear action plan for implementing your retention initiatives.

    Activities

    4.1 Select retention initiatives.

    4.2 Determine goals and metrics.

    4.3 Plan stakeholder communication.

    4.4 Build a high-level action plan.

    Outputs

    Finalized list of retention initiatives.

    Goals and associated metrics recorded in the Retention Plan Workbook.

    Further reading

    Tactics to Retain IT Talent

    Keep talent from walking out the door by discovering and addressing moments that matter and turnover triggers.

    Executive Summary

    Your Challenge

    Many organizations are facing an increase in voluntary turnover as low unemployment, a lack of skilled labor, and a rise in the number of vacant roles have given employees more employment choices.

    Common Obstacles

    Regrettable turnover is impacting organizational productivity and leading to significant costs associated with employee departures and the recruitment required to replace them.

    Many organizations tackle retention from an engagement perspective: Increase engagement to improve retention. This approach doesn't consider the whole problem.

    Info-Tech's Approach

    Build the case for creating retention plans by leveraging employee data and feedback to identify the key reasons for turnover that need to be addressed.

    Target employee segments and work with management to develop solutions to retain top talent.

    Info-Tech Insight

    Engagement surveys mask the volatility of the employee experience and hide the reason why individual employees leave. You must also talk to employees to understand the moments that matter and engage managers to understand turnover triggers.

    This research addresses regrettable turnover

    This is an image of a flow chart with three levels. The top level has only one box, labeled Turnover.  the Second level has 2 boxes, labeled Voluntary, and Involuntary.  The third level has two boxes under Voluntary, labeled Non-regrettable: The loss of employees that the organization did not wish to keep, e.g. low performers, and Regrettable:  The loss of employees that the organization wishes it could have kept.

    Low unemployment and rising voluntary turnover makes it critical to focus on retention

    As the economy continues to recover from the pandemic, unemployment continues to trend downward even with a looming recession. This leaves more job openings vacant, making it easier for employees to job hop.

    This image contains a graph of the US Employment rate between 2020 - 2022 from the US Bureau of Economic Analysis and Bureau of Labor Statistics (BLS), 2022, the percentage of individuals who change jobs every one to five years from 2022 Job Seeker Nation Study, Jobvite, 2022, and voluntary turnover rates from BLS, 2022

    With more employees voluntarily choosing to leave jobs, it is more important than ever for organizations to identify key employees they want to retain and put plans in place to keep them.

    Retention is a challenge for many organizations

    The number of HR professionals citing retention/turnover as a top workforce management challenge is increasing, and it is now the second highest recruiting priority ("2020 Recruiter Nation Survey," Jobvite, 2020).

    65% of employees believe they can find a better position elsewhere (Legaljobs, 2021). This is a challenge for organizations in that they need to find ways to ensure employees want to stay at the organization or they will lose them, which results in high turnover costs.

    Executives and IT are making retention and turnover – two sides of the same coin – a priority because they cost organizations money.

    • 87% of HR professionals cited retention/turnover as a critical and high priority for the next few years (TINYpulse, 2020).
    • $630B The cost of voluntary turnover in the US (Work Institute, 2020).
    • 66% of organizations consider employee retention to be important or very important to an organization (PayScale, 2019).

    Improving retention leads to broad-reaching organizational benefits

    Cost savings: the price of turnover as a percentage of salary

    • 33% Improving retention can result in significant cost savings. A recent study found turnover costs, on average, to be around a third of an employee's annual salary (SHRM, 2019).
    • 37.9% of employees leave their organization within the first year. Employees who leave within the first 90 days of being hired offer very little or no return on the investment made to hire them (Work Institute, 2020).

    Improved performance

    Employees with longer tenure have an increased understanding of an organization's policies and processes, which leads to increased productivity (Indeed, 2021).

    Prevents a ripple effect

    Turnover often ripples across a team or department, with employees following each other out of the organization (Mereo). Retaining even one individual can often have an impact across the organization.

    Transfer of knowledge

    Retaining key individuals allows them to pass it on to other employees through communities of practice, mentoring, or other knowledge-sharing activities.

    Info-Tech Insight

    Improving retention goes beyond cost savings: Employees who agree with the statement "I expect to be at this organization a year from now" are 71% more likely to put in extra hours and 32% more likely to accomplish more than what is expected of their role (McLean & Company Engagement Survey, 2021; N=77,170 and 97,326 respectively).

    However, the traditional engagement-focused approach to retention is not enough

    Employee engagement is a strong driver of retention, with only 25% of disengaged employees expecting to be at their organization a year from now compared to 92% of engaged employees (McLean & Company Engagement Survey, 2018-2021; N=117,307).

    Average employee Net Promoter Score (eNPS)

    This image contains a graph of the Average employee Net Promoter Score (eNPS)

    Individual employee Net Promoter Scores (eNPS)

    This image contains a graph of the Individual employee Net Promoter Scores (eNPS)

    However, engagement surveys mask the volatility of the employee experience and hide the reason why individual employees leave.

    This analysis of McLean & Company's engagement survey results shows that while an organization's average employee net promoter score (eNPS) stays relatively static, at an individual level there is a huge amount of volatility.

    This demonstrates the need for an approach that is more capable of responding to or identifying employees' in-the-moment needs, which an annual engagement survey doesn't support.

    Turnover triggers and moments that matter also have an impact on retention

    Retention needs to be monitored throughout the employee lifecycle. To address the variety of issues that can appear, consider three main paths to turnover:

    1. Employee engagement – areas of low engagement.
    2. Turnover triggers that can quickly lead to departures.
    3. Moments that matter in the employee experience (EX).

    Employee engagement

    Engagement drivers are strong predictors of turnover.

    Employees who are highly engaged are 3.6x more likely to believe they will be with the organization 12 months from now than disengaged employees (McLean & Company Engagement Survey, 2018-2021; N=117,307).

    Turnover triggers

    Turnover triggers are events that act as shocks or catalysts that quickly lead to an employee's departure.

    Turnover triggers are a cause for voluntary turnover more often than accumulated issues (Lee et al.).

    Moments that matter

    Employee experience is the employee's perception of the accumulation of moments that matter within their employee lifecycle.

    Retention rates increase from 21% to 44% when employees have positive experiences in the following categories: belonging, purpose, achievement, happiness, and vigor at work. (Workhuman, 2020).

    While managers do not directly impact turnover, they do influence the three main paths to turnover

    Research shows managers do not appear as one of the common reasons for employee turnover.

    Top five most common reasons employees leave an organization (McLean & Company, Exit Survey, 2018-2021; N=107 to 141 companies,14,870 to 19,431 responses).

    Turnover factorsRank
    Opportunities for career advancement1
    Satisfaction with my role and responsibilities2
    Base pay3
    Opportunities for career-related skill development4
    The degree to which my skills were used in my job5

    However, managers can still have a huge impact on the turnover of their team through each of the three main paths to turnover:

    Employee engagement

    Employees who believe their managers care about them as a person are 3.3x more likely to be engaged than those who do not (McLean & Company, 2021; N=105,186).

    Turnover triggers

    Managers who are involved with and aware of their staff can serve as an early warning system for triggers that lead to turnover too quickly to detect with data.

    Moments that matter

    Managers have a direct connection with each individual and can tailor the employee experience to meet the needs of the individuals who report to them.

    Gallup has found that 52% of exiting employees say their manager could have done something to prevent them from leaving (Gallup, 2019). Do not discount the power of managers in anticipating and preventing regrettable turnover.

    Addressing engagement, turnover triggers, and moments that matter is the key to retention

    This is an image of a flow chart with four levels. The top level has only one box, labeled Turnover.  the Second level has 2 boxes, labeled Voluntary, and Involuntary.  The third level has two boxes under Voluntary, labeled Non-regrettable, and Regrettable.  The fourth level has three boxes under Regrettable, labeled Employee Engagement, Turnover triggers, and Moments that matter

    Info-Tech Insight

    HR traditionally seeks to examine engagement levels when faced with retention challenges, but engagement is only a part of the full picture. You must also talk to employees to understand the moments that matter and engage managers to understand turnover triggers.

    Follow Info-Tech's two-step process to create a retention plan

    1. Identify Reasons for Regrettable Turnover

    2. Select Solutions and Create an Action Plan

    Step 1

    Identify Reasons for Regrettable Turnover

    After completing this step you will have:

    • Analyzed and documented why employees join, stay, and leave your organization.
    • Identified common themes and employee needs.
    • Conducted employee focus groups and prioritized employee needs.

    Step 1 focuses on analyzing existing data and validating it through focus groups

    Employee engagement

    Employee engagement and moments that matter are easily tracked by data. Validating employee feedback data by speaking and empathizing with employees helps to uncover moments that matter. This step focuses on analyzing existing data and validating it through focus groups.

    Engagement drivers such as compensation or working environment are strong predictors of turnover.
    Moments that matter
    Employee experience (EX) is the employee's perception of the accumulation of moments that matter with the organization.
    Turnover triggers
    Turnover triggers are events that act as shocks or catalysts that quickly lead to an employee's departure.

    Turnover triggers

    This step will not touch on turnover triggers. Instead, they will be discussed in step 2 in the context of the role of the manager in improving retention.

    Turnover triggers are events that act as shocks or catalysts that quickly lead to an employee's departure.

    Info-Tech Insight

    IT managers often have insights into where and why retention is an issue through their day-to-day work. Gathering detailed quantitative and qualitative data provides credibility to these insights and is key to building a business case for action. Keep an open mind and allow the data to inform your gut feeling, not the other way around.

    Gather data to better understand why employees join, stay, and leave

    Start to gather and examine additional data to accurately identify the reason(s) for high turnover. Begin to uncover the story behind why these employees join, stay, and leave your organization through themes and trends that emerge.

    Look for these icons throughout step 2.

    Join

    Why do candidates join your organization?

    Stay

    Why do employees stay with your organization?

    Leave

    Why do employees leave your organization?

    For more information on analysis, visualization, and storytelling with data, see Info-Tech's Start Making Data-Driven People Decisions blueprint.

    Employee feedback data to look at includes:

    Gather insights through:

    • Focus groups
    • Verbatim comments
    • Exit interviews
    • Using the employee value proposition (EVP) as a filter (does it resonate with the lived experience of employees?)

    Prepare to draw themes and trends from employee data throughout step 1.

    Uncover employee needs and reasons for turnover by analyzing employee feedback data.

    • Look for trends (e.g. new hires join for career opportunities and leave for the same reason, or most departments have strong work-life balance scores in engagement data).
    • Review if there are recurring issues being raised that may impact turnover.
    • Group feedback to highlight themes (e.g. lack of understanding of EVP).
    • Identify which key employee needs merit further investigation or information.

    This is an image showing how you can draw out themes and trends using employee data throughout step 1.

    Classify where key employee needs fall within the employee lifecycle diagram in tab 2 of the Retention Plan Workbook. This will be used in step 2 to pinpoint and prioritize solutions.

    Info-Tech Insight

    The employee lifecycle is a valuable way to analyze and organize engagement pain points, moments that matter, and turnover triggers. It ensures that you consider the entirety of an employee's tenure and the different factors that lead to turnover.

    Examine new hire data and begin to document emerging themes

    Join

    While conducting a high-level analysis of new hire data, look for these three key themes impacting retention:

    Issues or pain points that occurred during the hiring process.

    Reasons why employees joined your organization.

    The experience of their first 90 days. This can include their satisfaction with the onboarding process and their overall experience with the organization.

    Themes will help to identify areas of strength and weakness organization-wide and within key segments. Document in tab 3 of the Retention Plan Workbook.

    1. Start by isolating the top reasons employees joined your organization. Ask:
      • Do the reasons align with the benefits you associate with working at your organization?
      • How might this impact your EVP?
      • If you use a new hire survey, look at the results for the following questions:
      • For which of the following reasons did you apply to this organization?
      • For what reasons did you accept the job offer with this organization?
    2. then, examine other potential problem areas that may not be covered by your new hire survey, such as onboarding or the candidate experience during the hiring process.
      • If you conduct a new hire survey, look at the results in the following sections:
        • Candidate Experience
        • Acclimatization
        • Training and Development
        • Defining Performance Expectations

      Analyze engagement data to identify areas of strength that drive retention

      Employees who are engaged are 3.6x more likely to believe they will be with the organization 12 months from now (McLean & Company Engagement Survey, 2018-2021; N=117,307). Given the strength of this relationship, it is essential to identify areas of strength to maintain and leverage.

      1. Look at the highest-performing drivers in your organization's employee engagement survey and drivers that fall into the "leverage" and "maintain" quadrants of the priority matrix.
        • These drivers provide insight into what prompts broader groups of employees to stay.

      This is an image of a quadrant analysis, with the following quadrants in order from left to right, top to bottom.  Improve; Leverage; Evaluate; Maintain.

      1. Look into what efforts have been made to maintain programs, policies, and practices related to these drivers and ensure they are consistent across the entire organization.
      2. Document trends and themes related to engagement strengths in tab 2 of the Retention Plan Workbook.

      If you use Info-Tech's Engagement Survey, look in detail at what are classified as "Retention Drivers": total compensation, working environment, and work-life balance.

      Identify areas of weakness that drive turnover in your engagement data

      1. Look at the lowest-performing drivers in your organization's employee engagement survey and drivers that fall into the "improve" and "evaluate" quadrants of the priority matrix.
        • These drivers provide insight into what pushes employees to leave the organization.
      2. Delve into organizational efforts that have been made to address issues with the programs, policies, and practices related to these drivers. Are there any projects underway to improve them? What are the barriers preventing improvements?
      3. Document trends and themes related to engagement weaknesses in tab 2 of the Retention Plan Workbook.

      If you use a product other than Info-Tech's Engagement Survey, your results will look different. The key is to look at areas of weakness that emerge from the data.

      This is an image of a quadrant analysis, with the following quadrants in order from left to right, top to bottom.  Improve; Leverage; Evaluate; Maintain.

      If you use Info-Tech's Engagement Survey, look in detail at what are classified as "Retention Drivers": total compensation, working environment, and work-life balance.

      Mine exit surveys to develop an integrated, holistic understanding of why employees leave

      Conduct a high-level analysis of the data from your employee exit diagnostic. While analyzing this data, consider the following:

      • What are the trends and quantitative data about why employees leave your organization that may illuminate employee needs or issues at specific points throughout the employee lifecycle?
      • What are insights around your key segments? Data on key segments is easily sliced from exit survey results and can be used as a starting point for digging deeper into retention issues for specific groups.
      • Exit surveys are an excellent starting point. However, it is valuable to validate the data gathered from an exit survey using exit interviews.
      1. Isolate results for key segments of employees to target with retention initiatives (e.g. by age group or by department).
      2. Identify data trends or patterns over time; for example, that compensation factors have been increasing in importance.
      3. Document trends and themes taken from the exit survey results in tab 2 of the Retention Plan Workbook.

      If your organization conducts exit interviews, analyze the results alongside or in lieu of exit survey data.

      Compare new hire data with exit data to identify patterns and insights

      Determine if new hire expectations weren't met, prompting employees to leave your organization, to help identify where in the employee lifecycle issues driving turnover may be occurring.

      1. Look at your new hire data for the top reasons employees joined your organization.
        • McLean & Company's New Hire Survey database shows that the top three reasons candidates accept job offers on average are:
          1. Career opportunities
          2. Nature of the job
          3. Development opportunities
      2. Next, look at your exit data and the top reasons employees left your organization.
        1. McLean & Company's Exit Survey database shows that the top three reasons employees leave on average are:
          1. Opportunities for career advancement
          2. Base pay
          3. Satisfaction with my role and responsibilities
      3. Examine the results and ask:
        • Is there a link between why employees join and leave the organization?
        • Did they cite the same reasons for joining and for leaving?
        • What do the results say about what your employees do and do not value about working at your organization?
      4. Document the resulting insights in tab 2 of the Retention Plan Workbook.

      Example:

      A result where employees are leaving for the same reason they're joining the organization could signal a disconnect between your organization's employee value proposition and the lived experience.

      Revisit your employee value proposition to uncover misalignment

      Your employee value proposition (EVP), formal or informal, communicates the value your organization can offer to prospective employees.

      If your EVP is mismatched with the lived experience of your employees, new hires will be in for a surprise when they start their new job and find out it isn't what they were expecting.

      Forty-six percent of respondents who left a job within 90 days of starting cited a mismatch of expectations about their role ("Job Seeker Nation Study 2020," Jobvite, 2020).

      1. Use the EVP as a filter through which you look at all your employee feedback data. It will help identify misalignment between the promised and the lived experience.
      2. If you have EVP documentation, start there. If not, go to your careers page and put yourself in the shoes of a candidate. Ask what the four elements of an EVP look like for candidates:
        • Compensation and benefits
        • Day-to-day job elements
        • Working conditions
        • Organizational elements
      3. Next, compare this to your own day-to-day experiences. Does it differ drastically? Are there any contradictions with the lived experience at your organization? Are there misleading statements or promises?
      4. Document any insights or patterns you uncover in tab 2 of the Retention Plan Workbook.

      Conduct focus groups to examine themes

      Through focus groups, explore the themes you have uncovered with employees to discover employee needs that are not being met. Addressing these employee needs will be a key aspect of your retention plan.

      Identify employee groups who will participate in focus groups:

      • Incorporate diverse perspectives (e.g. employees, managers, supervisors).
      • Include employees from departments and demographics with strong and weak engagement for a full picture of how engagement impacts your employees.
      • Invite boomerang employees to learn why an individual might return to your organization after leaving.

      image contains two screenshots Mclean & Company's Standard Focus Group Guide.

      Customize Info-Tech's Standard Focus Group Guide based on the themes you have identified in tab 3 of the Retention Plan Workbook.

      The goal of the focus group is to learn from employees and use this information to design or modify a process, system, or other solution that impacts retention.

      Focus questions on the employees' personal experience from their perspective.

      Key things to remember:

      • It is vital for facilitators to be objective.
      • Keep an open mind; no feelings are wrong.
      • Beware of your own biases.
      • Be open and share the reason for conducting the focus groups.

      Info-Tech Insight

      Maintaining an open dialogue with employees will help flesh out the context behind the data you've gathered and allow you to keep in mind that retention is about people first and foremost.

      Empathize with employees to identify moments that matter

      Look for discrepancies between what employees are saying and doing.

      1. Say

      "What words or quotes did the employee use?"

      3.Think

      "What might the employee be thinking?"

      Record feelings and thoughts discussed, body language observed, tone of voice, and words used.

      Look for areas of negative emotion to determine the moments that matter that drive retention.

      2. Do

      "What actions or behavior did the employee demonstrate?"

      4. Feel

      "What might the employee be feeling?"

      Record them in tab 3 of the Retention Plan Workbook.

      5. Identify Needs

      "Needs are verbs (activities or desires), not nouns (solutions)"

      Synthesize focus group findings using Info-Tech's Empathy Map Template.

      6. Identify Insights

      "Ask yourself, why?"

      (Based on Stanford d.school Empathy Map Method)

      Distill employee needs into priority issues to address first

      Take employee needs revealed by your data and focus groups and prioritize three to five needs.

      Select a limited number of employee needs to develop solutions to ensure that the scope of the project is feasible and that the resources dedicated to this project are not stretched too thin. The remaining needs should not be ignored – act on them later.

      Share the needs you identify with stakeholders so they can support prioritization and so you can confirm their buy-in and approval where necessary.

      Ask yourself the following questions to determine your priority employee needs:

      • Which needs will have the greatest impact on turnover?
      • Which needs have the potential to be an easy fix or quick win?
      • Which themes or trends came up repeatedly in different data sources?
      • Which needs evoked particularly strong or negative emotions in the focus groups?

      This image contains screenshots of two table templates found in tab 5 of the Retention Plan Workbook

      In the Retention Plan Workbook, distill employee needs on tab 2 into three to five priorities on tab 5.

      Step 2

      Select Solutions and Create an Action Plan

      After completing this step, you will have:

      • Selected and prioritized solutions to address employee needs.
      • Created a plan to launch stay interviews.
      • Built an action plan to implement solutions.

      Select IT-owned solutions and implement people leader–driven initiatives

      Solutions

      First, select and prioritize solutions to address employee needs identified in the previous step. These solutions will address reasons for turnover that influence employee engagement and moments that matter.

      • Brainstorm solutions using the Retention Solutions Catalog as a starting point. Select a longlist of solutions to address your priority needs.
      • Prioritize the longlist of solutions into a manageable number to act on.

      People leaders

      Next, create a plan to launch stay interviews to increase managers' accountability in improving retention. Managers will be critical to solving issues stemming from turnover triggers.

      • Clarify the importance of harnessing the influence of people leaders in improving retention.
      • Discover what might cause individual employees to leave through stay interviews.
      • Increase trust in managers through training.

      Action plan

      Finally, create an action plan and present to senior leadership for approval.

      Look for these icons in the top right of slides in this step.

      Select solutions to employee needs, starting with the Retention Solutions Catalog

      Based on the priority needs you have identified, use the Retention Solutions Catalog to review best-practice solutions for pain points associated with each stage of the lifecycle.

      Use this tool as a starting point, adding to it and iterating based on your own experience and organizational culture and goals.

      This image contains three screenshots from Info-Tech's Retention Solutions Catalog.

      Use Info-Tech's Retention Solutions Catalog to start the brainstorming process and produce a shortlist of potential solutions that will be prioritized on the next slide.

      Info-Tech Insight

      Unless you have the good fortune of having only a few pain points, no single initiative will completely solve your retention issues. Combine one or two of these broad solutions with people-leader initiatives to ensure employee needs are addressed on an individual and an aggregate level.

      Prioritize solutions to be implemented

      Target efforts accordingly

      Quick wins are high-impact, low-effort initiatives that will build traction and credibility within the organization.

      Long-term initiatives require more time and need to be planned for accordingly but will still deliver a large impact. Review the planning horizon to determine how early these need to begin.

      Re-evaluate low-impact and low-effort initiatives and identify ones that either support other higher impact initiatives or have the highest impact to gain traction and credibility. Look for low-hanging fruit.

      Deprioritize initiatives that will take a high degree of effort to deliver lower-value results.

      When assessing the impact of potential solutions, consider:

      • How many critical segments or employees will this solution affect?
      • Is the employee need it addresses critical, or did the solution encompass several themes in the data you analyzed?
      • Will the success of this solution help build a case for further action?
      • Will the solution address multiple employee needs?

      Info-Tech Insight

      It's better to master a few initiatives than under-deliver on many. Start with a few solutions that will have a measurable impact to build the case for further action in the future.

      Solutions

      Low ImpactMedium ImpactLarge Impact
      Large EffortThis is an image of the used to help you prioritize solutions to be implemented.
      Medium Effort
      Low Effort

      Use tab 3 of the Retention Plan Workbook to prioritize your shortlist of solutions.

      Harness the influence of people leaders to improve employee retention

      Leaders at all levels have a huge impact on employees.

      Effective people leaders:

      • Manage work distribution.
      • Create a motivating work environment.
      • Provide development opportunities.
      • Ensure work is stimulating and challenging, but not overwhelming.
      • Provide clear, actionable feedback.
      • Recognize team member contributions.
      • Develop positive relationships with their teams.
      • Create a line of sight between what the employee is doing and what the organization's objectives are.

      Support leaders in recommitting to their role as people managers through Learning & Development initiatives with particular emphasis on coaching and building trust.

      For coaching training, see Info-Tech's Build a Better Manager: Team Essentials – Feedback and Coaching training deck.

      For more information on supporting managers to become better people leaders, see Info-Tech's Build a Better Manager: Manage Your People blueprint.

      "HR can't fix turnover. But leaders on the front line can."
      – Richard P. Finnegan, CEO, C-Suite Analytics

      Equip managers to conduct regular stay interviews to address turnover triggers

      Managers often have the most visibility into their employees' personal and work lives and have a key opportunity to anticipate and address turnover triggers.

      Stay interviews are an effective way of uncovering potential retention issues and allowing managers to act as an early warning system for turnover triggers.

      Examples of common turnover triggers and potential manager responses:

      • Moving, creating a long commute to the office.
        • Through stay interviews, a manager can learn that a long commute is an issue and can help find workarounds such as flexible/remote work options.
      • Not receiving an expected promotion.
        • A trusted manager can anticipate issues stemming from this, discuss why the decision was made, and plan development opportunities for future openings.

      Stay interview best practices

      1. Conducted by an employee's direct manager.
      2. Happen regularly as a part of an ongoing process.
      3. Based on the stay interview, managers produce a turnover forecast for each direct report.
        1. The method used by stay interview expert Richard P. Finnegan is simple: red for high risk, yellow for medium, and green for low.
      4. Provide managers with training and a rough script or list of questions to follow.
        1. Use and customize Info-Tech's Stay Interview Guide to provide a guide for managers on how to conduct a stay interview.
      5. Managers use the results to create an individualized retention action plan made up of concrete actions the manager and employee will take.

      Sources: Richard P. Finnegan, CEO, C-Suite Analytics; SHRM

      Build an action plan to implement the retention plan

      For each initiative identified, map out timelines and actions that need to be taken.

      When building actions and timelines:

      • Refer to the priority needs you identified in tab 4 of the Retention Plan Workbook and ensure they are addressed first.
      • Engage internal stakeholders who will be key to the development of the initiatives to ensure they have sufficient time to complete their deliverables.
        • For example, if you conduct manager training, Learning & Development needs to be involved in the development and launch of the program.
      • Include a date to revisit your baseline retention and engagement data in your project milestones.
      • Designate process owners for new processes such as stay interviews.

      Plan for stay interviews by determining:

      • Whether stay interviews will be a requirement for all employees.
      • How much flexibility managers will have with the process.
      • How you will communicate the stay interview approach to managers.
      • If manager training is required.
      • How managers should record stay interview data and how you will collect this data from them as a way to monitor retention issues.
        • For example, managers can share their turnover forecasts and action plans for each employee.

      Be clear about manager accountabilities for initiatives they will own, such as stay interviews. Plan to communicate the goals and timelines managers will be asked to meet, such as when they must conduct interviews or their responsibility to follow up on action items that come from interviews.

      Track project success to iterate and improve your solutions

      Analyze measurements

      • Regularly remeasure your engagement and retention levels to identify themes and trends that provide insights into program improvements.
      • For example, look at the difference in manager relationship score to see if training has had an impact, or look at changes in critical segment turnover to calculate cost savings.

      Revisit employee and manager feedback

      • After three to six months, conduct additional surveys or focus groups to determine the success of your initiatives and opportunities for improvement. Tweak the program, including stay interviews, based on manager and employee feedback.

      Iterate frequently

      • Revisit your initiatives every two or three years to determine if a refresh is necessary to meet changing organizational and employee needs and to update your goals and targets.

      Key insights

      Insight 1Insight 2Insight 3

      Retention and turnover are two sides of the same coin. You can't fix retention without first understanding turnover.

      Engagement surveys mask the volatility of the employee experience and hide the reason why individual employees leave. You must also talk to employees to understand the moments that matter and engage managers to understand turnover triggers.

      Improving retention isn't just about lowering turnover, it's about discovering what healthy retention looks like for your organization.

      Insight 4Insight 5Insight 6

      HR professionals often have insights into where and why retention is an issue. Gathering detailed employee feedback data through surveys and focus groups provides credibility to these insights and is key to building a case for action. Keep an open mind and allow the data to inform your gut feeling, not the other way around.

      Successful retention plans must be owned by both IT leaders and HR.

      IT leaders often have the most visibility into their employees' personal and work lives and have a key opportunity to anticipate and address turnover triggers.

      Stay interviews help managers anticipate potential retention issues on their teams.

      Workshop Overview

      Contact your account representative for more information.
      workshops@infotech.com 1-888-670-8889

      Info-Tech AnalystsPre-workPost-work
      Client Data Gathering and PlanningImplementation Supported Through Analyst Calls

      1.1 Discuss participants, logistics, overview of workshop activities

      1.2 Provide support to client for below activities through calls.

      2.1 Schedule follow-up calls to work through implementation of retention solutions based on identified needs.
      Client

      1.Gather results of engagement survey, new hire survey, exit survey, and any exit and stay interview feedback.

      2.Gather and analyze turnover data.

      3.Identify key employee segment(s) and identify and organize participants for focus groups.

      4.Complete cost of turnover analysis.

      5.Review turnover data and prioritize list of employee segments.

      1.Obtain senior leader approval to proceed with retention plan.

      2.Finalize and implement retention solutions.

      3.Prepare managers to conduct stay interviews.

      4.Communicate next steps to stakeholders.

      Workshop Overview

      Contact your account representative for more information.
      workshops@infotech.com 1-888-670-8889

      ActivitiesDay 1Day 2Day 3Day 4
      Assess Current StateConduct Focus GroupsIdentify Needs and Retention InitiativesPrepare to Communicate and Launch

      1.1 Review data to determine why employees join, stay, and leave.

      1.2 Identify common themes.

      1.3 Prepare for focus groups.

      2.1 Conduct four 1-hour focus groups with the employee segment(s) identified in the pre-workshop activities..

      2.2 Info-Tech facilitators independently analyze results of focus groups and group results by theme.

      3.1 Create an empathy map to identify needs

      3.2 Shortlist retention initiatives

      4.1 Select retention initiatives

      4.2 Determine goals and metrics

      4.3 Plan stakeholder communication4.4 Build a high-level action plan

      Deliverables

      1.List of common themes/pain points recorded in the Retention Plan Workbook

      2.Plan for focus groups documented in the Focus Group Guide

      1.Focus group feedback

      2.Focus group feedback analyzed and organized by themes

      1.Employee needs and shortlist of initiatives to address them1.Finalized list of retention initiatives

      Info-Tech offers various levels of support to best suit your needs

      DIY Toolkit

      “Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful.”

      Guided Implementation

      “Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track.”

      Workshop

      “We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place.”

      Consulting

      “Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project.”

      Diagnostics and consistent frameworks used throughout all four options

      Research Contributors and Experts

      Jeff Bonnell
      VP HR
      Info-Tech Research Group

      Phillip Kotanidis
      CHRO
      Michael Garron Hospital

      Michael McGuire
      Director, Organizational Development
      William Osler Health System

      Dr. Iris Ware
      Chief Learning Officer
      City of Detroit

      Richard P. Finnegan
      CEO
      C-Suite Analytics

      Dr. Thomas Lee
      Professor of Management
      University of Washington

      Jane Moughon
      Specialist in increasing profits, reducing turnover, and maximizing human potential in manufacturing companies

      Lisa Kaste
      Former HR Director
      Citco

      Piyush Mathur
      Head of Workforce Analytics
      Johnson & Johnson

      Gregory P. Smith
      CEO
      Chart Your Course

      Works Cited

      "17 Surprising Statistics about Employee Retention." TINYpulse, 8 Sept. 2020. Web.
      "2020 Job Seeker Nation Study." Jobvite, April 2020. Web.
      "2020 Recruiter Nation Survey." Jobvite, 2020. Web.
      "2020 Retention Report: Insights on 2019 Turnover Trends, Reasons, Costs, & Recommendations." Work Institute, 2020. Web.
      "25 Essential Productivity Statistics for 2021." TeamStage, 2021. Accessed 22 Jun. 2021.
      Agovino, Theresa. "To Have and to Hold." SHRM, 23 Feb. 2019. Web.
      "Civilian Unemployment Rate." Bureau of Labor Statistics, June 2020. Web.
      Foreman, Paul. "The domino effect of chief sales officer turnover on salespeople." Mereo, 19 July 2018. Web.
      "Gross Domestic Product." U.S. Bureau of Economic Analysis, 27 May 2021. Accessed 22 Jun. 2020.
      Kinne, Aaron. "Back to Basics: What is Employee Experience?" Workhuman, 27August 2020. Accessed 21 Jun. 2021.
      Lee, Thomas W, et al. "Managing employee retention and turnover with 21st century ideas." Organizational Dynamics, vol 47, no. 2, 2017, pp. 88-98. Web.
      Lee, Thomas W. and Terence R. Mitchell. "Control Turnover by Understanding its Causes." The Blackwell Handbook of Principles of Organizational Behaviour. 2017. Print.
      McFeely, Shane, and Ben Wigert. "This Fixable Problem Costs U.S. Businesses $1 Trillion." Gallup. 13 March 2019. Web.
      "Table 18. Annual Quit rates by Industry and Region Not Seasonally Adjusted." Bureau of Labor Statistics. June 2021. Web.
      "The 2019 Compensation Best Practices Report: Will They Stay or Will They Go? Employee Retention and Acquisition in an Uncertain Economy." PayScale. 2019. Web.
      Vuleta, Branka. "30 Troubling Employee Retention Statistics." Legaljobs. 1 Feb. 2021. Web.
      "What is a Tenured Employee? Top Benefits of Tenure and How to Stay Engaged as One." Indeed. 22 Feb. 2021. Accessed 22 Jun. 2021.

      Tell Your Story With Data Visualization

      • Buy Link or Shortcode: {j2store}364|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Business Intelligence Strategy
      • Parent Category Link: /business-intelligence-strategy

      Analysts do not feel empowered to challenge requirements to deliver a better outcome. This alongside underlying data quality issues prevents the creation of accurate and helpful information. Graphic representations do not provide meaningful and actionable insights.

      Our Advice

      Critical Insight

      As organizations strive to become more data-driven, good storytelling with data visualization supports growing corporate data literacy and helps analysts in providing insights that improves organization's decision-making and value-driving processes, which ultimately boosts business performance.

      Impact and Result

      Follow a step-by-step guide to address the business bias of tacet experience over data facts and increase audience's understanding and acceptance toward data solutions.

      Save the lost hours and remove the challenges of reports and dashboards being disregarded due to ineffective usage.

      Gain insights from data-driven recommendations and have decision support to make informed decisions.

      Tell Your Story With Data Visualization Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Tell Your Story With Data Visualization Deck – Solve challenging business problems more effectively and improve communication with audiences by demonstrating significant insights through data storytelling with impactful visuals.

      Here is our step-by-step process of getting value out of effective storytelling with data visualization:

    • Step 1: Frame the business problem and the outcomes required.
    • Step 2: Explore the potential drivers and formulate hypotheses to test.
    • Step 3: Construct a meaningful narrative which the data supports.
      • Tell Your Story With Data Visualization Storyboard

      2. Storytelling Whiteboard Canvas Template – Plan out storytelling using Info-Tech’s whiteboard canvas template.

      This storytelling whiteboard canvas is a template that will help you create your visualization story narrative by:

    • Identifying the problem space.
    • Finding logical relationships and data identification.
    • Reviewing analysis and initial insights.
    • Building the story and logical conclusion.
      • Storytelling Whiteboard Canvas Template
      [infographic]

      Further reading

      Tell Your Story With Data Visualization

      Build trust with your stakeholders.

      Analyst Perspective

      Build trust with your stakeholders.

      Data visualization refers to graphical representations of data which help an audience understand. Without good storytelling, however, these representations can distract an audience with enormous amounts of data or even lead them to incorrect conclusions.

      Good storytelling with data visualization involves identifying the business problem, exploring potential drivers, formulating a hypothesis, and creating meaningful narratives and powerful visuals that resonate with all audiences and ultimately lead to clear actionable insights.

      Follow Info-Tech's step-by-step approach to address the business bias of tacit experience over data facts, improve analysts' effectiveness and support better decision making.

      Ibrahim Abdel-Kader, Research Analyst

      Ibrahim Abdel-Kader
      Research Analyst,
      Data, Analytics, and Enterprise Architecture

      Nikitha Patel, Research Specialist

      Nikitha Patel
      Research Specialist,
      Data, Analytics, and Enterprise Architecture

      Ruyi Sun, Research Specialist

      Ruyi Sun
      Research Specialist,
      Data, Analytics, and Enterprise Architecture

      Our understanding of the problem

      This research is designed for

      • Business analysts, data analysts, or their equivalent who (in either a centralized or federated operating model) look to solve challenging business problems more effectively and improve communication with audiences by demonstrating significant insights through visual data storytelling.

      This research will also assist

      • A CIO or business unit (BU) leader looking to improve reporting and analytics, reduce time to information, and embrace decision making.

      This research will help you

      • Identify the business problem and root causes that you are looking to address for key stakeholders.
      • Improve business decision making through effective data storytelling.
      • Focus on insight generation rather than report production.
      • Apply design thinking principles to support the collection of different perspectives.

      This research will help them

      • Understand the report quickly and efficiently, regardless of their data literacy level.
      • Grasp the current situation of data within the organization.

      Executive Summary

      Your Challenge Common Obstacles Info-Tech's Approach
      As analysts, you may experience some critical challenges when presenting a data story.
      • The graphical representation does not provide meaningful or actionable insights.
      • Difficulty selecting the right visual tools or technologies to create visual impact.
      • Lack of empowerment, where analysts don't feel like they can challenge requirements.
      • Data quality issues that prevent the creation of accurate and helpful information.
      Some common roadblocks may prevent you from addressing these challenges.
      • Lack of skills and context to identify the root cause or the insight that adds the most value.
      • Lack of proper design or over-visualization of data will mislead/confuse the audience.
      • Business audience bias, leading them to ignore reliable insights presented.
      • Lack of the right access to obtain data could hinder the process.
      • Understand and dissect the business problem through Info-Tech's guidance on root cause analysis and design thinking process.
      • Explore each potential hypothesis and construct your story's narratives.
      • Manage data visualization using evolving tools and create visual impact.
      • Inform business owners how to proceed and collect feedback to achieve continuous improvement.

      Info-Tech Insight
      As organizations strive to become more data-driven, good storytelling with data visualization supports growing corporate data literacy and helps analysts provide insights that improve organizational decision-making and value-driving processes, which ultimately boosts business performance.

      Glossary

      • Data: Facts or figures, especially those stored in a computer, that can be used for calculating, reasoning, or planning. When data is processed, organized, structured, or presented in a given context to make it useful, it is called information. Data leaders are accountable for certain data domains and sets.
      • Data storytelling: The ability to create a narrative powered by data and analytics that supports the hypothesis and intent of the story. Narrators of the story should deliver a significant view of the message in a way easily understood by the target audience. Data visualization can be used as a tactic to enhance storytelling.
      • Data visualization: The ability to visually represent a complete story to the target audience powered by data & analytics, using data storytelling as an enabling mechanism to convey narratives. Typically, there are two types of visuals used as part of data visualization: explanatory/informative visuals (the entire story or specific aspects delivered to the audience) and exploratory visuals (the collected data used to clarify what questions must be answered).
      • Data literacy: The ability to read, work with, analyze, and argue with data. Easy access to data is essential to exercising these skills. All organizational employees involved with data-driven decisions should learn to think critically about the data they use for analytics and how they assess and interpret the results of their work.
      • Data quality: A measure of the condition of data based on factors such as accuracy, completeness, consistency, reliability, and being up-to-date. This is about how well-suited a data set is to serve its intended purpose, therefore business users and stakeholders set the standards for what is good enough. The governance function along with IT ensures that data quality measures are applied, and corrective actions taken.
      • Analytics/Business intelligence (BI): A technology-driven process for analyzing data and delivering actionable information that helps executives, managers, and workers make informed business decisions. As part of the BI process, organizations collect data from internal IT systems and external sources, prepare it for analysis, run queries against the data, and create data visualizations.
        Note: In some frameworks, analytics and BI refer to different types of analyses (i.e. analytics predict future outcomes, BI describes what is or has been).

      Getting value out of effective storytelling with data visualization

      Data storytelling is gaining wide recognition as a tool for supporting businesses in driving data insights and making better strategic decisions.

      92% of respondents agreed that data storytelling is an effective way of communicating or delivering data and analytics results.

      87% of respondents agreed that if insights were presented in a simpler/clearer manner, their organization's leadership team would make more data-driven decisions.

      93% of respondents agreed that decisions made based on successful data storytelling could potentially help increase revenue.

      Source: Exasol, 2021

      Despite organizations recognizing the value of data storytelling, issues remain which cannot be remedied solely with better technology.

      61% Top challenges of conveying important insights through dashboards are lack of context (61%), over-communication (54%), and inability to customize contents for intended audiences (46%).

      49% of respondents feel their organizations lack storytelling skills, regardless of whether employees are data literate.

      Source: Exasol, 2021

      Info-Tech Insight
      Storytelling is a key component of data literacy. Although enterprises are increasingly investing in data analytics software, only 21% of employees are confident with their data literacy skills. (Accenture, 2020)

      Prerequisite Checklist

      Before applying Info-Tech's storytelling methodology, you should have addressed the following criteria:

      • Select the right data visualization tools.
      • Have the necessary training in statistical analysis and data visualization technology.
      • Have competent levels of data literacy.
      • Good quality data founded on data governance and data architecture best practices.

      To get a complete view of the field you want to explore, please refer to the following Info-Tech resources:

      Select and Implement a Reporting and Analytics Solution

      Build a Data Architecture Roadmap

      Establish Data Governance

      Build Your Data Quality Program

      Foster Data-Driven Culture With Data Literacy

      Info-Tech's Storytelling With Data Visualization Framework

      Data Visualization Framework

      Info-Tech Insight
      As organizations strive to become more data-driven, good storytelling with data visualization supports growing corporate data literacy and helps analysts provide insights that improve organizational decision-making and value-driving processes, which ultimately boosts business performance.

      Research Benefits

      Member Benefits Business Benefits
      • Reduce time spent on getting your audience in the room and promote business involvement with the project.
      • Eliminate ineffectively used reports and dashboards being disregarded for lack of storytelling skills, resulting in real-time savings and monetary impact.
      • Example: A $50k reporting project has a 49% risk of the company being unable to communicate effective data stories (Exasol, 2021). Therefore, a $50k project has an approx. 50% chance of being wasted. Using Info-Tech's methodology, members can remove the risk, saving $25k and the time required to produce each report.
      • Address the common business bias of tacit experience over data-supported facts and increase audience understanding and acceptance of data-driven solutions.
      • Clear articulation of business context and problem.
      • High-level improvement objectives and return on investment (ROI).
      • Gain insights from data-driven recommendations to assist with making informed decisions.

      Info-Tech offers various levels of support to best suit your needs

      DIY Toolkit Guided Implementation Workshop Consulting
      "Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful." "Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track." "We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place." "Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project."

      Diagnostics and consistent frameworks are used throughout all four options.

      Maximize the Benefits from Enterprise Applications with a Center of Excellence

      • Buy Link or Shortcode: {j2store}367|cart{/j2store}
      • member rating overall impact: 10.0/10 Overall Impact
      • member rating average dollars saved: $129,465 Average $ Saved
      • member rating average days saved: 12 Average Days Saved
      • Parent Category Name: Optimization
      • Parent Category Link: /optimization
      • Processes pertaining to managing the application are inconsistent and do not drive excellence.
      • There is a lack of interdepartmental collaboration between different teams pertaining to the application.
      • There are no formalized roles and responsibilities for governance and support around enterprise applications.

      Our Advice

      Critical Insight

      • Scale the Center of Excellence (CoE) based on business needs. There is flexibility in how extensively the CoE methodology is applied and rigidity in how consistently it should be used.
      • The CoE is a refinery. It takes raw inputs from the business and produces an enhanced product, removing waste and isolating it from re-entering day-to-day operations.
      • Excellence is about people as much as it is about process. Documented best practices should include competencies, key resources, and identified champions to advocate the CoE practice.

      Impact and Result

      • Formalize roles and responsibilities for all application initiatives.
      • Develop a standard process of governance and oversight surrounding the application.
      • Develop a comprehensive support network that consists of IT, the business, and external stakeholders to address issues and problem areas surrounding the application.

      Maximize the Benefits from Enterprise Applications with a Center of Excellence Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you should establish a Center of Excellence for your enterprise application, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Create a vision for the CoE

      Understand the importance of developing an enterprise application CoE, define its scope, and identify key stakeholders.

      • Maximize the Benefits from Enterprise Applications with a Center of Excellence – Phase 1: Create a Vision for the Center of Excellence
      • Enterprise Application Center of Excellence Project Charter

      2. Design the CoE future state

      Gather high-level requirements to determine the ideal future state.

      • Maximize the Benefits from Enterprise Applications with a Center of Excellence – Phase 2: Design the Center of Excellence Future State
      • Center of Excellence Refinery Model Template

      3. Develop a CoE roadmap

      Assess the required capabilities to reach the ideal state CoE.

      • Maximize the Benefits from Enterprise Applications with a Center of Excellence – Phase 3: Develop a Center of Excellence Roadmap
      • Center of Excellence Exceptions Report
      • Track and Measure Benefits Tool
      • Enterprise Application Center of Excellence Stakeholder Presentation Template
      [infographic]

      Workshop: Maximize the Benefits from Enterprise Applications with a Center of Excellence

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Create a Vision for the CoE

      The Purpose

      Understand the importance of developing a CoE for enterprise applications.

      Determine how to best align the CoE mandate with business objectives.

      Complete a CoE project charter to gain buy-in, build a project team, and track project success. 

      Key Benefits Achieved

      Key stakeholders identified.

      Project team created with defined roles and responsibilities.

      Project charter finalized to gain buy-in.

      Activities

      1.1 Evaluate business needs and priorities.

      1.2 Identify key stakeholders and the project team.

      1.3 Align CoE with business priorities.

      1.4 Map current state CoE.

      Outputs

      Project vision

      Defined roles and responsibilities

      Strategic alignment of CoE and the business

      CoE current state schematic

      2 Design the CoE Future State

      The Purpose

      Gain a thorough understanding of pains related to the lack of application governance.

      Identify and recycle existing CoE practices.

      Visualize the CoE enhancement process.

      Visualize your ideal state CoE. 

      Key Benefits Achieved

      Requirements to strengthen the case for the enterprise application CoE.

      CoE value-add refinery.

      Future potential of the CoE.

      Activities

      2.1 Gather requirements.

      2.2 Map the CoE enhancement process.

      2.3 Sketch future state CoE.

      Outputs

      Classified pains, opportunities, and existing practices

      CoE refinery model

      Future state CoE sketch

      3 Develop a CoE Roadmap

      The Purpose

      Assess required capabilities and resourcing.

      List and prioritize CoE initiatives.

      Track and monitor CoE performance. 

      Key Benefits Achieved

      Next steps for the enterprise application CoE.

      CoE resourcing plan.

      CoE benefits realization tracking.

      Activities

      3.1 Build CoE capabilities.

      3.2 Identify risks and mitigation efforts.

      3.3 Prioritize and track CoE initiatives.

      3.4 Finalize stakeholder presentation.

      Outputs

      CoE potential capabilities

      Risk management plan

      CoE initiatives roadmap

      CoE stakeholder presentation

      Application Maintenance

      • Buy Link or Shortcode: {j2store}30|cart{/j2store}
      • Related Products: {j2store}30|crosssells{/j2store}
      • member rating overall impact: 10.0/10
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Applications
      • Parent Category Link: /applications

      The challenge

      • If you work with application maintenance or operations teams that handle the "run" of your applications, you may find that the sheer volume and variety of requests create large backlogs.
      • Your business and product owners may want scrum or DevOps teams to work on new functionality rather than spend effort on lifecycle management.
      • Increasing complexity and increasing reliance on technology may create unrealistic expectations for your maintenance teams. Business applications must be available around the clock, and new feature roadmaps cannot be side-tracked by maintenance.

      Our advice

      Insight

      • Improving maintenance focus may mean doing less work but create more value. Your teams need to be realistic about what commitments they take—balance maintenance with business value and risk levels.
      • Treat maintenance the same as any other development practice. Use the same intake and prioritization practices. Uphold the same quality standards.

      Impact and results 

      • Justify the necessity of streamlined and regular maintenance. Understand each stakeholder's objectives and concerns, validate them against your staff's current state, processes, and technologies involved.
      • Maintenance and risk go hand in hand. And the business wants to move forward all the time as well. Strengthen your prioritization practice. Use a holistic view of the business and technical impacts, risks, urgencies across the maintenance needs and requests. That allows you to justify their respective positions in the overall development backlog. Identify opportunities to bring some requirements and features together.
      • Build a repeatable process with appropriate governance around it. Ensure that people know their roles and responsibilities and are held accountable.
      • Instill development best-practices into your maintenance processes.

      The roadmap

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      Get started.

      Read our executive brief to understand everyday struggles regarding application maintenance, the root causes, and our methodology to overcome these. We show you how we can support you.

      Understand your maintenance priorities

      Identify your stakeholders and understand their drivers.

      • Streamline Application Maintenance – Phase 1: Assess the Current Maintenance Landscape (ppt)
      • Application Maintenance Operating Model Template (doc)
      • Application Maintenance Resource Capacity Assessment (xls)
      • Application Maintenance Maturity Assessment (xls)

      Define and employ maintenance governance

      Identify the right level of governance appropriate to your company and business context for your application maintenance. That ensures that people uphold standards across maintenance practices.

      • Streamline Application Maintenance – Phase 2: Develop a Maintenance Release Schedule (ppt)

      Enhance your prioritization practices

      Most companies cannot do everything for all applications and systems. Build your maintenance triage and prioritization rules to safeguard your company, maximize business value generation and IT risks and requirements.

      • Streamline Application Maintenance – Phase 3: Optimize Maintenance Capabilities (ppt)

      Streamline your maintenance delivery

      Define quality standards in maintenance practices. Enforce these in alignment with the governance you have set up. Show a high degree of transparency and open discussions on development challenges.

      • Streamline Application Maintenance – Phase 4: Streamline Maintenance Delivery (ppt)
      • Application Maintenance Business Case Presentation Document (ppt)

       

       

      2021 CIO Priorities Report

      • Buy Link or Shortcode: {j2store}83|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: IT Strategy
      • Parent Category Link: /it-strategy
      • It is a new year, but the challenges of 2020 remain: COVID-19 infection rates continue to climb, governments continue to enforce lockdown measures, we continue to find ourselves in the worst economic crisis since the Great Depression, and civil unrest grows in many democratic societies.
      • At the start of 2020, no business leader predicted the disruption that was to come. This left IT in a reactive but critical role as the health crisis hit. It was core to delivering the organization’s products and services, as it drove the radical shift to work-from-home.
      • For the year ahead, IT will continue to serve a critical function in uncertain times. However, unlike last year, CIOs can better prepare for 2021. That said, in the face of the uncertainty and volatility of the year ahead, what they need to prepare for is still largely undefined.
      • But despite the lack of confidence on knowing specifically what is to come, most business leaders will admit they need to get ready for it. This year’s priority report will help.

      Our Advice

      Critical Insight

      • “Resilience” is the theme for this year’s CIO Priorities Report. In this context, resilience is about building up the capacity and the capabilities to effectively respond to emergent and unforeseen needs.
      • Early in 2021 is a good time to develop resilience in several different areas. As we explore in this year’s Report, CIOs can best facilitate enterprise resilience through strategic financial planning, proactive risk management, effective organizational change management and capacity planning, as well as through remaining tuned into emergent technologies to capitalize on innovations to help weather the uncertainty of the year ahead.

      Impact and Result

      • Use Info-Tech’s 2021 CIO Priorities Report to prepare for the uncertainty of the year ahead. Across our five priorities we provide five avenues through which CIOs can demonstrate resilient planning, enabling the organization as a whole to better confront what’s coming in 2021.
      • Each of our priorities is backed up by a “call to action” that will help CIOs start to immediately implement the right drivers of resilience for their organization.
      • By building up resilience across our five key areas, CIOs will not only be able to better prepare for the year to come, but also strengthen business relations and staff morale in difficult times.

      2021 CIO Priorities Report Research & Tools

      Read the 2021 CIO Priorities Report

      Use Info-Tech’s 2021 CIO Priorities Report to prepare for the uncertainty of the year ahead. Across our five priorities we provide five avenues through which CIOs can demonstrate resilient planning, enabling the organization as a whole to better confront what’s coming in 2021.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Create an appropriate budget reserve

      Identifying and planning sources of financial contingency will help ensure CIOs can meet unforeseen and emergent operational and business needs throughout the year.

      • 2021 CIO Priorities Report: Priority 1 – Create an Appropriate Budget Reserve

      2. Refocus IT risk planning

      The start of 2021 is a time to refocus and redouble IT risk management and business continuity planning to bring it up to the standards of our “new normal.” Indeed, if last year taught us anything, it’s that no “black swan” should be off the table in terms of scenarios or possibilities for business disruption.

      • 2021 CIO Priorities Report: Priority 2 – Refocus IT Risk Planning

      3. Strengthen organizational change management capabilities

      At its heart, resilience is having the capacity to deal with unexpected change. Organizational change management can help build up this capacity, providing the ability to strategically plot known changes while leaving some capacity to absorb the unknowns as they present themselves.

      • 2021 CIO Priorities Report: Priority 3 – Strengthen Organizational Change Management Capabilities

      4. Establish capacity awareness

      Capacity awareness facilitates resilience by providing capital in the form of resource data. With this data, CIOs can make better decisions on what can be approved and when it can be scheduled for.

      • 2021 CIO Priorities Report: Priority 4 – Establish Capacity Awareness

      5. Keep emerging technologies in view

      Having an up-to-date view of emerging technologies will enable the resilient CIO to capitalize on and deploy leading-edge innovations as the business requires.

      • 2021 CIO Priorities Report: Priority 5 – Keep Emerging Technologies in View
      [infographic]

      Craft a Customer-Driven Market Strategy With Unbiased Data

      • Buy Link or Shortcode: {j2store}611|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Selection & Implementation
      • Parent Category Link: /selection-and-implementation
      • Market strategies are informed by gut feel and endless brainstorming instead of market data to take their product from concept to customer.
      • Hiring independent market research firms results in a lack of unbiased third-party data. Research firms tell vendors what they want to hear instead of offering an agnostic view of software trends.
      • Dissatisfied customers don’t tell you directly why they are leaving, so there is no feedback loop back into product improvements.
      • Often a market strategy is built after a product is developed to force the product’s fit in the market. The product marketing team has no say in the product vision or future improvements.

      Our Advice

      Critical Insight

      • Adopt the 5 P’s to building a winning market strategy: Proposition, Product, Pricing, Placement, and Promotion.
      • You can’t be everything to everyone. Testing your proposition in the market to see what sticks is a risky move. Promise future value using past successes by gaining a deeper understanding of which customers and submarkets truly align to your product.
      • Customers have learned to avoid shiny new objects but still expect rapid feature releases. Differentiating features require a closer look at the underpinning vendor capabilities. Having intentional feature releases requires a feedback loop into the product roadmap and increases influence by the product marketing team.
      • Price transparency and sensitivity should drive what you offer to customers. Negotiating solely on price is a race to the bottom.

      Impact and Result

      • Leverage this report to gain insights on the software selection process and what top vendors do best.
      • Gain a bird’s-eye view on customer purchasing behavior using over 40,000 data points on satisfaction and importance collected directly from the source.
      • Build a winning market strategy influenced by real customer data that drives vendor success.

      Craft a Customer-Driven Market Strategy With Unbiased Data Research & Tools

      Read the storyboard

      Read our storyboard to find out why you should leverage SoftwareReviews data to craft your market strategy, review Info-Tech’s methodology, and understand unbiased customer data on software purchasing triggers.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      • Craft a Customer-Driven Market Strategy With Unbiased Data Storyboard
      [infographic]

      Close the InfoSec Skills Gap: Develop a Technical Skills Sourcing Plan

      • Buy Link or Shortcode: {j2store}378|cart{/j2store}
      • member rating overall impact: 7.3/10 Overall Impact
      • member rating average dollars saved: $10,756 Average $ Saved
      • member rating average days saved: 9 Average Days Saved
      • Parent Category Name: Governance, Risk & Compliance
      • Parent Category Link: /governance-risk-compliance
      • The demand for qualified cybersecurity professionals far exceeds supply. As a result, organizations are struggling to protect their data against the evolving threat landscape.
      • It is a constant challenge to know what skills will be needed in the future, and when and how to acquire them.

      Our Advice

      Critical Insight

      • Plan for the inevitable. All industries are expected to be affected by the talent gap in the coming years. Plan ahead to address your organization’s future needs.
      • Base skills acquisition decisions on the five key factors to define skill needs. Create an impact scale for the five key factors (data criticality, durability, availability, urgency, and frequency) that reflects your organizational strategy, initiatives, and pressures.
      • A skills gap will always exist to some degree. The threat landscape is constantly changing, and your workforce’s skill sets must evolve as well.

      Impact and Result

      • Organizations must align their security initiatives to talent requirements such that business objectives are achieved and the business is cyber ready.
      • Identify if there are skill gaps in your current workforce.
      • Decide how you’ll acquire needed skills based on characteristics of need for each skill.

      Close the InfoSec Skills Gap: Develop a Technical Skills Sourcing Plan Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you should develop a technical skills acquisition strategy, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Identify skill needs for target state

      Identify what skills will be needed in your future state.

      • Close the InfoSec Skills Gap: Develop a Technical Skills Sourcing Plan – Phase 1: Identity Skill Needs for Target State
      • Security Initiative Skills Guide
      • Skills Gap Prioritization Tool

      2. Identify technical skill gaps

      Align role requirements with future initiative skill needs.

      • Close the InfoSec Skills Gap: Develop a Technical Skills Sourcing Plan – Phase 2: Identify Technical Skill Gaps
      • Current Workforce Skills Assessment
      • Technical Skills Workbook
      • Information Security Compliance Manager
      • IT Security Analyst
      • Chief Information Security Officer
      • Security Administrator
      • Security Architect

      3. Develop a sourcing plan for future work roles

      Acquire skills based on the impact of the five key factors.

      • Close the InfoSec Skills Gap: Develop a Skills Sourcing Plan for Future Work Roles – Phase 3: Develop a Sourcing Plan for Future Work Roles
      [infographic]

      Workshop: Close the InfoSec Skills Gap: Develop a Technical Skills Sourcing Plan

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Identify Skill Needs for Target State

      The Purpose

      Determine the skills needed in your workforce and align them to your organization’s security roadmap.

      Key Benefits Achieved

      Insight on what skills your organization will need in the future.

      Activities

      1.1 Understand the importance of aligning security initiatives skill needs with workforce requirements.

      1.2 Identify needed skills for future initiatives.

      1.3 Prioritize the initiative skill gaps.

      Outputs

      Security Initiative Skills Guide

      Skills Gap Prioritization Tool

      2 Define Technical Skill Requirements

      The Purpose

      Identify and create technical skill requirements for key work roles that are needed to successfully execute future initiatives.

      Key Benefits Achieved

      Increased understanding of the NICE Cybersecurity Workforce Framework.

      Standardization of technical skill requirements of current and future work roles.

      Activities

      2.1 Assign work roles to the needs of your future environment.

      2.2 Discuss the NICE Cybersecurity Workforce Framework.

      2.3 Develop technical skill requirements for current and future work roles.

      Outputs

      Skills Gap Prioritization Tool

      Technical Skills Workbook

      Current Workforce Skills Assessment

      3 Acquire Technical Skills

      The Purpose

      Assess your current workforce against their role’s skill requirements.

      Discuss five key factors that aid acquiring skills.

      Key Benefits Achieved

      A method to acquire skills in future roles.

      Activities

      3.1 Continue developing technical skill requirements for current and future work roles.

      3.2 Conduct Current Workforce Skills Assessment.

      3.3 Discuss methods of acquiring skills.

      3.4 Develop a plan to acquire skills.

      Outputs

      Technical Skills Workbook

      Current Workforce Skills Assessment

      Current Workforce Skills Assessment

      Technical Skills Workbook

      Current Workforce Skills Assessment

      Technical Skills Workbook

      Current Workforce Skills Assessment

      4 Plan to Execute Action Plan

      The Purpose

      Assist with communicating the state of the skill gap in your organization.

      Key Benefits Achieved

      Strategy on how to acquire skills needs of the organization.

      Activities

      4.1 Review skills acquisition plan.

      4.2 Discuss training and certification opportunities for staff.

      4.3 Discuss next steps for closing the skills gap.

      4.4 Debrief.

      Outputs

      Technical Skills Workbook

      Create a Game Plan to Implement Cloud Backup the Right Way

      • Buy Link or Shortcode: {j2store}469|cart{/j2store}
      • member rating overall impact: 7.0/10 Overall Impact
      • member rating average dollars saved: $2,000 Average $ Saved
      • member rating average days saved: 5 Average Days Saved
      • Parent Category Name: Storage & Backup Optimization
      • Parent Category Link: /storage-and-backup-optimization
      • Cloud adoption is frequently driven by hype rather than careful consideration of the best-fit solution.
      • IT is frequently rushed into cloud adoption without appropriate planning.
      • Organizations frequently lack appropriate strategies to deal with cloud-specific backup challenges.
      • Insufficient planning for cloud backup can exacerbate problems rather than solving them, leading to poor estimates of the cost and effort involved, budget overruns, and failure to meet requirements.

      Our Advice

      Critical Insight

      • The cloud isn’t a magic bullet, but it tends to deliver the most value to organizations with specific use cases – frequently smaller organizations who are looking to avoid the cost of building or upgrading a data center.
      • Cloud backup does not necessarily reduce backup costs so much as it moves them around. Cloud backup distributes costs over a longer term. Organizations need to compare the difference in CAPEX and OPEX to determine if making the move makes financial sense.
      • The cloud can deliver a great deal of value for organizations who are looking to reduce the operational effort demanded by an existing tape library for second- or third-tier backups.
      • Data security risks in some cases may be overstated, depending on what on-premises security is available. However, targeting backup to the cloud introduces other risks that need to be considered before implementation is given the green light.

      Impact and Result

      • Understand if cloud backup is the right solution for actual organizational needs.
      • Make an informed decision about targeting backup to the cloud by considering the big picture TCO and effort level involved in adoption.
      • Have a ready strategy to mitigate the most common challenges with cloud adoption projects.
      • Develop a roadmap that lays out the required step-by-step to implement cloud backup.

      Create a Game Plan to Implement Cloud Backup the Right Way Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Understand the benefits and risks of targeting backups to the cloud

      Build a plan to mitigate the risks associated with backing data up in the cloud.

      • Storyboard: Create a Game Plan to Implement Cloud Backup the Right Way

      2. Determine if the cloud can meet the organization's data requirements

      Assess if the cloud is a good fit for your organization’s backup data.

      • Cloud Backup Implementation Game Plan Tool

      3. Mitigate the Challenges of Backing Up to the Cloud

      Build a cloud challenge contingency plan.

      4. Build a Cloud Backup Implementation Roadmap

      Perform a gap analysis to determine cloud backup implementation initiatives.

      Infographic

      Workshop: Create a Game Plan to Implement Cloud Backup the Right Way

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Evaluate the business case for targeting backup at the cloud

      The Purpose

      Understand how cloud backup will affect backup and recovery processes

      Determine backup and recovery objectives

      Assess the value proposition of cloud backup

      Key Benefits Achieved

      A high-level understanding of the benefits of moving to cloud backup

      A best-fit analysis of cloud backup in comparison to organizational needs

      Activities

      1.1 Document stakeholder goals for cloud backup

      1.2 Document present backup processes

      1.3 Document ideal backup processes

      1.4 Review typical benefits of cloud backup

      Outputs

      Documented stakeholder goals

      Current backup process diagrams

      Ideal backup process diagram

      2 Identify candidate data sets and assess opportunities and readiness

      The Purpose

      Identify candidate data sets for cloud-based backup

      Determine RPOs and RTOs for candidate data sets

      Identify potential value specific to each data set for targeting backup at the cloud

      Evaluate organizational readiness for targeting backup at the cloud

      Key Benefits Achieved

      Documented recovery objectives

      Recommendations for cloud backup based on actual organizational needs and readiness

      Activities

      2.1 Document candidate data sets

      2.2 Determine recovery point and recovery time objectives for candidate data sets

      2.3 Identify potential value of cloud-based backup for candidate data sets

      2.4 Discuss the risk and value of cloud-based backup versus an on-premises solution

      2.5 Evaluate organizational readiness for cloud backup

      2.6 Identify data sets to move to the cloud

      Outputs

      Validated list of candidate data sets

      Specific RPOs and RTOs for core data sets

      An assessment of the value of cloud backup for data sets

      A tool-based recommendation for moving backups to the cloud

      3 Mitigate the challenges of backing up to the cloud

      The Purpose

      Understand different cloud provider models and their specific risks

      Identification of how cloud backup will affect IT infrastructure and personnel

      Strategize ways to mitigate the most common challenges of implementing cloud backup

      Understand the client/vendor relationship in cloud backup

      Understand the affect of cloud backup on data security

      Key Benefits Achieved

      Verified best-fit cloud provider model for organizational needs

      Verified strategy for meeting the most common challenges for cloud-based backup

      A strong understanding of how cloud backup will change IT

      Strategies for approaching vendors to ensure a strong footing in negotiations and clear expectations for the client/vendor relationship

      Activities

      3.1 Discuss the impact of cloud backup on infrastructure and IT environment

      3.2 Create a cloud backup risk contingency plan

      3.3 Document compliance and security regulations

      3.4 Identify client and vendor responsibilities for cloud backup

      3.5 Discuss and document the impact of cloud backup on IT roles and responsibilities

      3.6 Compile a list of implementation intiatives

      3.7 Evaluate the financial case for cloud backup

      Outputs

      Cloud risk assessment

      Documented contingency strategies for probabe risks

      Negotiation strategies for dealing with vendors

      A committed go/no-go decision on the value of cloud backup weighted against the effort of implementation

      4 Build a cloud backup implementation roadmap

      The Purpose

      Create a road map for implementing cloud backup

      Key Benefits Achieved

      Determine any remaining gaps between the present state and the ideal state for cloud backup

      Understand the steps and time frame for implementing cloud backup

      Allocate roles and responsibilities for the implementation intitiative

      A validated implementation road map

      Activities

      4.1 Perform a gap analysis to generate a list of implementation intiatives

      4.2 Prioritize cloud backup initiatives

      4.3 Assess risks and dependencies for critical implementation initiatives

      4.4 Assign ownership over implementation tasks

      4.5 Determine road map time frame and structure

      4.6 Populate the roadmap with cloud backup initiatives

      Outputs

      A validated gap analysis

      A prioritized list of cloud backup initiatives

      Documented dependencies and risks associated with implementation tasks

      A roadmap for targeting backups at the cloud

      Improve your core processes

      Improve your core processes


      We have over 45 fully detailed
      and interconnected process guides
      for you to improve your operations

      Managing and improving your processes is key to attaining commercial success

      Our practical guides help you to improve your operations

      We have hundreds of practical guides, grouped in many processes in our model. You may not need all of them. I suggest you browse within the belo top-level categories below and choose where to focus your attention. And with Tymans Group's help, you can go one process area at a time.

      If you want help deciding, please use the contact options below or click here.

      Check out our guides

      Our research and guides are priced from €299,00

      • Gert Taeymans Guidance

        Tymans Group Guidance & Consulting

        Tymans Group guidance and (online) consulting using both established and forward-looking research and field experience in our management domains.

        Contact

      • Tymans Group
        & Info-Tech
        Combo

        Get both inputs, all of the Info-tech research (with cashback rebate), and Tymans Group's guidance.

        Contact

      • Info-Tech Research

        Info-Tech offers a vast knowledge body, workshops, and guided implementations. You can buy Info-Tech memberships here at Tymans Group with cashback, reducing your actual outlay.

        Contact

      Register to read more …

      Estimate Software Delivery With Confidence

      • Buy Link or Shortcode: {j2store}147|cart{/j2store}
      • member rating overall impact: 10.0/10 Overall Impact
      • member rating average dollars saved: $50,000 Average $ Saved
      • member rating average days saved: 20 Average Days Saved
      • Parent Category Name: Development
      • Parent Category Link: /development
      • Estimation and planning practices set and reinforce the expectations of product delivery, which is a key driver of IT satisfaction.
      • However, today’s rapidly scaling and increasingly complex products and business needs create mounting pressure for teams to make accurate estimates with little knowledge of the problem or solution to it, risking poor-quality products.
      • Many organizations lack the critical foundations involved in making acceptable estimates in collaboration with the various perspectives and estimation stakeholders.

      Our Advice

      Critical Insight

      • Estimation reflects your culture and operating model. The accuracy of your estimates is dependent on the roles involved, which is not encouraged in traditional and top-down methodologies. Stakeholders must respect and support the team’s estimates.
      • Estimates support value delivery. IT satisfaction is driven by the delivery of valuable products and services. Estimates set the appropriate stakeholder expectations to ensure successful delivery and make the right decisions.
      • Estimates are more than just guesses. They are tools used to make critical business, product, and technical decisions and inform how to best utilize resources and funding.

      Impact and Result

      • Establish the right expectations. Gain a grounded understanding of estimation value and limitations. Discuss estimation challenges to determine if poor practices and tactics are the root causes or symptoms.
      • Strengthen analysis and estimation practices. Obtain a thorough view of the product backlog item (PBI) through good analysis tactics. Incorporate multiple analysis and estimation tactics to verify and validate assumptions.
      • Incorporate estimates into your delivery lifecycle. Review and benchmark estimates, and update expectations as more is learned.

      Estimate Software Delivery With Confidence Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you should optimize your estimation practice, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Justify estimation optimization

      Set the right stakeholder expectations for your delivery estimates and plans.

      • Estimate Software Delivery With Confidence – Phase 1: Justify Estimation Optimization
      • Estimation Quick Reference Template

      2. Commit to achievable delivery

      Adopt the analysis, estimation, commitment, and communication tactics to successfully develop your delivery plan.

      • Estimate Software Delivery With Confidence – Phase 2: Commit to Achievable Delivery

      3. Mature your estimation practice

      Build your estimation optimization roadmap.

      • Estimate Software Delivery With Confidence – Phase 3: Mature Your Estimation Practice
      [infographic]

      Workshop: Estimate Software Delivery With Confidence

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Set the Context

      The Purpose

      Discuss the decisions that estimates will help make.

      Level set estimation expectations by clarifying what they can and cannot do.

      Review the current state of your estimation practice.

      Key Benefits Achieved

      Grounded understanding of estimation that is accepted by all audiences and stakeholders.

      Identification of whether estimation practices are the root cause of estimation challenges or a symptom of a different issue.

      Activities

      1.1 Define estimation expectations.

      1.2 Reveal your root cause challenges.

      Outputs

      Estimation expectations

      Root causes of estimation challenges

      2 Build Your Estimation Practice

      The Purpose

      Discuss the estimation and planning practices used in the industry.

      Define the appropriate tactics to use to make key business and delivery decisions.

      Simulate the tactics to verify and validate their fit with your teams.

      Key Benefits Achieved

      Knowledge of good practices that can improve the effectiveness of your estimates and plans.

      Practice using new tactics.

      Activities

      2.1 Ground estimation fundamentals.

      2.2 Strengthen your analysis tactics.

      2.3 Strengthen your estimation tactics.

      2.4 Commit and communicate delivery.

      2.5 Simulate your target state planning and estimation tactics.

      Outputs

      Estimation glossary and guiding principles

      Defined analysis tactics

      Defined estimation and consensus-building tactics

      Defined commitment and communication tactics

      Lessons learned

      3 Define Your Optimization Roadmap

      The Purpose

      Review the scope and achievability of your improved estimation and planning practice.

      Key Benefits Achieved

      Realistic and achievable estimation optimization roadmap.

      Activities

      3.1 Mature your estimation practice.

      Outputs

      Estimation optimization roadmap

      Terms and Conditions for consulting to businesses

      By signing an agreement with Gert Taeymans bvba, Client declares that he agrees with the Terms and Conditions referred to hereafter. Terms and conditions on Client's order form or any other similar document shall not be binding upon Gert Taeymans bvba.

      The prices, quantities and delivery time stated in any quotation are not binding upon Gert Taeymans bvba. They are commercial estimates only which Gert Taeymans bvba will make reasonable efforts to achieve. Prices quoted in final offers will be valid only for 30 days. All prices are VAT excluded and do not cover expenses, unless otherwise agreed in writing. Gert Taeymans bvba reserves the right to increase a quoted fee in the event that Client requests a variation to the work agreed.

      The delivery times stated in any quotation are of an indicative nature and not binding upon Gert Taeymans bvba, unless otherwise agreed in writing. Delivery times will be formulated in working days. In no event shall any delay in delivery be neither cause for cancellation of an order nor entitle Client to any damages.

      Amendments or variations of the initial agreement between Client and Gert Taeymans bvba will only be valid when accepted by both parties in writing.

      Any complaints concerning the performance of services must be addressed to Gert Taeymans bvba in writing and by registered mail within 7 working days of the date of the performance of the services.

      In no event shall any complaint be just cause for non-payment or deferred payment of invoices. Any invoice and the services described therein will be deemed irrevocably accepted by Client if no official protest of non-payment has been sent by Client within 7 working days from the date of the mailing of the invoice.

      Client shall pay all invoices of Gert Taeymans bvba within thirty (30) calendar days of the date of invoice unless otherwise agreed in writing by Gert Taeymans bvba. In the event of late payment, Gert Taeymans bvba may charge a monthly interest on the amount outstanding at the rate of two (2) percent with no prior notice of default being required, in which case each commenced month will count as a full month. Any late payment will entitle Gert Taeymans bvba to charge Client a fixed handling fee of 300 EUR. All costs related to the legal enforcement of the payment obligation, including lawyer fees, will be charged to Client.

      In no event will Gert Taeymans bvba be liable for damages of any kind, including without limitation, direct, incidental or consequential damages (including, but not limited to, damages for lost profits, business interruption and loss of programs or information) arising out of the use of Gert Taeymans bvba services.

      Gert Taeymans bvba collects personal data from Client for the performance of its services and the execution of its contracts. Such personal data can also be used for direct marketing, allowing Gert Taeymans bvba to inform Client of its activities on a regular basis. If Client objects to the employment of its personal data for direct marketing, Client must inform Gert Taeymans bvba on the following address: gert@gerttaeymans.consulting.

      Client can consult, correct or amend its personal data by addressing such request to Gert Taeymans bvba by registered mail. Personal data shall in no event be sold, rented or made available to other firms or third parties where not needed for the execution of the contract. Gert Taeymans bvba reserves the right to update and amend its privacy policy from time to time to remain consistent with applicable privacy legislation.

      The logo of the Client will be displayed on the Gert Taeymans bvba website, together with a short description of the project/services.

      Any changes to Client’s contact information such as addresses, phone numbers or e-mail addresses must be communicated to Gert Taeymans bvba as soon as possible during the project.

      Both parties shall maintain strict confidence and shall not disclose to any third party any information or material relating to the other or the other's business, which comes into that party's possession and shall not use such information and material. This provision shall not, however, apply to information or material, which is or becomes public knowledge other than by breach by a party of this clause.

      Gert Taeymans bvba has the right at any time to change or modify these terms and conditions at any time without notice.

      The agreement shall be exclusively governed by and construed in accordance with the laws of Belgium. The competent courts of Antwerp, Belgium will finally settle any dispute about the validity, the interpretation or the execution of this agreement.

      These Terms and Conditions are the only terms and conditions applicable to both parties.

      If any provision or provisions of these Terms and Conditions shall be held to be invalid, illegal or unenforceable, such provision shall be enforced to the fullest extent permitted by applicable law, and the validity, legality and enforceability of the remaining provisions shall not in any way be affected or impaired thereby.

      Network Segmentation

      • Buy Link or Shortcode: {j2store}503|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Network Management
      • Parent Category Link: /network-management
      • Many legacy networks were built for full connectivity and overlooked potential security ramifications.
      • Malware, ransomware, and bad actors are proliferating. It is not a matter of if you will be compromised but how can the damage be minimized.
      • Cyber insurance will detective control, not a preventative one. Prerequisite audits will look for appropriate segmentation.

      Our Advice

      Critical Insight

      • Lateral movement amplifies damage. Contain movement within the network through segmentation.
      • Good segmentation is a balance between security and manageability. If solutions are too complex, they won’t be updated or maintained.
      • Network services and users change over time, so must your segmentation strategy. Networks are not static; your segmentation must maintain pace.

      Impact and Result

      • Create a common understanding of what is to be built, for whom, and why.
      • Define what services will be offered and how they will be governed.
      • Understand which assets that you already have can jump start the project.

      Network Segmentation Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Network Segmentation Deck – A deck to help you minimize risk by controlling traffic flows within the network.

      Map out appropriate network segmentation to minimize risk in your network.

      • Network Segmentation Storyboard
      [infographic]

      Further reading

      Network Segmentation

      Protect your network by controlling the conversations within it.

      Executive Summary

      Info-Tech Insight

      Lateral movement amplifies damage

      From a security perspective, bad actors often use the tactic of “land and expand.” Once a network is breached, if east/west or lateral movement is not restricted, an attacker can spread quickly within a network from a small compromise.

      Good segmentation is a balance between security and manageability

      The ease of management in a network is usually inversely proportional to the amount of segmentation in that network. Highly segmented networks have a lot of potential complications and management overhead. In practice, this often leads to administrators being confused or implementing shortcuts that circumvent the very security that was intended with the segmentation in the first place.

      Network services and users change over time, so must your segmentation strategy

      Network segmentation projects should not be viewed as singular or “one and done.” Services and users on a network are constantly evolving; the network segmentation strategy must adapt with these changes. Be sure to monitor and audit segmentation deployments and change or update them as required to maintain a proper risk posture.

      Executive Summary

      Your Challenge

      Common Obstacles

      Info-Tech’s Approach

      Networks are meant to facilitate communication, and when devices on a network cannot communicate, it is generally seen as an issue. The simplest answer to this is to design flat, permissive networks. With the proliferation of malware, ransomware, and advanced persistent threats (ATPs) a flat or permissive network is an invitation for bad actors to deliver more damage at an increased pace.

      Cyber insurance may be viewed as a simpler mitigation than network reconfiguration or redesign, but this is not a preventative solution, and the audits done before policies are issued will flag flat networks as a concern.

      Network segmentation is not a “bolt on” fix. To properly implement a minimum viable product for segmentation you must, at a minimum:

      • Understand the endpoints and their appropriate traffic flows.
      • Understand the technologies available to implement segmentation.

      Implementing appropriate segmentation often involves elements of (if not a full) network redesign.

      To ensure the best results in a timely fashion, Info-Tech recommends a methodology that consists of:

      • Understand the network (or subset thereof) and prioritizing segmentation based on risk.
      • Align the appropriate segmentation methodology for each surfaced segment to be addressed.
      • Monitor the segmented environment for compliance and design efficacy, adding to and modifying existing as required.

      Info-Tech Insight

      The aim of networking is communication, but unfettered communication can be a liability. Appropriate segmentation in networks, blocking communications where they are not required or desired, restricts lateral movement within the network, allowing for better risk mitigation and management.

      Network segmentation

      Compartmentalization of risk:

      Segmentation is the practice of compartmentalizing network traffic for the purposes of mitigating or reducing risk. Segmentation methodologies can generally be grouped into three broad categories:

      1. Physical Segmentation

      The most common implementation of physical segmentation is to build parallel networks with separate hardware for each network segment. This is sometimes referred to as “air gapping.”

      2. Static Virtual Segmentation

      Static virtual segmentation is the configuration practice of using technologies such as virtual LANs (VLANs) to assign ports or connections statically to a network segment.

      3. Dynamic Virtual Segmentation

      Dynamic virtual segmentation assigns a connection to a network segment based on the device or user of the connection. This can be done through such means as software defined networking (SDN), 802.1x, or traffic inspection and profiling.

      Common triggers for network segmentation projects

      1. Remediate Audit Findings

      Many security audits (potentially required for or affecting premiums of cyber insurance) will highlight the potential issues of non-segmented networks.

      2. Protect Vulnerable Technology Assets

      Whether separating IT and OT or segmenting off IoT/IIoT devices, keeping vulnerable assets separated from potential attack vectors is good practice.

      3. Minimize Potential for Lateral Movement

      Any organization that has experienced a cyber attack will realize the value in segmenting the network to slow a bad actor’s movement through technology assets.

      How do you execute on network segmentation?

      The image contains a screenshot of the network segmentation process. The process includes: identify risk, design segmentation, and operate and optimize.

      Identify risks by understanding access across the network

      Gain visibility

      Create policy

      Prioritize change

      "Security, after all, is a risk business. As companies don't secure everything, everywhere, security resilience allows them to focus their security resources on the pieces of the business that add the most value to an organization, and ensure that value is protected."

      – Helen Patton,

      CISO, Cisco Security Business Group, qtd. In PR News, 2022

      Discover the data flows within the network. This should include all users on the network and the environments they are required to access as well as access across environments.

      Examine the discovered flows and define how they should be treated.

      Change takes time. Use a risk assessment to prioritize changes within the network architecture.

      Understand the network space

      A space is made up of both services and users.

      Before starting to consider segmentation solutions, define whether this exercise is aimed at addressing segmentation globally or at a local level. Not all use cases are global and many can be addressed locally.

      When examining a network space for potential segmentation we must include:

      • Services offered on the network
      • Users of the network

      To keep the space a consumable size, both of these areas should be approached in the abstract. To abstract, users and services should be logically grouped and generalized.

      Groupings in the users and services categories may be different across organizations, but the common thread will be to contain the amount of groupings to a manageable size.

      Service Groupings

      • Are the applications all components of a larger service or environment?
      • Do the applications serve data of a similar sensitivity?
      • Are there services that feed data and don’t interact with users (IoT, OT, sensors)?

      User Groupings

      • Do users have similar security profiles?
      • Do users use a similar set of applications?
      • Are users in the same area of your organization chart?
      • Have you considered access by external parties?

      Info-Tech Insight

      The more granular you are in the definition of the network space, the more granular you can be in your segmentation. The unfortunate corollary to this is that the difficulty of managing your end solution grows with the granularity of your segmentation.

      Create appropriate policy

      Understand which assets to protect and how.

      Context is key in your ability to create appropriate policy. Building on the definition of the network space that has been created, context in the form of the appropriateness of communications across the space and the vulnerabilities of items within the space can be layered on.

      To decide where and how segmentation might be appropriate, we must first examine the needs of communication on the network and their associated risk. Once defined, we can assess how permissive or restrictive we should be with that communication.

      The minimum viable product for this exercise is to define the communication channel possibilities, then designate each possibility as one of the following:

      • Permissive – we should freely allow this traffic
      • Restricted – we should allow some of the traffic and/or control it
      • Rejected – we should not allow this traffic

      Appropriate Communications

      • Should a particular group of users have access to a given service?
      • Are there external users involved in any grouping?

      Potential Vulnerabilities

      • Are the systems in question continually patched/updated?
      • Are the services exposed designed with the appropriate security?

      Prioritize the potential segmentation

      Use risk as a guide to prioritize segmentation.

      For most organizations, the primary reason for network segmentation is to improve security posture. It follows that the prioritization of initiatives and/or projects to implement segmentation should be based on risk.

      When examining risk, an organization needs to consider both:

      • Impact and likelihood of visibility risk in respect to any given asset, data, or user
      • The organization’s level of risk tolerance

      The assets or users that are associated with risk levels higher than the tolerance of the organization should be prioritized to be addressed.

      Service Risks

      • If this service was affected by an adverse event, what would the impact on the organization be?

      User Risks

      • Are the users in question FTEs as opposed to contractors or outsourced resources?
      • Is a particular user group more susceptible to compromise than others?

      Info-Tech Insight

      Be sure to keep this exercise relative so that a clear ranking occurs. If it turns out that everything is a priority, then nothing is a priority. When ranking things relative to others in the exercise, we ensure clear “winners” and “losers.”

      Assess risk and prioritize action

      1-3 hours

      1. Define a list of users and services that define the network space to be addressed. If the lists are too long, use an exercise like affinity diagramming to appropriately group them into a smaller subset.
      2. Create a matrix from the lists (put users and services along the rows and columns). In the intersecting points, label how the traffic should be treated (e.g. Permissive, Restricted, Rejected).
      3. Examine the matrix and assess the intersections for risk using the lens of impact and likelihood of an adverse event. Label the intersections for risk level with one of green (low impact/likelihood), yellow (medium impact/likelihood), or red (high impact/likelihood).
      4. Find commonalities within the medium/high areas and list the users or services as priorities to be addressed.
      Input Output
      • Network, application, and security documentation
      • A prioritized list of areas to address with segmentation
      Materials Participants
      • Whiteboard/Flip Charts

      OR

      • Excel spreadsheet
      • Network Team
      • Application Team
      • Security Team
      • Data Team

      Design segmentation

      Segmentation comes in many flavors; decide which is right for the specific circumstance.

      Methodology

      Access control

      "Learning to choose is hard. Learning to choose well is harder. And learning to choose well in a world of unlimited possibilities is harder still, perhaps too hard."

      ― Barry Schwartz, The Paradox of Choice: Why More Is Less

      What is the best method to segment the particular user group, service, or environment in question?

      How can data or user access move safely and securely between network segments?

      Decide on which methods work for your circumstances

      You always have options…

      There are multiple lenses to look through when making the decision of what the correct segmentation method might be for any given user group or service. A potential subset could include:

      • Effort to deploy
      • Cost of the solution
      • Skills required to operate
      • Granularity of the segmentation
      • Adaptability of the solution
      • Level of automation in the solution

      Info-Tech Insight

      Network segmentation within an organization is rarely a one-size-fits-all proposition. Be sure to look at each situation that has been identified to need segmentation and align it with an appropriate solution. The overall number of solutions deployed has to maintain a balance between that appropriateness and the effort to manage multiple environments.

      Framework to examine segmentation methods

      To assess we need to understand.

      To assess when technologies or methodologies are appropriate for a segmentation use case, we need to understand what those options are. We will be examining potential segmentation methods and concepts within the following framework:

      WHAT

      A description of the segmentation technology, method, or concept.

      WHY

      Why would this be used over other choices and/or in what circumstances?

      HOW

      A high-level overview of how this option could or would be deployed.

      Notional assessments will be displayed in a sidebar to give an idea of Effort, Cost, Skills, Granularity, Adaptability, and Automation.

      Implement

      Notional level of effort to implement on a standard network

      Cost

      Relative cost of implementing this segmentation strategy

      Maintain

      Notional level of time and skills needed to maintain

      Granularity

      How granular this type of segmentation is in general

      Adaptability

      The ability of the solution to be easily modified or changed

      Automation

      The level of automation inherent in the solution

      Air gap

      … And never the twain shall meet.

      – Rudyard Kipling, “The Ballad of East and West.”

      WHAT

      Air gapping is a strategy to protect portions of a network by segmenting those portions and running them on completely separate hardware from the primary network. In an air gap scenario, the segmented network cannot have connectivity to outside networks. This difference makes air gapping a very specific implementation of parallel networks (which are still segmented and run on separate hardware but can be connected through a control point).

      WHY

      Air gap is a traditional choice when environments need to be very secure. Examples where air gaps exist(ed) are:

      • Operational technology (OT) networks
      • Military networks
      • Critical infrastructure

      HOW

      Most networks are not overprovisioned to a level that physical segmentation can be done without purchasing new equipment. The major steps required for constructing an air gap include:

      • Design segmentation
      • Purchase and install new hardware
      • Cable to new hardware

      The image contains a screenshot that demonstrates pie graphs with the notional assessments: Effort, Cost, Skills, Granularity, and Automation.

      Info-Tech Insight

      An air gapped network is the ultimate in segmentation and security … as long as the network does not require connectivity. It is unfortunately rare in today’s world that a network will stand on its own without any need for external connectivity.

      VLAN

      Do what you can, with what you’ve got…

      – Theodore Roosevelt

      WHAT

      Virtual local area networks (VLANs) are a standard feature on today’s firewalls, routers, and manageable switches. This configuration option allows for network traffic to be segmented into separate virtual networks (broadcast domains) on existing hardware. This segmentation is done at layer 2 of the OSI model. All traffic will share the same hardware but be partitioned based on “tags” that the local device applies to the traffic. Because of these tags, traffic is handled separately at layer 2 of the OSI model, but traffic can pass between segments at layer 3 (e.g. IP layer).

      WHY

      VLANs are commonly used because most existing deployments already have the technology available without extra licensing. VLANs are also potentially used as foundational components in more complex segmentation strategies such as static or dynamic overlays.

      HOW

      VLANs allow for segmentation of a device at the port level. VLAN strategies are generally on a location level (e.g. most VLAN deployments are local to a site, though the same structure may be used among sites). To deploy VLANs you must:

      • Define VLAN segments
      • Assign ports appropriately

      The image contains a screenshot that demonstrates pie graphs with the notional assessments: Effort, Cost, Skills, Granularity, and Automation.

      Info-Tech Insight

      VLANs are tried and true segmentation workhorses. The fact that they are already included in modern manageable solutions means that there is very little reason to not have some level of segmentation within a network.

      Micro-segmentation

      Everyone is against micromanaging, but macro managing means you’re working on the big picture but don’t understand the details.

      – Henry Mintzberg

      WHAT

      Micro-segmentation is used to secure and control network traffic between workloads. This is a foundational technology when implementing zero trust or least-privileged access network designs. Segmentation is done at or directly adjacent to the workload (on the system or its direct network connectivity) through firewall or similar policy controls. The controls are set to only allow the network communication required to execute the workload and is limited to appropriate endpoints. This restrictive design restricts all traffic (including east-west) and reduces the attack surface.

      WHY

      Micro-segmentation is primarily used:

      • In server-to-server communication.
      • When lateral movement by bad actors is identified as a concern.

      HOW

      Micro-segmentation can be deployed at different places within the connectivity depending on the technologies used:

      • Workload/server (e.g. server firewall)
      • VM network overlay (e.g. VMware NSX)
      • Network port (e.g. ACL, firewall, ACI)
      • Cloud native (e.g. Azure Firewall)

      Info-Tech Insight

      Micro-segmentation is necessary in the data center to limit lateral movement. Just be sure to be thorough in defining required communication as this technology works on allowlists, not traditional blocklists.

      Static overlay

      Adaptability is key.

      – Marc Andreessen

      WHAT

      Static overlays are a form of virtual segmentation that allows multiple network segments to exist on the same device. Most of these solutions will also allow for these segments to expand across multiple devices or sites, creating overlay virtual networks on top of the existing physical networks. The static nature of the solution is because the ports that participate in the overlays are statically assigned and configured. Connectivity between devices and sites is done through encapsulation and may have a dynamic component of the control plane handled through routing protocols.

      WHY

      Static overlays are commonly deployed when the need is to segment different use cases or areas of the organization consistently across sites while allowing easy access within the segments between sites. This could be representative of segmenting a department like Finance or extending a layer 2 segment across data centers.

      HOW

      Static overlays are can segment and potentially extend a layer 2 or layer 3 network. These solutions could be executed with technologies such as:

      • VXLAN (Virtual eXtensible LAN)
      • MPLS (Multi Protocol Label Switching)
      • VRF (Virtual Routing & Forwarding)

      The image contains a screenshot that demonstrates pie graphs with the notional assessments: Effort, Cost, Skills, Granularity, and Automation.

      Info-Tech Insight

      Static overlays are commonly deployed by telecommunications providers when building out their service offerings due to the multitenancy requirements of the network.

      Dynamic overlay

      Never tell people how to do things. Tell them what to do and they will surprise you with their ingenuity.

      – George S. Patton

      WHAT

      A dynamic overlay segmentation solution has the ability to make security or traffic decisions based on policy. Rather than designing and hardcoding the network architecture, the policy is architected and the network makes decisions based on that policy. Differing levels of control exist in this space, but the underlying commonality is that the segmentation would be considered “software defined” (SDN).

      WHY

      Dynamic overlay solutions provide the most flexibility of the presented solutions. Some use cases such as BYOD or IoT devices may not be easily identified or controlled through static means. As a general rule of thumb, the less static the network is, the more dynamic your segmentation solution must be.

      HOW

      Policy is generally applied at the network ingress. When applying policy, which policy to be applied can be identified through different methodologies such as:

      • Authentication (e.g. 802.1x)
      • Device agents
      • Device profiling

      The image contains a screenshot that demonstrates pie graphs with the notional assessments: Effort, Cost, Skills, Granularity, and Automation.

      Info-Tech Insight

      Dynamic overlays allow for more flexibility through its policy-based configurations. These solutions can provide the highest value when positioned where we have less control of the points within a network (e.g. BYOD scenarios).

      Define how your segments will communicate

      No segment is an island…

      Network segmentation allows for protection of devices, users, or data through the act of separating the physical or virtual networks they are on. Counter to this protective stance, especially in today’s networks, these devices, users, or data tend to need to interact with each other outside of the neat lines we draw for them. Proper network segmentation has to allow for the transfer of assets between networks in a safe and secure manner.

      Info-Tech Insight

      The solutions used to facilitate the controlled communication between segments has to consider the friction to the users. If too much friction is introduced, people will try to find a way around the controls, potentially negating the security that is intended with the solution.

      Potential access methods

      A ship in harbor is safe, but that is not what ships are built for.

      – John A. Shedd

      Firewall

      Two-way controlled communication

      Firewalls are tried and true control points used to join networks. This solution will allow, at minimum, port-level control with some potential for deeper inspection and control beyond that.

      • Traditionally firewalls are sized to handle internet-bound (North-South) traffic. When being used between segments, (East-West) loads are usually much higher, necessitating a more powerful device.

      Jump Box

      A place between worlds

      Also sometimes referred to as a “Bastion Host,” a jump box is a special-purpose computer/server that has been hardened and resides on multiple segments of a network. Administrators or users can log into this box and use it to securely use the tools installed to act on other segments of the network.

      • Jump box security is of utmost importance. Special care should be taken in hardening, configuration, and application installed to ensure that users cannot use the box to tunnel or traverse between the segments outside of well-defined and controlled circumstances.

      Protocol Gateway

      Command-level control

      A protocol gateway is a specific and special subset of a firewall. Whereas a firewall is a security generalist, a protocol gateway is designed to understand and have rule-level control over the commands passing through it within defined protocols. This granularity, for example, allows for control and filtering to only allow defined OT commands to be passed to a secure SCADA network.

      • Protocol gateways are generally specific feature sets of a firewall and traditionally target OT network security as their core use case.

      Network Pump

      One-way data extraction

      A network pump is a concept designed to allow data to be transferred from a secure network to a less secure network while still protecting against covert channels such as using the ACK within a transfer to transmit data. A network pump will consist of trusted processes and schedulers that allow for data to pass but control channels to be sufficiently modified so as to not allow security concerns.

      • Network pumps would generally be deployed in the most security demanding of environments and are generally not “off the shelf” products.

      Operate and optimize

      Security is not static. Monitor and iterate on policies within the environment.

      Monitor

      Iterate

      Two in three businesses (68%) allow more employee data access than necessary.

      GetApp's 2022 Data Security Survey Report

      Are the segmentation efforts resulting in the expected traffic changes? Are there any anomalies that need investigation?

      Using the output from the monitoring stage, refine and optimize the design by iterating on the process.

      Monitor for efficacy, compliance, and the unknown

      Monitor to ensure your intended results and to identify new potential risks.

      Monitoring network segments

      A combination of passive and active monitoring is required to ensure that:

      • The rules that have been deployed are working as expected.
      • Appropriate proof of compliance is in place for auditing and insurance purposes.
      • Environments are being monitored for unexpected traffic.

      Active monitoring goes beyond the traditional gathering of information for alerts and dashboards and moves into the space of synthetic users and anomaly detection. Using these strategies helps to ensure that security is enforced appropriately and responses to issues are timely.

      "We discovered in our research that insider threats are not viewed as seriously as external threats, like a cyberattack. But when companies had an insider threat, in general, they were much more costly than external incidents. This was largely because the insider that is smart has the skills to hide the crime, for months, for years, sometimes forever."

      – Dr. Larry Ponemon, Chairman Ponemon Institute, at SecureWorld Boston

      Info-Tech Insight

      Using solutions like network detection and response (NDR) will allow for monitoring to take advantage of advanced analytical techniques like artificial intelligence (AI) and machine learning (ML). These technologies can help identify anomalies that a human might miss.

      Monitoring options

      It’s not what you look at that matters, it’s what you see.

      – Henry David Thoreau

      Traditional

      Monitor cumulative change in a variable

      Traditional network monitoring is a minimum viable product. With this solution variables can be monitored to give some level of validation that the segmentation solution is operating as expected. Potential areas to monitor include traffic volumes, access-list (ACL) matches, and firewall packet drops.

      • This is expected baseline monitoring. Without at least this level of visibility, it is hard to validate the solutions in place

      Rules Based

      Inspect traffic to find a match against a library of signatures

      Rules-based systems will monitor traffic against a library of signatures and alert on any matches. These solutions are good at identifying the “known” issues on the network. Examples of these systems include security incident and event management (SIEM) and intrusion detection/prevention systems (IDS/IPS).

      • These solutions are optimally used when there are known signatures to validate traffic against.
      • They can identify known attacks and breaches.

      Anomaly Detection

      Use computer intelligence to compare against baseline

      Anomaly detection systems are designed to baseline the network traffic then compare current traffic against that to find anomalies using technologies like Bayesian regression analysis or artificial intelligence and machine learning (AI/ML). This strategy can be useful in analyzing large volumes of traffic and identifying the “unknown unknowns.”

      • Computers can analyze large volumes of data much faster than a human. This allows these solutions to validate traffic in (near) real-time and alert on things that are out of the ordinary and would not be easily visible to a human.

      Synthetic Data

      Mimic potential traffic flows to monitor network reaction

      Rather than wait for a bad actor to find a hole in the defenses, synthetic data can be used to mimic real-world traffic to validate configuration and segmentation. This often takes the form of real user monitoring tools, penetration testing, or red teaming.

      • Active monitoring or testing allows a proactive stance as opposed to a reactive one.

      Gather feedback, assess the situation, and iterate

      Take input from operating the environment and use that to optimize the process and the outcome.

      Optimize through iteration

      Output from monitoring must be fed back into the process of maintaining and optimizing segmentation. Network segmentation should be viewed as an ongoing process as opposed to a singular structured project.

      Monitoring can and will highlight where and when the segmentation design is successful and when new traffic flows arise. If these inputs are not fed back through the process, designs will become stagnant and admins or users will attempt to find ways to circumvent solutions for ease of use.

      "I think it's very important to have a feedback loop, where you're constantly thinking about what you've done and how you could be doing it better. I think that's the single best piece of advice: constantly think about how you could be doing things better and questioning yourself."

      – Elon Musk, qtd. in Mashable, 2012

      Info-Tech Insight

      The network environment will not stay static; flows will change as often as required for the business to succeed. Take insights from monitoring the environment and integrate them into an iterative process that will maintain relevance and usability in your segmentation.

      Bibliography

      Andreessen, Marc. “Adaptability is key.” BrainyQuote, n.d.
      Barry Schwartz. The Paradox of Choice: Why More Is Less. Harper Perennial, 18 Jan. 2005.
      Capers, Zach. “GetApp’s 2022 Data Security Report—Seven Startling Statistics.” GetApp,
      19 Sept. 2022.
      Cisco Systems, Inc. “Cybersecurity resilience emerges as top priority as 62 percent of companies say security incidents impacted business operations.” PR Newswire, 6 Dec. 2022.
      “Dynamic Network Segmentation: A Must-Have for Digital Businesses in the Age of Zero Trust.” Forescout Whitepaper, 2021. Accessed Nov. 2022.
      Eaves, Johnothan. “Segmentation Strategy - An ISE Prescriptive Guide.” Cisco Community,
      26 Oct. 2020. Accessed Nov. 2022.
      Kambic, Dan, and Jason Fricke. “Network Segmentation: Concepts and Practices.” Carnegie Mellon University SEI Blog, 19 Oct. 2020. Accessed Nov. 2022.
      Kang, Myong H., et al. “A Network Pump.” IEEE Transactions on Software Engineering, vol. 22 no. 5, May 1996.
      Kipling, Rudyard. “The Ballad of East and West.” Ballads and Barrack-Room Ballads, 1892.
      Mintzberg, Henry. “Everyone is against micro managing but macro managing means you're working at the big picture but don't know the details.” AZ Quotes, n.d.
      Murphy, Greg. “A Reimagined Purdue Model For Industrial Security Is Possible.” Forbes Magazine, 18 Jan. 2022. Accessed Oct. 2022.
      Patton, George S. “Never tell people how to do things. Tell them what to do and they will surprise you with their ingenuity.” BrainyQuote, n.d.
      Ponemon, Larry. “We discovered in our research […].” SecureWorld Boston, n.d.
      Roosevelt, Theodore. “Do what you can, with what you've got, where you are.” Theodore Roosevelt Center, n.d.
      Sahoo, Narendra. “How Does Implementing Network Segmentation Benefit Businesses?” Vista Infosec Blog. April 2021. Accessed Nov. 2022.
      “Security Outcomes Report Volume 3.” Cisco Secure, Dec 2022.
      Shedd, John A. “A ship in harbor is safe, but that is not what ships are built for.” Salt from My Attic, 1928, via Quote Investigator, 9 Dec. 2023.
      Singleton, Camille, et al. “X-Force Threat Intelligence Index 2022” IBM, 17 Feb. 2022.
      Accessed Nov. 2022.
      Stone, Mark. “What is network segmentation? NS best practices, requirements explained.” AT&T Cyber Security, March 2021. Accessed Nov. 2022.
      “The State of Breach and Attack Simulation and the Need for Continuous Security Validation: A Study of US and UK Organizations.” Ponemon Institute, Nov. 2020. Accessed Nov. 2022.
      Thoreau, Henry David. “It’s not what you look at that matters, it’s what you see.” BrainyQuote, n.d.
      Ulanoff, Lance. “Elon Musk: Secrets of a Highly Effective Entrepreneur.” Mashable, 13 April 2012.
      “What Is Microsegmenation?” Palo Alto, Accessed Nov. 2022.
      “What is Network Segmentation? Introduction to Network Segmentation.” Sunny Valley Networks, n.d.

      Transition Projects Over to the Service Desk

      • Buy Link or Shortcode: {j2store}495|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Service Desk
      • Parent Category Link: /service-desk
      • IT suffers from a lack of strategy and plan for transitioning support processes to the service desk.
      • Lack of effective communication between the project delivery team and the service desk, leads to an inefficient knowledge transfer to the service desk.
      • New service is not prioritized and categorized, negatively impacting service levels and end-user satisfaction.

      Our Advice

      Critical Insight

      Make sure to build a strong knowledge management strategy to identify, capture, and transfer knowledge from project delivery to the service desk.

      Impact and Result

      • Build touchpoints between the service desk and project delivery team and make strategic points in the project lifecycles to ensure service support is done effectively following the product launch.
      • Develop a checklist of action items on the initiatives that should be done following project delivery.
      • Build a training plan into the strategy to make sure service desk agents can handle tickets independently.

      Transition Projects Over to the Service Desk Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Transition Projects Over to the Service Desk – A guideline to walk you through transferring project support to the service desk.

      This storyboard will help you craft a project support plan to document information to streamline service support.

      • Transition Projects Over to the Service Desk Storyboard

      2. Project Handover and Checklist – A structured document to help you record information on the project and steps to take to transfer support.

      Use these two templates as a means of collaboration with the service desk to provide information on the application/product, and steps to take to make sure there are efficient service processes and knowledge is appropriately transferred to the service desk to support the service.

      • Project Handover Template
      • Service Support Transitioning Checklist
      [infographic]

      Further reading

      Transition Projects Over to the Service Desk

      Increase the success of project support by aligning your service desk and project team.

      Analyst Perspective

      Formalize your project support plan to shift customer service to the service desk.

      Photo of Mahmoud Ramin, Senior Research Analyst, Infrastructure and Operations, Info-Tech Research Group

      As a service support team member, you receive a ticket from an end user about an issue they’re facing with a new application. You are aware of the application release, but you don’t know how to handle the issue. So, you will need to either spend a long time investigating the issue via peer discussion and research or escalate it to the project team.

      Newly developed or improved services should be transitioned appropriately to the support team. Service transitioning should include planning, coordination, and communication. This helps project and support teams ensure that upon a service failure, affected end users receive timely and efficient customer support.

      At the first level, the project team and service desk should build a strategy around transitioning service support to the service desk by defining tasks, service levels, standards, and success criteria.

      In the second step, they should check the service readiness to shift support from the project team to the service desk.

      The next step is training on the new services via efficient communication and coordination between the two parties. The project team should allocate some time, according to the designed strategy, to train the service desk on the new/updated service. This will enable the service desk to provide independent service handling.

      This research walks you through the above steps in more detail and helps you build a checklist of action items to streamline shifting service support to the service desk.

      Mahmoud Ramin, PhD

      Senior Research Analyst
      Infrastructure and Operations
      Info-Tech Research Group

      Executive Summary

      Your Challenge

      • IT suffers from a lack of strategy and planning for transitioning support processes to the service desk.
      • Lack of effective communication between the project delivery team and the service desk leads to an inefficient knowledge transfer to the service desk.
      • New service is not prioritized and categorized, negatively impacting service levels and end-user satisfaction.

      Common Obstacles

      • Building the right relationship between the service desk and project team is challenging, making support transition tedious.
      • The service desk is siloed; tasks and activities are loosely defined. Service delivery is inconsistent, which impacts customer satisfaction.
      • Lack of training on new services forces the service desk to unnecessarily escalate tickets to other levels and delays service delivery.

      Info-Tech’s Approach

      • Build touchpoints between the service desk and project delivery team and make strategic points in the project lifecycles to ensure service support is done effectively following the product launch.
      • Develop a checklist of action items on the initiatives that should be done following project delivery.
      • Build a training plan into the strategy to make sure service desk agents can handle tickets independently.

      Info-Tech Insight

      Make sure to build a strong knowledge management strategy to identify, capture, and transfer knowledge from project delivery to the service desk.

      A lack of formal service transition process presents additional challenges

      When there is no formal transition process following a project delivery, it will negatively impact project success and customer satisfaction.

      Service desk team:

      • You receive a request from an end user to handle an issue with an application or service that was recently released. You are aware of the features but don’t know how to solve this issue particularly.
      • You know someone in the project group who is familiar with the service, as he was involved in the project. You reach out to him, but he is very busy with another project.
      • You get back to the user to let them know that this will be done as soon as the specialist is available. But because there is no clarity on the scope of the issue, you cannot tell them when this will be resolved.
      • Lack of visibility and commitment to the service recovery will negatively impact end-user satisfaction with the service desk.

      Project delivery team:

      • You are working on an exciting project, approaching the deadline. Suddenly, you receive a ticket from a service desk agent asking you to solve an incident on a product that was released three months ago.
      • Given the deadline on the current project, you are stressed, thinking about just focusing on the projects. On the other hand, the issue with the other service is impacting multiple users and requires much attention.
      • You spend extra time handling the issue and get back to your project. But a few days later the same agent gets back to you to take care of the same issue.
      • This is negatively impacting your work quality and causing some friction between the project team and the service desk.

      Link how improvement in project transitioning to the service desk can help service support

      A successful launch can still be a failure if the support team isn't fully informed and prepared.

      • In such a situation, the project team sends impacted users a mass notification without a solid plan for training and no proper documentation.
      • To provide proper customer service, organizations should involve several stakeholder groups to collaborate for a seamless transition of projects to the service desk.
      • This shift in service support takes time and effort; however, via proper planning there will be less confusion around customer service, and it will be done much faster.
        • For instance, if AppDev is customizing an ERP solution without considering knowledge transfer to the service desk, relevant tickets will be unnecessarily escalated to the project team.
      • On the other hand, the service desk should update configuration items (CIs) and the service catalog and related requests, incidents, problems, and workarounds to the relevant assets and configurations.
      • In this transition process, knowledge transfer plays a key role. Users, the service desk, and other service support teams need to know how the new application or service works and how to manage it when an issue arises.
      • Without a knowledge transfer, service support will be forced to either reinvent the wheel or escalate the ticket to the development team. This will unnecessarily increase the time for ticket handling, increase cost per ticket, and reduce end-user satisfaction.

      Info-Tech Insight

      Involve the service desk in the transition process via clear communication, knowledge transfer, and staff training.

      Integrate the service desk into the project management lifecycle for a smooth transition of service support

      Service desk involvement in the development, testing, and maintenance/change activity steps of your project lifecycle will help you logically define the category and priority level of the service and enable service level improvement accordingly after the project goes live.

      Project management lifecycle

      As some of the support and project processes can be integrated, responsibility silos should be broken

      Processes are done by different roles. Determine roles and responsibilities for the overlapping processes to streamline service support transition to the service desk.

      The project team is dedicated to projects, while the support team focuses on customer service for several products.

      Siloed responsibilities:

      • Project team transfers the service fully to the service desk and leaves technicians alone for support without a good knowledge transfer.
      • Specialists who were involved in the project have deep knowledge about the product, but they are not involved in incident or problem management.
      • Service desk was not involved in the planning and execution processes, which leads to lack of knowledge about the product. This leaves the support team with some vague knowledge about the service, which negatively impacts the quality of incident and problem management.

      How to break the silos:

      Develop a tiered model for the service desk and include project delivery in the specialist tier.

      • Use tier 1 (service desk) as a single point of contact to support all IT services.
      • Have tier 2/3 as experts in technology. These agents are a part of the project team. They are also involved in incident management, root-cause analysis, and change management.

      Determine the interfaces

      At the project level, get a clear understanding of support capabilities and demands, and communicate them to the service desk to proactively bring them into the planning step.

      The following questions help you with an efficient plan for support transition

      Questions for support transition

      Clear responsibilities help you define the level of involvement in the overlapping processes

      Conduct a stakeholder analysis to identify the people that can help ensure the success of the transition.

      Goal: Create a prioritized list of people who are affected by the new service and will provide support.

      Why is stakeholder analysis essential?

      Why is stakeholder analysis essential

      Identify the tasks that are required for a successful project handover

      Embed the tasks that the project team should deliver before handing support to the service desk.

      Task/Activity Example

      Conduct administrative work in the application

      • New user setup
      • Password reset

      Update documentation

      • Prepare for knowledge transfer>
      Service request fulfillment/incident management
      • Assess potential bugs
      Technical support for systems troubleshooting
      • Configure a module in ITSM solution

      End-user training

      • FAQs
      • How-to questions
      Service desk training
      • Train technicians for troubleshooting

      Support management (monitoring, meeting SLAs)

      • Monitoring
      • Meeting SLAs

      Report on the service transitioning

      • Transition effectiveness
      • Four-week warranty period
      Ensure all policies follow the transition activities
      • The final week of transition, the service desk will be called to a meeting for final handover of incidents and problems

      Integrate project description and service priority throughout development phase

      Include the service desk in discussions about project description, so it will be enabled to define service priority level.

      • Project description will be useful for bringing the project forward to the change advisory board (CAB) for approval and setting up the service in the CMDB.
      • Service priority is used for adding the next layer of attributes to the CMDB for the service and ensuring the I&O department can set up systems monitoring.
      • This should be done early in the process in conjunction with the project manager and business sponsors.
      • It should be done as the project gets underway and the team can work on specifically where that milestone will be in each project.
      • What to include in the project description:
        • Name
        • Purpose
        • Publisher
        • Departments that will use the service
        • Service information
        • Regulatory constrains
      • What to include in the service priority information:
        • Main users
        • Number of users
        • Service requirements
        • System interdependencies
        • Criticality of the dependent systems
        • Service category
        • Service SME and support backup
        • System monitoring resources
        • Alert description and flow

      Document project description and service priority in the Project Handover Template.

      Embed service levels and maintenance information

      Include the service desk in discussions about project description, so it will be enabled to define service priority level.

      • Service level objectives (SLOs) will be added to CMDB to ensure the product is reviewed for business continuity and disaster recovery and that the service team knows what is coming.
      • This step will be good to start thinking about training agents and documenting knowledgebase (KB) articles.
      • What to include in SLO:
        • Response time
        • Resolution time
        • Escalation time
        • Business owner
        • Service owner
        • Vendor(s)
        • Vendor warranties
        • Data archiving/purging
        • Availability list
        • Business continuity/recovery objectives
        • Scheduled reports
        • Problem description
      • Maintenance and change requirements: You should add maintenance windows to the change calendar and ensure the maintenance checklist is added to KB articles and technician schedules.
      • What to include in maintenance and change requirements:
        • Scheduled events for the launch
        • Maintenance windows
        • Module release
        • Planned upgrades
        • Anticipated intervals for changes and trigger points
        • Scheduled batches

      Document service level objectives and maintenance in the Project Handover Template.

      Enhance communication between the project team and the service desk

      Communicating with the service desk early and often will ensure that agents fully get a deep knowledge of the new technology.

      Transition of a project to the service desk includes both knowledge transfer and execution transfer.

      01

      Provide training and mentoring to ensure technical knowledge is passed on.

      02

      Transfer leadership responsibilities by appointing the right people.

      03

      Transfer support by strategically assigning workers with the right technical and interpersonal skills.

      04

      Transfer admin rights to ensure technicians have access rights for troubleshooting.

      05

      Create support and a system to transfer work process. For example, using an online platform to store knowledge assets is a great way for support to access project information.

      Info-Tech Insight

      A communication plan and executive presentation will help project managers outline recommendations and communicate their benefits.

      Communicate reasons for projects and how they will be implemented

      Proactive communication of the project to affected stakeholders will help get their buy-in for the new technology and feedback for better support.

      Leaders of successful change spend considerable time developing a powerful change message, i.e. a compelling narrative that articulates the desired end state, that makes the change concrete and meaningful to staff.

      The message should:

      • Explain why the change or new application is needed.
      • Summarize what will stay the same.
      • Highlight what will be left behind.
      • Emphasize what is being changed due to the new or updated product.
      • Explain how the application will be implemented.
      • Address how this will affect various roles in the organization.
      • Discuss the staff’s role in making the project successful.
      • Communicate the supporting roles in the early implementation stages and later on.

      Five elements of communicating change

      Implement knowledge transfer to the service desk to ensure tickets won’t be unnecessarily escalated

      The support team usually uses an ITSM solution, while the project team mostly uses a project management solution. End users’ support is done and documented in the ITSM tool.

      Even terminologies used by these teams are different. For instance, service desk’s “incident” is equivalent to a project manager’s “defect.” Without proper integration of the development and support processes, the contents get siloed and outdated over time.

      Potential ways to deal with this challenge:

      Use the same platform for both project and service support

      This helps you document information in a single platform and provides better visibility of the project status to the support team as well. It also helps project team find out change-related incidents for a faster rollback.

      Note: This is not always feasible because of the high costs incurred in purchasing a new application with both ITSM and PM capabilities and the long time it takes for implementing such a solution.

      Integrate the PM and ITSM tools to improve transition efficiency

      Note: Consider the processes that should be integrated. Don’t integrate unnecessary steps in the development stage, such as design, which will not be helpful for support transition.

      Build a training plan for the new service

      When a new system is introduced or significant changes are applied, describe the steps and timeline for training.

      Training the service desk has two-fold benefits:
      Improve support:
      • Support team gets involved in user acceptance testing, which will provide feedback on potential bugs or failures in the technology.
      • Collaboration between specialists and tier 1 technicians will allow the service desk to gather information for handling potential incidents on the application.
      Shift-left enablement:
      • At the specialist level, agents will be more focused on other projects and spend less time on application issues, as they are mostly handled by the service desk.
      • As you shift service support left:
        • Cost per ticket decreases as more of the less costly resources are doing the work.
        • Average time to resolve decreases as the ticket is handled by the service desk.
        • End-user satisfaction increases as they don’t need to wait long for resolution.

      Who resolves the incident

      For more information about shift-left enablement, refer to InfoTech’s blueprint Optimize the Service Desk With a Shift-Left Strategy.

      Integrate knowledge management in the transition plan

      Build a knowledge transfer process to streamline service support for the newly developed technology.

      Use the following steps to ensure the service desk gets trained on the new project.

      1. Identify learning opportunities.
      2. Prioritize the identified opportunities based on:
      • Risk of lost knowledge
      • Impact of knowledge on support improvement
    • Define ways to transfer knowledge from the project team to the service desk. These could be:
      • One-on-one meetings
      • Mentoring sessions
      • Knowledgebase articles
      • Product road test
      • Potential incident management shadowing
    • Capture and transfer knowledge (via the identified means).
    • Support the service desk with further training if the requirement arises.
    • Info-Tech Insight

      Allocate knowledge transfer within ticket handling workflows. When incident is resolved by a specialist, they will assess if it is a good candidate for technician training and/or a knowledgebase article. If so, the knowledge manager will be notified of the opportunity to assign it to a SME for training and documentation of an article.

      For more information about knowledge transfer, refer to phase 3 of Info-Tech’s blueprint Standardize the Service Desk.

      Focus on the big picture first

      Identify training functions and plan for a formal knowledge transfer

      1. Brainstorm training functions for each group.
      2. Determine the timeline needed to conduct training for the identified training topics.
      RoleTraining FunctionTimeline

      Developer/Technical Support

      • Coach the service desk on the new application
      • Document relevant KB articles
      Business Analysts
      • Conduct informational interviews for new business requirements

      Service Desk Agents

      • Conduct informational interviews
      • Shadow incident management procedures
      • Document lessons learned
      Vendor
      • Provide cross-training to support team

      Document your knowledge transfer plan in the Project Handover Template.

      Build a checklist of the transition action items

      At this stage, the project is ready to go live and support needs to be independently done by the service desk.

      Checklist of the transition action items

      Info-Tech Insight

      No matter how well training is done, specialists may need to work on critical incidents and handle emergency changes. With effective service support and transition planning, you can make an agreement between the incident manager, change manager, and project manager on a timeline to balance critical incident or emergency change management and project management and define your SLA.

      Activity: Prepare a checklist of initiatives before support transition

      2-3 hours

      Document project support information and check off each support transition initiative as you shift service support to the service desk.

      1. As a group, review the Project Handover Template that you filled out in the previous steps.
      2. Download the Service Support Transitioning Checklist, and review the items that need to be done throughout the development, testing, and deployment steps of your project.
      3. Brainstorm at what step service desk needs to be involved.
      4. As you go through each initiative and complete it, check it off to make sure you are following the agreed document for a smooth transition of service support.
      Input Output
      • Project information
      • Support information for developed application/service
      • List of transitioning initiatives
      MaterialsParticipants
      • Project Handover Template
      • Service Support Transitioning Checklist
      • Project Team
      • Service Desk Manager
      • IT Lead

      Download the Project Handover Template

      Download the Service Support Transitioning Checklist

      Define metrics to track the success of project transition

      Consider key metrics to speak the language of targeted end users.

      You won’t know if transitioning support processes are successful unless you measure their impact. Find out your objectives for project transition and then track metrics that will allow you to fulfill these goals.

      Determine critical success factors to help you find out key metrics:

      High quality of the service

      Effectiveness of communication of the transition

      Manage risk of failure to help find out activities that will mitigate risk of service disruption

      Smooth and timely transition of support to the service desk

      Efficient utilization of the shared services and resources to mitigate conflicts and streamline service transitioning

      Suggested metrics:

      • Time to fulfill requests and resolve incidents for the new project
      • Time spent training the service desk
      • Number of knowledgebase articles created by the project team
      • Percentage of articles used by the service desk that prevented ticket escalation
      • First-level resolution
      • Ratio of escalated tickets for the new project
      • Problem ticket volume for the new project
      • Average customer satisfaction with the new project support
      • SLA breach rate

      Summary of Accomplishment

      Problem Solved

      Following the steps outlined in this research has helped you build a strategy to shift service support from the project team to the service desk, resulting in an improvement in customer service and agent satisfaction.

      You have also developed a plan to break the silo between the service desk and specialists and enable knowledge transfer so the service desk will not need to unnecessarily escalate tickets to developers. In the meantime, specialists are also responsible for service desk training on the new application.

      Efficient communication of service levels has helped the project team set clear expectations for managers to create a balance between their projects and service support.

      If you would like additional support, have our analysts guide you through other phases as part of an Info-Tech workshop.

      Contact your account representative for more information

      workshops@infotech.com

      1-888-670-8889

      Related Info-Tech Research

      Standardize the Service Desk

      Improve customer service by driving consistency in your support approach and meeting SLAs.

      Optimize the Service Desk With a Shift-Left Strategy

      The best type of service desk ticket is the one that doesn’t exist.

      Tailor IT Project Management Processes to Fit Your Projects

      Right-size PMBOK for all of your IT projects.

      Works Cited

      Brown, Josh. “Knowledge Transfer: What it is & How to Use it Effectively.” Helpjuice, 2021. Accessed November 2022.

      Magowan, Kirstie. “Top ITSM Metrics & KPIs: Measuring for Success, Aiming for Improvement.” BMC Blogs, 2020. Accessed November 2022.

      “The Complete Blueprint for Aligning Your Service Desk and Development Teams (Process Integration and Best Practices).” Exalate, 2021. Accessed October 2022.

      “The Qualities of Leadership: Leading Change.” Cornelius & Associates, 2010. Web.

      Knowledge Management

      • Buy Link or Shortcode: {j2store}33|cart{/j2store}
      • Related Products: {j2store}33|crosssells{/j2store}
      • member rating overall impact: 9.0/10
      • member rating average dollars saved: $10,000
      • member rating average days saved: 2
      • Parent Category Name: People and Resources
      • Parent Category Link: /people-and-resources
      Mitigate Key IT Employee Knowledge Loss

      Service Desk

      • Buy Link or Shortcode: {j2store}11|cart{/j2store}
      • Related Products: {j2store}11|crosssells{/j2store}
      • Up-Sell: {j2store}11|upsells{/j2store}
      • member rating overall impact: 9.4/10
      • member rating average dollars saved: $22,900
      • member rating average days saved: 20
      • Parent Category Name: Infra and Operations
      • Parent Category Link: /infra-and-operations
      The service desk is typically the first point of contact for clients and staff who need something. Make sure your team is engaged, involved, knowledgeable, and gives excellent customer service.

      Build a Security Metrics Program to Drive Maturity

      • Buy Link or Shortcode: {j2store}266|cart{/j2store}
      • member rating overall impact: 9.5/10 Overall Impact
      • member rating average dollars saved: $22,947 Average $ Saved
      • member rating average days saved: 8 Average Days Saved
      • Parent Category Name: Security Processes & Operations
      • Parent Category Link: /security-processes-and-operations
      • Many security leaders put off adding metrics to their program because they don't know where to start or how to assess what is worth measuring.
      • Sometimes, this uncertainty causes the belief that their security programs are not mature enough for metrics to be worthwhile.
      • Because metrics can become very technical and precise,it's easy to think that they're inherently complicated (not true).

      Our Advice

      Critical Insight

      • The best metrics are tied to goals.
      • Tying your metrics to goals ensures that you are collecting metrics for a specific purpose rather than just to watch the numbers change.

      Impact and Result

      • A metric, really, is just a measure of success against a given goal. Gradually, programs will achieve their goals and set new more specific goals, and with them come more-specific metrics.
      • It is not necessary to jump into highly technical metrics right away. A lot can be gained from metrics that track behaviors.
      • A metrics program can be very simple and still effectively demonstrate the value of security to the organization. The key is to link your metrics to the goals or objectives the security team is pursuing, even if they are simple implementation plans (e.g. percentage of departments that have received security training course).

      Build a Security Metrics Program to Drive Maturity Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you should build a security metrics program, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Link security metrics to goals to boost maturity

      Develop goals and KPIs to measure your progress.

      • Build a Security Metrics Program to Drive Maturity – Phase 1: Link Security Metrics to Goals to Boost Maturity
      • Security Metrics Determination and Tracking Tool
      • KPI Development Worksheets

      2. Adapt your reporting strategy for various metric types

      Learn how to present different types of metrics.

      • Build a Security Metrics Program to Drive Maturity – Phase 2: Adapt Your Reporting Strategy for Various Metric Types
      • Security Metrics KPX Dashboard
      • Board-Level Security Metrics Presentation Template
      [infographic]

      Workshop: Build a Security Metrics Program to Drive Maturity

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Current State, Initiatives, and Goals

      The Purpose

      Create a prioritized list of goals to improve the security program’s current state.

      Key Benefits Achieved

      Insight into the current program and the direct it needs to head in.

      Activities

      1.1 Discuss current state and existing approach to metrics.

      1.2 Review contract metrics already in place (or available).

      1.3 Determine security areas that should be measured.

      1.4 Determine what stakeholders are involved.

      1.5 Review current initiatives to address those risks (security strategy, if in place).

      1.6 Begin developing SMART goals for your initiative roadmap.

      Outputs

      Gap analysis results

      SMART goals

      2 KPI Development

      The Purpose

      Develop unique KPIs to measure progress against your security goals.

      Key Benefits Achieved

      Learn how to develop KPIs

      Prioritized list of security goals

      Activities

      2.1 Continue SMART goal development.

      2.2 Sort goals into types.

      2.3 Rephrase goals as KPIs and list associated metric(s).

      2.4 Continue KPI development.

      Outputs

      KPI Evolution Worksheet

      3 Metrics Prioritization

      The Purpose

      Determine which metrics will be included in the initial program launch.

      Key Benefits Achieved

      A set of realistic and manageable goals-based metrics.

      Activities

      3.1 Lay out prioritization criteria.

      3.2 Determine priority metrics (implementation).

      3.3 Determine priority metrics (improvement & organizational trend).

      Outputs

      Prioritized metrics

      Tool for tracking and presentation

      4 Metrics Reporting

      The Purpose

      Strategize presentation based around metric type to indicate organization’s risk posture.

      Key Benefits Achieved

      Develop versatile reporting techniques

      Activities

      4.1 Review metric types and discuss reporting strategies for each.

      4.2 Develop a story about risk.

      4.3 Discuss the use of KPXs and how to scale for less mature programs.

      Outputs

      Key Performance Index Tool and presentation materials

      Further reading

      Build a Security Metrics Program to Drive Maturity

      Good metrics come from good goals.

      ANALYST PERSPECTIVE

      Metrics are a maturity driver.

      "Metrics programs tend to fall into two groups: non-existent and unhelpful.

      The reason so many security professionals struggle to develop a meaningful metrics program is because they are unsure of what to measure or why.

      The truth is, for metrics to be useful, they need to be tied to something you care about – a state you are trying to achieve. In other words, some kind of goal. Used this way, metrics act as the scoreboard, letting you know if you’re making progress towards your goals, and thus, boosting your overall maturity."

      Logan Rohde, Research Analyst, Security Practice Info-Tech Research Group

      Executive summary

      Situation

      • Many security leaders put off adding metrics to their program because they don't know where to start or how to assess what is worth measuring.

      Complication

      • Sometimes, this uncertainty causes the belief that their security programs are not mature enough for metrics to be worthwhile.
      • Because metrics can become very technical and precise, it's easy to think they're inherently complicated (not true).

      Resolution

      • A metric, really, is just a measure of success against a given goal. Gradually, programs will achieve their goals and set new, more specific goals, and with them comes more specific metrics.
      • It is not necessary to jump into highly technical metrics right away. A lot can be gained from metrics that track behaviors.
      • A metrics program can be very simple and still effectively demonstrate the value of security to the organization. The key is to link your metrics to the goals or objectives the security team is pursuing, even if they are simple implementation plans (e.g. percentage of departments that have received security training).

      Info-Tech Insight

      1. Metrics lead to maturity, not vice versa
        • Tracking metrics helps you assess progress and regress in your security program. This helps you quantify the maturity gains you’ve made and continue to make informed strategic decisions.
      2. The best metrics are tied to goals
        • Tying your metrics to goals ensures that you are collecting metrics for a specific purpose rather than just to watch the numbers change.

      Our understanding of the problem

      This Research is Designed For:

      • CISO

      This Research Will Help You:

      • Understand the value of metrics.
      • Right-size a metrics program based on your organization’s maturity and risk profile.
      • Tie metrics to goals to create meaningful KPIs.
      • Develop strategies to effectively communicate the right metrics to stakeholders.

      This Research Will Also Assist:

      • CIO
      • Security Manager
      • Business Professionals

      This Research Will Help Them:

      • Become informed on the metrics that matter to them.
      • Understand that investment in security is an investment in the business.
      • Feel confident in the progress of the organization’s security strategy.

      Info-Tech’s framework integrates several best practices to create a best-of-breed security framework

      Information Security Framework

      Governance

      • Context and Leadership
        • Information Security Charter
        • Information Security Organizational Structure
        • Culture and Awareness
      • Evaluation and Direction
        • Security Risk Management
        • Security Policies
        • Security Strategy and Communication
      • Compliance, Audit, and Review
        • Security Compliance Management
        • External Security Audit
        • Internal Security Audit
        • Management Review of Security

      Management

      • Prevention
        • Identity Security
          • Identity and Access Management
        • Data Security
          • Hardware Asset Management
          • Data Security & Privacy
        • Infrastructure Security
          • Network Security
          • Endpoint Security
          • Malicious Code
          • Application Security
          • Vulnerability Management
          • Cryptography Management
          • Physical Security
          • Cloud Security
        • HR Security
          • HR Security
        • Change and Support
          • Configuration and Change Management
          • Vendor Management
      • Detection
        • Security Threat Detection
        • Log and Event Management
      • Response and Recovery
        • Security Incident Management
        • Information Security in BCM
        • Security eDiscovery and Forensics
        • Backup and Recovery
      • Measurement
        • Metrics Program
        • Continuous Improvement

      Metrics help to improve security-business alignment

      While business leaders are now taking a greater interest in cybersecurity, alignment between the two groups still has room for improvement.

      Key statistics show that just...

      5% of public companies feel very confident that they are properly secured against a cyberattack.

      41% of boards take on cybersecurity directly rather than allocating it to another body (e.g. audit committee).

      19% of private companies do not discuss cybersecurity with the board.

      (ISACA, 2018)

      Info-Tech Insight

      Metrics help to level the playing field

      Poor alignment between security and the business often stems from difficulties with explaining how security objectives support business goals, which is ultimately a communication problem.

      However, metrics help to facilitate these conversations, as long as the metrics are expressed in practical, relatable terms.

      Security metrics benefit the business

      Executives get just as much out of management metrics as the people running them.

      1. Metrics assuage executives’ fears
        • Metrics help executives (and security leaders) feel more at ease with where the company is security-wise. Metrics help identify areas for improvement and gaps in the organization’s security posture that can be filled. A good metrics program will help identify deficiencies in most areas, even outside the security program, helping to identify what work needs to be done to reduce risk and increase the security posture of the organization.
      2. Metrics answer executives’ questions
        • Numbers either help ease confusion or signify other areas for improvement. Offering quantifiable evidence, in a language that the business can understand, offers better understanding and insight into the information security program. Metrics also help educate on types of threats, staff needed for security, and budget needs to decrease risk based on management’s threat tolerance. Metrics help make an organization more transparent, prepared, and knowledgeable.
      3. Metrics help to continually prove security’s worth
        • Traditionally, the security team has had to fight for a seat at the executive table, with little to no way to communicate with the business. However, the new trend is that the security team is now being invited before they have even asked to join. This trend allows the security team to better communicate on the organization’s security posture, describe threats and vulnerabilities, present a “plan of action,” and get a pulse on the organization’s risk tolerance.

      Common myths make security metrics seem challenging

      Security professionals have the perception that metrics programs are difficult to create. However, this attitude usually stems from one of the following myths. In reality, security metrics are much simpler than they seem at first, and they usually help resolve existing challenges rather than create new ones.

      Myth Truth
      1 There are certain metrics that are important to all organizations, based on maturity, industry, etc. Metrics are indications of change; for a metric to be useful it needs to be tied to a goal, which helps you understand the change you're seeing as either a positive or a negative. Industry and maturity have little bearing here.
      2 Metrics are only worthwhile once a certain maturity level is reached Metrics are a tool to help an organization along the maturity scale. Metrics help organizations measure progress of their goals by helping them see which tactics are and are not working.
      3 Security metrics should focus on specific, technical details (e.g. of systems) Metrics are usually a means of demonstrating, objectively, the state of a security program. That is, they are a means of communicating something. For this reason, it is better that metrics be phrased in easily digestible, non-technical terms (even if they are informed by technical security statistics).

      Tie your metrics to goals to make them worthwhile

      SMART metrics are really SMART goals.

      Specific

      Measurable

      Achievable

      Realistic

      Timebound

      Achievable: What is an achievable metric?

      When we say that a metric is “achievable,” we imply that it is tied to a goal of some kind – the thing we want to achieve.

      How do we set a goal?

      1. Determine what outcome you are trying to achieve.
        • This can be small or large (e.g. I want to determine what existing systems can provide metrics, or I want a 90% pass rate on our monthly phishing tests).
      2. Decide what indicates that you’ve achieved your goal.
        • At what point would you be satisfied with the progress made on the initiative(s) you’re working on? What conditions would indicate victory for you and allow you to move on to another goal?
      3. Develop a key performance indicator (KPI) to measure progress towards that goal.
        • Now that you’ve defined what you’re trying to achieve, find a way to indicate progress in relative or relational terms (e.g. percentage change from last quarter, percentage of implementation completed, ratio of programs in place to those still needing implementation).

      Info-Tech’s security metrics methodology is repeatable and iterative to help boost maturity

      Security Metric Lifecycle

      Start:

      Review current state and decide on priorities.

      Set a SMART goal for improvement.

      Develop an appropriate KPI.

      Use KPI to monitor program improvement.

      Present metrics to the board.

      Revise metrics if necessary.

      Metrics go hand in hand with your security strategy

      A security strategy is ultimately a large goal-setting exercise. You begin by determining your current maturity and how mature you need to be across all areas of information security, i.e. completing a gap analysis.

      As such, linking your metrics program to your security strategy is a great way to get your metrics program up and running – but it’s not the only way.

      Check out the following Info-Tech resource to get started today:

      Build an Information Security Strategy

      The value of security metrics goes beyond simply increasing security

      This blueprint applies to you whether you need to develop a metrics program from scratch or optimize and update your current strategy.

      Value of engaging in security metrics:

      • Increased visibility into your operations.
      • Improved accountability.
      • Better communication with executives as a result of having hard evidence of security performance.
      • Improved security posture through better understanding of what is working and what isn’t within the security program.

      Value of Info-Tech’s security metrics blueprint:

      • Doesn’t overwhelm you and allows you to focus on determining the metrics you need to worry about now without pressuring you to do it all at once.
      • Helps you develop a growth plan as your organization and metrics program mature, so you continue to optimize.
      • Creates effective communication. Prepares you to present the metrics that truly matter to executives rather than confusing them with unnecessary data. Pay attention to metric accuracy and reproducibility. No management wants inconsistent reporting.

      Impact

      Short term: Streamline your program. Based on your organization’s specific requirements and risk profile, figure out which metrics are best for now while also planning for future metrics as your organization matures.

      Long term: Once the program is in place, improvements will come with increased visibility into operations. Investments in security will be encouraged when more evidence is available to executives, contributing to overall improved security posture. Potential opportunities for eventual cost savings also exist as there is more informed security spending and fewer incidents.

      Info-Tech offers various levels of support to best suit your needs

      DIY Toolkit

      “Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful.”

      Guided Implementation

      “Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track.”

      Workshop

      “We need to hit the ground running and get this project kicked-off immediately. Our team has the ability to take this over once we get a framework and strategy in place.”

      Consulting

      “Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project.”

      Diagnostics and consistent frameworks used throughout all four options

      Link Security Metrics to Goals to Boost Maturity – Project Overview

      1. Link Security Metrics to Goals to Boost Maturity 2. Adapt Your Reporting Strategy for Various Metric Types
      Best-Practice Toolkit

      1.1 Review current state and set your goals

      1.2 Develop KPIs and prioritize your goals

      1.3 Implement and monitor the KPI to track goal progress

      2.1 Review best practices for presenting metrics

      2.2 Strategize your presentation based on metric type

      2.3 Tailor presentation to your audience

      2.4 Use your metrics to create a story about risk

      2.5 Revise your metrics

      Guided Implementations
      • Call 1: Setting Goals
      • Call 2: KPI Development
      • Call 1: Best Practices and Reporting Strategy
      • Call 2: Build a Dashboard and Presentation Deck
      Onsite Workshop Module 1: Current State, Initiatives, Goals, and KPIs Module 2: Metrics Reporting

      Phase 1 Outcome:

      • KPI development and populated metrics tracking tool.

      Phase 2 Outcome:

      • Reporting strategy with dashboard and presentation deck.

      Workshop overview

      Contact your account representative or email Workshops@InfoTech.com for more information.

      Workshop Day 1 Workshop Day 2 Workshop Day 3 Workshop Day 4 Workshop Day 5
      Activities

      Current State, Initiatives, and Goals

      • Discuss current state and existing approach to metrics.
      • Review contract metrics already in place (or available).
      • Determine security areas that should be measured.
      • Determine which stakeholders are involved.
      • Review current initiatives to address those risks (security strategy, if in place).
      • Begin developing SMART goals for your initiative roadmap.

      KPI Development

      • Continue SMART goal development.
      • Sort goals into types.
      • Rephrase goals as KPIs and list associated metric(s).
      • Continue KPI development.

      Metrics Prioritization

      • Lay out prioritization criteria.
      • Determine priority metrics (implementation).
      • Determine priority metrics (improvement & organizational trend).

      Metrics Reporting

      • Review metric types and discuss reporting strategies for each.
      • Develop a story about risk.
      • Discuss the use of KPXs and how to scale for less mature programs.

      Offsite Finalization

      • Review and finalization of documents drafted during workshop.
      Deliverables
      1. Gap analysis results
      1. Completed KPI development templates
      1. Prioritized metrics and tool for tracking and presentation.
      1. Key Performance Index tool and presentation materials.
      1. Finalization of completed deliverables

      Phase 1

      Link Security Metrics to Goals to Boost Maturity


      Phase 1

      1.1 Review current state and set your goals

      1.2 Develop KPIs and prioritize your goals

      1.3 Implement and monitor KPIs

      This phase will walk you through the following activities:

      • Current state assessment
      • Setting SMART goals
      • KPI development
      • Goals prioritization
      • KPI implementation

      This phase involves the following participants:

      • Security Team

      Outcomes of this phase

      • Goals-based KPIs
      • Security Metrics Determination and Tracking Tool

      Phase 1 outline

      Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.

      Complete these steps on your own or call us to complete a guided implementation. A guided implementation is a series of two to three advisory calls that help you execute each phase of a project. They are included in most advisory memberships.

      Guided Implementation 1: Link Security Metrics to Goals to Boost Maturity

      Proposed Time to Completion: 2-4 weeks

      Step 1.1: Setting Goals

      Start with an analyst kick-off call:

      • Determine current and target maturity for various security programs.
      • Develop SMART Goals.

      Then complete these activities…

      • CMMI Assessment

      Step 1.2 – 1.3: KPI Development

      Review findings with analyst:

      • Prioritize goals
      • Develop KPIs to track progress on goals
      • Track associated metrics

      Then complete these activities…

      • KPI Development

      With these tools & templates:

      • KPI Development Worksheet
      • Security Metrics Determination and Tracking Tool

      Phase 1 Results & Insights:

      • Basic Metrics program

      1.1 Review current state and set your goals

      120 minutes

      Let’s put the security program under the microscope.

      Before program improvement can take place, it is necessary to look at where things are at presently (in terms of maturity) and where we need to get them to.

      In other words, we need to perform a security program gap analysis.

      Info-Tech Best Practice

      The most thorough way of performing this gap analysis is by completing Info-Tech’s Build an Information Security Strategy blueprint, as it will provide you with a prioritized list of initiatives to boost your security program maturity.

      Completing an abbreviated gap analysis...

      • Security Areas
      • Network Security
      • Endpoint Security
      • Vulnerability Management
      • Identity Access Management
      • Incident Management
      • Training & Awareness
      • Compliance, Audit, & Review
      • Risk Management
      • Business Alignment & Governance
      • Data Security
      1. Using the CMMI scale on the next slide, assess your maturity level across the security areas to the left, giving your program a score from 1-5. Record your assessment on a whiteboard.
      2. Zone in on your areas of greatest concern and choose 3 to 5 areas to prioritize for improvement.
      3. Set a SMART goal for improvement, using the criteria on goals slides.

      Use the CMMI scale to contextualize your current maturity

      Use the Capability Maturity Model Integration (CMMI) scale below to help you understand your current level of maturity across the various areas of your security program.

      1. Initial
        • Incident can be managed. Outcomes are unpredictable due to lack of a standard operating procedure.
      2. Repeatable
        • Process in place, but not formally implemented or consistently applied. Outcomes improve but still lack predictability.
      3. Defined
        • Process is formalized and consistently applied. Outcomes become more predictable, due to consistent handling procedure.
      4. Managed
        • Process shows signs of maturity and can be tracked via metrics. Moving towards a predictive approach to incident management.
      5. Optimizing
        • Process reaches a fully reliable level, though improvements still possible. Regularity allows for process to be automated.

      (Adapted from the “CMMI Institute Maturity Model”)

      Base your goals around the five types of metrics

      Choose goals that make sense – even if they seem simple.

      The most effective metrics programs are personalized to reflect the goals of the security team and the business they work for. Using goals-based metrics allows you to make incremental improvements that can be measured and reported on, which makes program maturation a natural process.

      Info-Tech Best Practice

      Before setting a SMART goal, take a moment to consider your maturity for each security area, and which metric type you need to collect first, before moving to more ambitious goals.

      Security Areas

      • Network Security
      • Endpoint Security
      • Vulnerability Management
      • Identity Access Management
      • Incident Management
      • Training & Awareness
      • Compliance, Audit & Review
      • Risk Management
      • Business Alignment & Governance
      • Data Security
      Metric Type Description
      Initial Probe Determines what can be known (i.e. what sources for metrics exist?).
      Baseline Testing Establishes organization’s normal state based on current metrics.
      Implementation Focuses on setting up a series of related processes to increase organizational security (i.e. roll out MFA).
      Improvement Sets a target to be met and then maintained based on organizational risk tolerance.
      Organizational Trends Culls together several metrics to track (sometimes predict) how various trends affect the organization’s overall security. Usually focuses on large-scale issues (e.g. likelihood of a data breach).

      Set SMART goals for your security program

      Specific

      Measurable

      Achievable

      Realistic

      Timebound

      Now that you have determined which security areas you’d like to improve, decide on a goal that meets the SMART criteria.

      Examples of possible goals for various maturity levels:

      1. Perform initial probe to determine number of systems capable of providing metrics by the end of the week.
      2. Take baseline measurements each month for three months to determine organization’s baseline state.
      3. Implement a vulnerability management program to improve baseline state by the end of the quarter.
      4. Improve deployment of critical patches by applying 90% of them within the set window by the end of the year.
      5. Demonstrate how vulnerability management affects broad organizational trends at quarterly report to senior leadership.

      Compare the bolded text in these examples with the metric types on the previous slide

      Record and assess your goals in the Security Metrics Determination and Tracking Tool

      1.1 Security Metrics Determination and Tracking Tool

      Use tab “2. Identify Security Goals” to document and assess your goals.

      To increase visibility into the cost, effort, and value of any given goal, assess them using the following criteria:

      • Initial Cost
      • Ongoing Cost
      • Initial Staffing
      • Ongoing Staffing
      • Alignment w/Business
      • Benefit

      Use the calculated Cost/Effort Rating, Benefit Rating, and Difference Score later in this project to help with goal prioritization.

      Info-Tech Best Practice

      If you have already completed a security strategy with Info-Tech resources, this work may likely have already been done. Consult your Information Security Program Gap Analysis Tool from the Build an Information Security Strategy research.

      1.2 Develop KPIs and prioritize your goals

      There are two paths to success.

      At this time, it is necessary to evaluate the priorities of your security program.

      Option 1: Progress to KPI Development

      • If you would like practice developing KPIs for multiple goals to get used to the process, move to KPI development and then assess which goals you can pursue now based on resources available, saving the rest for later.

      Option 2: Progress to Prioritization of Goals

      • If you are already comfortable with KPI development and do not wish to create extras for later use, then prioritize your goals first and then develop KPIs for them.

      Phase 1 Schematic

      • Gap Analysis
      • Set SMART Goals (You are here.)
        • Develop KPIs
      • Prioritize Goals
      • Implement KPI & Monitor
      • Phase 2

      Develop a key performance indicator (KPI)

      Find out if you’re meeting your goals.

      Terms like “key performance indicator” may make this development practice seem more complicated than it really is. A KPI is just a single metric used to measure success towards a goal. In relational terms (i.e. as a percentage, ratio, etc.) to give it context (e.g. % of improvement over last quarter).

      KPI development is about answering the question: what would indicate that I have achieved my goal?

      To develop a KPI follow these steps:

      1. Review the case study on the following slides to get a sense of how KPIs can start simple and general and get more specific and complex over time.
      2. Using the example to the right, sort your SMART goals from step 1.1 into the various metric types, then determine what success would look like for you. What outcome are you trying to achieve? How will you know when you’ve achieved it?
      3. Fill out the KPI Development Worksheets to create sample KPIs for each of the SMART goals you have created. Ensure that you complete the accompanying KPI Checklist.

      KPIs differ from goal to goal, but their forms follow certain trends

      Metric Type KPI Form
      Initial Probe Progress of probe (e.g. % of systems checked to see if they can supply metrics).
      Baseline Testing What current data shows (e.g. % of systems needing attention).
      Implementation Progress of the implementation (e.g. % of complete vulnerability management program implementation).
      Improvement The threshold or target to be achieved and maintained (e.g. % of incidents responded to within target window).
      Organizational Trends The interplay of several KPIs and how they affect the organization’s risk posture (e.g. assessing the likelihood for a data breach).

      Explore the five metric types

      1. Initial Probe

      Focused on determining how many sources for metrics exist.

      • Question: What am I capable of knowing?
      • Goal: To determine what level of insight we have into our security processes.
      • Possible KPI: % of systems for which metrics are available.
      • Decision: Do we have sufficient resources available to collect metrics?

      2. Baseline Testing

      Focused on gaining initial insights about the state of your security program (what are the measurements?).

      • Question: Does this data suggest areas for improvement?
      • Goal: To create a roadmap for improvement.
      • Possible KPI: % of systems that provide useful metrics to measure improvement.
      • Decision: Is it necessary to acquire tools to increase, enhance, or streamline the metrics-gathering process?

      Info-Tech Insight

      Don't lose hope if you lack resources to move beyond these initial steps. Even if you are struggling to pull data, you can still draw meaningful metrics. The percent or ratio of processes or systems you lack insight into can be very valuable, as it provides a basis to initiate a risk-based discussion with management about the organization's security blind spots.

      Explore the five metric types (cont’d)

      3. Program Implementation

      Focused on developing a basic program to establish basic maturity (e.g. implement an awareness and training program).

      • Question: What needs to be implemented to establish basic maturity?
      • Goal: To begin closing the gap between current and desired maturity.
      • Possible KPI: % of implementation completed.
      • Decision: Have we achieved a formalized and repeatable process?

      4. Improvement

      Focused on attaining operational targets to lower organizational risk.

      • Question: What other related activities could help to support this goal (e.g. regular training sessions)?
      • Goal: To have metrics operate above or below a certain threshold (e.g. lower phishing-test click rate to an average of 10% across the organization)
      • Possible KPI: Phishing click rate %
      • Decision: What other metrics should be tracked to provide insight into KPI fluctuations?

      Info-Tech Insight

      Don't overthink your KPI. In many cases it will simply be your goal rephrased to express a percentage or ratio. In others, like the example above, it makes sense for them to be identical.

      5. Organizational Impact

      Focused on studying several related KPIs (Key Performance Index, or KPX) in an attempt to predict risks.

      • Question: What risks does the organization need to address?
      • Goal: To provide high-level summaries of several metrics that suggest emerging or declining risks.
      • Possible KPI: Likelihood of a given risk (based on the trends of the KPX).
      • Decision: Accept the risk, transfer the risk, mitigate the risk?

      Case study: Healthcare example

      Let’s take a look at KPI development in action.

      Meet Maria, the new CISO at a large hospital that desperately needs security program improvements. Maria’s first move was to learn the true state of the organization’s security. She quickly learned that there was no metrics program in place and that her staff were unaware what, if any, sources were available to pull security metrics from.

      After completing her initial probe into available metrics and then investigating the baseline readings, she determined that her areas of greatest concern were around vulnerability and access management. But she also decided it was time to get a security training and awareness program up and running to help mitigate risks in other areas she can’t deal with right away.

      See examples of Maria’s KPI development on the next four slides...

      Info-Tech Insight

      There is very little variation in the kinds of goals people have around initial probes and baseline testing. Metrics in these areas are virtually always about determining what data sources are available to you and what that data actually shows. The real decisions start in determining what you want to do based on the measures you’re seeing.

      Metric development example: Vulnerability Management

      See examples of Maria’s KPI development on the next four slides...

      Implementation

      Goal: Implement vulnerability management program

      KPI: % increase of insight into existing vulnerabilities

      Associated Metric: # of vulnerability detection methods

      Improvement

      Goal: Improve deployment time for patches

      KPI: % of critical patches fully deployed within target window

      • Associated Metric 1: # of critical vulnerabilities not patched
      • Associated Metric 2: # of patches delayed due to lack of staff
      • Associated Metric X

      Metric development example: Identity Access Management

      Implementation

      Goal: Implement MFA for privileged accounts

      KPI: % of privileged accounts with MFA applied

      Associated Metric: # of privileged accounts

      Improvement

      Goal: Remove all unnecessary privileged accounts

      KPI: % of accounts with unnecessary privileges

      • Associated Metric 1: # of privileged accounts
      • Associated Metric 2: # of necessary privileged accounts
      • Associated Metric X

      Metric development example: Training and Awareness

      Implementation

      Goal: Implement training and awareness program

      KPI: % of organization trained

      Associated Metric: # of departments trained

      Improvement

      Goal: Improve time to report phishing

      KPI: % of phishing cases reported within target window

      • Associated Metric 1: # of phishing tests
      • Associated Metric 2: # of training sessions
      • Associated Metric X

      Metric development example: Key Performance Index

      Organizational Trends

      Goal: Predict Data Breach Likelihood

      • KPX 1: Insider Threat Potential
        • % of phishing cases reported within target window
          • Associated Metrics:
            • # of phishing tests
            • # of training sessions
        • % of critical patches fully deployed within target window
          • Associated Metrics:
            • # of critical vulnerabilities not patched
            • # of patches delayed due to lack of staff
        • % of accounts with unnecessary privileges
          • Associated Metrics:
            • # of privileged accounts
            • # of necessary privileged accounts
      • KPX 2: Data Leakage Issues
        • % of incidents related to unsecured databases
          • Associated Metrics:
            • # of unsecured databases
            • # of business-critical databases
        • % of misclassified data
          • Associated Metrics:
            • # of misclassified data reports
            • # of DLP false positives
        • % of incidents involving data-handling procedure violations.
          • Associated Metrics:
            • # of data processes with SOP
            • # of data processes without SOP
      • KPX 3: Endpoint Vulnerability Issues
        • % of unpatched critical systems
          • Associated Metrics:
            • # of unpatched systems
            • # of missed patches
        • % of incidents related to IoT
          • Associated Metrics:
            • # of IoT devices
            • # of IoT unsecure devices
        • % of incidents related to BYOD
          • Associated Metrics:
            • # of end users doing BYOD
            • # of BYOD incidents

      Develop Goals-Based KPIs

      1.2 120 minutes

      Materials

      • Info-Tech KPI Development Worksheets

      Participants

      • Security Team

      Output

      • List of KPIs for immediate and future use (can be used to populate Info-Tech’s KPI Development Tool).

      It’s your turn.

      Follow the example of the CISO in the previous slides and try developing KPIs for the SMART goals set in step 1.1.

      • To begin, decide if you are starting with implementation or improvement metrics.
      • Enter your goal in the space provided on the left-hand side and work towards the right, assigning a KPI to track progress towards your goal.
      • Use the associated metrics boxes to record what raw data will inform or influence your KPI.
        • Associated metrics are connected to the KPI box with a segmented line. This is because these associated metrics are not absolutely necessary to track progress towards your goal.
        • However, if a KPI starts trending in the wrong direction, these associated metrics would be used to determine where the problem has occurred.
      • If desired, bundle together several related KPIs to create a key performance index (KPX), which is used to forecast the likelihood of certain risks that would have a major business impact (e.g. potential for insider threat, or risk for a data breach).

      Record KPIs and assign them to goals in the Security Metrics Determination and Tracking Tool

      1.2 Security Metrics Determination and Tracking Tool

      Document KPI metadata in the tool and optionally assign them to a goal.

      Tab “3. Identify Goal KPIs” allows you to record each KPI and its accompanying metadata:

      • Source
      • Owner
      • Audience
      • KPI Target
      • Effort to Collect
      • Frequency of Collection
      • Comments

      Optionally, each KPI can be mapped to goals defined on tab “2. Identify Security Goals.”

      Info-Tech Best Practice

      Ensure your metadata is comprehensive, complete, and realistic. A different employee should be able to use only the information outlined in the metadata to continue collecting measurements for the program.

      Complete Info-Tech’s KPI Development Worksheets

      1.2 KPI Development Worksheet

      Use these worksheets to model the maturation of your metrics program.

      Follow the examples contained in this slide deck and practice creating KPIs for:

      • Implementation metrics
      • Improvement metrics
      • Organizational trends metrics

      As well as drafting associated metrics to inform the KPIs you create.

      Info-Tech Best Practice

      Keep your metrics program manageable. This exercise may produce more goals, metrics, and KPIs than you deal with all at once. But that doesn’t mean you can’t save some for future use.

      Build an effort map to prioritize your SMART goals

      1.2 120 minutes

      Materials

      • Whiteboard
      • Sticky notes
      • Laptop

      Participants

      • Security team
      • Other stakeholders

      Output

      • Prioritized list of SMART goals

      An effort map visualizes a cost and benefit analysis. It is a quadrant output that visually shows how your SMART goals were assessed. Use the calculated Cost/Effort Rating and Benefit Rating values from tab “2. Identify Security Goals” of the Security Metrics Determination and Tracking Tool to aid this exercise.

      Steps:

      1. Establish the axes and colors for your effort map:
        1. X-axis (horizontal) - Security benefit
        2. Y-axis (vertical) - Overall cost/effort
        3. Sticky color - Business alignment
      2. Create sticky notes for each SMART goal and place them onto the effort map based on your determined axes.
        • Goal # Example Security Goal - Benefit (1-12) - Cost (1-12)

      The image shows a matric with four quadrants. The X-axis is labelled Low Benefit on the left side and High benefit on the right side. The Y-axis is labelled Low cost at the top and High cost at the bottom. The top left quadrant is labelled Could Dos, the top right quadrant is labelled Must Dos, the lower left quadrant is labelled May Not Dos, and the lower right quadrant is Should Dos. On the right, there are three post-it style notes, the blue one labelled High Alignment, the yellow labelled Medium Alignment, and the pink labelled Low Alignment.

      1.3 Implement and monitor the KPI to track goal progress

      Let’s put your KPI into action!

      Now that you’ve developed KPIs to monitor progress on your goals, it’s time to use them to drive security program maturation by following these steps:

      1. Review the KPI Development Worksheets (completed in step 1.2) for your prioritized list of goals. Be sure that you are able to track all of the associated metrics you have identified.
      2. Track the KPI and associated metrics using Info-Tech’s KPI Development Tool (see following slide).
      3. Update the data as necessary according to your SMART criteria of your goal.

      A Word on Key Risk Indicators...

      The term key risk indicator (KRI) gets used in a few different ways. However, in most cases, KRIs are closely associated with KPIs.

      1. KPIs and KRIs are the same thing
        • A KPI, at its core, is really a measure of risk. Sometimes it is more effective to emphasize that risk rather than performance (i.e. the data shows you’re not meeting your goal).
      2. KRI is KPI going the wrong way
        • After achieving the desired threshold for an improvement goal, our new goal is usually to maintain such a state. When this balance is upset, it indicates that settled risk has once again become active.
      3. KRI as a predictor of emerging risks
        • When organizations reach a highly mature state, they often start assessing how events external to the organization can affect the optimal performance of the organization. They monitor such events or trends and try to predict when the organization is likely to face additional risks.

      Track KPIs in the Security Metrics Determination and Tracking Tool

      1.3 Security Metrics Determination and Tracking Tool

      Once a metric has been measured, you have the option of entering that data into tab “4. Track Metrics” of the Tool.

      Tracking metric data in Info-Tech's tool provides the following data visualizations:

      • Sparklines at the end of each row (on tab “4. Track Metrics”) for a quick sense of metric performance.
      • A metrics dashboard (on tab “5. Graphs”) with three graph options in two color variations for each metric tracked in the tool, and an overall metric program health gauge.

      Info-Tech Best Practice

      Be diligent about measuring and tracking your metrics. Record any potential measurement biases or comments on measurement values to ensure you have a comprehensive record for future use. In the tool, this can be done by adding a comment to a cell with a metric measurement.

      If you want additional support, have our analysts guide you through this phase as part of an Info-Tech workshop

      Book a workshop with our Info-Tech analysts:

      Workshops offer an easy way to accelerate your project. While onsite, our analysts will work with you and your team to facilitate the activities outlined in the blueprint.

      Getting key stakeholders together to formalize the program, while getting started on data discovery and classification, allows you to kickstart the overall program.

      In addition, leverage over-the-phone support through Guided Implementations included in advisory memberships to ensure the continuous improvement of the classification program even after the workshop.

      Logan Rohde

      Research Analyst – Security, Risk & Compliance Info-Tech Research Group

      Ian Mulholland

      Senior Research Analyst – Security, Risk & Compliance Info-Tech Research Group

      Call 1-888-670-8889 for more information.

      Phase 2

      Adapt Your Reporting Strategy for Various Metric Types


      Phase 2

      2.1 Review best practices for presenting metrics

      2.2 Strategize your presentation based on metric type

      2.3 Tailor your presentation to your audience

      2.4 Use your metrics to create a story about risk

      2.5 Revise Metrics

      This phase will walk you through the following activities:

      • Develop reporting strategy
      • Use metrics to create a story about risk
      • Metrics revision

      This phase involves the following participants:

      • Security Team

      Outcomes of this phase

      • Metrics Dashboard
      • Metrics Presentation Deck

      Phase 2 outline

      Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.

      Complete these steps on your own or call us to complete a guided implementation. A guided implementation is a series of two to three advisory calls that help you execute each phase of a project. They are included in most advisory memberships.

      Guided Implementation 2: Adapt Your Reporting Strategy for Various Metric Types

      Proposed Time to Completion: 2-4 weeks

      Step 2.1 – 2.3: Best Practices and Reporting Strategy

      Start with an analyst kick-off call:

      • Do’s and Don’ts of reporting metrics.
      • Strategize presentation based on metric type.

      Then complete these activities…

      • Strategy development for 3-5 metrics

      Step 2.4 – 2.5: Build a Dashboard and Presentation Deck

      Review findings with analyst:

      • Review strategies for reporting.
      • Compile a Key Performance Index.
      • Revise metrics.

      Then complete these activities…

      • Dashboard creation
      • Presentation development

      With these tools & templates:

      • Security Metrics Determination and Tracking Tool Template
      • Security Metrics KPX Dashboard Tool

      Phase 2 Results & Insights:

      • Completed reporting strategy with presentable dashboard

      2.1 Review best practices for presenting metrics

      Avoid technical details (i.e. raw data) by focusing on the KPI.

      • KPIs add context to understand the behavior and associated risks.

      Put things in terms of risk; it's the language you both understand.

      • This usually means explaining what will happen if not addressed and what you recommend.
      • There are always three options:
        • Address it completely
        • Address it partially
        • Do not address it (i.e. accept the risk)

      Explain why you’re monitoring metrics in terms of the goals you’re hoping to achieve.

      • This sets you up well to explain what you've been doing and why it's important for you to meet your goals.

      Choose between KPI or KRI as the presentation format.

      • Base your decision on whether you are trying to emphasize current success or risk.

      Match presentation with the audience.

      • Board presentations will be short; middle-management ones may be a bit longer.
      • Maximize your results by focusing on the minimum possible information to make sure you sufficiently get your point across.
      • With the board, plan on showing no more than three slides.

      Read between the lines.

      • It can be difficult to get time with the board, so you may find yourself in a trial and error position, so pay attention to cues or suggestions that indicate the board is interested in something.
      • If you can, make an ally to get the inside scoop on what the board cares about.

      Read the news if you’re stuck for content.

      • Board members are likely to have awareness (and interest) in large-scale risks like data breaches and ransomware.

      Present your metrics as a story.

      • Summarize how the security program looks to you and why the metrics lead you to see it this way.

      2.2 Strategize your presentation based on metric type (1 of 5)

      Metric Type: Initial Probe

      Scenario: Implementing your first metrics program.

      • All metrics programs start with determining what measurements you are capable of taking.

      Decisions: Do you have sufficient insight into the program? (i.e. do you need to acquire additional tools to collect metrics?)

      Strategy: If there are no barriers to this (e.g. budget), then focus your presentation on the fact that you are addressing the risk of not knowing what your organization's baseline state is and what potential issues exist but are unknown. This is likely the first phase of an improvement plan, so sketching the overall plan is a good idea too.

      • If budget is an issue, explain the risks associated with not knowing and what you would need to make it happen.

      Possible KPIs:

      • % of project complete.
      • % of systems that provide worthwhile metrics.

      Strategize your presentation based on metric type (2 of 5)

      Metric Type: Baseline Testing

      Scenario: You've taken the metrics to determine what your organization’s normal state is and you're now looking towards addressing your gaps or problem areas.

      Decisions: What needs to be prioritized first and why? Are additional resources required to make this happen?

      Strategy: Explain your impression of the organization's normal state and what you plan to do about it. In other words, what goals are you prioritizing and why? Be sure to note any challenges that may occur along the way (e.g. staffing).

      • If the board doesn't like to open their pocketbook, your best play is to explain what stands to happen (or is happening) if risks are not addressed.

      Possible KPIs:

      • % of goals complete.
      • % of metrics indicating urgent attention needed.

      Strategize your presentation based on metric type (3 of 5)

      Metric Type: Implementation

      Scenario: You are now implementing solutions to address your security priorities.

      Decisions: What, to you, would establish the basis of a program?

      Strategy: Focus on what you're doing to implement a certain security need, why, and what still needs to be done when you’re finished.

      • Example: To establish a training and awareness program, a good first step is to actually hold training sessions with each department. A single lecture is simple but something to build from. A good next step would be to hold regular training sessions or implement monthly phishing tests.

      Possible KPIs:

      • % of implementation complete (e.g. % of departments trained).

      Strategize your presentation based on metric type (4 of 5)

      Metric Type: Improvement

      Scenario: Now that a basic program has been established, you are looking to develop its maturity to boost overall performance (i.e. setting a new development goal).

      Decisions: What is a reasonable target, given the organization's risk tolerance and current state?

      Strategy: Explain that you're now working to tighten up the security program. Note that although things are improving, risk will always remain, so we need to keep it within a threshold that’s proportionate with our risk tolerance.

      • Example: Lower phishing-test click rate to 10% or less. Phishing will always be a risk, and just one slip up can have a huge effect on business (i.e. lost money).

      Possible KPIs:

      • % of staff passing the phishing test.
      • % of employees reporting phishing attempts within time window.

      Strategize your presentation based on metric type (5 of 5)

      Metric Type: Organizational Trends

      Scenario: You've reached a mature state and now how several KPIs being tracked. You begin to look at several KPIs together (i.e. a KPX) to assess the organization's exposure for certain broad risk trends.

      Decisions: Which KPIs can be used together to look at broader risks?

      Strategy: Focus on the overall likelihood of a certain risk and why you've chosen to assess it with your chosen KPIs. Spend some time discussing what factors affect the movement of these KPIs, demonstrating how smaller behaviors create a ripple effect that affects the organization’s exposure to large-scale risks.

      Possible KPX: Insider Threat Risk

      • % of phishing test failures.
      • % of critical patches missed.
      • % of accounts with unnecessary privileges.

      Change your strategy to address security challenges

      Even challenges can elicit useful metrics.

      Not every security program is capable of progressing smoothly through the various metric types. In some cases, it is impossible to move towards goals and metrics for implementation, improvement, or organizational trends because the security program lacks resources.

      Info-Tech Insight

      When your business is suffering from a lack of resources, acquiring these resources automatically becomes the goal that your metrics should be addressing. To do this, focus on what risks are being created because something is missing.

      When your security program is lacking a critical resource, such as staff or technology, your metrics should focus on what security processes are suffering due to this lack. In other words, what critical activities are not getting done?

      KPI Examples:

      • % of critical patches not deployed due to lack of staff.
      • % of budget shortfall to acquire vulnerability scanner.
      • % of systems with unknown risk due to lack of vulnerability scanner.

      2.3 Tailor presentation to your audience

      Metrics come in three forms...

      1. Raw Data

      • Taken from logs or reports, provides values but not context.
      • Useful for those with technical understanding of the organization’s security program.

      2. Management-Level

      • Raw data that has been contextualized and indicates performance of something (i.e. a KPI).
      • Useful for those with familiarity with the overall state of the security program but do not have a hands-on role.

      3. Board-Level

      • KPI with additional context indicating overall effect on the organization.
      • Useful for those removed from the security program but who need to understand the relationship between security, business goals, and cyber risk.

      For a metric to be useful it must...

      1. Be understood by the audience it’s being presented to.
        • Using the criteria on the left, choose which metric form is most appropriate.
      2. Indicate whether or not a certain target or goal is being met.
        • Don’t expect metrics to speak for themselves; explain what the indications and implications are.
      3. Drive some kind of behavioral or strategic change if that target or goal is not being met.
        • Metrics should either affirm that things are where you want them to be or compel you to take action to make an improvement. If not, it is not a worthwhile metric.

      As a general rule, security metrics should become decreasingly technical and increasingly behavior-based as they are presented up the organizational hierarchy.

      "The higher you travel up the corporate chain, the more challenging it becomes to create meaningful security metrics. Security metrics are intimately tied to their underlying technologies, but the last thing the CEO cares about is technical details." – Ben Rothke, Senior Information Security Specialist, Tapad.

      Plan for reporting success

      The future of your security program may depend on this presentation; make it count.

      Reporting metrics is not just another presentation. Rather, it is an opportunity to demonstrate and explain the value of security.

      It is also a chance to correct any misconceptions about what security does or how it works.

      Use the tips on the right to help make your presentation as relatable as possible.

      Info-Tech Insight

      There is a difference between data manipulation and strategic presentation: the goal is not to bend the truth, but to present it in a way that allows you to show the board what they need to see and to explain it in terms familiar to them.

      General Tips for a Successful Presentation

      Avoid jargon; speak in practical terms

      • The board won’t receive your message if they can’t understand you.
      • Explain things as simply as you can; they only need to know enough to make decisions about addressing cyber risk.

      Address compliance

      • Boards are often interested in compliance, so be prepared to talk about it, but clarify that it doesn't equal security.
      • Instead, use compliance as a bridge to discussing areas of the security program that need attention.

      Have solid answers

      • Try to avoid answering questions with the answer, “It depends.”
        • Depends on what?
        • Why?
        • What do you recommend?
      • The board is relying on you for guidance, so be prepared to clarify what the board is asking (you may have to read between the lines to do this).
      • Also address the pain points of board members and have answers to their questions about how to resolve them.

      2.4 Use your metrics to create a story about risk

      Become the narrator of your organization’s security program.

      Security is about managing risk. This is also its primary value to the organization. As such, risk should be the theme of the story you tell.

      "Build a cohesive story that people can understand . . . Raw metrics are valuable from an operations standpoint, but at the executive level, it's about a cohesive story that helps executives understand the value of the security program and keeps the company moving forward. "– Adam Ely, CSO and Co-Founder, Bluebox Security, qtd. by Tenable, 2016

      How to Develop Your Own Story...

      1. Review your security program goals and the metrics you’re using to track progress towards them. Then, decide which metrics best tell this story (i.e. what you’re doing and why).
        • Less is more when presenting metrics, so be realistic about how much your audience can digest in one sitting.
        • Three metrics is usually a safe number; choose the ones that are most representative of your goals.
      2. Explain why you chose the goals you did (i.e. what risks were you addressing?). Then, make an honest assessment of how the security program is doing as far as meeting those goals:
        • What’s going well?
        • What still needs improvement?
        • What about your metrics suggests this?
      3. Address how risks have changed and explain your new recommended course of action.
        • What risks were present when you started?
        • What risks remain despite your progress?
        • How do these risks affect the business operation and what can security do to help?

      Story arc for security metrics

      The following model encapsulates the basic trajectory of all story development.

      Use this model to help you put together your story about risk.

      Introduction: Overall assessment of security program.

      Initial Incident: Determination of the problems and associated risks.

      Rising Action: Creation of goals and metrics to measure progress.

      Climax: Major development indicated by metrics.

      Falling Action: New insights gained about organization’s risks.

      Resolution: Recommendations based on observations.

      Info-Tech Best Practice

      Follow this model to ensure that your metrics presentation follows a coherent storyline that explains how you assessed the problem, why you chose to address it the way you did, what you learned in doing so, and finally what should be done next to boost the security program’s maturity.

      Use a nesting-doll approach when presenting metrics

      Move from high-level to low-level to support your claims

      1. Avoid the temptation to emphasize technical details when presenting metrics. The importance of a metric should be clear from just its name.
      2. This does not mean that technical details should be disregarded entirely. Your digestible, high-level metrics should be a snapshot of what’s taking place on the security ground floor.
      3. With this in mind, we should think of our metrics like a nesting doll, with each metrics level being supported by the one beneath it.

      ...How do you know that?

      Board-Level KPI

      Mgmt.-Level KPI

      Raw Data

      Think of your lower-level metrics as evidence to back up the story you are telling.

      When you’re asked how you arrived at a given conclusion, you know it’s time to go down a level and to explain those results.

      Think of this like showing your work.

      Info-Tech Insight

      This approach is built into the KPX reporting format, but can be used for all metric types by drawing from your associated metrics and goals already achieved.

      Use one of Info-Tech’s dashboards to present your metrics

      2.4 Security Metrics Determination and Tracking Tool

      Choose the dashboard tool that makes the most sense for you.

      Info-Tech provides two options for metric dashboards to meet the varying needs of our members.

      If you’re just starting out, you’ll likely be inclined towards the dashboard within the Security Metrics Determination and Tracking Tool (seen here).

      The image shows a screenshot of the Security Metrics Determination and Tracking Tool.

      But if you’ve already got several KPIs to report on, you may prefer the Security Metrics KPX Dashboard Tool, featured on the following slides.

      Info-Tech Best Practice

      Not all graphs will be needed in all cases. When presenting, consider taking screenshots of the most relevant data and displaying them in Info-Tech’s Board-Level Security Metrics Presentation Template.

      Use one of Info-Tech’s dashboards to present your metrics

      2.4 Security Metrics KPX Dashboard

      Use Info-Tech’s Security Metrics KPX Dashboard to track and show your work.

      The image shows a screenshot of the Definitions section of the Security Metrics KPX Dashboard

      1. Start by customizing the definitions on tab 1 to match your organization’s understanding of high, medium, and low risk across the three impact areas (functional, informational, and recoverability).
      2. Next, enter up to 5 business goals that your security program supports.

      Use one of Info-Tech’s dashboards to present your metrics

      2.4 Security Metrics KPX Dashboard

      Use Info-Tech’s Security Metrics KPX Dashboard to track and show your work.

      The image shows a screenshot of tab 2 of the Security Metrics KPX Dashboard.

      1. On tab 2, enter the large-scale risk you are tracking
      2. Proceed by naming each of your KPXs after three broad risks that – to you – contribute to the large-scale risk.

      Use one of Info-Tech’s dashboards to present your metrics

      2.4 Security Metrics KPX Dashboard

      Use Info-Tech’s Security Metrics KPX Dashboard to track and show your work.

      The image is the same screenshot from the previous section, of tab 2 of the Security Metrics KPX Dashboard.

      1. Then, add up to five KPIs aimed at managing more granular risks that contribute to the broad risk.
      2. Assess the frequency and impact associated with these more granular risks to determine how likely it is to contribute to the broad risk the KPX is tracking.

      Use one of Info-Tech’s dashboards to present your metrics

      2.4 Security Metrics KPX Dashboard

      Use Info-Tech’s Security Metrics KPX Dashboard to track and show your work.

      The image is the same screenshot of tab 2 of the Security Metrics KPX Dashboard.

      1. Repeat as necessary for the other KPXs on tab 2.
      2. Repeat steps 3-7 for up to two more large-scale risks and associated KPXs on tabs 3 and 4.

      Use one of Info-Tech’s dashboards to present your metrics

      2.4 Security Metrics KPX Dashboard

      Use Info-Tech’s Security Metrics KPX Dashboard to track and show your work.

      The image shows a chart titled Business Alignment, with sample Business Goals and KPXs filled in.

      1. If desired, complete the Business Alignment evaluation (located to the right of KPX 2 on tabs 2-4) to demonstrate how well security is supporting business goals.

      "An important key to remember is to be consistent and stick to one framework once you've chosen it. As you meet with the same audiences repeatedly, having the same framework for reference will ensure that your communications become smoother over time." – Caroline Wong, Chief Strategy Officer, Cobalt.io

      Use one of Info-Tech’s dashboards to present your metrics

      2.4 Security Metrics KPX Dashboard

      Use Info-Tech’s Security Metrics KPX Dashboard to track and show your work.

      The image shows a screenshot of the dashboard on tab 5 of the Security Metrics KPX Dashboard.

      1. Use the dashboard on tab 5 to help you present your security metrics to senior leadership.

      Use one of Info-Tech’s dashboards to present your metrics

      2.4 Security Metrics KPX Dashboard

      Use Info-Tech’s Security Metrics KPX Dashboard to track and show your work.

      The image shows the same screenshot of Tab 2 of the Security Metrics KPX Dashboard that was shown in previous sections.

      Best Practice:

      This tool helps you convert your KPIs into the language of risk by assessing frequency and severity, which helps to make the risk relatable for senior leadership. However, it is still useful to track fluctuations in terms of percentage. To do this, track changes in the frequency, severity, and trend scores from quarter to quarter.

      Customize Info-Tech’s Security Metrics Presentation Template

      2.4 Board-Level Security Metrics Presentation Template

      Use the Board-Level Security Metrics Presentation Template deck to help structure and deliver your metrics presentation to the board.

      To make the dashboard slide, simply copy and paste the charts from the dashboard tool and arrange the images as needed.

      Adapt the status report and business alignment slides to reflect the story about risk that you are telling.

      2.5 Revise your metrics

      What's next?

      Now that you’ve made it through your metrics presentation, it’s important to reassess your goals with feedback from your audience in mind. Use the following workflow.

      The image shows a flowchart titled Metrics-Revision Workflow. The flowchart begins with the question Have you completed your goal? and then works through multiple potential answers.

      If you want additional support, have our analysts guide you through this phase as part of an Info-Tech workshop

      Book a workshop with our Info-Tech analysts:

      Workshops offer an easy way to accelerate your project. While onsite, our analysts will work with you and your team to facilitate the activities outlined in the blueprint.

      Getting key stakeholders together to formalize the program, while getting started on data discovery and classification, allows you to kickstart the overall program.

      In addition, leverage over-the-phone support through Guided Implementations included in advisory memberships to ensure the continuous improvement of the classification program even after the workshop.

      Logan Rohde

      Research Analyst – Security, Risk & Compliance Info-Tech Research Group

      Ian Mulholland

      Senior Research Analyst – Security, Risk & Compliance Info-Tech Research Group

      Call 1-888-670-8889 for more information.

      Insight breakdown

      Metrics lead to maturity, not vice versa.

      • Tracking metrics helps you assess progress and regress in your security program, which helps you quantify the maturity gains you’ve made.

      Don't lose hope if you lack resources to move beyond baseline testing.

      • Even if you are struggling to pull data, you can still draw meaningful metrics. The percent or ratio of processes or systems you lack insight into can be very valuable, as it provides a basis to initiate a risk-based discussion with management about the organization's security blind spots.

      The best metrics are tied to goals.

      • Tying your metrics to goals ensures that you are collecting metrics for a specific purpose rather than just to watch the numbers change.

      Summary of accomplishment

      Knowledge Gained

      • Current maturity assessment of security areas
      • Setting SMART goals
      • Metric types
      • KPI development
      • Goals prioritization
      • Reporting and revision strategies

      Processes Optimized

      • Metrics development
      • Metrics collection
      • Metrics reporting

      Deliverables Completed

      • KPI Development Worksheet
      • Security Metrics Determination and Tracking Tool
      • Security Metrics KPX Dashboard Tool
      • Board-Level Security Metrics Presentation Template

      Research contributors and experts

      Mike Creaney, Senior Security Engineer at Federal Home Loan Bank of Chicago

      Peter Chestna, Director, Enterprise Head of Application Security at BMO Financial Group

      Zane Lackey, Co-Founder / Chief Security Officer at Signal Sciences

      Ben Rothke, Senior Information Security Specialist at Tapad

      Caroline Wong, Chief Strategy Officer at Cobalt.io

      2 anonymous contributors

      Related Info-Tech research

      Build an Information Security Strategy

      Tailor best practices to effectively manage information security.

      Implement a Security Governance and Management Program

      Align security and business objectives to get the greatest benefit from both.

      Bibliography

      Capability Maturity Model Integration (CMMI). ISACA. Carnegie Mellon University.

      Ely, Adam. “Choose Security Metrics That Tell a Story.” Using Security Metrics to Drive Action: 33 Experts Share How to Communicate Security Program Effectiveness to Business Executives and the Board Eds. 2016. Web.

      https://www.ciosummits.com/Online_Assets_Tenable_eBook-_Using_Security_Metrics_to_Drive_Action.pdf

      ISACA. “Board Director Concerns about Cyber and Technology Risk.” CSX. 11 Sep. 2018. Web.

      Rothke, Ben. “CEOs Require Security Metrics with a High-Level Focus.” Using Security Metrics to Drive Action: 33 Experts Share How to Communicate Security Program Effectiveness to Business Executives and the Board Eds. 2016. Web.

      https://www.ciosummits.com/Online_Assets_Tenable_eBook-_Using_Security_Metrics_to_Drive_Action.pdf

      Wong, Caroline. Security Metrics: A Beginner’s Guide. McGraw Hill: New York, 2012.

      Design a Tabletop Exercise to Support Your Security Operation

      • Buy Link or Shortcode: {j2store}319|cart{/j2store}
      • member rating overall impact: 10.0/10 Overall Impact
      • member rating average dollars saved: $12,599 Average $ Saved
      • member rating average days saved: 5 Average Days Saved
      • Parent Category Name: Threat Intelligence & Incident Response
      • Parent Category Link: /threat-intelligence-incident-response
      • Threat management has become resource intensive, requiring continuous monitoring, collection, and analysis of massive volumes of security event data.
      • Security incidents are inevitable, but how they are handled is critical.
      • The increasing use of sophisticated malware is making it difficult for organizations to identify the true intent behind the attack campaign.
      • The incident response is often handled in an ad hoc or ineffective manner.

      Our Advice

      Critical Insight

      • Establish communication processes and channels well in advance of a crisis. Don’t wait until a state of panic. Collaborate and share information mutually with other organizations to stay ahead of incoming threats.
      • Security operations is no longer a center, but a process. The need for a physical security hub has evolved into the virtual fusion of prevention, detection, analysis, and response efforts. When all four functions operate as a unified process, your organization will be able to proactively combat changes in the threat landscape.
      • You might experience a negative return on your security control investment. As technology in the industry evolves, threat actors will adopt new tools, tactics, and procedures; a tabletop exercise will help ensure teams are leveraging your security investment properly and providing relevant situational awareness to stay on top of the rapidly evolving threat landscape.

      Impact and Result

      Establish and design a tabletop exercise capability to support and test the efficiency of the core prevention, detection, analysis, and response functions that consist of an organization's threat intelligence, security operations, vulnerability management, and incident response functions.

      Design a Tabletop Exercise to Support Your Security Operation Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you should design a tabletop exercise, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Plan

      Evaluate the need for a tabletop exercise.

      • Design a Tabletop Exercise to Support Your Security Operation – Phase 1: Plan

      2. Design

      Determine the topics, scope, objectives, and participant roles and responsibilities.

      • Design a Tabletop Exercise to Support Your Security Operation – Phase 2: Design

      3. Develop

      Create briefings, guides, reports, and exercise injects.

      • Design a Tabletop Exercise to Support Your Security Operation – Phase 3: Develop
      • Design a Tabletop Exercise to Support Your Security Operation – Inject Examples

      4. Conduct

      Host the exercise in a conference or classroom setting.

      • Design a Tabletop Exercise to Support Your Security Operation – Phase 4: Conduct

      5. Evaluate

      Plan to ensure measurement and continued improvement.

      • Design a Tabletop Exercise to Support Your Security Operation – Phase 5: Evaluate
      [infographic]

      Tech Trend Update: If Digital Ethics Then Data Equity

      • Buy Link or Shortcode: {j2store}100|cart{/j2store}
      • member rating overall impact: 9.0/10 Overall Impact
      • member rating average dollars saved: After each Info-Tech experience, we ask our members to quantify the real-time savings, monetary impact, and project improvements our research helped them achieve.
      • member rating average days saved: Read what our members are saying
      • Parent Category Name: Innovation
      • Parent Category Link: /innovation

      COVID-19 is driving the need for quick technology solutions, including some that require personal data collection. Organizations are uncertain about the right thing to do.

      Our Advice

      Critical Insight

      Data equity approaches personal data like money, putting the owner in control and helping to protect against unethical systems.

      Impact and Result

      There are some key considerations for businesses grappling with digital ethics:

      1. If partnering, set expectations.
      2. If building, invite criticism.
      3. If imbuing authority, consider the most vulnerable.

      Tech Trend Update: If Digital Ethics Then Data Equity Research & Tools

      Tech Trend Update: If Digital Ethics Then Data Equity

      Understand how to use data equity as an ethical guidepost to create technology that will benefit everyone.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      • Tech Trend Update: If Digital Ethics Then Data Equity Storyboard
      [infographic]

      Enterprise Architecture

      • Buy Link or Shortcode: {j2store}43|cart{/j2store}
      • Related Products: {j2store}43|crosssells{/j2store}
      • member rating overall impact: 9.2/10
      • member rating average dollars saved: $28,368
      • member rating average days saved: 24
      • Parent Category Name: Service Planning and Architecture
      • Parent Category Link: service-planning-and-architecture
      Demystify enterprise architecture value with key metrics.

      Social Media Management Software Selection Guide

      • Buy Link or Shortcode: {j2store}570|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Marketing Solutions
      • Parent Category Link: /marketing-solutions
      • Social media has changed the way businesses interact with their customers. It is essential to engage with your customers regularly and in a timely manner.
      • Businesses must stay on top of the latest news and update the public regarding the status of downtime or any mishaps.
      • Customers are present in multiple social media platforms, and it is important for businesses to engage with all audiences without alienating one group.

      Our Advice

      Critical Insight

      • There are many social media platforms, and any post, image, or other content must be uploaded on all the platforms with minimal delay.
      • It is often difficult to manage replies and responses to all social media platforms promptly.
      • Measuring key performance metrics is crucial to obtain targeted ROI. Calculating ROI across multiple platforms with various audiences is a challenge.

      Impact and Result

      • A business’ social media presence is an extension of the organization, and the social media management strategy must align with the organization's values.
      • Choose a social media management platform that is right for you by aligning your needs without falling for bells and whistles. Vendors offer a lot of features that are not helpful for most day-to-day activities.
      • Ensure the social media management platform has support and integrations for all the platforms that you require.

      Social Media Management Software Selection Guide Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Social Media Management Software Selection Guide – A deck outlining the features of SMMP tools and top vendors in the marketspace.

      This research offers insight into web analytic tools, key trends in the marketspace, and advanced web analytics techniques. It also provides an overview of the ten top vendors in the marketspace.

      • Social Media Management Software Selection Guide Storyboard
      [infographic]

      Further reading

      Social Media Management Software Selection Guide

      Identify the best tools for your social media management needs.

      Analyst Perspective

      Connecting through social media is an essential way to understand and engage with your customers.

      Social media management platforms (SMMP) allow businesses to engage with customers more efficiently. Ten years ago, Facebook and Twitter dominated the social media space, but many alternatives have emerged that attract a wide variety of audiences today. Every social media platform has a unique demographic; for instance, LinkedIn attracts an audience looking to develop their professional career, while Snapchat attracts those who want to share their everyday casual experience.

      It is important for businesses and brands to engage with all kinds of audiences without alienating a certain group. Domino's, for example, can sell pizzas to business professionals and teenagers alike, so connecting with both customer segments via personalized and meaningful posts in their preferred platform is a great way to grow their business.

      To successfully implement a social media management platform, organizations need to ensure they have their requirements and business needs shortlisted and choose vendors that ensure the best return on investment (ROI).

      An image of Sai Krishna Rajaramagopalan
      Sai Krishna Rajaramagopalan
      Research Specialist, Customer Experience & Application Insights
      Info-Tech Research Group

      Executive Summary

      Your Challenge

      • Social media has changed the way businesses interact with customers. It is essential to engage with your them regularly and in a timely manner.
      • Businesses must stay on top of the latest news and update the public regarding any downtime or mishaps.
      • Customers are present on multiple social media platforms, and businesses need to engage all audiences without neglecting or alienating any one group.

      Common Obstacles

      • There are many social media platforms, and any post, image, or other content must be uploaded on every platform with minimal delay.
      • It is often difficult to manage audience interaction on all social media platforms in a timely manner.
      • Measuring key performance metrics is crucial to obtaining the targeted ROI. Calculating ROI across multiple platforms with varying audiences is a challenge.

      Info-Tech's Approach

      • Social media presence is an extension of the organization, and the social media management strategy must align with organizational values.
      • Understand your feature requirements and don't for bells and whistles. Vendors offer many features that are not helpful during 80% of day-to-day activities. Choose the SMMP that is right for your organization's needs.
      • Ensure the SMMP has support and integrations for all the platforms that you require.

      Info-Tech Insight

      Choosing a good SMMP is only the first step. Having great social media managers who understand their audience is essential in maintaining a healthy relationship with your audience.

      Guided Implementation

      What does a typical GI on this topic look like?

      Phase 1 Phase 2

      Call #1: Understand what a social media management platform (SMMP) is.
      Call #2: Build the business case to select an SMMP.

      Call #3: Define your key SMMP requirements.
      Call #4: Build procurement items, such as a request for proposal (RFP).
      Call #5: Evaluate the SMMP solution landscape and shortlist viable options.

      A Guided implementation (GI) is a series of calls with an Info-Tech analyst to help implement our best practices in your organization.

      The SMMP selection process should be broken into segments:

      1. SMMP shortlisting with this buyer's guide
      2. Structured approach to selection
      3. Contract review

      Info-Tech offers various levels of support to best suit your needs

      DIY Toolkit

      “Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful.”

      Guided Implementation

      “Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track.”

      Workshop

      “We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place.”

      Consulting

      “Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project.”

      Diagnostics and consistent frameworks used throughout all four options

      What exactly is an SMMP platform?

      A social media management platform is a software solution that enables businesses and brands to manage multiple social media accounts. It facilitates making posts, monitoring metrics, and engaging with your audience.

      An SMMP platform offers many key features, including but not limited to the following capabilities:

      • Integrate with popular social media platforms
      • Post images, text, videos on multiple platforms at once
      • Schedule posts
      • Track and monitor activity on social media accounts
      • Send replies and view likes and comments across all accounts
      • Reporting and analytics
      • Send alerts and notifications regarding key events
      • Multilingual support and translation

      Info-Tech Insight

      Social media management platforms have continuously expanded their features list. It is, however, essential not to get lost in endless features to remain competitive and ensure the best ROI.

      Key trends – short-form videos drive the most engagement

      Short-form videos

      Short-form videos are defined as videos less than two minutes long. Shorter videos take substantially less time and effort to consume, making them very attractive for marketing brands to end users. According to a study conducted by Vidyard, more than 50% of viewers end up watching an entire video if it's less than one minute. Another study finds that over 93% of the surveyed brands sold their product or service to a customer through a social media video.

      Popular social media platforms such as TikTok, Instagram, YouTube etc. have caught on to this trend and introduced short-form videos, more commonly called "shorts". It's also common for content creators and brands to cut and upload short clips from longer videos to drive more engagement with viewers.

      Key Trends

      Short-form videos have higher viewership and view time compared to long videos.

      58%

      About 58% of viewers watch the video to the end if it’s under one minute long. A two-minute video manages to keep around 50% of its viewers till the end.
      Source: Oberlo, 2020

      30%

      Short-form videos have the highest ROI of any social media marketing at 30%.
      Source: Influencer Marketing Hub, 2023

      Key trends – influencer marketing

      Influencer marketing

      Influencer marketing is the collaboration of brands with online influencers and content creators across various social media platforms to market their products and services. Influencers are not necessarily celebrities; they can be any individual with a dedicated community. This makes influencers abundant. For instance, compare the number of popular football players with the number of YouTubers on the planet.

      Unlike traditional marketing methods, influencer marketing is effective across different budget levels. This is because the engagement level of small influencers with 10,000 followers is higher than the engagement level of large influencers with millions of followers. If a brand is budget conscious, working with smaller influencers still gives a good ROI. For every dollar spent on influencer marketing, the average ROI is $5.78.

      Key Trends

      61%

      A recent study by Matter found that 61% of consumers trust influencers' recommendations over branded social media content.
      Source: Shopify, 2022

      According to data gathered by Statista, the influencer marketing industry has more than doubled since 2019. It was worth $16.4 billion in 2022.
      Source: Statista, 2023

      Executive Brief Case Study

      INDUSTRY: Retail
      SOURCE: "5 Influencer Marketing Case Studies," HubSpot

      H&M

      H&M was looking to build awareness and desirability around the brand to drive clothing sales during the holiday season. They decided to partner with influencers and align content with each celebrity's personality and lifestyle to create authentic content and messaging for H&M. H&M selected four lesser-known celebrities with highly engaged and devoted social media followings: Tyler Posey, Peyton List, Jana Kramer, and Hannah Simone.

      They posted teaser clips across various platforms to create buzz about the campaign a couple of days before the full, one-minute videos were released. Presenting the content two different times enabled H&M to appeal to more viewers and increase the campaign's visibility. Two of the celebrities, List and Kramer, garnered more views and engagement on the short clip than the full video, highlighting that a great short clip can be more effective than long-form content.

      Results

      The campaign achieved 12 million views on YouTube, 1.3 million likes, 14,000 comments, and 19,000 shares. The average engagement with consumers across all four celebrities was 10%.

      A screenshot of Tyler Posey's sponsored video.

      Tyler Posey's sponsored video achieved:

      • 25% engagement rate on Instagram
      • 14% engagement rate across Facebook, Twitter, and Instagram

      Key trends – social commerce is the future of e-commerce

      Social commerce

      Social commerce is the selling of goods and services through social media. This may involve standalone stores on social media platforms or promotions on these platforms which link to traditional e-commerce platforms.

      Social media platforms contain more data about consumers than traditional platforms, which allows more accurate targeting of ads and promotions. Additionally, social commerce can place ads on popular influencer stories and posts, taking advantage of influencer marketing without directly involving the influencers.

      Popular platforms have opened their own built-in stores. Facebook created Marketplace and Facebook Shops. TikTok soon followed with the TikTok Shopping suite. These stores allow platforms to lower third-party costs and have more control over which products are featured. This also creates a transactional call to action without leaving social media.

      Key Trends

      2020 saw a sizable increase in social commerce occurring on social media networks, with users making purchases directly from their social accounts.

      30.8%

      Sales through social commerce are expected to grow about 30.8% per year from 2020 to 2025. The growth rate is expected to increase to 35% in 2026.
      Source: Oberlo, 2020

      46%

      China has the highest social commerce adoption rate in the world, with 46% of all internet users making at least one purchase. The US is second with a 36% adoption rate.
      Source: Influencer Marketing Hub, 2022

      Executive Brief Case Study

      BestBuy

      The Twitter Shop Module allows select brands to showcase products at the top of Twitter business profiles. Users can scroll through a carousel of products on a brand's profile and tap on individual products to read more and make purchases without leaving the platform.

      While the results of Twitter's Shop Module experiment are still pending, brands aren't waiting around to sell on the platform. Best Buy and others continue to link to well-formatted product pages directly in their Tweets.

      Clear, direct calls to action such as "Pick yours up today" encourage interested audiences to click through, learn more, and review options for purchase. In this social commerce example, Best Buy also makes optimal use of a Tweet's character limit. In just a few words, the brand offers significant savings for a high-quality product, then doubles down with a promotional trade-in offer. Strong imagery is the icing on the cake.

      INDUSTRY: Retail
      SOURCE: "5 genius social commerce examples," Sprout Social, 2021

      Image shows a social media post by Best Buy.

      Key trends – social media risk management is crucial

      Crisis management

      Crisis management is the necessary intervention from an organization when negative news spreads across social media platforms. With how interconnected people are due to social media, news can quickly spread across different platforms.

      Organizations must be prepared for difficult situations such as negative feedback for a product or service, site outages, real-world catastrophes or disasters, and negative comments toward the social media handle. There are tools that organizations can use to receive real-time updates and be prepared for extreme situations.

      While the causes are often beyond control, organizations can prepare by setting up a well-constructed crisis management strategy.

      Key Trends

      75%

      75% of respondents to PwC's Global Crisis Survey said technology has facilitated the coordination of their organization's crisis response team.
      Source: PwC, 2021

      69%

      69% of business leaders reported experiencing a crisis over a period of five years, with the average number of crises being three.
      Source: PwC, 2019

      Executive Brief Case Study

      INDUSTRY: Apparel
      SOURCE: “Social Media Crisis Management 3 Examples Done Right,” Synthesio

      Nike

      On February 20, 2019, Zion Williamson, a star player from Duke University, suffered a knee injury when a malfunctioning Nike shoe fell apart. This accident happened less than a minute into a highly anticipated game against North Carolina. Media outlets and social media users quickly began talking. ESPN had broadcast the game nationally. On Twitter, former President Barack Obama, who was watching the game courtside, expressed his well-wishes to Williamson, as did NBA giants like LeBron James.

      This accident was so high profile that Nike stock dropped 1.7% the following day. Nike soon released a statement expressing its concern and well-wishes for Williamson. The footwear megabrand reassured the world that its teams were "working to identify the issue." The following day, Nike sent a team to Durham, North Carolina, where the game took place. This team then visited Nike's manufacturing site in China and returned with numerous suggestions.

      About a month later, Williamson returned to the court with custom shoes, which he told reporters were "incredible." He thanked Nike for creating them.

      An image of a post by Time about Zion Williamson's injury.

      Get to know the key players in the SMMP landscape

      These next slides provide a top-level overview of the popular players you will encounter in the SMMP shortlisting process.

      A collection of the logos for the SMPP key players, discussed later in this blueprint.

      Evaluate software category leaders through vendor rankings and awards

      SoftwareReviews

      An Image of SoftwareReviews data quadrant analysis

      The data quadrant is a thorough evaluation and ranking of all software in an individual category to compare platforms across multiple dimensions.
      Vendors are ranked by their composite score, based on individual feature evaluations, user satisfaction rankings, vendor capability comparisons, and likeliness to recommend the platform.

      An image of SoftwareReviews Emotional Footprint.

      The emotional footprint is a powerful indicator of overall user sentiment toward the relationship with the vendor, capturing data across five dimensions.
      Vendors are ranked by their customer experience (CX) score, which combines the overall emotional footprint rating with a measure of the value delivered by the solution.

      Speak with category experts to dive deeper into the vendor landscape

      SoftwareReviews

      CLICK HERE to ACCESS

      Comprehensive software reviews

      to make better IT decisions

      We collect and analyze the most detailed reviews on enterprise software from real users to give you an unprecedented view into the product and vendor before you buy.

      Fact-based reviews of business software from IT professionals.

      Product and category reports with state-of-the-art data visualization.

      Top-tier data quality backed by a rigorous quality assurance process.

      User-experience insight that reveals the intangibles of working with a vendor.

      SoftwareReviews is powered by Info-Tech

      Technology coverage is a priority for Info-Tech and SoftwareReviews provides the most comprehensive unbiased data on today's technology. Combined with the insight of our expert analysts, our members receive unparalleled support in their buying journey.

      The logo for HubSpot

      Est. 2006 | MA, USA | NYSE: HUBS

      bio

      From attracting visitors to closing customers, HubSpot brings the entire marketing funnel together for less hassle, more control, and an inbound marketing strategy.

      An image of SoftwareReviews analysis for HubSpot

      SoftwareReviews' SMMP Rankings

      Strengths:

      • Extensive functionality
      • Great for midmarket and large enterprises
      • Offers free trial

      Areas to improve:

      • Comparatively expensive
      • Steep price increase between various tiers of offering

      The logo for HubSpot

      *Pricing correct as of November 2022. Listed in USD and absent discounts.
      See pricing on vendor's website for latest information.

      HubSpot offers a robust social media management platform that enables organizations to run all social media campaigns from a central location. HubSpot is suitable for a range of midmarket and enterprise use cases. HubSpot offers a free base version of the platform that freelancers and start-ups can take advantage of. The free version can also be used to trial the product prior to deciding on purchase.

      However, HubSpot is relatively expensive compared to its competitors. The free tools are not sustainable for growing businesses and some essential features are locked behind professional pricing. The price increase from one tier to another – specifically from starter to professional – is steep, which may discourage organizations looking for a "cheap and cheerful" product.

      History

      An image of the timeline for HubSpot

      Starter

      • Starts at $45
      • Per month
      • Small businesses

      Professional

      • Starts at $800
      • Per month
      • Medium/large businesses

      Enterprise

      • Starts at $3600
      • Per month
      • Large enterprises

      The logo for Sprout Social

      Est. 2010 | IL, USA | NASDAQ: SPT

      bio

      People increasingly turn to social media to engage with your business. Sprout Social provides powerful tools to personally connect with customers, solve issues, and create brand advocates.

      An image of SoftwareReviews analysis for Sprout Social

      SoftwareReviews' SMMP Rankings

      Strengths:

      • Automated response feature
      • Great price for base offering

      Areas to improve:

      • Advanced features are very expensive
      • No free trial offered

      The logo for Sprout Social

      *Pricing correct as of November 2022. Listed in USD and absent discounts.
      See pricing on vendor's website for latest information.

      Sprout Social offers strong social feed management and social customer service capabilities. It also provides powerful analytical tools to monitor multiple social media accounts. The listening functionality helps discover trends and identify gaps and opportunities. It is also one of the very few platforms to provide automated responses to incoming communications, easing the process of managing large and popular brands.

      Although the starting price of each tier is competitive, advanced analytics and listening come at a steep additional cost. Adding one additional user to the professional tier costs $299 which is a 75% increase in cost. Sprout Social does not offer a free tier for small businesses to trial.

      History

      An image of the timeline for Sprout Social

      Standard

      • Starts at $249
      • Per month
      • Small businesses
      • Five social profiles

      Professional

      • Starts at $399
      • Per month
      • Medium/large businesses

      Advanced

      • Starts at $499
      • Per month
      • Medium/large businesses

      Enterprise

      • Opaque pricing
      • Request a quote
      • Large enterprises

      The logo for Hootsuite

      Est. 2008 | BC, CANADA |PRIVATE

      bio

      Manage social networks, schedule messages, engage your audiences, and measure ROI right from the dashboard.

      SoftwareReviews' SMMP Rankings

      Strengths:

      • Automatic scheduling functionality
      • Competitor analysis
      • 30-day free trial

      Areas to improve:

      • Advanced functionalities require additional purchase and are expensive

      The logo for Hootsuite

      *Pricing correct as of November 2022. Listed in USD and absent discounts.
      See pricing on vendor's website for latest information.

      Hootsuite is one of the largest players in the social media management space with over 18 million users. The solution has great functionality covering all the popular social media platforms like Facebook, Instagram, Twitter, and Pinterest. One popular and well-received feature is the platform’s ability to schedule posts in bulk. Hootsuite also provides an automatic scheduling feature that uses algorithms to determine the optimal time to post to maximize viewership and engagement. Additionally, the platform can pull analytics for all competitors in the same marketspace as the user to compare performance.

      Hootsuite offers buyers a 30-day free trial to familiarize with the platform and provides unlimited post scheduling across all their plans. Features like social listening, employee advocacy, and ROI reporting, however, are not included in these plans and require additional purchase.

      History

      An image of the timeline for Hootsuite

      Professional

      • Starts at $49*
      • Per month
      • 1 user and 10 social accounts

      Team

      • Starts at $249*
      • Per month
      • 3 users and 20 social accounts

      Business

      • Starts at $739*
      • Per month
      • 5 users and 35 social accounts

      Enterprise

      • Custom built and priced
      • Starts at 5 users and 50 social accounts

      The logo for Sprinklr

      Est. 2009 | NY, USA | NYSE: CXM

      bio

      With social engagement & sales, you can deliver a positive experience that's true to your brand - no matter where your customers are digitally - from a single, unified platform.

      An image of SoftwareReviews analysis for Sprinklr

      SoftwareReviews' SMMP Rankings

      Strengths

      • Extensive social analytics functionality
      • Advertising and sales capabilities

      Areas to improve:

      • Not suitable for small to medium businesses
      • Opaque pricing

      The logo for Sprinklr

      Sprinklr is a vendor focused on enterprise-grade capabilities that offers a comprehensive unified customer experience management (CXM) platform.

      Their product portfolio offers an all-in-one solution set with an extensive list of features to accommodate all marketing and communication needs. Sprinklr comes integrated with products consisting of advertising, marketing, engagement, and sales capabilities. Some of the key functionality specific to social media includes sentiment analysis, social reporting, advanced data filtering, alerts and notifications, competitor analysis, post performance, and hashtag analysis.

      History

      An image of the timeline for Sprinklr

      Sprinklr – Opaque Pricing:
      "Request a Demo"

      The logo for Zoho Social

      Est. 1996 | TN, INDIA | PRIVATE

      bio

      Zoho Social is a complete social media management tool for growing businesses & agencies. It helps schedule posts, monitor mentions, create unlimited reports, and more. Zoho Social is from Zoho.com—a suite of 40+ products trusted by 30+ million users.

      An image of SoftwareReviews analysis for Zoho Social” data-verified=

      SoftwareReviews' SMMP Rankings

      Strengths:

      • Provides integration capabilities with other Zoho products
      • Competitive pricing

      Areas to improve:

      • Base functionality is limited
      • The two starting tiers are limited to one user

      The logo for Zoho Social

      *Pricing correct as of August 2021. Listed in USD and absent discounts.
      See pricing on vendor's website for latest information.

      Zoho differentiates itself from competitors by highlighting integration with other products under the Zoho umbrella – their adjacent tool sets allow organizations to manage emails, projects, accounts, and webinars. Zoho also offers the choice of purchasing their social media management tool without any of the augmented CRM capabilities, which is priced quite competitively.

      The social media management tools are offered in three plans. Each plan allows the ability to publish and schedule posts across nine platforms, access summary reports and analytics, and access a Bit.ly integration & URL shortener. The standard and professional plans are limited to one brand and one team member, with the option to add team members or social channels for an additional cost.

      YouTube support is exclusive to the premium offering.

      History

      An image of the timeline for Zoho Social

      Standard

      • Starts at $10*
      • Per month, billed annually
      • 9 channels and 1 team member

      Professional

      • Starts at $30*
      • Per month, billed annually
      • Option to add team members for additional cost

      Premium

      • Starts at $40*
      • Per month, billed annually
      • Starts at 10 channels and 3 team members

      The logo for MavSocial

      Est. 2012 | CA, USA | PRIVATE

      bio

      MavSocial is a multi-award-winning, fully integrated social media management & advertising solution for brands and agencies.

      An image of SoftwareReviews analysis for MavSocial

      SoftwareReviews' SMMP Rankings

      Strengths

      • Content management capabilities
      • Offers millions of stock free images

      Areas to improve:

      • Limited market footprint compared to competitors
      • Not ideal for large enterprises

      The logo for MavSocial

      *Pricing correct as of November 2022. Listed in USD and absent discounts.
      See pricing on vendor's website for latest information.

      In addition to social media management, MavSocial is also an excellent content management tool. A centralized platform is offered that can store many photos, videos, infographics, and more, which can be accessed anytime. The solution comes with millions of free stock images to use. MavSocial is a great hybrid social media and content management solution for small and mid-sized businesses and larger brands that have dedicated teams to manage their social media. MavSocial also offers campaign planning and management, scheduling, and social inbox functionality. The entry-level plan starts at $78 per month for three users and 30 profiles. The enterprise plan offers fully configurable and state-of-the-art social media management tools, including the ability to manage Facebook ads.

      History

      An image of the timeline for MavSocial

      Pro

      • Starts at $78*
      • Per month
      • Max. 3 users and 30 Profiles

      Business

      • Starts at $249*
      • Per month
      • 5 users, 40 profiles
      • Ability to expand users and profiles

      Enterprise

      • Starts at $499*
      • Per month
      • Fully customized

      The logo for Khoros

      Est. 2019 | TX, USA | PRIVATE

      bio

      Use the Khoros platform (formerly Spredfast + Lithium) to deliver an all-ways connected experience your customers deserve.

      An image of SoftwareReviews analysis for Khoros

      SoftwareReviews' SMMP Rankings

      Strengths

      • Offers a dedicated social strategic service team
      • Extensive functionality

      Areas to improve:

      • Opaque pricing
      • Not suitable for small or medium businesses

      The logo for Khoros

      Khoros is the result of the merger between two social marketing platforms - Spredfast and Lithium. The parent companies have over a decade of experience offering social management tools. Khoros is widely used among many large brands such as StarHub and Randstad. Khoros is another vendor that is primarily focused on large enterprises and does not offer plans for small/medium businesses. Khoros offers a broad range of functionality such as social media marketing, customer engagement, and brand protection with visibility and controls over social media presence. Khoros also offers a social strategic services team to manage content strategy, brand love, reporting, trend tracking, moderation, crisis and community management; this team can be full service or a special ops extension of your in-house crew.

      History

      An image of the timeline for Khoros

      Khoros – Opaque Pricing:
      "Request a Demo"

      The logo for Sendible

      Est. 2009 | UK | PRIVATE

      bio

      Sendible allows you to manage social networks, schedule messages, engage your audiences, and measure ROI right from one easy-to-use dashboard.

      An image of SoftwareReviews analysis for Sendible

      SoftwareReviews' SMMP Rankings

      Strengths

      • Great integration capabilities
      • Competitive pricing
      • Scheduling functionality

      Areas to improve:

      • Limited footprint compared to competitors
      • Better suited for agencies

      The logo for Sendible

      *Pricing correct as of November 2022. Listed in USD and absent discounts.
      See pricing on vendor's website for latest information.

      Sendible primarily markets itself to agencies rather than individual brands or businesses. Sendible's key value proposition is its integration capabilities. It can integrate with 17 different tools including Meta, Twitter, Instagram, LinkedIn, Google My Business (GMB), YouTube, WordPress, Canva, Google Analytics, and Google Drive. In addition to normal reporting functionality, the Google Analytics integration allows customers to track clickthrough and user behavior for traffic coming from social media channels.

      All plans include the functionality to schedule at least ten posts. Sendible offers excellent collaboration tools, allowing teams to work on assigned tasks and have content approved before they are scheduled to ensure quality control. Sendible offers four plans, with the option to save an additional 15% by signing up for annual payments.

      History

      An image of the timeline for Sendible

      Creator

      • Starts at $29
      • Price per month
      • For freelancers
      • One brand

      Traction

      • Starts at $89
      • Price per month
      • Start-up agencies & brands. 4+ brands

      Scale

      • Starts at $199
      • Price per month
      • For growing agencies & brands

      Custom

      • Opaque pricing
      • Request a quote
      • For large teams & agencies

      The logo for Agorapulse

      Est. 2010 | FRANCE | PRIVATE

      bio

      Agorapulse is an affordable social media dashboard that helps businesses and agencies easily publish content and manage their most important conversations on their social networks.

      An image of SoftwareReviews analysis for Agorapulse

      SoftwareReviews' SMMP Rankings

      Strengths

      • ROI calculation for Facebook
      • Competitor analysis
      • Social inbox functionality

      Areas to improve:

      • Targeted toward agencies
      • Advanced features can't be purchased under lower tier plans

      The logo for Agorapulse

      *Pricing correct as of November 2022. Listed in USD and absent discounts.
      See pricing on vendor's website for latest information.

      Although Agorapulse offers the solution for both agencies and business, they primarily focus on agencies. In addition to the standard social media management functionality, Agorapulse also offers features such as competitor analysis and Facebook contest apps at an affordable price point. They also offer social inbox functionality, allowing the ability to manage the inbox and reply to any message or comment across all social profiles through a single platform.

      The solution is offered in three plans. The pro plan allows ten social profiles and two users. Additional social profiles and users can only be purchased under the premium plan. All plans include ROI calculation for Facebook, but if you want this functionality for other platforms, that's exclusive to the enterprise plan.

      History

      An image of the timeline for Agorapulse

      Pro

      • Starts at $79
      • Price per month
      • 10 social profiles and 2 users

      Premium

      • Starts at $199
      • Price per month
      • 20 social profiles and 2 brands

      Enterprise

      • Opaque pricing
      • 40+ social profiles and 8+ users

      The logo for Buffer

      Est. 2010 | CA, USA | PRIVATE

      bio

      A better way to manage social media for your business. Buffer makes it easy to manage your business' social media accounts. Schedule posts, analyze performance, and collaborate with your team — all in one place.

      An image of SoftwareReviews analysis for Buffer

      SoftwareReviews' SMMP Rankings

      Strengths

      • Competitive pricing
      • Scheduling functionality
      • Mobile app

      Areas to improve:

      • Not suited for medium to large enterprises
      • Limited functionality

      The logo for Buffer

      *Pricing correct as of November 2022. Listed in USD and absent discounts.
      See pricing on vendor's website for latest information.

      Buffer is a social media platform targeted toward small businesses. It is a great cost-effective option for those who want to manage a few social media profiles, with a free plan that lets one user access three social channels. At $5 per month, it's a great entry point for smaller companies to invest in social media management tools, offering functionality like post scheduling and link shortening and optimization tools for hashtags, tags, and mentions across platforms. All plans provide a browser extension, access to a mobile app, two-factor authentication, social media and email support, and access to the Buffer community. Customers can also trial any of the plans for 14 days before purchasing.

      history

      An image of the timeline for Buffer

      Essentials

      • Starts at $5
      • Per month per channel
      • Basic functionality

      Team

      • Starts at $10
      • Per month per channel
      • Adds reporting capabilities

      Agency

      • Starts at $100
      • Per month per channel

      Leverage Info-Tech's research to plan and execute your SMMP implementation

      Use Info-Tech Research Group's three-phase implementation process to guide your own planning.

      • Assess
      • Prepare
      • Govern & Course Correct

      An image of the title page for Info-Tech's governance and management of enterprise software implementation

      Establish and execute an end-to-end, Agile framework to succeed with the implementation of a major enterprise application.

      Visit this link

      Ensure your implementation team has a high degree of trust and communication

      If external partners are needed, dedicate an internal resource to managing vendor and partner relationships.

      Communication

      Teams must have a communication strategy. This can be broken into:

      • Regularity: Having a set time each day to communicate progress and a set day to conduct retrospectives.
      • Ceremonies: Introducing awards and continually emphasizing delivery of value can encourage relationship building and constructive motivation.
      • Escalation: Voicing any concerns and having someone responsible for addressing those concerns.

      Proximity

      Distributed teams create complexity as communication can break down. This can be mitigated by:

      • Location: Placing teams in proximity can close the barrier of geographical distance and time zone differences.
      • Inclusion: Making a deliberate attempt to pull remote team members into discussions and ceremonies.
      • Communication tools: Having the right technology (e.g. video conference) can help bring teams closer together virtually.

      Trust

      Members should trust other members to contribute to the project and complete required tasks on time. Trust can be developed and maintained by:

      • Accountability: Having frequent quality reviews and feedback sessions. As work becomes more transparent, people become more accountable.
      • Role clarity: Having a clear definition of everyone's role.

      Summary of Accomplishment

      Knowledge Gained

      • What a social media management platform (SMMP) is
      • The history of SMMP
      • The future of SMMP
      • Key trends in SMMP

      Processes Optimized

      • Requirements gathering
      • Requests for proposal (RFPs) and contract reviews
      • SMMP vendor selection
      • SMMP implementation

      SMMP Vendors Analyzed

      • Sprout Social
      • HubSpot
      • Zoho Social
      • Khoros
      • Agorapulse
      • Hootsuite
      • Sprinklr
      • MavSocial
      • Sendible
      • Buffer

      Related Info-Tech Research

      Select and Implement a Social Media Management Platform

      • SMMPs reduce complexity and increase the results of enterprise social media initiatives.

      Social Media

      • The Social Media workshop provides clear, measurable improvements to your social media strategy.

      Improve Requirements Gathering

      • An improvement in requirements analysis will strengthen the relationship between business and IT, as more and more applications satisfy stakeholder needs. More importantly, the applications delivered by IT will meet all the must-have and at least some of the nice-to-have requirements, allowing end users to successfully execute their day-to-day responsibilities.

      Bibliography

      "30+ Influencer Marketing Statistics You Should Know (2022)." Shopify, www.shopify.com/blog/influencer-marketing-statistics.
      "A Brief History of Hootsuite." BrainStation®, 2015, https://brainstation.io/magazine/a-brief-history-of-hootsuite#:~:text=In%202008%2C%20Vancouver%2Dbased%20digital,accounts%20from%20a%20single%20interface.&text=In%202009%2C%20BrightKit's%20name%20changed,a%20capital%20%E2%80%9CS%E2%80%9D).
      "About Us." Sprout Social, https://sproutsocial.com/about/#history
      "About Zoho - Our Story, List of Products." Zoho, www.zoho.com/aboutus.html.
      Adam Rowe, et al. "Sprout Social vs Hootsuite - Which Is Best?: Tech.co 2022." Tech.co, 15 Nov. 2022, https://tech.co/digital-marketing/sprout-social-vs-hootsuite
      "Agorapulse Customer Story: Twilio Segment." Segment, https://segment.com/customers/agorapulse/
      "Agorapulse - Funding, Financials, Valuation & Investors." Crunchbase, www.crunchbase.com/organization/agorapulse/company_financials.
      "Agorapulse Release Notes." Agorapulse Release Notes, https://agorapulse.releasenotes.io/
      "Buffer - Funding, Financials, Valuation & Investors." Crunchbase, www.crunchbase.com/organization/buffer/company_financials.
      Burton, Shannon. "5 Genius Social Commerce Examples You Can Learn From." Sprout Social, 28 Oct. 2021, https://sproutsocial.com/insights/social-commerce-examples/ .
      Chris Gillespie. "How Long Should a Video Be." Vidyard, 17 May 2022, www.vidyard.com/blog/video-length/.
      "Consumers Continue to Seek Influencers Who Keep It Real." Matter Communications, 22 Feb 2023. https://www.matternow.com/blog/consumers-seek-influencers-who-keep-it-real/
      "Contact Center, Communities, & Social Media Software." Khoros, https://khoros.com/about.
      Fennell, Kylie, et al. "Blog." MavSocial, https://mavsocial.com/blog/.
      Fuchs, Jay. "24 Stats That Prove Why You Need a Crisis Management Strategy in 2022." HubSpot Blog, HubSpot, 16 Mar. 2022, https://blog.hubspot.com/service/crisis-management-stats
      Geyser, Werner. "Key Social Commerce Statistics You Should Know in 2022." Influencer Marketing Hub, http://influencermarketinghub.com/social-commerce-stats/
      "Global Crisis Survey 2021: Building resilience for the next normal." PwC, 2021. https://www.pwc.com/ia/es/prensa/pdfs/Global-Crisis-Survey-FINAL-March-18.pdf
      "Global Influencer Marketing Value 2016-2022." Statista, 6 Jan 2023, www.statista.com/statistics/1092819/global-influencer-market-size/.
      "Key Social Commerce Statistics You Should Know in 2023." Influencer Marketing Hub, December 29, 2022. https://influencermarketinghub.com/social-commerce-stats/
      "Khoros - Funding, Financials, Valuation & Investors." Crunchbase, www.crunchbase.com/organization/spredfast/company_financials.
      Lin, Ying. "Social Commerce Market Size (2020–2026) ", Oberlo, Oberlo, www.oberlo.com/statistics/social-commerce-market-size#:~:text=Social%20commerce%20statistics%20show%20that,fastest%20and%20slowest%20growth%20rates.
      Mediakix, "5 Influencer Marketing Case Studies." HubSpot, n.d. https://cdn2.hubspot.net/hubfs/505330/Influencer-Marketing-5-Case-Studies-Ebook.pdf.
      "Our Story: HubSpot - Internet Marketing Company." HubSpot, www.hubspot.com/our-story .
      PricewaterhouseCoopers. "69% Of Business Leaders Have Experienced a Corporate Crisis in the Last Five Years Yet 29% of Companies Have No Staff Dedicated to Crisis Preparedness." PwC, 2019. www.pwc.com/gx/en/news-room/press-releases/2019/global-crisis-survey.html.
      Ferris, Robert. "Duke Player Zion Williamson Injured When Nike Shoe Blows Apart during Game." CNBC, CNBC, 21 Feb. 2019, www.cnbc.com/2019/02/21/duke-player-zion-williamson-injured-when-nike-shoe-blows-apart-in-game.html.
      "Social Engagement & Sales Platform." Sprinklr, www.sprinklr.com/social-engagement/.
      "Social Media Analytics & Reporting for Growing Brands." Buffer, https://buffer.com/analyze
      "Social Media Management and Advertising Tool." MavSocial, 30 July 2022, https://mavsocial.com/
      "Social Media Management Software." HubSpot, www.hubspot.com/products/marketing/social-inbox.
      "Social Media Management Software - Zoho Social." Zoho, www.zoho.com/social/
      "Social Media Management Tool for Agencies & Brands." Sendible, www.sendible.com/.
      "Social Media Management Tools." Sprout Social, 6 Sept. 2022, https://sproutsocial.com/social-media-management/
      "Social Media Marketing & Management Platform For Enterprises." Khoros, khoros.com/platform/social-media-management.
      "Social Media Monitoring Tool." Agorapulse, www.agorapulse.com/features/social-media-monitoring/.
      "Top 12 Moments in SPRINKLR's History." Sprinklr, www.sprinklr.com/blog/12-moments-sprinklr-history/.
      Twitter, BestBuy, https://twitter.com/BestBuyCanada
      "The Ultimate Guide to Hootsuite." Backlinko, 10 Oct. 2022, https://backlinko.com/hub/content/hootsuite
      Widrich, Leo. "From 0 to 1,000,000 Users: The Journey and Statistics of Buffer." Buffer Resources, Buffer Resources, 8 Dec. 2022, buffer.com/resources/from-0-to-1000000-users-the-journey-and-statistics-of-buffer/.
      Yeung, Carmen. "Social Media Crisis Management 3 Examples Done Right." Synthesio, 19 Nov. 2021, www.synthesio.com/blog/social-media-crisis-management/.

      Performance Measurement

      • Buy Link or Shortcode: {j2store}24|cart{/j2store}
      • Related Products: {j2store}24|crosssells{/j2store}
      • member rating overall impact: 9.0/10
      • member rating average dollars saved: $19,436
      • member rating average days saved: 23
      • Parent Category Name: Strategy and Governance
      • Parent Category Link: /strategy-and-governance
      Reinforce service orientation in your IT organization through IT metrics that make value-driven behavior happen..

      Create a Right-Sized Enterprise Architecture Governance Framework

      • Buy Link or Shortcode: {j2store}582|cart{/j2store}
      • member rating overall impact: 9.0/10 Overall Impact
      • member rating average dollars saved: $10,000 Average $ Saved
      • member rating average days saved: 5 Average Days Saved
      • Parent Category Name: Strategy & Operating Model
      • Parent Category Link: /strategy-and-operating-model
      • EA governance is perceived as an unnecessary layer of bureaucracy because business benefits are poorly communicated.
      • The organization doesn’t have a formalized EA practice.
      • Where an EA practice exists, employees are unsure of EA’s roles and responsibilities.

      Our Advice

      Critical Insight

      • Enterprise architecture is not a technical function – it should be business-value driven and forward looking, positioning organizational assets in favor of long-term strategy rather than short-term tactics.

      Impact and Result

      • Value-focused. Focus EA governance on helping the organization achieve business benefits. Promote EA’s contribution in realizing business value.
      • Right-sized. Re-use existing process checkpoints rather than creating new ones. Clearly define EA governance inclusion criteria for projects.
      • Defined and measured process. Define metrics to measure EA’s performance and integrate EA governance with other governance processes such as project governance. Also clearly define the EA governing bodies’ composition, domain, inputs, and outputs.
      • Strike the right balance. Adopt architecture principles that strikes the right balance between business and technology.

      Create a Right-Sized Enterprise Architecture Governance Framework Research & Tools

      Start here – read the Executive Brief

      Read our Executive Brief to find out how implementing a successful enterprise architecture governance framework can benefit your organization.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Current State of EA Governance

      Identify the organization’s standing in terms of the enterprise architecture practice, and know the gaps and what the EA practice needs to fulfill to create a good governance framework.

      • Create a Right-Sized Enterprise Architecture Governance Framework – Phase 1: Current State of EA Governance
      • EA Capability – Risk and Complexity Assessment Tool
      • EA Governance Assessment Tool

      2. EA Fundamentals

      Understand the EA fundamentals and then refresh them to better align the EA practice with the organization and create business benefit.

      • Create a Right-Sized Enterprise Architecture Governance Framework – Phase 2: EA Fundamentals
      • EA Vision and Mission Template
      • EA Goals and Measures Template
      • EA Principles Template

      3. Engagement Model

      Analyze the IT operating model and identify EA’s role at each stage; refine it to promote effective EA engagement upfront in the early stages of the IT operating model.

      • Create a Right-Sized Enterprise Architecture Governance Framework – Phase 3: Engagement Model
      • EA Engagement Model Template

      4. EA Governing Bodies

      Set up EA governing bodies to provide guidance and foster a collaborative environment by identifying the correct number of EA governing bodies, defining the game plan to initialize the governing bodies, and creating an architecture review process.

      • Create a Right-Sized Enterprise Architecture Governance Framework – Phase 4: EA Governing Bodies
      • Architecture Board Charter Template
      • Architecture Review Process Template

      5. EA Policy

      Create an EA policy to provide a set of guidelines designed to direct and constrain the architecture actions of the organization in the pursuit of its goals in order to improve architecture compliance and drive business value.

      • Create a Right-Sized Enterprise Architecture Governance Framework – Phase 5: EA Policy
      • EA Policy Template
      • EA Assessment Checklist Template
      • EA Compliance Waiver Process Template
      • EA Compliance Waiver Form Template

      6. Architectural Standards

      Define architecture standards to facilitate information exchange, improve collaboration, and provide stability. Develop a process to update the architectural standards to ensure relevancy and promote process transparency.

      • Create a Right-Sized Enterprise Architecture Governance Framework – Phase 6: Architectural Standards
      • Architecture Standards Update Process Template

      7. Communication Plan

      Craft a plan to engage the relevant stakeholders, ascertain the benefits of the initiative, and identify the various communication methods in order to maximize the chances of success.

      • Create a Right-Sized Enterprise Architecture Governance Framework – Phase 7: Communication Plan
      • EA Governance Communication Plan Template
      • EA Governance Framework Template
      [infographic]

      Workshop: Create a Right-Sized Enterprise Architecture Governance Framework

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Current State of EA governance (Pre-workshop)

      The Purpose

      Conduct stakeholder interviews to understand current state of EA practice and prioritize gaps for EA governance based on organizational complexity.

      Key Benefits Achieved

      Prioritized list of actions to arrive at the target state based on the complexity of the organization

      Activities

      1.1 Determine organizational complexity.

      1.2 Conduct an assessment of the EA governance components.

      1.3 Identify and prioritize gaps.

      1.4 Conduct senior management interviews.

      Outputs

      Organizational complexity score

      EA governance current state and prioritized list of EA governance component gaps

      Stakeholder perception of the EA practice

      2 EA Fundamentals and Engagement Model

      The Purpose

      Refine EA fundamentals to align the EA practice with the organization and identify EA touchpoints to provide guidance for projects.

      Key Benefits Achieved

      Alignment of EA goals and objectives with the goals and objectives of the organization

      Early involvement of EA in the IT operating model

      Activities

      2.1 Review the output of the organizational complexity and EA assessment tools.

      2.2 Craft the EA vision and mission.

      2.3 Develop the EA principles.

      2.4 Identify the EA goals.

      2.5 Identify EA engagement touchpoints within the IT operating model.

      Outputs

      EA vision and mission statement

      EA principles

      EA goals and measures

      Identified EA engagement touchpoints and EA level of involvement

      3 EA Governing Bodies

      The Purpose

      Set up EA governing bodies to provide guidance and foster a collaborative environment by identifying the correct number of EA governing bodies, defining the game plan to initialize the governing bodies and creating an architecture review process.

      Key Benefits Achieved

      Business benefits are maximized and solution design is within the options set forth by the architectural reference models while no additional layers of bureaucracy are introduced

      Activities

      3.1 Identify the number of governing bodies.

      3.2 Define the game plan to initialize the governing bodies.

      3.3 Define the architecture review process.

      Outputs

      Architecture board structure and coverage

      Identified architecture review template

      4 EA Policy

      The Purpose

      Create an EA policy to provide a set of guidelines designed to direct and constrain the architecture actions of the organization in the pursuit of its goals in order to improve architecture compliance and drive business value.

      Key Benefits Achieved

      Improved architecture compliance, which ties investments to business value and provides guidance to architecture practitioners

      Activities

      4.1 Define the scope.

      4.2 Identify the target audience.

      4.3 Determine the inclusion and exclusion criteria.

      4.4 Craft an assessment checklist.

      Outputs

      Defined scope

      Inclusion and exclusion criteria for project review

      Architecture assessment checklist

      5 Architectural Standards and Communication Plan

      The Purpose

      Define architecture standards to facilitate information exchange, improve collaboration, and provide stability.

      Craft a communication plan to implement the new EA governance framework in order to maximize the chances of success.

      Key Benefits Achieved

      Consistent development of architecture, increased information exchange between stakeholders

      Improved process transparency

      Improved stakeholder engagement

      Activities

      5.1 Identify and standardize EA work products.

      5.2 Classifying the architectural standards.

      5.3 Identifying the custodian of standards.

      5.4 Update the standards.

      5.5 List the changes identified in the EA governance initiative

      5.6 Create a communication plan.

      Outputs

      Identified set of EA work products to standardize

      Architecture information taxonomy

      Identified set of custodian of standards

      Standard update process

      List of EA governance initiatives

      Communication plan for EA governance initiatives

      Further reading

      Create a Right-Sized Enterprise Architecture Governance Framework

      Focus on process standardization, repeatability, and sustainability.

      ANALYST PERSPECTIVE

      "Enterprise architecture is not a technology concept, rather it is the foundation on which businesses orient themselves to create and capture value in the marketplace. Designing architecture is not a simple task and creating organizations for the future requires forward thinking and rigorous planning.

      Architecture processes that are supposed to help facilitate discussions and drive option analysis are often seen as an unnecessary overhead. The negative perception is due to enterprise architecture groups being overly prescriptive rather than providing a set of options that guide and constrain solutions at the same time.

      EA groups should do away with the direct and control mindset and change to a collaborate and mentor mindset. As part of the architecture governance, EA teams should provide an option set that constrains design choices, and also be open to changes to standards or best practices. "

      Gopi Bheemavarapu, Sr. Manager, CIO Advisory Info-Tech Research Group

      Our understanding of the problem

      This Research Is Designed For:

      • CIO
      • IT Leaders
      • Business Leaders
      • Head of Enterprise Architecture
      • Enterprise Architects
      • Domain Architects
      • Solution Architects

      This Research Will Help You:

      • Understand the importance of enterprise architecture (EA) governance and how to apply it to guide architectural decisions.
      • Enhance your understanding of the organization’s current EA governance and identify areas for improvement.
      • Optimize your EA engagement model to maximize value creation.
      • Learn how to set up the optimal number of governance bodies in order to avoid bureaucratizing the organization.

      This Research Will Also Assist:

      • Business Relationship Managers
      • Business Analysts
      • IT Managers
      • Project Managers
      • IT Analysts
      • Quality Assurance Leads
      • Software Developers

      This Research Will Help Them:

      • Give an overview of enterprise architecture governance
      • Clarity on the role of enterprise architecture team

      Executive summary

      Situation

      • Deployed solutions do not meet business objectives resulting in expensive and extensive rework.
      • Each department acts independently without any regular EA touchpoints.
      • Organizations practice project-level architecture as opposed to enterprise architecture.

      Complication

      • EA governance is perceived as an unnecessary layer of bureaucracy because business benefits are poorly communicated.
      • The organization doesn’t have a formalized EA practice.
      • Where an EA practice exists, employees are unsure of EA’s roles and responsibilities.

      Resolution

      • Value-focused. Focus EA governance on helping the organization achieve business benefits. Promote EA’s contribution in realizing business value.
      • Right-sized. Re-use existing process checkpoints, rather than creating new ones. Clearly define EA governance inclusion criteria for projects.
      • Defined and measured process. Define metrics to measure EA’s performance and integrate EA governance with other governance processes such as project governance. Also clearly define the EA governing bodies’ composition, domain, inputs, and outputs.
      • Strike the right balance. Adopt architecture principles that strikes the right balance between business and technology imperatives.

      Info-Tech Insight

      Enterprise architecture is critical to ensuring that an organization has the solid IT foundation it needs to efficiently enable the achievement of its current and future strategic goals rather than focusing on short-term tactical gains.

      What is enterprise architecture governance?

      An architecture governance process is the set of activities an organization executes to ensure that decisions are made and accountability is enforced during the execution of its architecture strategy. (Hopkins, “The Essential EA Toolkit.”)

      EA governance includes the following:

      • Implement a system of controls over the creation and monitoring of all architectural components.
      • Ensure effective introduction, implementation, and evolution of architectures within the organization.
      • Implement a system to ensure compliance with internal and external standards and regulatory obligations.
      • Develop practices that ensure accountability to a clearly identified stakeholder community, both inside and outside the organization.

      (TOGAF)

      IT governance sets direction through prioritization and decision making, and monitors overall IT performance.

      The image shows a circle set within a larger circle. The inner circle is connected to the bottom of the larger circle. The inner circle is labelled EA Governance and the larger circle is labelled IT Governance.

      EA governance ensures that optimal architectural design choices are being made that focus on long-term value creation.

      Harness the benefits of an optimized EA governance

      Core benefits of EA governance are seen through:

      Value creation

      Effective EA governance ensures alignment between organizational investments and corporate strategic goals and objectives.

      Cost reduction

      Architecture standards provide guidance to identify opportunities for reuse and eliminate redundancies in an organization.

      Risk optimization

      Architecture review processes and assessment checklists ensure that solutions are within the acceptable risk levels of the organization.

      EA governance is difficult to structure appropriately, but having an effective structure will allow you to:

      • Achieve business strategy through faster time-to-market innovations and capabilities.
      • Reduced transaction costs with more consistent business processes and information across business units.
      • Lower IT costs due to better traceability, faster design, and lower risk.
      • Link IT investments to organizational strategies and objectives
      • Integrate and institutionalizes IT best practices.
      • Enable the organization to take full advantage of its information, infrastructure, and hardware and software assets.
      • Support regulatory as well as best practice requirements such as auditability, security, responsibility, and accountability.

      Organizations that have implemented EA governance realize greater benefits from their EA programs

      Modern day CIOs of high-performing organizations use EA as a strategic planning discipline to improve business-IT alignment, enable innovation, and link business and IT strategies to execution.

      Recent Info-Tech research found that organizations that establish EA governance realize greater benefits from their EA initiatives.

      The image shows a bar graph, with Impact from EA on the Y-axis, and different initiatives listed on the X-axis. Each initiative has two bars connected to it, with a blue bar representing answers of No and the grey bar representing answers of Yes.

      (Info-Tech Research Group, N=89)

      Measure EA governance implementation effectiveness

      Define key operational measures for internal use by IT and EA practitioners. Also, define business value measures that communicate and demonstrate the value of EA as an “enabler” of business outcomes to senior executives.

      EA performance measures (lead, operational) EA value measures (lag)
      Application of EA management process EA’s contribution to IT performance EA’s contribution to business value

      Enterprise Architecture Management

      • Number of months since the last review of target state EA blueprints.

      IT Investment Portfolio Management

      • Percentage of projects that were identified and proposed by EA.

      Solution Development

      • Number of projects that passed EA reviews.
      • Number of building blocks reused.

      Operations Management

      • Reduction in the number of applications with overlapping functionality.

      Business Value

      • Lower non-discretionary IT spend.
      • Decreased time to production.
      • Higher satisfaction of IT-enabled services.

      An insurance provider adopts a value-focused, right-sized EA governance program

      CASE STUDY

      Industry Insurance

      Source Info-Tech

      Situation

      The insurance sector has been undergoing major changes, and as a reaction, businesses within the sector have been embracing technology to provide innovative solutions.

      The head of EA in a major insurance provider (henceforth to be referred to as “INSPRO01”) was given the mandate to ensure that solutions are architected right the first time to maximize reuse and reduce technology debt. The EA group was at a critical point – to demonstrate business value or become irrelevant.

      Complication

      The project management office had been accountable for solution architecture and had placed emphasis on short-term project cost savings at the expense of long term durability.

      There was a lack of awareness of the Enterprise Architecture group within INSPRO01, and people misunderstood the roles and responsibilities of the EA team.

      Result

      Info-Tech helped define the responsibilities of the EA team and clarify the differences between the role of a Solution Architect vs. Enterprise Architect.

      The EA team was able to make the case for change in the project management practices to ensure architectures are reviewed and approved prior to implementation.

      As a result, INSPRO01 saw substantial increases in reuse opportunities and thereby derived more value from its technology investments.

      Success factors for EA governance

      The success of any EA governance initiative revolves around adopting best practices, setting up repeatable processes, and establishing appropriate controls.

      1. Develop best practices for managing architecture policies, procedures, roles, skills, and organizational structures.
      2. Establish organizational responsibilities and structures to support the architecture governance processes.
      3. Management of criteria for the control of the architecture governance processes, dispensations, compliance assessments, and SLAs.

      Info-Tech’s approach to EA governance

      Our best-practice approach is grounded in TOGAF and enhanced by the insights and guidance from our analysts, industry experts, and our clients.

      Value-focused. Focus EA governance on helping the organization achieve business benefits. Promote EA’s contribution in realizing business value.

      Right-sized. Insert EA governance into existing process checkpoints rather than creating new ones. Clearly define EA governance inclusion criteria for projects.

      Measured. Define metrics to measure EA’s performance, and integrate EA governance with other governance processes such as project governance. Also clearly define the EA governing bodies’ composition, domain, inputs, and outputs.

      Balanced. Adopt architecture principles that strikes the right balance between business and technology.

      Info-Tech’s EA governance framework

      Info-Tech’s architectural governance framework provides a value-focused, right-sized approach with a strong emphasis on process standardization, repeatability, and sustainability.

      1. Current state of EA governance
      2. EA fundamentals
      3. Engagement model
      4. EA governing bodies
      5. EA policy
      6. Architectural standards
      7. Communication Plan

      Use Info-Tech’s templates to complete this project

      1. Current state of EA governance
        • EA Capability - Risk and Complexity Assessment Tool
        • EA Governance Assessment Tool
      2. EA fundamentals
        • EA Vision and Mission Template
        • EA Goals and Measures Template
        • EA Principles Template
      3. Engagement model
        • EA Engagement Model Template
      4. EA governing bodies
        • Architecture Board Charter Template
        • Architecture Review Process Template
      5. EA policy
        • EA Policy Template
        • Architecture Assessment Checklist Template
        • Compliance Waiver Process Template
        • Compliance Waiver Form Template
      6. Architectural standards
        • Architecture Standards Update Process Template
      7. Communication Plan
        • EA Governance Communication Plan Template
        • EA Governance Framework Template

      As you move through the project, capture your progress with a summary in the EA Governance Framework Template.

      Download the EA Governance Framework Template document for use throughout this project.

      Info-Tech offers various levels of support to best suit your needs

      DIY Toolkit

      “Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful.”

      Guided Implementation

      “Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track.”

      Workshop

      “We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place.”

      Consulting

      “Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project.”

      Diagnostics and consistent frameworks used throughout all four options

      EA governance framework – phase-by-phase outline (1/2)

      Current state of EA governance EA Fundamentals Engagement Model EA Governing Bodies
      Best-Practice Toolkit

      1.1 Determine organizational complexity

      1.2 Conduct an assessment of the EA governance components

      1.3 Identify and prioritize gaps

      2.1 Craft the EA vision and mission

      2.2 Develop the EA principles

      2.3 Identify the EA goals

      3.1 Build the case for EA engagement

      3.2 Identify engagement touchpoints within the IT operating model

      4.1 Identify the number of governing bodies

      4.2 Define the game plan to initialize the governing bodies

      4.3 Define the architecture review process

      Guided Implementations
      • Determine organizational complexity
      • Assess current state of EA governance
      • Develop the EA fundamentals
      • Review the EA fundamentals
      • Review the current IT operating model
      • Determine the target engagement model
      • Identify architecture boards and develop charters
      • Develop an architecture review process

      Phase 1 Results:

      • EA Capability - risk and complexity assessment
      • EA governance assessment

      Phase 2 Results:

      • EA vision and mission
      • EA goals and measures
      • EA principles

      Phase 3 Results:

      • EA engagement model

      Phase 4 Results:

      • Architecture board charter
      • Architecture review process

      EA governance framework – phase-by-phase outline (2/2)

      EA Policy Architectural Standards Communication Plan
      Best-Practice Toolkit

      5.1 Define the scope of EA policy

      5.2 Identify the target audience

      5.3 Determine the inclusion and exclusion criteria

      5.4 Craft an assessment checklist

      6.1 Identify and standardize EA work products

      6.2 Classify the architectural standards

      6.3 Identify the custodian of standards

      6.4 Update the standards

      7.1 List the changes identified in the EA governance initiative

      7.2 Identify stakeholders

      7.3 Create a communication plan

      Guided Implementations
      • EA policy, assessment checklists, and decision types
      • Compliance waivers
      • Understand architectural standards
      • EA repository and updating the standards
      • Create a communication plan
      • Review the communication plan

      Phase 5 Results:

      • EA policy
      • Architecture assessment checklist
      • Compliance waiver process
      • Compliance waiver form

      Phase 6 Results:

      • Architecture standards update process

      Phase 7 Results:

      • Communication plan
      • EA governance framework

      Workshop overview

      Contact your account representative or email Workshops@InfoTech.com for more information.

      Pre-workshopWorkshop Day 1Workshop Day 2Workshop Day 3Workshop Day 4
      ActivitiesCurrent state of EA governance EA fundamentals and engagement model EA governing bodies EA policy Architectural standards and

      communication plan

      1.1 Determine organizational complexity

      1.2 Conduct an assessment of the EA governance components

      1.3 Identify and prioritize gaps

      1.4 Senior management interviews

      1. Review the output of the organizational complexity and EA assessment tools
      2. Craft the EA vision and mission
      3. Develop the EA principles.
      4. Identify the EA goals
      5. Identify EA engagement touchpoints within the IT operating model
      1. Identify the number of governing bodies
      2. Define the game plan to initialize the governing bodies
      3. Define the architecture review process
      1. Define the scope
      2. Identify the target audience
      3. Determine the inclusion and exclusion criteria
      4. Craft an assessment checklist
      1. Identify and standardize EA work products
      2. Classifying the architectural standards
      3. Identifying the custodian of standards
      4. Updating the standards
      5. List the changes identified in the EA governance initiative
      6. Identify stakeholders
      7. Create a communication plan
      Deliverables
      1. EA Capability - risk and complexity assessment tool
      2. EA governance assessment tool
      1. EA vision and mission template
      2. EA goals and measures template
      3. EA principles template
      4. EA engagement model template
      1. Architecture board charter template
      2. Architecture review process template
      1. EA policy template
      2. Architecture assessment checklist template
      3. Compliance waiver process template
      4. Compliance waiver form template
      1. Architecture standards update process template
      2. Communication plan template

      Phase 1

      Current State of EA Governance

      Create a Right-Sized Enterprise Architecture Governance Framework

      Current State of EA Governance

      1. Current State of EA Governance
      2. EA Fundamentals
      3. Engagement Model
      4. EA Governing Bodies
      5. EA Policy
      6. Architectural Standards
      7. Communication Plan

      This phase will walk you through the following activities:

      • Determine organizational complexity
      • Conduct an assessment of the EA governance components
      • Identify and prioritize gaps

      This step involves the following participants:

      • CIO
      • IT Leaders
      • Business Leaders
      • Head of Enterprise Architecture
      • Enterprise Architects
      • Domain Architects
      • Solution Architects

      Outcomes of this step

      • Prioritized list of gaps

      Info-Tech Insight

      Correlation is not causation – an apparent problem might be a symptom rather than a cause. Assess the organization’s current EA governance to discover the root cause and go beyond the symptoms.

      Phase 1 guided implementation outline

      Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.

      Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.

      Guided Implementation 1: Current State of EA Governance

      Proposed Time to Completion: 2 weeks

      Step 1.1: Determine organizational complexity

      Start with an analyst kick-off call:

      • Discuss how to use Info-Tech’s EA Capability – Risk and Complexity Assessment Tool.
      • Discuss how to complete the inputs on the EA Governance Assessment Tool.

      Then complete these activities…

      • Conduct an assessment of your organization to determine its complexity.
      • Assess the state of EA governance within your organization.

      With these tools & templates:

      • EA Capability – Risk and Complexity Assessment Tool
      • EA Governance Assessment Tool

      Step 1.2: Assess current state of EA governance

      Start with an analyst kick-off call:

      • Review the output of the EA governance assessment and gather feedback on your goals for the EA practice.

      Then complete these activities…

      • Discuss whether you are ready to proceed with the project.
      • Review the list of tasks and plan your next steps.

      With these tools & templates:

      • EA Governance Assessment Tool

      Right-size EA governance based on organizational complexity

      Determining organizational complexity is not rocket science. Use Info-Tech’s tool to quantify the complexity and use it, along with common sense, to determine the appropriate level of architecture governance.

      Info-Tech’s methodology uses six factors to determine the complexity of the organization:

      1. The size of the organization, which can often be denoted by the revenue, headcount, number of applications in use, and geographical diversity.
      2. The solution alignment factor helps indicate the degree to which various projects map to the organization’s strategy.
      3. The size and complexity of the IT infrastructure and networks.
      4. The portfolio of applications maintained by the IT organization.
      5. Key changes within the organization such as M&A, regulatory changes, or a change in business or technology leadership.
      6. Other negative influences that can adversely affect the organization.

      Determine your organization’s level of complexity

      1.1 2 hours

      Input

      • Group consensus on the current state of EA competencies.

      Output

      • A list of gaps that need to be addressed for EA governance competencies.

      Materials

      • Info-Tech’s EA assessment tool, a computer, and/or a whiteboard and marker.

      Participants

      • EA team, business line leads, IT department leads.

      The image shows a screenshot of the Table of Contents with the EA Capability section highlighted.

      Step 1 - Facilitate

      Download the EA Capability – Risk and Complexity Assessment Tool to facilitate a session on determining your organization’s complexity.

      Download EA Organizational - Risk and Complexity Assessment Tool

      Step 2 - Summarize

      Summarize the results in the EA governance framework document.

      Update the EA Governance Framework Template

      Understand the components of effective EA governance

      EA governance is multi-faceted and it facilitates effective use of resources to meet organizational strategic objectives through well-defined structural elements.

      EA Governance

      • Fundamentals
      • Engagement Model
      • Policy
      • Governing Bodies
      • Architectural Standards

      Components of architecture governance

      1. EA vision, mission, goals, metrics, and principles that provide a direction for the EA practice.
      2. An engagement model showing where and in what fashion EA is engaged in the IT operating model.
      3. An architecture policy formulated and enforced by the architectural governing bodies to guide and constrain architectural choices in pursuit of strategic goals.
      4. Governing bodies to assess projects for compliance and provide feedback.
      5. Architectural standards that codify the EA work products to ensure consistent development of architecture.

      Next Step: Based on the organization’s complexity, conduct a current state assessment of EA governance using Info-Tech’s EA Governance Assessment Tool.

      Assess the components of EA governance in your organization

      1.2 2 hrs

      Input

      • Group consensus on the current state of EA competencies.

      Output

      • A list of gaps that need to be addressed for EA governance competencies.

      Materials

      • Info-Tech’s EA assessment tool, a computer, and/or a whiteboard and marker.

      Participants

      • EA team, business line leads, IT department leads.

      The image shows a screenshot of the Table of Contents with the EA Governance section highlighted.

      Step 1 - Facilitate

      Download the “EA Governance Assessment Tool” to facilitate a session on identifying the best practices to be applied in your organization.

      Download Info-Tech’s EA Governance Assessment Tool

      Step 2 - Summarize

      Summarize the identified best practices in the EA governance framework document.

      Update the EA Governance Framework Template


      Conduct a current state assessment to identify limitations of the existing EA governance framework

      CASE STUDY

      Industry Insurance

      Source Info-Tech

      Situation

      INSPRO01 was planning a major transformation initiative. The organization determined that EA is a strategic function.

      The CIO had pledged support to the EA group and had given them a mandate to deliver long-term strategic architecture.

      The business leaders did not trust the EA team and believed that lack of business skills in the group put the business transformation at risk.

      Complication

      The EA group had been traditionally seen as a technology organization that helps with software design.

      The EA team lacked understanding of the business and hence there had been no common language between business and technology.

      Result

      Info-Tech helped the EA team create a set of 10 architectural principles that are business-value driven rather than technical statements.

      The team socialized the principles with the business and technology stakeholders and got their approvals.

      By applying the business focused architectural principles, the EA team was able to connect with the business leaders and gain their support.

      If you want additional support, have our analysts guide you through this phase as part of an Info-Tech workshop

      Book a workshop with our Info-Tech analysts:

      • To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team.
      • Info-Tech analysts will join you and your team onsite at your location or welcome you to Info-Tech’s historic Toronto office to participate in an innovative onsite workshop.
      • Contact your account manager (www.infotech.com/account), or email Workshops@InfoTech.com for more information.

      The following are sample activities that will be conducted by Info-Tech analysts with your team:

      Key Activities

      • Determine organizational complexity.
      • Conduct an assessment of the EA governance components.
      • Identify and prioritize gaps.

      Outcomes

      • Organizational complexity assessment
      • EA governance capability assessment
      • A prioritized list of capability gaps

      Phase 2

      EA Fundamentals

      Create a Right-Sized Enterprise Architecture Governance Framework

      EA Fundamentals

      1. Current State of EA Governance
      2. EA Fundamentals
      3. Engagement Model
      4. EA Governing Bodies
      5. EA Policy
      6. Architectural Standards
      7. Communication Plan

      This phase will walk you through the following activities:

      • Craft the EA vision and mission
      • Develop the EA principles.
      • Identify the EA goals

      This step involves the following participants:

      • CIO
      • IT Leaders
      • Business Leaders
      • Head of Enterprise Architecture
      • Enterprise Architects
      • Domain Architects
      • Solution Architects

      Outcomes of this step

      • Refined set of EA fundamentals to support the building of EA governance

      Info-Tech Insight

      A house divided against itself cannot stand – ensure that the EA fundamentals are aligned with the organization’s goals and objectives.

      Phase 2 guided implementation outline

      Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.

      Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.

      Guided Implementation 2: EA Fundamentals

      Proposed Time to Completion: 3 weeks

      Step 2.1: Develop the EA fundamentals

      Review findings with analyst:

      • Discuss the importance of the EA fundamentals – vision, mission, goals, measures, and principles.
      • Understand how to align the EA vision, mission, goals, and measures to your organization’s vision, mission, goals, measures, and principles.

      Then complete these activities…

      • Develop the EA vision statements.
      • Craft the EA mission statements.
      • Define EA goals and measures.
      • Adopt EA principles.

      With these tools & templates:

      • EA Vision and Mission Template
      • EA Principles Template
      • EA Goals and Measures Template

      Step 2.2: Review the EA fundamentals

      Review findings with analyst:

      • Review the EA fundamentals in conjunction with the results of the EA governance assessment tool and gather feedback.

      Then complete these activities…

      • Refine the EA vision, mission, goals, measures, and principles.
      • Review the list of tasks and plan your next steps.

      With these tools & templates:

      • EA Vision and Mission Template
      • EA Principles Template
      • EA Goals and Measures Template

      Fundamentals of an EA organization

      Vision, mission, goals and measures, and principles form the foundation of the EA function.

      Factors to consider when developing the vision and mission statements

      The vision and mission statements provide strategic direction to the EA team. These statements should be created based on the business and technology drivers in the organization.

      Business Drivers

      • Business drivers are factors that determine, or cause, an increase in value or major improvement of a business.
      • Examples of business drivers include:
        • Increased revenue
        • Customer retention
        • Salesforce effectiveness
        • Innovation

      Technology Drivers

      • Technology drivers are factors that are vital for the continued success and growth of a business using effective technologies.
      • Examples of technology drivers include:
        • Enterprise integration
        • Information security
        • Portability
        • Interoperability

      "The very essence of leadership is [that] you have a vision. It's got to be a vision you articulate clearly and forcefully on every occasion. You can't blow an uncertain trumpet." – Theodore Hesburgh

      Develop vision, mission, goals, measures, and principles to define the EA capability direction and purpose

      EA capability vision statement

      Articulates the desired future state of EA capability expressed in the present tense.

      • What will be the role of EA capability?
      • How will EA capability be perceived?

      Example: To be recognized by both the business and IT as a trusted partner that drives [Company Name]’s effectiveness, efficiency, and agility.

      EA capability mission statement

      Articulates the fundamental purpose of the EA capability.

      • Why does EA capability exist?
      • What does EA capability do to realize its vision?
      • Who are the key customers of the EA capability?

      Example: Define target enterprise architecture for [Company Name], identify solution opportunities, inform IT investment management, and direct solution development, acquisition, and operation compliance.

      EA capability goals and measures

      EA capability goals define specific desired outcomes of an EA management process execution. EA capability measures define how to validate the achievement of the EA capability goals.

      Example:

      Goal: Improve reuse of IT assets at [Company Name].

      Measures:

      • The number of building blocks available for reuse.
      • Percent of projects that utilized existing building blocks.
      • Estimated efficiency gain (= effort to create a building block * reuse count).

      EA principles

      EA principles are shared, long-lasting beliefs that guide the use of IT in constructing, transforming, and operating the enterprise by informing and restricting target-state enterprise architecture design, solution development, and procurement decisions.

      Example:

      • EA principle name: Reuse.
      • Statement: Maximize reuse of existing assets.
      • Rationale: Reuse prevents duplication of development and support efforts, increasing efficiency, and agility.
      • Implications: Define architecture and solution building blocks and ensure their consistent application.

      EA principles guide decision making

      Policies can be seen as “the letter of the law,” whereas EA principles summarize “the spirit of the law.”

      The image shows a graphic with EA Principles listed at the top, with an arrow pointing down to Decisions on the use of IT. At the bottom are domain-specific policies, with two arrows pointing upwards: the arrow on the left is labelled direct, and the arrow on the right is labelled control. The arrow points up to the label Decisions on the use of IT. On the left, there is an arrow pointing both up and down. At the top it is labelled The spirit of the law, and at the bottom, The letter of the law. On the right, there is another arrow pointing both up and down, labelled How should decisions be made at the top and labelled Who has the accountability and authority to make decisions? at the bottom.

      Define EA capability goals and related measures that resonate with EA capability stakeholders

      EA capability goals, i.e. specific desired outcomes of an EA management process execution. Use COBIT 5, APO03 process goals, and metrics as a starting point.

      The image shows a chart titled Manage Enterprise Architecture.

      Define relevant business value measures to collect indirect evidence of EA’s contribution to business benefits

      Define key operational measures for internal use by IT and EA practitioners. Also, define business value measures that communicate and demonstrate the value of EA as an enabler of business outcomes to senior executives.

      EA performance measures (lead, operational) EA value measures (lag)
      Application of EA management process EA’s contribution to IT performance EA’s contribution to business value

      Enterprise Architecture Management

      • Number of months since the last review of target state EA blueprints.

      IT Investment Portfolio Management

      • Percentage of projects that were identified and proposed by EA.

      Solution Development

      • Number of projects that passed EA reviews.
      • Number of building blocks reused.

      Operations Management

      • Reduction in the number of applications with overlapping functionality.

      Business Value

      • Lower non-discretionary IT spend.
      • Decreased time to production.
      • Higher satisfaction of IT-enabled services.

      Refine the organization’s EA fundamentals

      2.1 2 hrs

      Input

      • Group consensus on the current state of EA competencies.

      Output

      • A list of gaps that need to be addressed for EA governance competencies.

      Materials

      • Info-Tech’s EA assessment tool, a computer, and/or a whiteboard and marker.

      Participants

      • EA team, business line leads, IT department leads.

      The image shows the Table of Contents with four sections highlighted, beginning with EA Vision Statement and ending with EA Goals and Measures.

      Step 1 - Facilitate

      Download the three templates and hold a working session to facilitate a session on creating EA fundamentals.

      Download the EA Vision and Mission Template, the EA Principles Template, and the EA Goals and Measures Template

      Step 2 - Summarize

      Document the final vision, mission, principles, goals, and measures within the EA Governance Framework.

      Update the EA Governance Framework Template


      Ensure that the EA fundamentals are aligned to the organizational needs

      CASE STUDY

      Industry Insurance

      Source Info-Tech

      Situation

      The EA group at INSPRO01 was being pulled in multiple directions with requests ranging from architecture review to solution design to code reviews.

      Project level architecture was being practiced with no clarity on the end goal. This led to EA being viewed as just another IT function without any added benefits.

      Info-Tech recommended that the EA team ensure that the fundamentals (vision, mission, principles, goals, and measures) reflect what the team aspired to achieve before fixing any of the process concerns.

      Complication

      The EA team was mostly comprised of technical people and hence the best practices outlined were not driven by business value.

      The team had no documented vision and mission statements in place. In addition, the existing goals and measures were not tied to the business strategic objectives.

      The team had architectural principles documented, but there were too many and they were very technical in nature.

      Result

      With Info-Tech’s guidance, the team developed a vision and mission statement to succinctly communicate the purpose of the EA function.

      The team also reduced and simplified the EA principles to make sure they were value driven and communicated in business terms.

      Finally, the team proposed goals and measures to track the performance of the EA team.

      With the fundamentals in place, the team was able to show the value of EA and gain organization-wide acceptance.

      If you want additional support, have our analysts guide you through this phase as part of an Info-Tech workshop

      Book a workshop with our Info-Tech analysts:

      • To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team.
      • Info-Tech analysts will join you and your team onsite at your location or welcome you to Info-Tech’s historic Toronto office to participate in an innovative onsite workshop.
      • Contact your account manager (www.infotech.com/account), or email Workshops@InfoTech.com for more information.

      The following are sample activities that will be conducted by Info-Tech analysts with your team:

      Key Activities

      • Craft the EA vision and mission.
      • Develop the EA principles.
      • Identify the EA goals.

      Outcomes

      • Refined set of EA fundamentals to support the building of EA governance.

      Phase 3

      Engagement Model

      Create a Right-Sized Enterprise Architecture Governance Framework

      Engagement Model

      1. Current state of EA governance
      2. EA fundamentals
      3. Engagement model
      4. EA governing bodies
      5. EA policy
      6. Architectural standards
      7. Communication Plan

      This step will walk you through the following activities:

      • Build the case for EA engagement
      • Engagement touchpoints within the IT operating model

      This step involves the following participants:

      • CIO
      • IT Leaders
      • Business Leaders
      • Head of Enterprise Architecture
      • Enterprise Architects
      • Domain Architects
      • Solution Architects

      Outcomes of this step

      • Summary of the assessment of the current EA engagement model
      • Target EA engagement model

      Info-Tech Insight

      Perform due diligence prior to decision making. Use the EA Engagement Model to promote conversations between stage gate meetings as opposed to having the conversation during the stage gate meetings.

      Phase 3 guided implementation outline

      Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.

      Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.

      Guided Implementation 3: EA engagement model

      Proposed Time to Completion: 2 weeks

      Step 3.1 Review the current IT operating model

      Start with an analyst kick-off call:

      • Review Info-Tech’s IT operating model.
      • Understand how to document your organization’s IT operating model.
      • Document EA’s current role and responsibility at each stage of the IT operating model.

      Then complete these activities…

      • Document your organization’s IT operating model.

      With these tools & templates:

      • EA Engagement Model Template

      Step 3.2: Determine the target engagement model

      Review findings with analyst:

      • Review your organization’s current state IT operating model.
      • Review your EA’s role and responsibility at each stage of the IT operating model.
      • Document the role and responsibility of EA in the future state.

      Then complete these activities…

      • Document EA’s future role within each stage of your organization’s IT operating model.

      With these tools & templates:

      • EA Engagement Model Template.

      The three pillars of EA Engagement

      Effective EA engagement revolves around three basic principles – generating business benefits, creating adaptable models, and being able to replicate the process across the organization.

      Business Value Driven

      Focus on generating business value from organizational investments.

      Repeatable

      Process should be standardized, transparent, and repeatable so that it can be consistently applied across the organization.

      Flexible

      Accommodate the varying needs of projects of different sizes.

      Where these pillars meet: Advocates long-term strategic vs. short-term tactical solutions.

      EA interaction points within the IT operating model

      EA’s engagement in each stage within the plan, build, and run phases should be clearly defined and communicated.

      Plan Strategy Development Business Planning Conceptualization Portfolio Management
      Build Requirements Solution Design Application Development/ Procurement Quality Assurance
      Run Deploy Operate

      Document the organization’s current IT operating model

      3.1 2-3 hr

      Input

      • IT project lifecycle

      Output

      • Organization’s current IT operating model.

      Materials

      • A computer, and/or a whiteboard and marker.

      Participants

      • EA team, IT department leads, business leaders.

      Instructions:

      Hold a working session with the participants to document the current IT operating model. Facilitate the activity using the following steps:

      1. Map out the IT operating model.

      1. Find a project that was just deployed within the organization and backtrack every step of the way to the strategy development that resulted in the conception of the project.
      2. Interview the personnel involved with each step of the process to get a sense of whether or not projects usually move to deployment going through these steps.
      3. Review Info-Tech’s best-practice IT operating model presented in the EA Engagement Model Template, and add or remove any steps to the existing organization’s IT operating model as necessary. Document the finalized steps of the IT operating model.

      2. Determine EA’s current role in the operating model.

      1. Interview EA personnel through each step of the process and ask them their role. This is to get a sense of the type of input that EA is having into each step of the process.
      2. Using the EA Engagement Model Template, document the current role of EA in each step of the organization’s IT operation as you complete the interviews.

      Download the EA Engagement Model Template to document the organization’s current IT operating model.

      Define RACI in every stage of the IT operating model (e.g. EA role in strategy development phase of the IT operating model is presented below)

      Strategy Development

      Also known as strategic planning, strategy development is fundamental to creating and running a business. It involves the creation of a longer-term game plan or vision that sets specific goals and objectives for a business.

      R Those in charge of performing the task. These are the people actively involved in the completion of the required work. Business VPs, EA, IT directors R
      A The one ultimately answerable for the correct and thorough completion of the deliverable or task, and the one who delegates the work to those responsible. CEO A
      C Those whose opinions are sought before a decision is made, and with whom there is two-way communication. PMO, Line managers, etc. C
      I Those who are kept up to date on progress, and with whom there is one-way communication. Development managers, etc. I

      Next Step: Similarly define the RACI for each stage of the IT operating model; refer to the activity slide for prompts.

      Best practices on the role of EA within the IT operating model

      Plan

      Strategy Development

      C

      Business Planning

      C

      Conceptualization

      A

      Portfolio Management

      C

      Build

      Requirements

      C

      Solution Design

      R

      Application Development/ Procurement

      R

      Quality Assurance

      I

      Run

      Deploy

      I

      Operate

      I

      Next Step: Define the role of EA in each stage of the IT operating model; refer to the activity slide for prompts.

      Define EA’s target role in each step of the IT operating model

      3.2 2 hrs

      Input

      • Organization’s IT operating model.

      Output

      • Organization’s EA engagement model.

      Materials

      • A computer, and/or a whiteboard and marker.

      Participants

      • EA team, CIO, business leaders, IT department leaders.

      The image shows the Table of Contents for the EA Engagement Model Template with the EA Engagement Summary section highlighted.

      Step 1 - Facilitate

      Download the EA Engagement Model Template and hold a working session to define EA’s target role in each step of the IT operating model.

      Download the EA Engagement Model Template

      Step 2 - Summarize

      Document the target state role of EA within the EA Governance Framework document.

      Update the EA Governance Framework Template


      Design an EA engagement model to formalize EA’s role within the IT operating model

      CASE STUDY

      Industry Insurance

      Source Info-Tech

      Situation

      INSPRO01 had a high IT cost structure with looming technology debt due to a preference for short-term tactical gains over long-term solutions.

      The business satisfaction with IT was at an all-time low due to expensive solutions that did not meet business needs.

      INSPRO01’s technology landscape was in disarray with many overlapping systems and interoperability issues.

      Complication

      No single team within the organization had an end-to-end perspective all the way from strategy to project execution. A lot of information was being lost in handoffs between different teams.

      This led to inconsistent design/solution patterns being applied. Investment decisions had not been grounded in reality and this often led to cost overruns.

      Result

      Info-Tech helped INSPRO01 identify opportunities for EA team engagement at different stages of the IT operating model. EA’s role within each stage was clearly defined and documented.

      With Info-Tech’s help, the EA team successfully made the case for engagement upfront during strategy development rather than during project execution.

      The increased transparency enabled the EA team to ensure that investments were aligned to organizational strategic goals and objectives.

      If you want additional support, have our analysts guide you through this phase as part of an Info-Tech workshop

      Book a workshop with our Info-Tech analysts:

      • To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team.
      • Info-Tech analysts will join you and your team onsite at your location or welcome you to Info-Tech’s historic Toronto office to participate in an innovative onsite workshop.
      • Contact your account manager (www.infotech.com/account), or email Workshops@InfoTech.com for more information.

      The following are sample activities that will be conducted by Info-Tech analysts with your team:

      Key Activities

      • Build the case for EA engagement.
      • Identify engagement touchpoints within the IT operating model.

      Outcomes

      • Summary of the assessment of the current EA engagement model
      • Target EA engagement model

      Phase 4

      EA Governing Bodies

      Create a Right-Sized Enterprise Architecture Governance Framework

      EA Governing Bodies

      1. Current state of EA governance
      2. EA fundamentals
      3. Engagement model
      4. EA governing bodies
      5. EA policy
      6. Architectural standards
      7. Communication Plan

      This phase will walk you through the following activities:

      • Identify the number of governing bodies
      • Define the game plan to initialize the governing bodies
      • Define the architecture review process

      This step involves the following participants:

      • CIO
      • IT Leaders
      • Business Leaders
      • Head of Enterprise Architecture
      • Enterprise Architects
      • Domain Architects
      • Solution Architects

      Outcomes of this step

      • Charter definition for each EA governance board

      Info-Tech Insight

      Use architecture governance like a scalpel rather than a hatchet. Implement governing bodies to provide guidance rather than act as a police force.

      Phase 4 guided implementation

      Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.

      Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.

      Guided Implementation 4: Create or identify EA governing bodies

      Proposed Time to Completion: 2 weeks

      Step 4.1: Identify architecture boards and develop charters

      Start with an analyst kick-off call:

      • Understand the factors influencing the number of governing bodies required for an organization.
      • Understand the components of a governing body charter.

      Then complete these activities…

      • Identify how many governing bodies are needed.
      • Define EA governing body composition, meeting frequency, and domain of coverage.
      • Define the inputs and outputs of each EA governing body.
      • Identify mandatory inclusion criteria.

      With these tools & templates:

      • Architecture Board Charter Template

      Step 4.2: Develop an architecture review process

      Follow-up with an analyst call:

      • Review the number of boards identified for your organization and gather feedback.
      • Review the charters developed for each governing body and gather feedback.
      • Understand the various factors that impact the architecture review process.
      • Review Info-Tech’s best-practice architecture review process.

      Then complete these activities…

      • Refine the charters for governing bodies.
      • Develop the architecture review process for your organization.

      With these tools & templates:

      • Architecture Review Process Template

      Factors that determine the number of architectural boards required

      The primary purpose of architecture boards is to ensure that business benefits are maximized and solution design is within the options set forth by the architectural reference models without introducing additional layers of bureaucracy.

      The optimal number of architecture boards required in an organization is a function of the following factors:

      • EA organization model
        • Distributed
        • Federated
        • Centralized
      • Architecture domains Maturity of architecture domains
      • Project throughput

      Commonly observed architecture boards:

      • Architecture Review Board
      • Technical Architecture Committee
      • Data Architecture Review Board
      • Infrastructure Architecture Review Board
      • Security Architecture Review Board

      Info-Tech Insight

      Before building out a new governance board, start small by repurposing existing forums by adding architecture as an agenda item. As the items for review increase consider introducing dedicated governing bodies.

      EA organization model drives the architecture governance structure

      EA teams can be organized in three ways – distributed, federated, and centralized. Each model has its own strengths and weaknesses. EA governance must be structured in a way such that the strengths are harvested and the weaknesses are mitigated.

      Distributed Federated Centralized
      EA org. structure
      • No overarching EA team exists and segment architects report to line of business (LOB) executives.
      • A centralized EA team exists with segment architects reporting to LOB executives and dotted-line to head of (centralized) EA.
      • A centralized EA capability exists with enterprise architects reporting to the head of EA.
      Implications
      • Produces a fragmented and disjointed collection of architectures.
      • Economies of scale are not realized.
      • High cross-silo integration effort.
      • LOB-specific approach to EA.
      • Requires dual reporting relationships.
      • Additional effort is required to coordinate centralized EA policies and blueprints with segment EA policies and blueprints.
      • Accountabilities may be unclear.
      • Can be less responsive to individual LOB needs, because the centralized EA capability must analyze needs of multiple LOBs and various trade-off options to avoid specialized, one-off solutions.
      • May impede innovation.
      Architectural boards
      • Cross LOB working groups to create architecture standards, patterns, and common services.
      • Local boards to support responsiveness to LOB-specific needs.
      • Cross LOB working groups to create architecture standards, patterns and common services.
      • Cross-enterprise boards to ensure adherence to enterprise standards and reduce integration costs.
      • Local boards to support responsiveness to LOB specific needs.
      • Enterprise working groups to create architecture standards, patterns, and all services.
      • Central board to ensure adherence to enterprise standards.

      Architecture domains influences the number of architecture boards required

      • An architecture review board (ARB) provides direction for domain-specific boards and acts as an escalation point. The ARB must have the right mix of both business and technology stakeholders.
      • Domain-specific boards provide a platform to have focused discussions on items specific to that domain.
      • Based on project throughput and the maturity of each domain, organizations would have to pick the optimal number of boards.
      • Architecture working groups provide a platform for cross-domain conversations to establish organization wide standards.
      Level 1 Architecture Review Board IT and Business Leaders
      Level 2 Business Architecture Board Data Architecture Board Application Architecture Board Infrastructure Architecture Board Security Architecture Board IT and Business Managers
      Level 3 Architecture Working Groups Architects

      Create a game plan for the architecture boards

      • Start with a single board for each level – an architecture review board (ARB), a technical architecture committee (TAC), and architecture working groups.
      • As the organization matures and the number of requests to the TAC increase, consider creating domain-specific boards – such as business architecture, data architecture, application architecture, etc. – to handle architecture decisions pertaining to that domain.

      Start with this:

      Level 1 Architecture Review Board
      Level 2 Technical Architecture Committee
      Level 3 Architecture Working Groups

      Change to this:

      Architecture Review Board IT and Business Leaders
      Business Architecture Board Data Architecture Board Application Architecture Board Infrastructure Architecture Board Security Architecture Board IT and Business Managers
      Architecture Working Groups Architects

      Architecture boards have different objectives and activities

      The boards at each level should be set up with the correct agenda – ensure that the boards’ composition and activities reflect their objective. Use the entry criteria to communicate the agenda for their meetings.

      Architecture Review Board Technical Architecture Committee
      Objective
      • Evaluates business strategy, needs, and priorities, sets direction and acts as a decision making authority of the EA capability.
      • Directs the development of target state architecture.
      • Monitors performance and compliance of the architectural standards.
      • Monitor project solution architecture compliance to standards, regulations, EA principles, and target state EA blueprints.
      • Review EA compliance waiver requests, make recommendations, and escalate to the architecture review board (ARB).
      Composition
      • Business Leadership
      • IT Leadership
      • Head of Enterprise Architecture
      • Business Managers
      • IT Managers
      • Architects
      Activities
      • Review compliance of conceptual solution to standards.
      • Discuss the enterprise implications of the proposed solution.
      • Select and approve vendors.
      • Review detailed solution design.
      • Discuss the risks of the proposed solution.
      • Discuss the cost of the proposed solution.
      • Review and recommend vendors.
      Entry Criteria
      • Changes to IT Enterprise Technology Policy.
      • Changes to the technology management plan.
      • Approve changes to enterprise technology inventory/portfolio.
      • Ongoing operational cost impacts.
      • Detailed estimates for the solution are ready for review.
      • There are significant changes to protocols or technologies responsible for solution.
      • When the project is deviating from baselined architectures.

      Identify the number of governing bodies

      4.1 2 hrs

      Input

      • EA Vision and Mission
      • EA Engagement Model

      Output

      • A list of EA governing bodies.

      Materials

      • A computer, and/or a whiteboard and marker.

      Participants

      • EA team, CIO, business line leads, IT department leads.

      Instructions:

      Hold a working session with the participants to identify the number of governing bodies. Facilitate the activity using the following steps:

      1. Examine the EA organization models mentioned previously. Assess how your organization is structured, and identify whether your organization has a federated, distributed or centralized EA organization model.
      2. Reference the “Game plan for the architecture boards” slide. Assess the architecture domains, and define how many there are in the organization.
      3. Architecture domains:
        1. If no defined architecture domains exist, model the number of governing bodies in the organization based on the “Start with this” scenario in the “Game plan for the architecture boards” slide.
        2. If defined architecture domains do exist, model the number of governing bodies based on the “Change to this” scenario in the “Game plan for the architecture boards” slide.
      4. Name each governing body you have defined in the previous step. Download Info-Tech’s Architecture Board Charter Template for each domain you have named. Input the names into the title of each downloaded template.

      Download the Architecture Board Charter Template to document this activity.

      Defining the governing body charter

      The charter represents the agreement between the governing body and its stakeholders about the value proposition and obligations to the organization.

      1. Purpose: The reason for the existence of the governing body and its goals and objectives.
      2. Composition: The members who make up the committee and their roles and responsibilities in it.
      3. Frequency of meetings: The frequency at which the committee gathers to discuss items and make decisions.
      4. Entry/Exit Criteria: The criteria by which the committee selects items for review and items for which decisions can be taken.
      5. Inputs: Materials that are provided as inputs for review and decision making by the committee.
      6. Outputs: Materials that are provided by the committee after an item has been reviewed and the decision made.
      7. Activities: Actions undertaken by the committee to arrive at its decision.

      Define EA’s target role in each step of the IT operating model

      4.2 3 hrs

      Input

      • A list of all identified EA governing bodies.

      Output

      • Charters for each EA governing bodies.

      Materials

      • A computer, and/or a whiteboard and marker.

      Participants

      • EA team, business line leads, IT department leads.

      The image shows the Table of Contents for the EA Governance Framework document, with the Architecture Board Charters highlighted.

      Step 1 Facilitate

      Hold a working session with the stakeholders to define the charter for each of the identified architecture boards.

      Download Architecture Board Charter Template

      Step 2 Summarize

      • Summarize the objectives of each board and reference the charter document within the EA Governance Framework.
      • Upload the final charter document to the team’s common repository.

      Update the EA Governance Framework document


      Considerations when creating an architecture review process

      • Ensure that architecture review happens at major milestones within the organization’s IT Operating Model such as the plan, build, and run phases.
      • In order to provide continuous engagement, make the EA group accountable for solution architecture in the plan phase. In the build phase, the EA group will be consulted while the solution architect will be responsible for the project solution architecture.

      Plan

      • Strategy Development
      • Business Planning
      • A - Conceptualization
      • Portfolio Management

      Build

      • Requirements
      • R - Solution Design
      • Application Development/ Procurement
      • Quality Assurance

      Run

      • Deploy
      • Operate

      Best-practice project architecture review process

      The best-practice model presented facilitates the creation of sound solution architecture through continuous engagement with the EA team and well-defined governance checkpoints.

      The image shows a graphic of the best-practice model. At the left, four categories are listed: Committees; EA; Project Team; LOB. At the top, three categories are listed: Plan; Build; Run. Within the area between these categories is a flow chart demonstrating the best-practice model and specific checkpoints throughout.

      Develop the architecture review process

      4.3 2 hours

      Input

      • A list of all EA governing bodies.
      • Info-Tech’s best practice architecture review process.

      Output

      • The new architecture review process.

      Materials

      • A computer, and/or a whiteboard and marker.

      Participants

      • EA team, business line leads, IT department leads.

      Hold a working session with the participants to develop the architecture review process. Facilitate the activity using the following steps:

      1. Reference Info-Tech’s best-practice architecture review process embedded within the “Architecture Review Process Template” to gain an understanding of an ideal architecture review process.
      2. Identify the stages within the plan, build, and run phases where solution architecture reviews should occur, and identify the governing bodies involved in these reviews.
      3. As you go through these stages, record your findings in the Architecture Review Process Template.
      4. Connect the various activities leading to and from the architecture creation points to outline the review process.

      Download the Architecture Review Process Template for additional guidance regarding developing an architecture review process.

      Develop the architecture review process

      4.3 2 hrs

      Input

      • A list of all identified EA governing bodies.

      Output

      • Charters for each EA governing bodies.

      Materials

      • A computer, and/or a whiteboard and marker.

      Participants

      • EA team, business line leads, IT department leads.

      The image shows a screenshot of the Table of Contents, with the Architecture Review Process highlighted.

      Step 1 - Facilitate

      Download Architecture Review Process Template and facilitate a session to customize the best-practice model presented in the template.

      Download the Architecture Review Process Template

      Step 2 - Summarize

      Summarize the process changes and document the process flow in the EA Governance Framework document.

      Update the EA Governance Framework Template

      Right-size EA governing bodies to reduce the perception of red tape

      Case Study

      Industry Insurance

      Source Info-Tech

      Situation

      At INSPRO01, architecture governance boards were a bottleneck. The boards fielded all project requests, ranging from simple screen label changes to complex initiatives spanning multiple applications.

      These boards were designed as forums for technology discussions without any business stakeholder involvement.

      Complication

      INSPRO01’s management never gave buy-in to the architecture governance boards since their value was uncertain.

      Additionally, architectural reviews were perceived as an item to be checked off rather than a forum for getting feedback.

      Architectural exceptions were not being followed through due to the lack of a dispensation process.

      Result

      Info-Tech has helped the team define adaptable inclusion/exclusion criteria (based on project complexity) for each of the architectural governing boards.

      The EA team was able to make the case for business participation in the architecture forums to better align business and technology investment.

      An architecture dispensation process was created and operationalized. As a result architecture reviews became more transparent with well-defined next steps.

      If you want additional support, have our analysts guide you through this phase as part of an Info-Tech workshop

      Book a workshop with our Info-Tech analysts:

      • To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team.
      • Info-Tech analysts will join you and your team onsite at your location or welcome you to Info-Tech’s historic Toronto office to participate in an innovative onsite workshop.
      • Contact your account manager (www.infotech.com/account), or email Workshops@InfoTech.com for more information.

      The following are sample activities that will be conducted by Info-Tech analysts with your team:

      Key Activities

      • Identify the number of governing bodies.
      • Define the game plan to initialize the governing bodies.
      • Define the architecture review process.

      Outcomes

      • Charter definition for each EA governance board

      Phase 5

      EA Policy

      Create a Right-Sized Enterprise Architecture Governance Framework

      EA Policy

      1. Current state of EA governance
      2. EA fundamentals
      3. Engagement model
      4. EA governing bodies
      5. EA policy
      6. Architectural standards
      7. Communication Plan

      This phase will walk you through the following activities:

      • Define the EA policy scope
      • Identify the target audience
      • Determine the inclusion and exclusion criteria
      • Create an assessment checklist

      This step involves the following participants:

      • CIO
      • IT Leaders
      • Business Leaders
      • Head of Enterprise Architecture
      • Enterprise Architects
      • Domain Architects
      • Solution Architects

      Outcomes of this step

      • The completed EA policy
      • Project assessment checklist
      • Defined assessment outcomes
      • Completed compliance waiver process

      Info-Tech Insight

      Use the EA policy to promote EA’s commitment to deliver value to business stakeholders through process transparency, stakeholder engagement, and compliance.

      Phase 5 guided implementation

      Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.

      Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.

      Guided Implementation 5: EA Policy

      Proposed Time to Completion: 3 weeks

      Step 5.1–5.3: EA Policy, Assessment Checklists, and Decision Types

      Start with an analyst kick-off call:

      • Discuss the three pillars of EA policy and its purpose.
      • Review the components of an effective EA policy.
      • Understand how to develop architecture assessment checklists.
      • Understand the assessment decision types.

      Then complete these activities…

      • Define purpose, scope, and audience of the EA policy.
      • Create a project assessment checklist.
      • Define the organization’s assessment decision type.

      With these tools & templates:

      • EA Policy Template
      • EA Assessment Checklist Template

      Step 5.4: Compliance Waivers

      Review findings with analyst:

      • Review your draft EA policy and gather feedback.
      • Review your project assessment checklists and the assessment decision types.
      • Discuss the best-practice architecture compliance waiver process and how to tailor it to your organizational needs.

      Then complete these activities…

      • Refine the EA policy based on feedback gathered.
      • Create the compliance waiver process.

      With these tools & templates:

      • EA Compliance Waiver Process Template
      • EA Compliance Waiver Form Template

      Three pillars of architecture policy

      Architecture policy is a set of guidelines, formulated and enforced by the governing bodies of an organization, to guide and constrain architectural choices in pursuit of strategic goals.

      Architecture compliance – promotes compliance to organizational standards through well-defined assessment checklists across architectural domains.

      Business value – ensures that investments are tied to business value by enforcing traceability to business capabilities.

      Architectural guidance – provides guidance to architecture practitioners on the application of the business and technology standards.

      Components of EA policy

      An enterprise architecture policy is an actionable document that can be applied to projects of varying complexity across the organization.

      1. Purpose and Scope: This EA policy document clearly defines the scope and the objectives of architecture reviews within an organization.
      2. Target Audience: The intended audience of the policy such as employees and partners.
      3. Architecture Assessment Checklist: A wide range of typical questions that may be used in conducting Architecture Compliance reviews, relating to various aspects of the architecture.
      4. Assessment Outcomes: The outcome of the architecture review process that determines the conformance of a project solution to the enterprise architecture standards.
      5. Compliance Waiver: Used when a solution or segment architecture is perceived to be non-compliant with the enterprise architecture.

      Draft the purpose and scope of the EA policy

      5.1 2.5 hrs

      Input

      • A consensus on the purpose, scope, and audience for the EA policy.

      Output

      • Documented version of the purpose, scope, and audience for the EA policy.

      Materials

      • A computer, and/or a whiteboard and marker.

      Participants

      • EA team, CIO, business line leads, IT department leads.

      The image shows a screenshot of the Table of Contents with the EA Policy section highlighted.

      Step 1 - Facilitate

      Download the EA Policy Template and hold a working session to draft the EA policy.

      Download the EA Policy Template

      Step 2 - Summarize

      • Summarize purpose, scope, and intended audience of the policy in the EA Governance Framework document.
      • Update the EA policy document with the purpose, scope and intended audience.

      Update the EA Governance Framework Template

      Architecture assessment checklist

      Architecture assessment checklist is a list of future-looking criteria that a project will be assessed against. It provides a set of standards against which projects can be assessed in order to render a decision on whether or not the project can be greenlighted.

      Architecture checklists should be created for each EA domain since each domain provides guidance on specific aspects of the project.

      Sample Checklist Questions

      Business Architecture:

      • Is the project aligned to organizational strategic goals and objectives?
      • What are the business capabilities that the project supports? Is it creating new capabilities or supporting an existing one?

      Data Architecture:

      • What processes are in place to support data referential integrity and/or normalization?
      • What is the physical data model definition (derived from logical data models) used to design the database?

      Application Architecture:

      • Can this application be placed on an application server independent of all other applications? If not, explain the dependencies.
      • Can additional parallel application servers be easily added? If so, what is the load balancing mechanism?

      Infrastructure Architecture:

      • Does the solution provide high-availability and fault-tolerance that can recover from events within a datacenter?

      Security Architecture:

      • Have you ensured that the corporate security policies and guidelines to which you are designing are the latest versions?

      Create architectural assessment checklists

      5.2 2 hrs

      Input

      • Reference architecture models.

      Output

      • Architecture assessment checklist.

      Materials

      • A computer, and/or a whiteboard and marker.

      Participants

      • EA team, business line leads, IT department leads.

      The image shows a screenshot of the Table of Contents with the EA Assessment Checklist section highlighted.

      Step 1 - Facilitate

      Download the EA Assessment Checklist Template and hold a working session to create the architectural assessment checklists.

      Download the EA Assessment Checklist Template

      Step 2 - Summarize

      • Summarize the major points of the checklists in the EA Governance Framework document.
      • Update the EA policy document with the detailed architecture assessment checklists.

      Update the EA Governance Framework Template

      Architecture assessment decision types

      • As a part of the proposed solution review, the governing bodies produce a decision indicating the compliance of the solution architecture with the enterprise standards.
      • Go, No Go, or Conditional are a sample set of decision outcomes available to the governing bodies.
      • On a conditional approval, the project team must file for a compliance waiver.

      Approved

      • The solution demonstrates substantial compliance with standards.
      • Negligible risk to the organization or minimal risks with sound plans of how to mitigate them.
      • Architectural approval to proceed with delivery type of work.

      Conditional Approval

      • The significant aspects of the solution have been addressed in a satisfactory manner.
      • Yet, there are some aspects of the solution that are not compliant with standards.
      • The architectural approval is conditional upon presenting the missing evidence within a minimal period of time determined.
      • The risk level may be acceptable to the organization from an overall IT governance perspective.

      Not Approved

      • The solution is not compliant with the standards.
      • Scheduled for a follow-up review.
      • Not recommended to proceed until the solution is more compliant with the standards.

      Best-practice architecture compliance waiver process

      Waivers are not permanent. Waiver terms must be documented for each waiver specifying:

      • Time period after which the architecture in question will be compliant with the enterprise architecture.
      • The modifications necessary to the enterprise architecture to accommodate the solution.

      The image shows a flow chart, split into 4 sections: Enterprise Architect; Solution Architect; TAC; ARB. To the right of these section labels, there is a flow chart that documents the waiver process.

      Create compliance waiver process

      5.4 3-4 hrs

      Input

      • A consensus on the compliance waiver process.

      Output

      • Documented compliance waiver process and form.

      Materials

      • A computer, and/or a whiteboard and marker.

      Participants

      • EA team, business line leads, IT department leads.

      The image shows the Table of Contents with the Compliance Waiver Form section highlighted.

      Step 1 - Facilitate

      Download the EA compliance waiver template and hold a working session to customize the best-practice process to your organization’s needs.

      Download the EA Compliance Waiver Process Template

      Step 2 - Summarize

      • Summarize the objectives and high-level process in the EA Governance Framework document.
      • Update the EA policy document with the compliance waiver process.
      • Upload the final policy document to the team’s common repository.

      Update the EA Governance Framework Template

      Creates an enterprise architecture policy to drive adoption

      Case Study

      Industry Insurance

      Source Info-Tech

      Situation

      EA program adoption across INSPRO01 was at its lowest point due to a lack of transparency into the activities performed by the EA group.

      Often, projects ignored EA entirely as it was viewed as a nebulous and non-value-added activity that produced no measurable results.

      Complication

      There was very little documented information about the architecture assessment process and the standards against which project solution architectures were evaluated.

      Additionally, there were no well-defined outcomes for the assessment.

      Project groups were left speculating about the next steps and with little guidance on what to do after completing an assessment.

      Result

      Info-Tech helped the EA team create an EA policy containing architecture significance criteria, assessment checklists, and reference to the architecture review process.

      Additionally, the team also identified guidelines and detailed next steps for projects based on the outcome of the architecture assessment.

      These actions brought clarity to EA processes and fostered better engagement with the EA group.

      If you want additional support, have our analysts guide you through this phase as part of an Info-Tech workshop

      Book a workshop with our Info-Tech analysts:

      • To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team.
      • Info-Tech analysts will join you and your team onsite at your location or welcome you to Info-Tech’s historic Toronto office to participate in an innovative onsite workshop.
      • Contact your account manager (www.infotech.com/account), or email Workshops@InfoTech.com for more information.

      The following are sample activities that will be conducted by Info-Tech analysts with your team:

      Key Activities

      • Define the scope.
      • Identify the target audience.
      • Determine the inclusion and exclusion criteria.
      • Create an assessment checklist.

      Outcomes

      • The completed EA policy
      • Project assessment checklist
      • Defined assessment outcomes
      • Completed compliance waiver process

      Phase 6

      Architectural Standards

      Create a Right-Sized Enterprise Architecture Governance Framework

      Architectural Standards

      1. Current state of EA governance
      2. EA fundamentals
      3. Engagement model
      4. EA governing bodies
      5. EA policy
      6. Architectural standards
      7. Communication Plan

      This phase will walk you through the following activities:

      • Identify and standardize EA work products
      • Classify the architectural standards
      • Identify the custodian of standards
      • Update the standards

      This step involves the following participants:

      • Head of Enterprise Architecture
      • Enterprise Architects
      • Domain Architects
      • Solution Architects

      Outcomes of this step

      • A standardized set of EA work products
      • A way to categorize and store EA work products
      • A defined method of updating standards

      Info-Tech Insight

      The architecture standard is the currency that facilitates information exchange between stakeholders. The primary purpose is to minimize transaction costs by providing a balance between stability and relevancy.

      Phase 6 guided implementation

      Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.

      Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.

      Guided Implementation 6: Architectural standards

      Proposed Time to Completion: 4 weeks

      Step 6.1: Understand Architectural Standards

      Start with an analyst kick-off call:

      • Discuss architectural standards.
      • Know how to identify and define EA work products.
      • Understand the standard content of work products.

      Then complete these activities…

      • Identify and standardize EA work products.

      Step 6.2–6.3: EA Repository and Updating the Standards

      Review with analyst:

      • Review the standardized EA work products.
      • Discuss the principles of EA repository.
      • Discuss the Info-Tech best-practice model for updating architecture standards and how to tailor them to your organizational context.

      Then complete these activities…

      • Build a folder structure for storing EA work products.
      • Use the Info-Tech best-practice architecture standards update process to develop your organization’s process for updating architecture standards.

      With these tools & templates:

      • Architecture Standards Update Process Template

      Recommended list of EA work products to standardize

      • EA work products listed below are typically produced as a part of the architecture lifecycle.
      • To ensure consistent development of architecture, the work products need to be standardized.
      • Consider standardizing both the naming conventions and the content of the work products.
      1. EA vision: A document containing the vision that provides the high-level aspiration of the capabilities and business value that EA will deliver.
      2. Statement of EA Work: The Statement of Architecture Work defines the scope and approach that will be used to complete an architecture project.
      3. Reference architectures: A reference architecture is a set of best-practice taxonomy that describes components and the conceptual structure of the model, as well as graphics, which provide a visual representation of the taxonomy to aid understanding. Reference architectures are created for each of the architecture domains.
      4. Solution proposal: The proposed project solution based on the EA guidelines and standards.
      5. Compliance assessment request: The document that contains the project solution architecture assessment details.
      6. Architecture change request: The request that initiates a change to architecture standards when existing standards can no longer meet the needs of the enterprise.
      7. Transition architecture: A transition architecture shows the enterprise at incremental states that reflect periods of transition that sit between the baseline and target architectures.
      8. Architectural roadmap: A roadmap that lists individual increments of change and lays them out on a timeline to show progression from the baseline architecture to the target architecture.
      9. EA compliance waiver request: A compliance waiver request that must be made when a solution or segment architecture is perceived to be non-compliant with the enterprise architecture.

      Standardize the content of each work product

      1. Purpose - The reason for the existence of the work product.
      2. Owner - The owner of this EA work product.
      3. Target Audience - The intended audience of the work product such as employees and partners.
      4. Naming Pattern - The pattern for the name of the work product as well as its file name.
      5. Table of Contents - The various sections of the work product.
      6. Review & Sign-Off Authority - The stakeholders who will review the work product and approve it.
      7. Repository Folder Location - The location where the work product will be stored.

      Identify and standardize work products

      6.1 3 hrs

      Input

      • List of various documents being produced by projects currently.

      Output

      • Standardized list of work products.

      Materials

      • A computer, and/or a whiteboard and marker.

      Participants

      • A computer, and/or a whiteboard and marker.

      Instructions:

      Hold a working session with the participants to identify and standardize work products. Facilitate the activity using the steps below.

      1. Identifying EA work products:
        1. Start by reviewing the list of all architecture-related documents presently produced in the organization. Any such deliverable with the following characteristics can be standardized:
          1. If it can be broken out and made into a standalone document.
          2. If it can be made into a fill-in form completed by others.
          3. If it is repetitive and requires iterative changes.
        2. Create a list of work products that your organization would like to standardize based on the characteristics above.
      2. The content and format of standardized EA work products:
        1. For each work product your organization wishes to standardize, look at its purpose and brainstorm the content needed to fulfill that purpose.
        2. After identifying the elements that need to be included in the work product to fulfill its purpose, order them logically for presentation purposes.
        3. In each section of the work product that need to be completed, include instructions on how to complete the section.
        4. Review the seven elements presented in the previous slide and include them in the work products.

      EA repository - information taxonomy

      As the EA function begins to grow and accumulates EA work products, having a well-designed folder structure helps you find the necessary information efficiently.

      Architecture meta-model

      Describes the organizationally tailored architecture framework.

      Architecture capability

      Defines the parameters, structures, and processes that support the enterprise architecture group.

      Architecture landscape

      An architectural presentation of assets in use by the enterprise at particular points in time.

      Standards information base

      Captures the standards with which new architectures and deployed services must comply.

      Reference library

      Provides guidelines, templates, patterns, and other forms of reference material to accelerate the creation of new architectures for the enterprise.

      Governance log

      Provides a record of governance activity across the enterprise.

      Create repository folder structure

      6.2 5-6 hrs

      Input

      • List of standardized work products.

      Output

      • EA work products mapped to a repository folder.

      Materials

      • A computer, and/or a whiteboard and marker.

      Participants

      • EA team, IT department leads.

      Instructions:

      Hold a working session with the participants to create a repository structure. Facilitate the activity using the steps below:

      1. Start with the taxonomy on the previous slide, and sort the existing work products into these six categories.
      2. Assess that the work products are sorted in a mutually exclusive and collectively exhaustive fashion. This means that a certain work product that appears in one category should not appear in another category. As well, make sure these six categories capture all the existing work products.
      3. Based on the categorization of the work products, build a folder structure that follows these categories, which will allow for the work products to be accessed quickly and easily.

      Create a process to update EA work products

      • Architectural standards are not set in stone and should be reviewed and updated periodically.
      • The Architecture Review Board is the custodian for standards.
      • Any change to the standards need to be assessed thoroughly and must be communicated to all the impacted stakeholders.

      Architectural standards update process

      Identify

      • Identify changes to the standards

      Assess

      • Review and assess the impacts of the change

      Document

      • Document the change and update the standard

      Approve

      • Distribute the updated standards to key stakeholders for approval

      Communicate

      • Communicate the approved changes to impacted stakeholders

      Create a process to continually update standards

      6.3 1.5 hrs

      Input

      • The list of work products and its owners.

      Output

      • A documented work product update process.

      Materials

      • A computer, and/or a whiteboard and marker.

      Participants

      • EA team, business line leads, IT department leads.

      The image shows the screenshot of the Table of Contents with the Standards Update Process highlighted.

      Step 1 - Facilitate

      Download the standards update process template and hold a working session to customize the best practice process to your organization’s needs.

      Download the Architecture Standards Update Process Template

      Step 2 - Summarize

      Summarize the objectives and the process flow in the EA governance framework document.

      Update the EA Governance Framework Template

      Create architectural standards to minimize transaction costs

      Case Study

      Industry Insurance

      Source Info-Tech

      Situation

      INSPRO01 didn’t maintain any centralized standards and each project had its own solution/design work products based on the preference of the architect on the project. This led to multiple standards across the organization.

      Lack of consistency in architectural deliverables made the information hand-offs expensive.

      Complication

      INSPRO01 didn’t maintain the architectural documents in a central repository and the information was scattered across multiple project folders.

      This caused key stakeholders to make decisions based on incomplete information and resulted in constant revisions as new information became available.

      Result

      Info-Tech recommended that the EA team identify and standardize the various EA work products so that information was collected in a consistent manner across the organization.

      The team also recommended an information taxonomy to store the architectural deliverables and other collateral.

      This resulted in increased consistency and standardization leading to efficiency gains.

      If you want additional support, have our analysts guide you through this phase as part of an Info-Tech workshop

      Book a workshop with our Info-Tech analysts:

      • To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team.
      • Info-Tech analysts will join you and your team onsite at your location or welcome you to Info-Tech’s historic Toronto office to participate in an innovative onsite workshop.
      • Contact your account manager (www.infotech.com/account), or email Workshops@InfoTech.com for more information.

      The following are sample activities that will be conducted by Info-Tech analysts with your team:

      Key Activities

      • Identify and standardize EA work products.
      • Classify the architectural standards.
      • Identify the custodian of standards.
      • Update the standards.

      Outcomes

      • A standardized set of EA work products
      • A way to categorize and store EA work products
      • A defined method of updating standards

      Phase 7

      Communication Plan

      Create a Right-Sized Enterprise Architecture Governance Framework

      Communication Plan

      1. Current state of EA governance
      2. EA fundamentals
      3. Engagement model
      4. EA governing bodies
      5. EA policy
      6. Architectural standards
      7. Communication Plan

      This phase will walk you through the following activities:

      • List the changes identified in the EA governance initiative
      • Identify stakeholders
      • Create a communication plan

      This step involves the following participants:

      • Head of Enterprise Architecture
      • Enterprise Architects
      • Domain Architects
      • Solution Architects

      Outcomes of this step

      • Communication Plan
      • EA Governance Framework

      Info-Tech Insight

      By failing to prepare, you are preparing to fail – maximize the likelihood of success for EA governance by engaging the relevant stakeholders and communicating the changes.

      Phase 7 guided implementation

      Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.

      Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.

      Guided Implementation 6: Operationalize the EA governance framework

      Proposed Time to Completion: 1 week

      Step 7.1: Create a Communication Plan

      Start with an analyst kick-off call:

      • Discuss how to communicate changes to stakeholders.
      • Discuss the purposes and benefits of the EA governance framework.

      Then complete these activities…

      • Identify the stakeholders affected by the EA governance transformations.
      • List the benefits of the proposed EA governance initiative.
      • Create a plan to communicate the changes to impacted stakeholders.

      With these tools & templates:

      • EA Governance Communication Plan Template
      • EA Governance Framework Template

      Step 7.2: Review the Communication Plan

      Start with an analyst kick-off call:

      • Review the communication plan and gather feedback on the proposed stakeholders.
      • Confer about the various methods of communicating change in an organization.
      • Discuss the uses of the EA Governance Framework.

      Then complete these activities…

      • Refine your communication plan and use it to engage with stakeholders to better serve customers.
      • Create the EA Governance Framework to accompany the communication plan in engaging stakeholders to better understand the value of EA.

      With these tools & templates:

      • EA Governance Communication Plan Template
      • EA Governance Framework Template

      Communicate changes to stakeholders

      The changes made to the EA governance components need to be reviewed, approved, and communicated to all of the impacted stakeholders.

      Deliverables to be reviewed:

      • Fundamentals
        • Vision and Mission
        • Goals and Measures
        • Principles
      • Architecture review process
      • Assessment checklists
      • Policy Governing body charters
      • Architectural standards

      Deliverable Review Process:

      Step 1: Hold a meeting with stakeholders to review, refine, and agree on the changes.

      Step 2: Obtain an official approval from the stakeholders.

      Step 3: Communicate the changes to the impacted stakeholders.

      Communicate the changes by creating an EA governance framework and communication plan

      7.1 3 hrs

      Input

      • EA governance deliverables.

      Output

      • EA Governance Framework
      • Communication Plan.

      Materials

      • A computer, and/or a whiteboard and marker.

      Participants

      • EA team, CIO, business line leads, IT department leads.

      Instructions:

      Hold a working session with the participants to create the EA governance framework as well as the communication plan. Facilitate the activity using the steps below:

      1. EA Governance Framework:
        1. The EA Governance Framework is a document that will help reference and cite all the materials created from this blueprint. Follow the instructions on the framework to complete.
      2. Communication Plan:
        1. Identify the stakeholders based on the EA governance deliverables.
        2. For each stakeholder identified, complete the “Communication Matrix” section in the EA Governance Communication Plan Template. Fill out the section based on the instructions in the template.
        3. As the stakeholders are identified based on the “Communication Matrix,” use the EA Governance Framework document to communicate the changes.

      Download the EA Governance Communication Plan Template and EA Governance Framework Template for additional instructions and to document your activities in this phase.

      Maximize the likelihood of success by communicating changes

      Case Study

      Industry Insurance

      Source Info-Tech

      Situation

      The EA group followed Info-Tech’s methodology to assess the current state and has identified areas for improvement.

      Best practices were adopted to fill the gaps identified.

      The team planned to communicate the changes to the technology leadership team and get approvals.

      As the EA team tried to roll out changes, they encountered resistance from various IT teams.

      Complication

      The team was not sure of how to communicate the changes to the business stakeholders.

      Result

      Info-Tech has helped the team conduct a thorough stakeholder analysis to identify all the stakeholders who would be impacted by the changes to the architecture governance framework.

      A comprehensive communication plan was developed that leveraged traditional email blasts, town hall meetings, and non-traditional methods such as team blogs.

      The team executed the communication plan and was able to manage the change effectively.

      If you want additional support, have our analysts guide you through this phase as part of an Info-Tech workshop

      Book a workshop with our Info-Tech analysts:

      • To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team.
      • Info-Tech analysts will join you and your team onsite at your location or welcome you to Info-Tech’s historic Toronto office to participate in an innovative onsite workshop.
      • Contact your account manager (www.infotech.com/account), or email Workshops@InfoTech.com for more information.

      The following are sample activities that will be conducted by Info-Tech analysts with your team:

      Key Activities

      • List the changes identified in the EA governance initiative.
      • Identify stakeholders.
      • Create a communication plan.
      • Compile the materials created in the blueprint to better communicate the value of EA governance.

      Outcomes

      • Communication plan
      • EA governance framework

      Bibliography

      Government of British Columbia. “Architecture and Standards Review Board.” Government of British Columbia. 2015. Web. Jan 2016. < http://www.cio.gov.bc.ca/cio/standards/asrb.page >

      Hopkins, Brian. “The Essential EA Toolkit Part 3 – An Architecture Governance Process.” Cio.com. Oct 2010. Web. April 2016. < http://www.cio.com/article/2372450/enterprise-architecture/the-essential-ea-toolkit-part-3---an-architecture-governance-process.html >

      Kantor, Bill. “How to Design a Successful RACI Project Plan.” CIO.com. May 2012. Web. Jan 2016. < http://www.cio.com/article/2395825/project-management/how-to-design-a-successful-raci-project-plan.html >

      Sapient. “MIT Enterprise Architecture Guide.” Sapient. Sep 2004. Web. Jan 2016. < http://web.mit.edu/itag/eag/FullEnterpriseArchitectureGuide0.1.pdf >

      TOGAF. “Chapter 41: Architecture Repository.” The Open Group. 2011. Web. Jan 2016. < http://pubs.opengroup.org/architecture/togaf9-doc/arch/chap41.html >

      TOGAF. “Chapter 48: Architecture Compliance.” The Open Group. 2011. Web. Jan 2016. < http://pubs.opengroup.org/architecture/togaf9-doc/arch/chap48.html >

      TOGAF. “Version 9.1.” The Open Group. 2011. Web. Jan 2016. http://pubs.opengroup.org/architecture/togaf9-doc/arch/

      United States Secret Service. “Enterprise Architecture Review Board.” United States Secret Service. Web. Jan 2016. < http://www.archives.gov/records-mgmt/toolkit/pdf/ID191.pdf >

      Virginia Information Technologies Agency. “Enterprise Architecture Policy.” Commonwealth of Virginia. Jul 2006. Web. Jan 2016. < https://www.vita.virginia.gov/uploadedfiles/vita_main_public/library/eapolicy200-00.pdf >

      Research contributors and experts

      Alan Mitchell, Senior Manager, Global Cities Centre of Excellence, KPMG

      Alan Mitchell has held numerous consulting positions before his role in Global Cities Centre of Excellence for KPMG. As a Consultant, he has had over 10 years of experience working with enterprise architecture related engagements. Further, he worked extensively with the public sector and prides himself on his knowledge of governance and how governance can generate value for an organization.

      Ian Gilmour, Associate Partner, EA advisory services, KPMG

      Ian Gilmour is the global lead for KPMG’s enterprise architecture method and Chief Architect for the KPMG Enterprise Reference Architecture for Health and Human Services. He has over 20 years of business design experience using enterprise architecture techniques. The key service areas that Ian focuses on are business architecture, IT-enabled business transformation, application portfolio rationalization, and the development of an enterprise architecture capability within client organizations.

      Djamel Djemaoun Hamidson, Senior Enterprise Architect, CBC/Radio-Canada

      Djamel Djemaoun is the Senior Enterprise Architect for CBC/Radio-Canada. He has over 15 years of Enterprise Architecture experience. Djamel’s areas of special include service-oriented architecture, enterprise architecture integration, business process management, business analytics, data modeling and analysis, and security and risk management.

      Sterling Bjorndahl, Director of Operations, eHealth Saskatchewan

      Sterling Bjorndahl is now the Action CIO for the Sun Country Regional Health Authority, and also assisting eHealth Saskatchewan grow its customer relationship management program. Sterling’s areas of expertise include IT strategy, enterprise architecture, ITIL, and business process management. He serves as the Chair on the Board of Directors for Gardiner Park Child Care.

      Huw Morgan, IT Research Executive, Enterprise Architect

      Huw Morgan has 10+ years experience as a Vice President or Chief Technology Officer in Canadian internet companies. As well, he possesses 20+ years experience in general IT management. Huw’s areas of expertise include enterprise architecture, integration, e-commerce, and business intelligence.

      Serge Parisien, Manager, Enterprise Architecture at Canada Mortgage Housing Corporation

      Serge Parisien is a seasoned IT leader with over 25 years of experience in the field of information technology governance and systems development in both the private and public sectors. His areas of expertise include enterprise architecture, strategy, and project management.

      Alex Coleman, Chief Information Officer at Saskatchewan Workers’ Compensation Board

      Alex Coleman is a strategic, innovative, and results-driven business leader with a proven track record of 20+ years’ experience planning, developing, and implementing global business and technology solutions across multiple industries in the private, public, and not-for-profit sectors. Alex’s expertise includes program management, integration, and project management.

      L.C. (Skip) Lumley , Student of Enterprise and Business Architecture

      Skip Lumley was formerly a Senior Principle at KPMG Canada. He is now post-career and spends his time helping move enterprise business architecture practices forward. His areas of expertise include enterprise architecture program implementation and public sector enterprise architecture business development.

      Additional contributors

      • Tim Gangwish, Enterprise Architect at Elavon
      • Darryl Garmon, Senior Vice President at Elavon
      • Steve Ranaghan, EMEIA business engagement at Fujitsu

      Design Your Cloud Operations

      • Buy Link or Shortcode: {j2store}462|cart{/j2store}
      • member rating overall impact: 10.0/10 Overall Impact
      • member rating average dollars saved: 20 Average Days Saved
      • member rating average days saved: After each Info-Tech experience, we ask our members to quantify the real-time savings, monetary impact, and project improvements our research helped them achieve.
      • Parent Category Name: Operations Management
      • Parent Category Link: /i-and-o-process-management
      • Traditional IT capabilities, activities, organizational structures, and culture need to adjust to leverage the value of cloud, optimize spend, and manage risk.
      • Different stakeholders across previously separate teams rely on one another more than ever, but rules of engagement do not yet exist.

      Our Advice

      Critical Insight

      Define your target cloud operations state first, then plan how to get there. If you begin by trying to reconstruct on-prem operations in the cloud, you will build an operations model that is the worst of both worlds.

      Impact and Result

      • Assess your key workflows’ maturity for life in the cloud and evaluate your readiness and need for new ways of working
      • Identify the work that must be done to deliver value in cloud services
      • Design your cloud operations framework and communicate it clearly and succinctly to secure buy-in

      Design Your Cloud Operations Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Design Your Cloud Operations Deck – A step-by-step storyboard to help guide you through the activities and tools in this project.

      This storyboard will help you assess your cloud maturity, understand relevant ways of working, and create a meaningful design of your cloud operations that helps align team members and stakeholders.

      • Design Your Cloud Operations – Storyboard
      • Cloud Operations Design Sketchbook
      • Roadmap Tool

      2. Planning and design tools.

      Use these templates and tools to assess your current state, design the cloud operations organizing framework, and create a roadmap.

      • Cloud Maturity Assessment

      3. Communication tools.

      Use these templates and tools to plan how you will communicate changes to key stakeholders and communicate the new cloud operations organizing framework in an executive presentation.

      • Cloud Operations Communication Plan
      • Cloud Operations Organizing Framework: Executive Brief

      Infographic

      Workshop: Design Your Cloud Operations

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Day 1

      The Purpose

      Establish Context

      Key Benefits Achieved

      Alignment on target state

      Activities

      1.1 Assess current cloud maturity and areas in need of improvement

      1.2 Identify the drivers for organizational redesign

      1.3 Review cloud objectives and obstacles

      1.4 Develop organization design principles

      Outputs

      Cloud maturity assessment

      Project drivers

      Cloud challenges and objectives

      Organization design principles

      2 Day 2

      The Purpose

      Establish Context

      Key Benefits Achieved

      Understanding of cloud workstreams

      Activities

      2.1 Evaluate new ways of working

      2.2 Develop a workstream target statement

      2.3 Identify cloud work

      Outputs

      Workstream target statement

      Cloud operations workflow diagrams

      3 Day 3

      The Purpose

      Design the Organization

      Key Benefits Achieved

      Visualization of the cloud operations future state

      Activities

      3.1 Design a future-state cloud operations diagram

      3.2 Create a current-state cloud operations diagram

      3.3 Define success indicators

      Outputs

      Future-state cloud operations diagram

      Current-state cloud operations diagram

      Success indicators

      4 Day 4

      The Purpose

      Communicate the Changes

      Key Benefits Achieved

      Alignment and buy-in from stakeholders

      Activities

      4.1 Create a roadmap

      4.2 Create a communication plan

      Outputs

      Roadmap

      Communication plan

      Further reading

      It’s “day two” in the cloud. Now what?

      EXECUTIVE BRIEF

      Analysts’ Perspective

      The image contains a picture of Andrew Sharp.

      Andrew Sharp

      Research Director

      Infrastructure & Operations Practice

      It’s “day two” in the cloud. Now what?

      Just because you’re in the cloud doesn’t mean everyone is on the same page about how cloud operations work – or should work.

      You have an opportunity to implement new ways of working. But if people can’t see the bigger picture – the organizing framework of your cloud operations – it will be harder to get buy-in to realize value from your cloud services.

      Use Info-Tech’s methodology to build out and visualize a cloud operations organizing framework that defines cloud work and aligns it to the right areas.

      The image contains a picture of Nabeel Sherif.

      Nabeel Sherif

      Principal Research Director

      Infrastructure & Operations Practice

      The image contains a picture of Emily Sugerman.

      Emily Sugerman

      Research Analyst

      Infrastructure & Operations Practice

      Scott Young

      Principal Research Director

      Infrastructure & Operations Practice

      Executive Summary

      Your Challenge

      Common Obstacles

      Info-Tech’s Approach

      Widespread cloud adoption has created new opportunities and challenges:

      • Traditional IT capabilities, activities, organizational structures, and culture need to adjust to leverage the value of cloud, optimize spend, and manage risk.
      • Different stakeholders across previously separate teams rely on one another more than ever, but rules of engagement do not yet exist, leading to a lack of direction, employee frustration, missed work, inefficiency, and unacceptable risk.
      • Many organizations have bought their way into a SaaS portfolio. Now, as key applications leave their network, I&O leaders still have accountability for these apps, but little visibility and control over them.
      • Few organizations are, or will ever be, cloud only. Your operations will be both on-prem and in-cloud for the foreseeable future and you must be able to accommodate both.
      • Traditional infrastructure siloes no longer work for cloud operations, but key stakeholders are wary of significant change.

      Clearly communicate the need for operations changes:

      • Identify current challenges with cloud operations. Assess your readiness and fit for new ways of working involved in cloud operations: DevOps, SRE, Platform Engineering, and more.
      • Use Info-Tech’s templates to design a cloud operations organizing framework. Define cloud work, and align work to the right work areas.
      • Communicate the design. Gain buy-in from your key stakeholders for the considerable organizational change management required to achieve durable change.

      Info-Tech Insight

      Define your target cloud operations state first, then plan how to get there. If you begin by trying to reconstruct on-prem operations in the cloud, you will build an operations model that is the worst of both worlds.

      Your Challenge

      Traditional IT capabilities, activities, organizational structures, and culture need to adjust to leverage the value of cloud, optimize spend, and manage risk.

      • As key applications leave for the cloud, I&O teams are still expected to manage access, spend, and security but may have little or no visibility or control over the applications themselves.
      • The automation and self-service capabilities of cloud aren’t delivering the speed the business expected because teams don’t work together effectively.
      • Business leaders purchase their own cloud solutions because, from their point of view, IT’s processes are cumbersome and ineffective.
      • Accounting practices and governance mechanisms haven’t adjusted to enable new development practices and technologies.
      • Security and cost management requirements may not be accounted for by teams acquiring or developing solutions.
      • All of this contributes to frustration, missed work, wasteful spending, and unacceptable risk.

      Obstacles, by the numbers:

      85% of respondents reported security in the cloud was a serious concern.

      73% reported balancing responsibilities between a central cloud team and business units was a top concern.

      The average organization spent 13% more than they’d budgeted on cloud – even when budgets were expected to increase by 29% in the next year.

      32% of all cloud spend was estimated to be wasted spend.

      56% of operations professionals said their primary focus is cloud services.

      81% of security professionals thought it was difficult to get developers to prioritize bug fixes.

      42% of security professionals felt bugs were being caught too late in the development process.

      1. Flexera 2022 State of the Cloud Report. 2. GitLab DevSecOps 2021 Survey

      Cloud operations are different, but IT departments struggle to change

      • There’s no sense of urgency in the organization that change is needed, particularly from teams that aren’t directly involved in operations. It can be challenging to make the case that change is needed.
      • Beware “analysis paralysis”! With so many options, philosophies, approaches, and methodologies, it’s easy to be overwhelmed by choice and fail to make needed changes.
      • The solution to the problem requires organizational changes beyond the operations team, but you don’t have the authority to make those changes directly. Operations can influence the solution, but they likely can’t direct it.
      • Behavior, culture, and organizations take time and work to change. Progress is usually evolutionary – but this can also mean it feels like it’s happening too slowly.
      • It’s not just cloud, and it probably never will be. You’ll need to account for operating both on-premises and cloud technologies for the foreseeable future.

      Follow Info-Tech’s Methodology

      1. Ensure alignment with the risks and drivers of the business and understand your organization’s strengths and gaps for a cloud operations world.

      2. Understand the balance of different types of deliveries you’re responsible for in the cloud.

      3. Reduce risk by reinforcing the key operational pillars of cloud operations to your workstreams.

      4. Identify “work areas,” decide which area is responsible for what tasks and how work areas should interact in order to best facilitate desired business outcomes.

      The image contains a screenshot of a diagram demonstrating Info-Tech's Methodology, as described in the text above.

      Info-Tech Insight

      Start by designing operations around the main workflow you have for cloud services; i.e. If you mostly build or host in cloud, build the diagram to maximize value for that workflow.

      Operating Framework Elements

      Proper design of roles and responsibilities for each cloud workflow category will help reduce risk by reinforcing the key operational pillars of cloud operations.

      We base this on a composite of the well-architected frameworks established by the top global cloud providers today.

      Workflow Categories

      • Build
      • Host
      • Consume

      Key Pillars

      • Performance
      • Reliability
      • Cost Effectiveness
      • Security
      • Operational Excellence

      Risks to Mitigate

      • Changes to Support Model
      • Changes to Security & Governance
      • Changes to Skills & Roles
      • Replicating Old Habits
      • Misaligned Stakeholders

      Cloud Operations Design

      Info-Tech’s Methodology

      Assess Maturity and Ways of Working

      Define Cloud Work

      Design Cloud Operations

      Communicate and Secure Buy-in

      Assess your key workflows’ maturity for “life in the cloud,” related to Key Operational Pillars. Evaluate your readiness and need for new ways of working.

      Identify the work that must be done to deliver value in cloud services.

      Define key cloud work areas, the work they do, and how they should share information and interact.

      Outline the change you recommend to a range of stakeholders. Gain buy-in for the plan.

      Blueprint deliverables

      Each step of this blueprint is accompanied by supporting deliverables to help you accomplish your goals.

      Cloud Maturity Assessment

      Assess the intensity and cloud maturity of your IT operations for each of the key cloud workstreams: Consume, Host, and Build

      The image contains screenshots of the Cloud Maturity Assessment.

      Communication Plan

      Identify stakeholders, what’s in it for them, what the impact will be, and how you will communicate over the course of the change.

      The image contains a screenshot of the Communcation Plan.

      Cloud Operations Design Sketchbook

      Capture the diagram as you build it.

      The image contains a screenshot of the Cloud Operations Design Sketchbook.

      Roadmap Tool

      Build a roadmap to put the design into action.

      The image contains a screenshot of the Roadmap Tool.

      Key deliverable:

      Cloud Operations Organizing Framework

      The Cloud Operations Organizing Framework is a communication tool that introduces the cloud operations diagram and establishes its context and justification.

      The image contains a screenshot of the Cloud Operations Organizing Framework.

      Project Outline

      Phase 1: Establish Context

      1.1: Identify challenges, opportunities, and cloud maturity

      1.2: Evaluate new ways of working

      1.3: Define cloud work

      Phase 2: Design the organization and communicate changes

      2.1: Design a draft cloud operations diagram

      2.2: Communicate changes

      Outputs

      Cloud Services Objectives and Obstacles

      Cloud Operations Workflow Diagrams

      Cloud Maturity Assessment

      Draft Cloud Operations Diagram

      Communication Plan

      Roadmap Tool

      Cloud Operations Organizing Framework

      Project benefits

      Benefits for IT

      Benefits for the business

      • Define the work required to effectively deliver cloud services to deliver business value.
      • Define key roles for operating cloud services.
      • Outline an operations diagram that visually communicates what key work areas do and how they interact.
      • Communicate needed changes to key stakeholders.
      • Receive more value from cloud services when the organization is structured to deliver value including:
        • Avoiding cost overruns
        • Securing services
        • Providing faster, more effective delivery
        • Increasing predictability
        • Reducing error rates

      Calculate the value of Info-Tech’s Methodology

      The value of the project is the delivery of organizational change that improves the way you manage cloud services

      Example Goal

      How this blueprint can help

      How you might measure success/value

      Streamline Responsibilities

      The operations team is spending too much time fighting applications fires, which is distracting it from needed platform improvements.

      • Identify shared and separate responsibilities for development and platform operations teams.
      • Focus the operations team on securing and automating cloud platform(s).
      • Reduce time wasted on back and forth between development and operations teams (20 hrs. per employee per year x 50 staff = 1000 hrs.).
      • Deliver automation features that reduces development lead time by one hour per sprint (40 devs x 20 sprints per yr. x 1 hr. = 800 hrs.).

      Improve Cost Visibility

      The teams responsible for cost management today don’t have the authority, visibility, or time to effectively find wasted spend.

      The teams responsible for cost management today don’t have the authority, visibility, or time to effectively find wasted spend.

      • Ensure operations contributes to visibility and execution of cost governance.
      • $1,000,000 annual spend on cloud services.
      • Of this, assume 32% is wasted spend ($320k).1
      • New cost management function has a target to cut waste by half next year saving ~$160k.
      • Cost visibility and capture metrics (e.g. accurate tagging metrics, right-sizing execution).
      1. Average wasted cloud spend across all organizations, from the 2022 Flexera State of the Cloud Report

      Understand your cloud vision and strategy before you redesign operations

      Guide your operations redesign with an overarching cloud vision and strategy that aligns to and enables the business’s goals.

      Cloud Vision

      The image contains a screenshot of the Define Your Cloud Vision.

      Cloud Strategy

      It is difficult to get or maintain buy-in for changes to operations without everyone on the same page about the basic value proposition cloud offers your organization.

      Do the workload and risk analysis to create a defensible cloud vision statement that boils down into a single statement: “This is how we want to use the cloud.”

      Once you have your basic cloud vision, take the next step by documenting a cloud strategy.

      Establish your steering committee with stakeholders from IT, business, and leadership to work through the essential decisions around vision and alignment, people, governance, and technology.

      Your cloud operations design should align to a cloud strategy document that provides guidelines on establishing a cloud council, preparing staff for changing skills, mitigating risks through proper governance, and setting a direction for migration, provisioning, and monitoring decisions.

      Key Insights

      Focus on the future, not the present

      Define your target cloud operations state first, then plan how to get there. If you begin by trying to reconstruct on-prem operations in the cloud, you will build an operations model that is the worst of both worlds.

      Responsibilities change in the cloud

      Understand what you mean by cloud work

      Focus where it matters

      Cloud is a different way of consuming IT resources and applications and it requires a different operational approach than traditional IT.

      In most cases, cloud operations involves less direct execution and more service validation and monitoring

      Work that is invisible to the customer can still be essential to delivering customer value. A lot of operations work is invisible to your organization’s customers but is required to deliver stability, security, efficiency, and more.

      Cloud work is not just applications that have been approved by IT. Consider how unsanctioned software purchased by the business will be integrated and managed.

      Start by designing operations around the main workflow you have for cloud services. If you mostly build or host in the cloud, build the diagram to maximize value for that workflow.

      Design principles will often change over time as the organization’s strategy evolves.

      Identify skills requirements and gaps as early as possible to avoid skills gaps later. Whether you plan to acquire skills via training or cross-training, hiring, contracting, or outsourcing, effectively building skills takes time.

      Info-Tech offers various levels of support to best suit your needs

      DIY Toolkit

      Guided Implementation

      Workshop

      Consulting

      “Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful.”“Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track.”“We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place.”“Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project.”

      Diagnostics and consistent frameworks used throughout all four options

      Guided Implementation

      What does a typical GI on this topic look like?

      Phase 1

      Phase 2

      Call #1: Scope requirements, objectives, and your specific challenges

      Calls #2&3: Assess cloud maturity and drivers for org. redesign

      Call #4: Review cloud objectives and obstacles

      Call #5: Evaluate new ways of working and identify cloud work

      Calls #6&7: Create your Cloud Operations diagram

      Call #8: Create your communication plan and build roadmap

      A Guided Implementation (GI) is a series of calls with an Info-Tech analyst to help implement our best practices in your organization.

      Workshop Overview

      Contact your account representative for more information.
      workshops@infotech.com 1-888-670-8889

      Day 1

      Day 2

      Day 3

      Day 4

      Day 5

      Establish Context

      Design the Organization and Communicate Changes

      Next Steps and
      Wrap-Up (offsite)

      Activities

      1.1 Assess current cloud maturity and areas in need of improvement

      1.2 Identify the drivers for organizational redesign

      1.3 Review cloud objectives and obstacles

      1.4 Develop organization design principles

      2.1 Evaluate new ways of working

      2.2 Develop a workstream target statement

      2.3 Identify cloud work

      3.1 Design a future-state cloud operations diagram

      3.2 Create a current state cloud operations diagram

      3.3 Define success indicators

      4.1 Create a roadmap

      4.2 Create a communication plan

      5.1 Complete in-progress deliverables from previous four days.

      5.2 Set up review time for workshop deliverables and to discuss next steps.

      Deliverables

      1. Cloud Maturity Assessment
      2. Cloud Challenges and Objectives
      1. Workstream target statement
      2. Cloud Operations Workflow Diagrams
      1. Future and current state cloud operations diagrams
      1. Roadmap
      2. Communication Plan

      Cloud Operations Organizing Framework.

      Phase 1:

      Establish context

      Phase 1

      Phase 2

      1.1 Establish operating model design principals by identifying goals & challenges, workstreams, and cloud maturity

      1.2 Evaluate new ways of working

      1.3 Identify cloud work

      2.1 Draft an operating model

      2.2 Communicate proposed changes

      Phase Outcomes:

      Define current maturity and which workstreams are important to your organization.

      Understand new operating approaches and which apply to your workstream balance.

      Identify a new target state for IT operations.

      Before you get started

      Set yourself up for success with these three steps:

      • This methodology and the related slides are intended to be executed via intensive, collaborative working sessions using the rest of this slide deck.
      • Ensure the working sessions are successful by working through these steps before you start work on defining your cloud operations.

      1. Identify an operations design working group

      2. Review cloud vision and strategy

      3. Create a working folder

      This should be a group with insight into current cloud challenges, and with the authority to drive change. This group is the main audience for the activities in this blueprint.

      Review your established planning work and documentation.

      Create a repository to house your notes and any work in progress.

      Create a working folder

      15 minutes

      Create a central repository to support transparency and collaboration. It’s an obvious step, but one that’s often forgotten.

      1. Download all the documents associated with this blueprint to a shared repository accessible to all participants. Keep separate folders for templates and work-in-progress.
      2. Share the link to the repository with all attendees. Include links to the repository in any meeting invites you set up as working sessions for the project.
      3. Use the repository for all the work you do in the activities listed in this blueprint.

      Step 1.1: Identify goals and challenges, workstreams, and cloud maturity

      Participants

      • Operations Design Working Group, which may include:
        • Cloud owners
        • Platform/Applications Team leads
        • Infra & Ops managers

      Outcomes

      • Identify your current cloud maturity and areas in need of improvement.
      • Define the advantages you expect to realize from cloud services and any obstacles you have to overcome to meet those objectives.
      • Identify the reasons why redesigning cloud operations is necessary.
      • Develop organization design principles.

      “Start small: Begin with a couple services. Then, based on the feedback you receive from Operations and the business, modify your approach and keep increasing your footprint.” – Nenad Begovic

      Cloud changes operational activities, tactics, and goals

      As you adopt cloud services, the operations core mission remains . . .

      • IT operations are expected to deliver stable, efficient, and secure IT services.

      . . . but operational activities are evolving.

      • Core IT operational processes remain relevant, such as incident or capacity management, but opportunities to automate or outsource operations tasks will change how that work is done.
      • As you rely more on automation and outsourcing, the team may see less direct execution in its day-to-day work and more solution design and validation.
      • Outsourcing frees the team from operational toil but reduces the direct control over your end-to-end solution and increases your reliance on your vendor.
      • Pay-as-you-go pricing models present opportunities for streamlined delivery and cost rationalization but require you to rethink how you do cost and asset management.
      • It’s very easy for the business to buy a SaaS solution without consulting IT, which can lead to duplicated functionality, integration challenges, security threats, and more.

      Design a model for cloud operations that helps you achieve value from your cloud environment.

      “As operating models shift to the cloud, you still need the same people and processes. However, the shift is focused on a higher level of operations. If your people no longer focus on server uptime, then their success metrics will change. When security is no longer protected by the four walls of a datacenter, your threat profile changes.

      (Microsoft, “Understand Cloud Operating Models,” 2022)

      Operational responsibilities are shared with a range of stakeholders

      When using a vendor-operated public cloud, IT exists in a shared responsibility model with the cloud service provider, one that is further differentiated by the type of cloud service model in use: broadly, software-as a service (SaaS), platform-as-a-service (PaaS), or infrastructure-as-a-service (IaaS).

      Your IT operations organization may still reflect a structure where IT retains control over the entire infrastructure stack from facilities to application and defines their operational roles and processes accordingly.

      If the organization chooses a co-location facility, they outsource facility responsibility to a third-party provider, but much of the rest of the traditional IT operating model remains the same. The operations model that worked for an entirely premises-based environment is very different from one that is made up of, for instance, a portfolio of SaaS applications, where your control is limited to the top of the infrastructure stack at the application layer.

      Once an organization migrates workloads to the cloud, IT gives up an increasing amount of control to the vendor, and its traditional operational roles & responsibilities necessarily change.

      The image contains a screenshot that demonstrates what the cloud service models are.

      Align operations with customer value

      • Decisions about operational design should be made with customer value in mind. Remember that cloud adoption should be an enabler of adaptability in the face of changing business needs!
      • Think about how the operations team is indispensable to the value received by your customer. Think about the types of changes that can add to the value your customers receive.
      • A focus on value will help you establish and explain the rationale and urgency required to deliver on needed changes. If you can’t explain how the changes you propose will help deliver value, your proposal will come across as change for the sake of change.
      The image contains a screenshot of a diagram to demonstrate how operational design decisions need to be made with customer value in mind.

      Info-Tech Insight

      Work that is invisible to the customer can still be essential to delivering customer value. A lot of operations work is invisible to your organization’s customers but required to deliver stability, security, efficiency, and more.

      A new consumption model means a different mix of activities

      Evolving to cloud-optimal operations also means re-assessing and adapting your team’s approach to achieving cloud maturity, especially with respect to how automation and standardization can be leveraged to best achieve optimization in cloud.

      Traditional ITDesignExecuteValidateSupportMonitor
      CloudDesignExecuteValidateSupportMonitor

      Info-Tech Insight

      Cloud is a different way of consuming IT resources and applications and requires a different operational approach than traditional IT.

      In most cases, cloud operations involves less direct execution and more service validation and monitoring.

      The Service Models in cloud correspond to the way your organization delivers IT

      Service Model

      Example

      Function

      Software-as-a-Service (SaaS)

      Salesforce.com

      Office 365

      Workday

      Consume

      Platform-as-a-Service (PaaS)

      Azure Stack

      AWS SageMaker

      WordPress

      Build

      Infrastructure-as-a-Service (IaaS)

      Microsoft Azure

      Amazon EC2

      Google Cloud Platform

      Host

      Define how you plan to use cloud services

      Your cloud operations will include different tasks, teams, and workflows, depending on whether you consume cloud services, build them, or host on them.

      Function

      Business Need

      Service Model

      Example Tasks

      Consume

      “I need a commodity, off-the-shelf service that we can configure to our organization’s needs.

      Software-as-a-Service (SaaS)

      Onboard and add users to a new SaaS offering. Vendor management of SaaS providers. Configure/integrate the SaaS offering to meet business needs.

      Build

      “I need to create significantly customized or net-new products and services.”

      Platform-as-a-Service (PaaS) & Infrastructure as-a-Service (IaaS)

      Create custom applications. Build and maintain a container platform. Manage CI/CD pipelines and tools. Share infrastructure and applications patterns.

      Host

      “I need compute, storage, and networking components that reflect key cloud characteristics (on-demand self-service, metered usage, etc.).”

      Infrastructure-as-a-Service (IaaS)

      Stand up compute, networking, and storage resources to host a COTS application. Plan to increase storage capacity to support future demand.

      Align to the well-architected framework

      • Each cloud provider has defined a well-architected framework (WAF) that defines effective deployment and operations for their services.
      • WAFs embody a set of best practices and design principles to leverage the cloud in a more efficient, secure, and cost-effective manner.
      • While each vendor’s WAF has its own definitions and nuances, they collectively share a set of key principles, or “pillars,” that define the desired outcome of any cloud deployment.
      • These pillars address the key areas of risk when migrating to a public cloud platform.

      “In order to accelerate public cloud adoption, you need to focus on infrastructure-as-code and script everything you can. Unlike traditional operations, CloudOps focuses on creating scripts: a script for task A, a script for task B, etc.”

      – Nenad Begovic

      Pillars

      • Reliability
      • Security
      • Cost Optimization
      • Operational Excellence
      • Performance Efficiency

      General Best Practice Capability Areas

      • Host
      • Network
      • Data
      • Identity Management
      • Cost/Subscription Management

      Assess cloud maturity

      2 hours

      1. Download a copy of the Cloud Maturity Assessment Tool.
      2. As a group, work through:
        • The balance of your operations activities from a Host/Build/Consume perspective. What are you responsible for delivering now? How do you expect things will change in the future?
        • Which workstreams to focus on. Are there activity categories that are critical or non-critical or that don’t represent a significant portion of overall work? Conversely, are there workstreams that you feel are subject to particular risk when moving to cloud?
      3. Fill out the Maturity Quiz tab in the Cloud Maturity Assessment Tool for the workstreams you have chosen to focus on.
      InputOutput
      • Insight into and experience with your current cloud environment.
      • Maturity scoring for key workload streams as they align to the pillars of a general well-architected cloud framework
      MaterialsParticipants
      • Whiteboard/Flip chart
      • Operating model template
      • Cloud platform SMEs

      Download theCloud Maturity Assessment Tool

      Identify the drivers for organizational redesign

      Whiteboard Activity

      An absolute must-have in any successful redesign is a shared understanding and commitment to changing the status quo.

      Without a clear and urgent call to action, the design changes will be seen as change for the sake of change and therefore entirely safe to ignore.

      Take up the following questions as a group:

      1. What kind of organizational change is needed?
      2. Why do we think the need for this change is urgent?
      3. What do we think will happen if no change occurs? What’s the worst-case scenario?

      Record your answers so you can reference and use them in the communication materials you’ll create in Phase 2.

      InputOutput
      • Cloud maturity assessment
      • Objectives and obstacles
      • Insight into existing challenges stemming from organizational design challenges
      • A list of reasons that form a compelling argument for organizational change
      MaterialsParticipants
      • Whiteboard/Flip chart
      • Cloud Operations Design Working Group

      “We know, for example, that 70 percent of change programs fail to achieve their goals, largely due to employee resistance and lack of management support. We also know that when people are truly invested in change it is 30 percent more likely to stick.”

      – Ewenstein, Smith, Sologar

      McKinsey (2015)

      Consider the value of change from advantage and obstacle perspectives

      Consider what you intend to achieve and the obstacles to overcome to help identify the changes required to achieve your desired future state.

      Advantage Perspective

      Ideas for Change

      Obstacle Perspective

      What advantages do cloud services offer us as an organization?

      For example:

      • Enhance service features.
      • Enhance user experience.
      • Provide ubiquitous access.
      • Scalability to align with demand.
      • Automate or outsource routine tasks.

      What obstacles prevent us from realizing value in cloud services?

      For example:

      • Inadequate stability and reliability
      • Difficult to observe or monitor workloads
      • Challenges ensuring cloud security
      • Insufficient access to relevant skills

      Review risks and challenges

      Changes to Support Model

      • Have we identified who is on the cloud ops team?
      • Do we know where we are procuring skills (internal IT vs. third party) and for how long?
      • Do we know where we are in the migration process?

      Changes to security & governance

      • Have we identified how our attack surface changes in the cloud?
      • Do we have guardrails in place to govern self-provisioning users?
      • Are we managing cost overage risks?

      Replicating old habits

      • Have we made concrete plans to leverage cloud capabilities to standardize and automate outputs?
      • Are we simply reproducing existing systems in the cloud?

      Changes to Skills & Roles

      • Is our staff excited to learn new skills and technologies? Are our specialists prepared to acquire generalist skills to support cloud services?
      • Do we have training plans created and aligned to our technology roadmap?
      • Do we know what head count we need?

      Misaligned stakeholders

      • Have we identified our key stakeholders and teams? Have we considered what changes will impact them and how?
      • Are we meeting regularly and collaborating effectively with our peers, or are we siloed?

      Review cloud objectives and obstacles

      Whiteboard Activity

      1 hour

      1. With your working group, review why you’re using cloud in the first place. What advantages do you expect to realize by adopting cloud services? If we achieve what we’ve set out to do, what should that look and feel like to us, our organization, and our organization’s customers?
        • You should have identified cloud drivers and objectives in your cloud vision and strategy – leverage and validate what you already have!
      2. Next, identify obstacles that are preventing you from fully realizing the value of cloud services.
      3. Finally, brainstorm initial ideas for change. What could we start doing that could help us better use cloud in the future? Are there changes to how we need to organize ourselves to collaborate more effectively?
      InputOutput
      • Insight into and experience with your current cloud environment
      • Identified key business outcomes you expect to realize by adopting cloud services
      • Identified challenges and obstacles that are preventing you from realizing key outcomes
      MaterialsParticipants
      • Whiteboard/Flip chart
      • Cloud operations design working group.

      Commonly cited advantages and obstacles

      Cloud Advantages/Objectives

      • Deliver faster on commitments to the business by removing infrastructure provisioning as a bottleneck.
      • Simplify capacity management on flexible cloud-based infrastructure.
      • Reduce capital spending on IT infrastructure.
      • Create sandboxes/innovation practices to experiment with and develop new functionality on cloud platforms.
      • Easily enable ubiquitous access to key corporate services.
      • Minimize the expense and effort required to maintain a data center – power & cooling, cabling, or physical hardware.
      • Leverage existing automation tools from cloud vendors to speed up integration and deployment.
      • Direct costs for specific services can improve transparency and cost allocation, allowing IT to directly “show-back” or charge-back cloud costs to specific cost centers.

      Obstacles

      Need to speed up provisioning of PaaS/IaaS/data resources to development and project teams.

      No time to develop and improve platform services and standards due to other responsibilities.

      We constantly run up unexpected cloud costs.

      Not enough time for continuous learning and development.

      The business will buy SaaS apps and only let us know after they’ve been purchased, leading to overlapping functionality; gaps in compliance, security, or data protection requirements; integration challenges; cost inefficiencies; and more.

      Role descriptions haven’t kept up with tech changes.

      Obvious opportunities to rationalize costs aren’t surfaced (e.g. failing to make use of existing volume licensing agreements).

      Skills needed to properly operate cloud solutions aren’t identified until breakdowns happen.

      Establish organization design principles

      You’ve established a need for organizational change. What will that change look like?

      Design principles are concise, direct statements that describe how you will design your organization to achieve key objectives and address key challenges.

      This is a critically important step for several reasons:

      • A set of clear, concise statements that describe what the design should achieve provides parameters that will help you create and evaluate different design options.
      • A focused, facilitated discussion to create those statements will help uncover conflicting assumptions between key stakeholders.
      • A comprehensive description of the various ways the organization should change makes it easier to identify misaligned or incompatible objectives.
      • A description of what your organization should look like in the future will help you identify where changes will be required .

      Examples of design principles:

      1. We will create a path to review and publish effective application/platform patterns.
      2. A single governing body should have oversight into all cloud costs.
      3. Development must happen only on approved cloud platforms.
      4. Application teams must address operational issues that derive from the applications they’ve created.
      5. Security practices should be embedded into approved cloud platforms and be automatically applied wherever possible.
      6. Focus is on improving developer experience on cloud platforms.

      Info-Tech Insight

      Design principles will often change as the organization’s strategy evolves.

      Align design principles to your objectives

      Developing design principles starts with your key objectives. What do we absolutely have to get right to deliver value through cloud services?

      Once you have your direction set, work through the points in the star model to establish how you will meet your objectives and deliver value. Each point in the star is an important element in your design – taken together, it paints a holistic picture of your future-state organization.

      The changes you choose to implement that affect capabilities, structure, processes, rewards, and people should be self-reinforcing. Each point in the star is connected to, and should support, the other points.

      “There is no one-size-fits-all organization design that all companies – regardless of their particular strategy needs – should subscribe to.”

      – Jay Galbraith, “The Star Model”

      The image contains a screenshot of a modified versio of Jay Galbraith's Star Model of Organizational Design.

      Establish design principles

      Track your findings in the table on the next slide.

      1. Review the cloud objectives and challenges from the previous activity. As a group, decide from that list: what are the key objectives you are trying to achieve? What are the things you absolutely must get right to get value from cloud services?
      2. Work through the following questions as a group:
        • What capabilities or technologies do we need to adopt or leverage differently?
        • How must our structure change? How will power shift in the new structure?
        • Will our new structure require changes to processes or information sharing?
        • How must we change how we motivate or reward employees?
        • What new skills or knowledge is required? How will we acquire those skills or knowledge?
      InputOutput
      • Cloud objectives and challenges
      • Different viewpoints into how your organization must change to realize objectives and overcome challenges
      • Organizational design principles for cloud operations
      MaterialsParticipants
      • Whiteboard/Flip charts
      • Cloud operations design working group

      Design principles (example)

      What is our key objective?

      • Rapidly develop innovative cloud services aligned to business value.

      What capabilities or technologies do we need to adopt or leverage differently?

      • We will adopt more agile development techniques to make smaller changes, faster.
      • We will standardize and automate tasks that are routine and repeatable.

      How must our structure change? How will power shift in the new structure?

      • Embed development teams within business units to better align to business unit needs.
      • Create a focused cloud platform team to develop infrastructure services.

      Will our new structure require changes to processes or information sharing?

      • Development teams will take on responsibility for application support.
      • Platform teams will be deeply embedded with development teams on new projects to build new infrastructure functionality.

      How must we change how we motivate or reward employees?

      • We will highlight innovative work across the company.
      • We will encourage experimentation and risk-taking.

      What new skills or knowledge is required, and how will we acquire it?

      • We will focus on acquiring skills most closely aligned to our technology roadmap.
      • We will ensure budget is available for training employees who ask for it.
      • We will contract to find skills we cannot develop in-house and use engagements as an opportunity to learn internally.

      Step 1.2: Evaluate new ways of working

      Participants

      Cloud Operations Design Working Group

      Outcomes

      Shared understanding of the horizon of work possibilities:

      • Ways to work
      • Ways to govern and learn

      Consider the different approaches on the following slides, how they change operational work, and decide which approaches are the right fit for you.

      Evaluate new ways of working

      Cut through the hype

      • There are new approaches/ways of working that deal head on with the persistent breakdowns and headaches that come with operations management – work thrown over the wall from development, manual and repetitive work, siloed teams, and more.
      • Many of these approaches emphasize an operations-aware approach to solutions development and apply techniques traditionally associated with AppDev to Operations.
      • Cloud services present opportunities to outsource/automate away routine tasks.

      “DevOps is a set of practices, tools, and a cultural philosophy that automates and integrates the processes between software development and IT teams. It emphasizes team empowerment, cross-team communication and collaboration, and technology automation.”

      – Atlassian, “DevOps”

      “ITIL 4 brings ITIL up to date by…embracing new ways of working, such as Lean, Agile, and DevOps.”

      – ITIL Foundation: ITIL 4 Edition

      “Over time, left to their own devices, the SRE team should end up with very little operational load and almost entirely engage in development tasks, because the service basically runs and repairs itself.”

      – Ben Treynor Sloss, “Site Reliability Engineering”

      The more things change, the more they stay the same:

      • Core processes remain, but they may be done differently, and new technologies and services create new challenges.
      • Not all approaches are right for all organizations, and what’s right for you depends on how you use cloud services.
      • The best solution draws from these management ideas to build an approach to operations that is right for you.

      Leverage patterns to think about new ways of approaching operations work

      Patterns are strategies, approaches, and philosophies that can help you imagine new ways of working in your own organization.

      • The following slides provide an overview of organizing patterns that are applicable to cloud operations.
      • These are strategies that have been applied successfully elsewhere. Review what they can and cannot do and decide whether they are something you can use in your own organizational design.
      • Not every pattern will apply to every organization. For example, an organization which typically consumes SaaS applications will likely have very little need for SRE approaches and techniques.

      Ways to work

      • What work do we do? What skills do we need?
      • How do we create and support systems?

      Ways to govern and learn

      • How do we set and enforce rules?
      • How do we create and share knowledge?

      Explore Applicable Patterns

      Ways to work

      Ways to govern and learn

      1. DevOps

      2. Site Reliability Engineering

      3. Platform Engineering

      4. Cloud Centre of Excellence

      5. Cloud Community of Practice

      What is DevOps?

      “Look for obstacles constantly and treat them as opportunities to experiment and learn.” – Jez Humble, et al. Lean Enterprise: How High Performance Organizations Innovate at Scale

      What it is NOT

      What it IS

      Why Use It

      • Another word for automation or CI/CD tools.
      • A specific role.
      • A fix-all to address friction between existing siloed application and development teams.
      • An approach that will be successful without getting the basics right first.
      • The right fit for every IT organization or every team.

      An operational philosophy that seeks to:

      • Converge accountability for development and operations to align all teams to the goal of delivering customer value.
      • Improve the relationship between Development and Operations teams.
      • Increase the rate of deployment of valuable functionality into production.
      • “A cultural shift giving development teams more control over shipping code to production.” 1
      • You’re doing a lot of custom development.
      • There are opportunities for operations and development teams to work more closely.
      • You want to improve coding quality and throughput.
      • You want to shift the culture of the team to focus on customer value rather than exclusively uptime or new features.
      1 DevOps, SRE, and Platform Engineering

      What is Site Reliability Engineering (SRE)?

      “Hope is not a strategy” – Benjamin Treynor Sloss, Site Reliability Engineering: How Google Runs Production Systems

      What it is NOT

      What it IS

      Why Use It

      • Deeply focussed on a specific technical domain; SRE work “does not discriminate between infrastructure, software, networking, or platforms.” 2
      • A different name for a team of sysadmins.
      • A programming framework or a specific set of technologies.
      • A way to manage COTS software. SRE is less useful when you’re using applications out-of-the-box with minimal customization, integration, or development.
      • An application of skills and approaches from software engineering to improve system reliability.
      • A team responsible for “availability, latency, performance, efficiency, change management, monitoring, emergency response, and capacity planning.”3
      • A team responsible for building systems that become “a platform and workflow that encompasses monitoring, incident management, eliminating single points of failure, [and] failure mitigation.”1
      • You are building services and providing them at scale.
      • You want to improve reliability and reduce “the frequency and impact of failures that can impact the overall reliability of a cloud application.”1
      • You need to define related service metrics and SLOs.
      • To increase the use of automation in operations to avoid mistakes and minimize toil. 3
      1 SRE vs Platform Engineering
      2. Lakhani, Usman. “ISite Reliability Engineering: What Is It? Why Is It Important for Online Businesses?,” 2020.
      3. Sloss, “Introduction,” 2017

      What4 is Platform Engineering?

      “Platform engineers can act as a shield between developers and the infrastructure”

      – Carlos Schults, “What is Platform Engineering? The Concept Behind the Term”

      What it is NOT

      What it IS

      Why Use It

      • A team that manages every aspect of each application on a particular platform.
      • Focussed solely on platform reliability and availability.
      • A different name for a team of sysadmins.
      • Needed for all cloud service deployments. Platform engineers are most useful when you’re building extensively on a particular platform (e.g. AWS, Azure, or your internal cloud).
      • Platform engineers design, build, and manage the infrastructure that supports and hosts work done by developers.
      • The work done by platform engineering allows developers to avoid the repetitive work of setting everything up anew each time.
      • Requires engineers with a deep understanding of cloud services and other platform technologies (e.g. Kubernetes).
      • The big public cloud platforms are built for everyone. You need platform engineering when you need to extensively adapt or manage standard cloud services to support your own requirements.
      • Platform engineers are responsible for creating a secure, stable, maintainable environment that enables developers to do their work faster and without having to manage the underlying technology infrastructure.
      1 DevOps, SRE, and Platform Engineering

      What is a Cloud Center of Excellence?

      You need a strong core to grow a cloud culture.

      What it is NOT

      What it IS

      Why Use It

      • A project management office (PMO) for cloud services.
      • An easy, quick, or temporary fix to cloud governance problems. The CCoE requires champions who provide ongoing support to realize value over time.
      • An approach that’s only for enterprise-sized IT organizations.
      • A standing meeting – members of the CCoE may meet regularly to review progress on their mandate, but work and collaboration need to happen outside of meetings.
      • A cross-functional team responsible for oversight of all cloud initiatives, including architectural, technical, security, financial, contractual, and operational aspects of planned and deployed solutions.
      • The CCoE’s responsibilities typically include governance and continuous improvement; alignment between technical and accounting practices; documentation, training, best practices and standards development; and vendor management.
      • CCoE duties are often part of an existing role rather than a full-time responsibility.
      • You want to enable a core group of cloud experts to promote collaboration and accelerate adoption of cloud services, including members from infrastructure, applications, and security.
      • You need to manage cloud risks, set guidelines and policies, and govern costs across cloud environments.
      • There is an unmet need for training, knowledge sharing, and best practice development across the organization.

      What is a Cloud Community of Practice?

      “We have to stop optimizing for programmers and start optimizing for users”

      – Jeff Atwood

      What it is NOT

      What it IS

      Why Use It

      • A replacement for effective oversight and governance practices, though they may help users navigate and understand governance requirements.
      • A way to advertise cloud to potential new practitioners – engaged members of a CoP are typically already using a particular service.
      • Always exclusively composed of internal staff; in certain cases, a CoP could have external members as well.
      • A network of engaged users and experts who share knowledge and best practices for related technologies, crowdsource solutions to problems, and suggest improvements.
      • Often supported by communication and collaboration tools (e.g. chat channels, knowledge base, forums). May use a range of techniques (e.g. drop-ins, vendor-led training, lunch and learns).
      • Communities of practice may be deliberately created by the organization or develop organically.
      • Communities of practice are an effective way for practitioners to support one another and share ideas and solutions.
      • A CoP can help “shift left” work and help practitioners help themselves.
      • An engaged CoP can help IT to identify improvement opportunities and can also be a channel to communicate updates or changes to practitioners.

      Reinforce what we mean by patterns

      Patterns are . . .

      Ways of Working

      • Sets of habits, processes, and methodologies you want to adopt as part of your operational guidelines and commonly agreed upon definitions.

      Patterns are also . . .

      Ways to Govern and Learn

      • The formal and informal practices and groups that focus on enabling governance, risk management, and adoption.

      Review the implications of each pattern for organizational design

      Ways of Working

      DevOps

      Development teams take on operational work to support the services they create after they are launched to production.

      Some DevOps teams may be aligned around a particular function or product rather than a technology – there are individuals with skills on a number of technologies that are part of the same team.

      Site Reliability Engineering (SRE)

      In the beginning, you can start to adopt SRE practices within existing teams. As demand grows for SRE skills and services, you may decide to create focused SRE roles or teams.

      SRE teams may work across applications or be aligned to just infrastructure services or a particular application, or they may focus on tools that help developers manage reliability. SREs may also be embedded long-term with other teams or take on an internal consulting roles with multiple teams.1

      Platform Engineering

      Platform engineering will often, though not always, be the responsibility of a dedicated team. This team must work very closely with, and tuned into the needs of, its internal customers. There is a constant need to find ways to add value that aren’t already part and parcel of the platform – or its external roadmap.

      This team will take on responsibility for the platform, in terms of feature development, automation, availability and reliability, security, and more. They may also be internal consultants or advisors on the platform to developers.

      1. Gustavo Franco and Matt Brown, “How SRE teams are organized and how to get started.”

      Review the implications of each pattern for organizational design

      Ways to Govern and Learn

      Cloud Center of Excellence

      • A CCoE is a cross-functional group with technical experts from security, infrastructure, applications, and more.
      • There should, ideally, be someone focused on leading the CCoE full-time – often someone with an architecture background. Team members may work on the CCoE part-time alongside their main role, and dedicate more of their time to the CCoE as needed.
      • As the CCoE is a governance function, it will typically bridge and sit above teams working on cloud services, reporting to the CIO, CTO, or to an architecture function.

      Cloud Community of Practice

      • Participation in a community of practice is often above and beyond a core role – it’s a leadership activity taken on by technologically adept experts with a drive to help others.
      • Some organizations will create a role to foster community collaboration, run events, raise opportunities and issues identified by the community with product or technology teams, manage collaboration tools, and more.

      Evolve your organization to meet the needs of increased adoption

      Your operating model should evolve as you increase adoption of cloud services.

      Least Adoption Greatest Adoption

      Initial Adoption

      Early Centralization

      Scaling Up

      Full Steam Ahead

      • One or more small agile teams design, build, manage, and operate individual solutions on cloud resources. Solutions provide early value, and identify new opportunities using small, safe-to-fail experiments.
      • Governance is likely done locally to each team. Knowledge sharing, guidelines, and standards are likely informal.
      • Early experience with cloud services help the organization identify where to invest in cloud services to best meet business demands.
      • Accountability and governance over the platform are more clearly defined, possibly still separate from core IT governance processes. Best practices may be shared across teams through a Community of Practice.
      • Operations may be centralized, where valuable, to support monitoring and incident response.
      • Additional product/service-aligned development teams are created to keep up with demand.
      • There is a focused effort to consolidate best practices and platform knowledge, which can be supported through a culture of learning, effective automation, and appropriate tools.
      • The CCoE takes on additional roles in cloud governance, security, operations, and administration.
      • The organization has reached a relatively steady-state for cloud adoption. Innovation and new service development takes place on a stable platform.
      • A Cloud Center of Excellence is accountable for cloud governance across the organization.
      Adapted from Microsoft, “Get Started: Align your organization,” 2021

      Choose new ways of working that make sense for your team

      1 hour

      Consider if, and how, the approaches to management and governance you’ve just reviewed can offer value to your organization.

      1. List the organizing/managing ideas listed in the previous slides in the table below.
      2. Define why it’s for you. What benefits do you expect to realize? What challenges do you expect this will help you overcome? How does this align with your key benefits and drivers for moving to cloud?
      3. List risks or challenges to adoption. Why will it be hard to do? What could get in the way of adoption? Why might it not be a good fit?
      4. Identify next steps to adopt proposed practices.

      Why it’s for us (drivers)

      Risks or challenges to adoption

      Next steps to build/adopt it

      CCoE

      DevOps

      InputOutput
      • Related Info-Tech slides on new ways of working.
      • Opportunities and challenges in your own cloud deployment that may be addressed through new ways of working.
      • Identify new ways of working aligned to your goals.
      MaterialsParticipants
      • Whiteboard/Flip chart
      • Cloud Operations Design Working Group

      Step 1.3: Identify cloud work

      Participants

      • Operations Design Working Group

      Outcomes

      • Identify core work required to deliver value in key cloud workstreams.

      “At first, for many people, the cloud seems vast. But what you actually do is carve out space.”

      –DevOps Manager

      Identify work

      Before you can identify roles and responsibilities, you have to confirm what work you do as an organization and how that work enables you to meet your goals.

      • A comprehensive approach that connects the work you do to your organizational goals will help you identify work that’s falling through the cracks.
      • Identifying work is an opportunity to look at the tasks you regularly execute and ensure they actually drive value.
      • Working through the exercise as a group will help you develop a common language around the work you do.
      • To make the evident obvious: you can’t decide who should be responsible for something if you don’t know about it in the first place.

      Defining work can be a lot of … work! We recommend you start by identifying work for the workstream you do most – Build, Consume, or Host – to focus your efforts. You can repeat the exercise as needed.

      Map work in workstream diagrams

      The image contains a screenshot of the map work in workstream diagrams.

      The five Well-Architected Framework pillars. These are principles/directions/guideposts that should inform all cloud work.

      The work being done to achieve the workstream target. These are roughly aligned with the three streams on the right.

      Workstream Target: A concise statement of the value you aim to achieve through this workstream. All work should help deliver value (directly or indirectly).

      Define the scope of the exercise

      Whiteboard Activity

      20 minutes

      Over the next few exercises, you’ll do a deep dive into the work you do in one specific workstream. In this exercise, we’ll decide on a workstream to focus on first.

      1. Are you primarily building, hosting on, or consuming cloud services? Start with the workstream where you’re doing the most work.
      2. If this isn’t sufficient to narrow your focus, look at the workstream that is most closely tied to mission critical applications, or that is most in need of review in terms of what work is done and who does it.
      3. You can narrow the scope further if there’s a very specific sub-area that differs from the rest (e.g. managing your O365 environment vs. managing all SaaS applications).
      InputOutput
      • Insight into and experience with your current cloud environment.
      • Your completed cloud maturity assessment.
      • Identify one workstream where you’ll define work first.
      MaterialsParticipants
      • None
      • Cloud Operations Design Working Group

      Create a workstream target statement

      Whiteboard Activity

      30 minutes

      In this activity, come up with a short sentence to describe what all this work you do is building toward. The target statement helps align participants on why work is being done and helps focus the activity on work that is most important to achieving the target statement.

      Start with this common workstream target statement:

      “Deliver valuable, secure, available, reliable, and efficient cloud services.”

      Now, review and adjust the target statement by working through the questions below:

      1. Return to the earlier exercises in Phase 1.1 where you reviewed your key objectives for cloud services. Does the target statement align with what you’d identified previously?
      2. Who is the customer for the work you do? Would they see the target differently than you’ve described it?
      3. Can you be more specific? Are there value drivers that are more specific to your industry, organization, business functions, or products that are key to the value your customers receive from this workstream?
      InputOutput
      • Previous exercises.
      • Workstream target statement.
      MaterialsParticipants
      • Whiteboard/Flip chart
      • Cloud Operations Design Sketchbook
      • Cloud Operations Design Working Group

      Identify cloud work

      1-2 hours

      1. Use the workstream diagram template in the Cloud Operations Design Sketchbook, or draw the template out on a whiteboard and use sticky notes to identify work.
      2. Identify the workstream at the top of the slide. Update the template value statement on the right with the value statement you created in the previous exercise.
      3. Review one or more of the examples in the Cloud Operations Design Sketchbook to get a sense of the level of detail required for this exercise.

      Activity instructions continue on the next slide.

      Some notes to the facilitator:

      • Working directly from the Cloud Operations Design Sketchbook will save you time with transcription. Sharing the document with participants (e.g. via OneDrive) will allow you to collaborate and edit the document together in real-time.
      • Don’t worry about being too tidy for the moment, just get the information written down and you can clean up the diagram later.
      InputOutput
      • Previously identified design principles.
      • An understanding of the work done, and that needs to be done, in your cloud environment.
      • Identify the work that needs to be done to support your key cloud services workstream in the future.
      MaterialsParticipants
      • Cloud Operations Design Sketchbook
      • Whiteboard and sticky notes (optional)
      • Cloud Operations Design Working Group

      Identify cloud work (cont’d)

      4. Work together to identify work, documenting one work item per box. This should focus on future state, so record work whether it’s actually done today or not. Your space is limited on the sheet, so focus on work that is indispensable to delivering the value statement. Use the lists on the right as a reminder of key IT practice areas.

      5. As much as possible, align the work items to the appropriate row (Govern & Align, Design & Execute, or Validate, Support & Monitor). You can overlap boxes between rows if needed.

      Have you captured work related to:

      ITIL practices, such as:

      • Request management
      • Incident & problem management
      • Service catalog
      • Service level management
      • Configuration management

      Security-aligned practices, such as:

      • Identity & access management
      • Vulnerability management
      • Security incident management

      Financial practices, such as:

      • IT asset management
      • Cost management & budgeting
      • Vendor management
      • Portfolio management

      Data-aligned practices, such as:

      • Data integrations
      • Data governance

      Technology-specific tasks, such as:

      • Network, Server & Storage
      • Structured/unstructured DBs
      • Composite services
      • IDEs and compilers

      Other key practices:

      • Monitoring & observability
      • Continuous improvement
      • Testing & quality assurance
      • Training and knowledge management
      • Manage shadow IT

      Info-Tech Insight

      Cloud work is not just applications that have been approved by IT. Consider how unsanctioned software purchased by the business will be integrated and managed.

      Identify cloud work (cont’d)

      6. If you have decided to adopt any of the new ways of working outlined in Step 1.2 (e.g. DevOps, SRE, etc.) review the next slide for examples of the type of work that frequently needs to be done in each of those work models. Add any additional work items as needed.

      7. Consolidate boxes and clean up the diagram (e.g. remove duplicate work items, align boxes, clarify language).

      8. Do a final review. Is all the work in the diagram truly aligned with the value statement? Is the work identified aligned with the design principles from Step 1.1?

      If you used a whiteboard for this exercise, transcribe the output to a copy of the Cloud Operations Design Sketchbook, and repeat the exercise for other key workstreams. You will use this diagram in Phase 2.

      Examples of work

      Examples of work in the "Host" workstream:

      • Bulk patch servers
      • Add a server
      • Add capacity
      • Develop a new server template
      • Incident management

      Examples of work in the "Build" workstream:

      • Provision a production server
      • Provision a test environment
      • Test recovery procedures
      • Add capacity for a service
      • Publish a new pattern
      • Manage capacity/performance for a service
      • Identify wasted spend across services
      • Identify performance bottlenecks
      • Review and shut down idle/unneeded services

      Examples of work in the "Consume" workstream:

      • Conduct vendor risk assessments
      • Develop a standard evaluation matrix to compare solutions to existing or potential in-house offerings
      • Onboard a solution
      • Offboard a solution
      • Conduct a renewal
      • Review and negotiate a contract
      • Rationalize software titles

      Phase 2:

      Design the organization and communicate changes

      Phase 1

      Phase 2

      1.1 Establish operating model design principals by identifying goals & challenges, workstreams, and cloud maturity

      1.2 Evaluate new ways of working

      1.3 Identify cloud work

      2.1 Draft an operating model

      2.2 Communicate proposed changes

      Phase Outcomes:

      Draft your cloud operations diagram, identify key messages and impacts to communicate to your stakeholders, and build out the Cloud Operations Organizing Framework communication deck.

      Step 2.1: Identify groups and responsibilities

      Participants

      • Operations Design Working Group

      Outcomes

      • Cloud Operations Diagram
      • Success Indicators
      • Roadmap

      “No-one ever solved a problem by restructuring.”

      – Anonymous

      Visualize your cloud operations

      Create a visual to help you abstract, analyze, and clarify your vision for the future state of your organization in order to align and instruct stakeholders.

      Create a visual, high-level view of your organization to help you answer questions such as:

      • “What work do we do? What are the roles and responsibilities of different teams?”
      • “How do we interact between work areas?”
      • “How has our organization changed already, and what additional changes may be needed?”
      • “How do we make technology decisions?”
      • “How do we provide services?”
      • “How might this change be received by people on the ground?”
      The image contains a screenshot of the Cloud Operations Diagram Example.

      Decide whether to centralize or decentralize

      Specialization & Focus: A group or work unit developing a focused concentration of skills, expertise, and activities aligned with an area of focus (such as the ones at right).

      Decentralization: Operational teams that report to a decentralized IT or business function, either directly or via a “dotted line” relationship.

      Decentralization and Specialization can:

      • Duplicate work.
      • Localize decision-making authority, which can increase agility and responsiveness.
      • Transfer authority and accountability to local and typically smaller teams, clarifying responsibilities and encouraging staff to take ownership for service delivery.
      • Enable the team to focus on complex and rapidly changing technologies or processes.
      • Create islands of expertise, which can get in the way of collaboration, innovation, and decision making across groups and work units and make oversight difficult.
      • Complicate the transfer of resources and knowledge between groups.

      Examples: Areas of Focus

      Business unit

      • Manufacturing
      • R&D
      • Sales & Marketing

      Region

      • Americas
      • EMEA
      • APAC

      Service

      • ERP
      • Commercial website

      Technology

      • On-premises servers/storage
      • Network
      • Cloud services

      Operational process focus

      • Capacity management & planning
      • Incident management
      • Problem management

      “The concept of organization design is simple in theory but highly complex in practice. Like any strategic decision, it involves making multiple trade-offs before choosing what is best suited to a business context.”

      – Nitin Razdan & Arvind Pandit

      Identify key work areas

      Balance specialization with effective collaboration

      • Much is said about breaking down organizational silos. But at some level, silos are inevitable – any company with more than one employee will have to divide work up somehow.
      • Dividing up work is a delicate balancing act – ensuring individuals and groups are able to do work that is related, meaningful, and that allows autonomy while allowing for effective collaboration between groups that need to work together to achieve business goals.

      Why “work areas”?

      Why don’t we just use teams, groups, squads, or departments, or some other more common term for groups of people working together?

      • We are not yet at the point of deciding who in the organization should be aligned to which areas in the design.
      • Describing work areas as teams can shift the conversation to the organizational chart – to who does the work, rather than what needs to be done.

      That’s not the goal of this exercise. If the conversation gets stuck on what you do today, it can get in the way of thinking about what you need to do in the future.

      Create a future-state cloud operations diagram

      1-3 hours

      1. Review the example cloud operations diagram example in your copy of the Cloud Operations Design Sketchbook.
      2. Identify key work areas (e.g. applications, infrastructure, platform engineering, DevOps, security). Add the name of each work area in one of the larger boxes.
        • Go back to your design principles. Did you define any work areas in your design principles that should be represented here?
        • If you have several groups or teams with similar responsibilities, consider lumping them together in one box (e.g. applications teams, 3x DevOps teams).
      3. Copy the tasks from any workstream diagrams you’ve created to the same slide as the organization design diagram. Keep the workstream diagram intact, as you’ll want to be able to refer back to it later.

      Activity instructions continue on the next slide.

      InputOutput
      • Insight into and experience with your current cloud environment.
      • Cloud Operations Diagram
      MaterialsParticipants
      • Whiteboard/Flip charts
      • Cloud Operations
      • Cloud Operations Design Working Group

      Cloud operations diagram (cont’d)

      1-3 hours

      4. As a group, move the work boxes from the workstream diagram into the appropriate work area.

      • Don’t worry about being too tidy for the moment – clean up the diagram when the exercise is done.
      • Make adjustments to the wording of the work boxes if needed.

      5. Use the space between work areas to describe how work areas must interact to achieve organizational goals. For example:

      • What information should be shared between groups?
      • What information sharing channels may be used?
      • What processes will be handed-off between groups and how?
      • How often will teams interact?
      • Will interactions be formal or informal?

      Create a current-state operations diagram

      1 -2 hours

      This exercise can be done by one person, then reviewed with the working group at a later time.

      This current state diagram helps clarify the changes that may need to happen to get to your future state.

      1. Color code the work boxes for each work area. For example, if you have a “DevOps” work area, make all the work boxes assigned to “DevOps” the same color.
      2. On a separate slide, sketch your existing organization indicating your current teams.
      3. Copy the tasks from the future-state diagram to this current-state chart. Align the tasks to the appropriate groups.
      4. Review the chart with the working group. Discuss: are there teams that are doing work today that will also be done by different teams? Are there groups that may merge into one team? What types of changes may be required?
      InputOutput
      • Future-state cloud operations diagram
      • Current-state cloud operations diagram
      MaterialsParticipants
      • Cloud Operations Design Sketchbook
      • Projector/screen/virtual meeting
      • Project lead
      • Cloud Operations Design Working Group

      Check for biases to make better choices

      Use the strategies below to spot and address flaws in your team’s thinking about your future-state design.

      Biases

      What’s the risk?

      Mitigation strategies

      Is the team making mistakes due to self-interest, love of a single idea, or groupthink?

      Important information may be ignored or left unspoken.

      Rigorously check for the other biases, below. Tactfully seek dissenting opinions.

      Do recommendations use unreasonable analogies to other successes or failures?

      Opportunities or challenges in the current situation may not be sufficiently understood.

      Ask for other examples, and check whether the analogies are still valid.

      Is the team blinkered by the weight of past decisions?

      Doubling-down on bad decisions (sunk costs) or ignoring new opportunities.

      Ask yourself what you'd do if you were new to the position or organization.

      Does the data support the recommendations?

      Data used to make the case isn't a good fit for the challenge, is based on faulty assumptions, or is incomplete.

      If you had a year to make the decision, what data would you want? How much can you get?

      Are there realistic alternative recommendations?

      Alternatives don't exist or are "strawman" options.

      Ask for additional options.

      Is the recommendation too risk averse or cautious?

      Recommendations that may be too risky are ignored, leading to missed opportunities.

      Review options to accept, transfer, distribute, or mitigate the risk of the decision.

      Framework above adapted from Kahneman, Lovallo, and Sibony (2011)

      Be specific with metrics

      Thinking of ways you could measure success can help uncover what success actually means to you.

      Work collectively to generate success indicators for each key cloud initiative. Success indicators are metrics, with targets, aligned to goals, and if you are able to measure them accurately, they should help you report your progress toward your objectives.

      For example, if your driver is “faster access to resources” you might consider indicators like developer satisfaction, project completion time, average time to provision, etc.

      There are several reasons you may not publicize these metrics. They may be difficult to calculate or misconstrued as targets, warping behavior in unexpected ways. But managed properly, they have value in measuring operational success!

      Examples: Operations redesign project metrics

      Key stakeholder satisfaction scores

      IT staff engagement scores

      Support Delivery of New Functionality

      Double number of accepted releases per cycle

      80% of key cloud initiatives completed on time, on budget, and in scope

      Improve Operational Effectiveness

      <1% of servers have more than two major versions out of date

      No more than one capacity-related incident per Q

      Define success indicators

      Whiteboard Activity

      45 minutes

      1. On a whiteboard, draw a table with key objectives for the design across the top.
        • What cloud objectives should the redesign help you achieve? Refer back to the design principles from Phase 1.
        • Think about the redesign itself. How will you measure whether the project itself is proceeding according to plan? Consider metrics such as employee engagement scores and satisfaction scores from key stakeholders.
      2. Consider whether the metrics are feasible to track. Record your decisions in your copy of the Cloud Operations Organizing Framework deck.
      InputOutput
      • Key design goals
      • Success indicators for your design
      MaterialsParticipants
      • Whiteboard
      • Markers
      • Cloud Operations Design Working Group

      Populate a roadmap

      Tool Activity

      45 minutes

      1. In the Roadmap Tool, populate the data entry tab with the initiatives you will take to support changes toward the new cloud operations organizing framework.
      2. Input each of the tasks in the data entry tab and provide a description and rationale behind the task (as needed).
      3. Assign an effort, priority, and cost level to each task (high, medium, low).
      4. Assign an owner to each task – someone who can take points and shepherd the task to completion.
      5. Identify the timeline for each task based on the priority, effort, and cost (short, medium, and long term).
      6. Highlight risk for each task if it will be deferred.
      7. Track the progress of each task with the status column.
      InputOutput
      • Cloud Operations Organizing Framework
      • Roadmap/ implementation plan
      MaterialsParticipants
      • Roadmap Tool
      • Cloud Operations Design Working Group

      Download the Roadmap Tool

      Step 2.2: Communicate changes

      Participants

      • Operations Design Working Group

      Outcomes

      • Build a communication plan for key stakeholders
      • Complete the communication deck Cloud Operations Organizing Framework
      • Build a roadmap

      “Words, words, words.”

      – Shakespeare

      Communicate changes

      Which stakeholders will be affected by the changes?

      Decision makers: Who do you ultimately need to convince to proceed with any changes you’ve outlined?

      Peers: How will managers of other areas be affected by the changes you’re proposing? If you are you suggesting changes to the way that they, or their teams, do their work, you will have to present a compelling case that there’s value in it for them.

      Staff: Are you dictating changes or looking for feedback on the path forward?

      The image contains a screenshot of the Five Elements of Change that is displayed in a cycle. The five elements are: What is the change? Why are we doing it? How are we going to go about it? How long will it take us? What is the role of each team and individual.

      Source: The Qualities of Leadership: Leading Change

      Follow these guidelines for good communication

      Be relevant

      • Talk about what matters to each stakeholder group.
      • Talk about what matters to the initiative.
      • IT thinks in processes but stakeholders only care about results: talk in terms of results.
      • IT wants to be “understood” but this does not matter to stakeholders; think “what’s in it for them?”
      • Communicate truthfully; do not make false promises or hide bad news.
      • If you expect objections, create a plan to handle them.

      Be clear

      • Lead with the point you’re trying to make.
      • Don’t use jargon.
      • Avoid idiomatic language and clichés.
      • Have a third party review draft communications and ask them to tell you the key messages in their own words. If they’re missing the main points, there’s a good chance the draft isn’t clear.

      Be consistent

      • Ensure the core message is consistent regardless of audience, channel, or medium.
      • Changing the core message from one group to another can be interpreted as incompetence or an attempt at deception. This will damage your credibility and can lead to a loss of trust.

      Be concise

      • Get to the point.
      • Minimize word count wherever possible.

      “We tend to use a lot of jargon in our discussions, and that is a sure fire way to turn people away. We realized the message wasn’t getting out because the audience wasn’t speaking the same language. You have to take it down to the next level and help them understand where the needs are.”

      – Jeremy Clement, Director of Finance, College of Charleston

      Create a communication plan

      1 hour

      Fill out the table below.

      Stakeholder group: Identify key stakeholders who may be impacted by changes to the operations team. This might include IT leadership, management, and staff.

      Benefits: What’s in it for them?

      Impact: What are we asking in return?

      How: What mechanisms or channels will you use to communicate?

      When: When (and how often) will you get the message out?

      Benefits

      Impact

      How

      When

      IT Mgrs.

      • Improve agility, stability
      • Deliver faster against business goals
      • Respond to identified needs
      • Improve confidence in IT
      • Must support the process
      • Change and engagement issues during restructuring may affect staff engagement and productivity
      • Training budget required
      • Present at leadership meeting
      • Kick-off email
      • Sept. leadership meeting
      • Weekly touchpoints
      • Informally throughout project

      Ops Staff

      • Clearer direction and clear priorities (Operations mission statement and RACI)
      • Higher-value work – address problems, contribute to plans
      • New skills and training
      • More personal accountability
      • Push toward process consistency
      • Must make time and plan for training during work hours
      • Present at operations team’s offsite meeting
      • AMA channel on Slack
      • 1:1 meetings
      • Add RACI, org. sketch to shared folder
      • Operations offsite
      • Sept. all-hands meeting
      • Ongoing coaching and informal conversations
      InputOutput
      • Discussion
      • Communication Plan
      MaterialsParticipants
      • Whiteboard/Flip Chart
      • Cloud Operations Design Working Group

      Download the Communication Plan Template

      Support the transition with a plan to acquire skills

      Identify the preferred way to acquire needed skill sets: contracting, outsourcing, training, or hiring.

      • Some cloud projects will change the demand for some skills in the organization, and not all skills should be cultivated internally. Uncertainty about future skills and jobs will cause anxiety for your team and can lead to employee exit.
      • Use Info-Tech’s research to conduct a demand analysis to identify which new and critical skills should be acquired via training or hiring (rather than outsourcing or contracting).
      • Create a roadmap to clarify when training needs to be completed, a budget plan that accounts for training costs, and role descriptions that paint a picture of future work.
      • Within the confines of a collective agreement, managers may be required to retrain staff into new roles before those staff are required to do work in their new jobs. Failing to plan can be more consequential.
      • Remember that in cloud, a wealth of automation opportunities present a great option for offloading tasks as well!

      Info-Tech Insight

      Identify skills requirements and gaps as early as possible to avoid skills gaps later. Whether you plan to acquire skills via training or cross-training, hiring, contracting, or outsourcing, effectively building skills takes time. Use Info-Tech’s methodology to address skills gaps in a prioritized and rational way.

      Involve HR for implementation

      Your HR team should help you work through:

      • Which staff and managers will move to which roles, and any headcount changes.
      • Job descriptions, performance metrics, career paths, compensation, and succession planning.
      • Organizational change management and implementation plans.

      When do you need to involve HR?

      Role changes will result in job description changes.

      • New or changed job descriptions need to be evaluated for impact on pay, title, exempt status, career pathing, and more.
      • This is especially true in more traditional or unionized organizations that require specific and granular job descriptions of responsibilities.
      • Changed jobs will likely require union review and approval.

      You anticipate changes to the reporting structure.

      • Work with HR to develop a transition plan including communications, training to new managers, and support to new teams.

      You anticipate redundancies.

      • Your HR department can prepare you for difficult discussions, help you navigate labor laws, and support the offboarding process.

      You anticipate new positions.

      • Recruitment and hiring takes time. Give HR advance notice to support recruitment, hiring, and onboarding to ensure you hire the right people, with the right skills, at the right time.

      Training and development budget is required.

      • If training is a critical part of the onboarding process, don’t just assume funding is available. Work with HR to build your case.

      Related Info-Tech Research

      Define Your Cloud Vision

      Define your cloud vision before it defines you.

      Document Your Cloud Strategy

      Drive consensus by outlining how your organization will use the cloud.

      Map Technical Skills for a Changing Infrastructure & Operations Organization

      Be practical and proactive – identify needed technical skills for your future-state environment and the most efficient way to acquire them.

      Bibliography

      “2021 GitLab DevSecOps Survey.” Gitlab, 2021.
      “2022 State of the Cloud Report.” Flexera, 2022.
      “DevOps.” Atlassian, ND. Web. 21 July 2022.
      Atwood, Jeff. “The 2030 Self-Driving Car Bet.” Coding Horror, 4 Mar 2022. Web. 5 Aug 2022.
      Campbell, Andrew. “What is an operating model?” Operational Excellence Society, 12 May 2016. Web. 13 July 2022.
      “DevOps.” Atlassian, ND. Web. 21 July 2022.
      Ewenstein, Boris, Wesley Smith, Ashvin Sologar. “Changing change management” McKinsey, 1 July 2015. Web. 8 April 2022.
      Franco, Gustavo and Matt Brown. “How SRE teams are organized, and how to get started.” Google Cloud Blog, 26 June 2019. Web. July 13 2022.
      “Get started: Build a cloud operations team.” Microsoft, 10 May 2021.
      ITIL Foundation: ITIL 4 Edition. Axelos, 2019.
      Humble, Jez, Joanne Molesky, and Barry O’Reilly. Lean Enterprise: How High Performance Organizations Innovate at Scale. O’Reilly Media, 2015.
      Franco, Gustavo and Matt Brown. “How SRE teams are organized and how to get started.” 26 June 2019. Web. 21 July 2022.
      Galbraith, Jay. “The Star Model”. ND. Web. 21 July 2022.
      Kahnemanm Daniel, Dan Lovallo, and Olivier Sibony. “Before you make that big decision.” Harv Bus Rev. 2011 Jun; 89(6): 50-60, 137. PMID: 21714386.
      Kesler, Greg. “Star Model of Organizational Design.” YouTube, 1 Oct 2018. Web Video. 21 Jul 2022.
      Lakhani, Usman. “Site Reliability Engineering: What Is It? Why Is It Important for Online Businesses?” Info-Tech. Web. 25 May 2020.
      Mansour, Sherif. “Product Management: The role and best practices for beginners.” Atlassian Agile Coach, n.d.
      Murphy, Annie, Jamie Kirwin, Khalid Abdul Razak. “Operating Models: Delivering on strategy and optimizing processes.” EY, 2016.
      Shults, Carlos. “What is Platform Engineering? The Concept Behind the Term.” liatrio, 3 Aug 2021. Web. 5 Aug 2022.
      Sloss, Benjamin Treynor. Site Reliability Engineering Part I: Introduction. O’Reilly Media, 2017.
      “SRE vs. Platform Engineering.” Ambassador Labs, 8 Feb 2021.
      “The Qualities of Leadership: Leading Change.” Cornelius & Associates, n.d. Web.
      “Understand cloud operating models.” Microsoft, 02 Sept. 2022.
      Velichko, Ivan. “DevOps, SRE, and Platform Engineering.” 15 Mar 2022.

      Research Contributors and Experts

      Nenad Begovic

      Executive Director, Head of IT Operations

      MUFG Investor Services

      Desmond Durham

      Manager, ICT Planning & Infrastructure

      Trinidad & Tobago Unit Trust Corporation

      Virginia Roberts

      Director, Enterprise IT

      Denver Water

      Denis Sharp

      IT/LEAN Consultant

      Three anonymous contributors

      Design a Coordinated Vulnerability Disclosure Program

      • Buy Link or Shortcode: {j2store}322|cart{/j2store}
      • member rating overall impact: 10.0/10 Overall Impact
      • member rating average dollars saved: $10,000 Average $ Saved
      • member rating average days saved: 20 Average Days Saved
      • Parent Category Name: Threat Intelligence & Incident Response
      • Parent Category Link: /threat-intelligence-incident-response
      • Businesses prioritize speed to market over secure coding and testing practices in the development lifecycle. As a result, vulnerabilities exist naturally in software.
      • To improve overall system security, organizations are leveraging external security researchers to identify and remedy vulnerabilities, so as to mitigate the overall security risk.
      • A primary challenge to developing a coordinated vulnerability disclosure (CVD) program is designing repeatable procedures and scoping the program to the organization’s technical capacity.

      Our Advice

      Critical Insight

      • Having a coordinated vulnerability disclosure program is likely to be tomorrow’s law. With pressures from federal government agencies and recommendations from best-practice frameworks, it is likely that a CVD will be mandated in the future to encourage organizations to be equipped and prepared to respond to externally disclosed vulnerabilities.
      • CVD programs such as bug bounty and vulnerability disclosure programs (VDPs) may reward differently, but they have the same underlying goals. As a result, you don't need dramatically different process documentation.

      Impact and Result

      • Design a coordinated vulnerability disclosure program that reflects business, customer, and regulatory obligations.
      • Develop a program that aligns your resources with the scale of the coordinated vulnerability disclosure program.
      • Follow Info-Tech’s vulnerability disclosure methodology by leveraging our policy, procedure, and workflow templates to get you started.

      Design a Coordinated Vulnerability Disclosure Program Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you should design a coordinated vulnerability disclosure program, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Assess goals

      Define the business, customer, and compliance alignment for the coordinated vulnerability disclosure program.

      • Design a Coordinated Vulnerability Disclosure Program – Phase 1: Assess Goals
      • Information Security Requirements Gathering Tool

      2. Formalize the program

      Equip your organization for coordinated vulnerability disclosure with formal documentation of policies and processes.

      • Design a Coordinated Vulnerability Disclosure Program – Phase 2: Formalize the Program
      • Coordinated Vulnerability Disclosure Policy
      • Coordinated Vulnerability Disclosure Plan
      • Coordinated Vulnerability Disclosure Workflow (Visio)
      • Coordinated Vulnerability Disclosure Workflow (PDF)
      [infographic]

      Define a Sourcing Strategy for Your Development Team

      • Buy Link or Shortcode: {j2store}161|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Development
      • Parent Category Link: /development
      • Hiring quality development team resources is becoming increasingly difficult and costly in most domestic markets.
      • Firms are seeking to do more with less and increase their development team throughput.
      • Globalization and increased competition are driving a need for more innovation in your applications.
      • Firms want more cost certainty and tighter control of their development investment.

      Our Advice

      Critical Insight

      • Choosing the right sourcing strategy is not just a question of technical skills! Successful sourcing is based on matching your organization’s culture, knowledge, and experiences to the right choice of internal or external partnership.

      Impact and Result

      • We will help you build a sourcing strategy document for your application portfolio.
      • We will examine your portfolio and organization from three different perspectives to enable you to determine the right approach:
        • From a business perspective, reliance on the business, strategic value of the product, and maturity of product ownership are critical.
        • From an organizational perspective, you must examine your culture for communication processes, conflict resolution methods, vendor management skills, and geographic coverage.
        • From a technical perspective, consider integration complexity, environmental complexity, and testing processes.

      Define a Sourcing Strategy for Your Development Team Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Define a Sourcing Strategy for Your Development Team Storyboard – A guide to help you choose the right resourcing strategy to keep pace with your rapidly changing application and development needs.

      This project will help you define a sourcing strategy for your application development team by assessing key factors about your products and your organization, including critical business, technical, and organizational factors. Use this analysis to select the optimal sourcing strategy for each situation.

      • Define a Sourcing Strategy for Your Development Team Storyboard

      2. Define a Sourcing Strategy Workbook – A tool to capture the results of activities to build your sourcing strategy.

      This workbook is designed to capture the results of the activities in the storyboard. Each worksheet corresponds with an activity from the deck. The workbook is also a living artifact that should be updated periodically as the needs of your team and organization change.

      • Define a Sourcing Strategy Workbook
      [infographic]

      Further reading

      Define a Sourcing Strategy for Your Development Team

      Choose the right resourcing strategy to keep pace with your rapidly changing application and development needs.

      Analyst Perspective

      Choosing the right sourcing strategy for your development team is about assessing your technical situation, your business needs, your organizational culture, and your ability to manage partners!

      Photo of Dr. Suneel Ghei, Principal Research Director, Application Development, Info-Tech Research Group

      Firms today are under continuous pressure to innovate and deliver new features to market faster while at the same time controlling costs. This has increased the need for higher throughput in their development teams along with a broadening of skills and knowledge. In the face of these challenges, there is a new focus on how firms source their development function. Should they continue to hire internally, offshore, or outsource? How do they decide which strategy is the right fit?

      Info-Tech’s research shows that the sourcing strategy considerations have evolved beyond technical skills and costs. Identifying the right strategy has become a function of the characteristics of the organization, its culture, its reliance on the business for knowledge, its strategic value of the application, its vendor management skills, and its ability to internalize external knowledge. By assessing these factors firms can identify the best sourcing mix for their development portfolios.

      Dr. Suneel Ghei
      Principal Research Director, Application Development
      Info-Tech Research Group

      Executive Summary

      Your Challenge
      • Hiring quality development team resources is becoming increasingly difficult and costly in most domestic markets.
      • Firms are seeking to do more with less and increase their development team throughput.
      • Globalization and increased competition is driving a need for more innovation in your applications.
      • Firms want more cost certainty and tighter control of their development investment.
      Common Obstacles
      • Development leaders are encouraged to manage contract terms and SLAs rather than build long-term relationships.
      • People believe that outsourcing means you will permanently lose the knowledge around solutions.
      • Moving work outside of the current team creates motivational and retention challenges that can be difficult to overcome.
      Info-Tech’s Approach
      • Looking at this from these three perspectives will enable you to determine the right approach:
        1. From a business perspective, reliance on the business, strategic value of the product, and maturity of product ownership are critical.
        2. From an organizational perspective, you must examine your culture for communication processes, conflict resolution methods, vendor management skills, and geographic coverage
        3. From a technical perspective, consider integration complexity, environment complexity, and testing processes.

      Info-Tech Insight

      Choosing the right sourcing strategy is not just a question of technical skills! Successful sourcing is based on matching your organization’s culture, knowledge, and experiences to the right choice of internal or external partnership.

      Define a sourcing strategy for your development team

      Business
      • Business knowledge/ expertise required
      • Product owner maturity
      Technical
      • Complexity and maturity of technical environment
      • Required level of integration
      Organizational
      • Company culture
      • Desired geographic proximity
      • Required vendor management skills
      1. Assess your current delivery posture for challenges and impediments.
      2. Decide whether to build or buy a solution.
      3. Select your desired sourcing strategy based on your current state and needs.
      Example sourcing strategy with initiatives like 'Client-Facing Apps' and 'ERP Software' assigned to 'Onshore Dev', 'Outsource Team', 'Offshore Dev', 'Outsource App (Buy)', 'Outsource Dev', or 'Outsource Roles'.

      Three Perspectives +

      Three Steps =

      Your Sourcing Strategy

      Diverse sourcing is used by many firms

      Many firms across all industries are making use of different sourcing strategies to drive innovation and solve business issues.

      According to a report by ReportLinker the global IT services outsourcing market reached US$413.8 billion in 2021.

      In a recent study of Canadian software firms, it was found that almost all firms take advantage of outside knowledge in their application development process. In most cases these firms also use outside resources to do development work, and about half the time they use externally built software packages in their products (Ghei, 2020)!

      Info-Tech Insight

      In today’s diverse global markets, firms that wish to stay competitive must have a defined ability to take advantage of external knowledge and to optimize their IT services spend.

      Modeling Absorptive Capacity for Open Innovation in the Canadian Software Industry (Source: Ghei, 2020; n=54.)

      56% of software development firms are sourcing applications instead of resources.

      68% of firms are sourcing external resources to develop software products.

      91% of firms are leveraging knowledge from external sources.

      Internal sourcing models

      Insourcing comes in three distinct flavors

      Geospatial map giving example locations for the three internal sourcing models. In this example, 'Head Office' is located in North America, 'Onshore' is 'Located in the same area or even office as your core business resources. Relative Cost: $$$', 'Near Shore' is 'Typically, within 1-3 time zones for ease of collaboration where more favorable resource costs exist. Relative Cost: $$', and 'Offshore' is 'Located in remote markets where significant labor cost savings can be realized. Relative Cost: $'.

      Info-Tech Insight

      Insourcing allows you to stay close to more strategic applications. But choosing the right model requires a strong look inside your organization and your ability to provide business knowledge support to developers who may have different skills and cultures and are in different geographies.

      Outsourcing models

      External sourcing can be done to different degrees

      Outsource Roles
      • Enables resource augmentation
      • Typically based on skills needs
      • Short-term outsourcing with eventual integration or dissolution
      Outsource Teams (or Projects)
      • Use of a full team or multiple teams of vendor resources
      • Meant to be temporary, with knowledge transfer at the end of the project
      Outsource Products
      • Use of a vendor to build, maintain, and support the full product
      • Requires a high degree of contract management skill

      Info-Tech Insight

      Outsourcing represents one of the most popular ways for organizations to source external knowledge and skills. The choice of model is a function of the organization’s ability to support the external resources and to absorb the knowledge back into the organization.

      Defining your sourcing strategy

      Follow the steps below to identify the best match for your organization

      Review Your Current Situation

      Review the issues and opportunities related to application development and categorize them based on the key factors.

      Arrow pointing right. Assess Build Versus Buy

      Before choosing a sourcing model you must assess whether a particular product or function should be bought as a package or developed.

      Arrow pointing right. Choose the Right Sourcing Strategy

      Based on the research, use the modeling tool to match the situation to the appropriate sourcing solution.

      Step 1.1

      Review Your Current Situation

      Activities
      • 1.1.1 Identify and categorize your challenges

      This step involves the following participants:

      • Product management team
      • Software development leadership team
      • Key stakeholders
      Outcomes of this step

      Review your current delivery posture for challenges and impediments.

      Define a Sourcing Strategy for Your Development Team
      Step 1.1 Step 1.2 Step 1.3

      Review your situation

      There are three key areas to examine in your current situation:

      Business Challenges
      • Do you need to gain new knowledge to drive innovation?
      • Does your business need to enhance its software to improve its ability to compete in the market?
      • Do you need to increase your speed of innovation?

      Technology Challenges

      • Are you being asked to take tighter control of your development budgets?
      • Does your team need to expand their skills and knowledge?
      • Do you need to increase your development speed and capacity?

      Market Challenges

      • Is your competition seen as more innovative?
      • Do you need new features to attract new clients?
      • Are you struggling to find highly skilled and knowledgeable development resources?
      Stock image of multi-colored arrows travelling in a line together before diverging.

      Info-Tech Insight

      Sourcing is a key tool to solve business and technical challenges and enhance market competitiveness when coupled with a robust definition of objectives and a way to measure success.

      1.1.1 Identify and categorize your challenges

      60 minutes

      Output: List of the key challenges in your software lifecycle. Breakdown of the list into categories to identify opportunities for sourcing

      Participants: Product management team, Software development leadership team, Key stakeholders

      1. What challenge is your firm is facing with respect to your software that you think sourcing can address? (20 minutes)
      2. Is the challenge related to a business outcome, development methodology, or technology challenge? (10 minutes)
      3. Is the challenge due to a skills gap, budget or resource challenge, throughput issue, or a broader organizational knowledge or process issue? (10 minutes)
      4. What is the specific objective for the team/leader in addressing this challenge? (15 minutes)
      5. How will you measure progress and achievement of this objective? (5 minutes)

      Document results in the Define a Sourcing Strategy Workbook

      Identify and categorize your challenges

      Sample table for identifying and categorizing challenges, with column groups 'Challenge' and 'Success Measures' containing headers 'Issue, 'Category', 'Breadth', and 'Stakeholder' in the former, and 'Objective' and 'Measurement' in the latter.

      Step 1.2

      Assess Build Versus Buy

      Activities
      • 1.2.1 Understand the benefits and drawbacks of build versus buy in your organizational context

      This step involves the following participants:

      • Product management team
      • Software development leadership team
      • Key stakeholders

      Outcomes of this step

      Understand in your context the benefits and drawbacks of build versus buy, leveraging Info-Tech’s recommended definitions as a starting point.

      Define a Sourcing Strategy for Your Development Team

      Step 1.1 Step 1.2 Step 1.3

      Look vertically across the IT hierarchy to assess the impact of your decision at every level

      IT Hierarchy with 'Enterprise' at the top, branching out to 'Portfolio', then to 'Solution' at the bottom. The top is 'Strategic', the bottom 'Operational'.

      Regardless of the industry, a common and challenging dilemma facing technology teams is to determine when they should build software or systems in-house versus when they should rely wholly on an outside vendor for delivering on their technology needs.

      The answer is not as cut and dried as one would expect. Any build versus buy decision may have an impact on strategic and operational plans. It touches every part of the organization, starting with individual projects and rolling up to the enterprise strategy.

      Info-Tech Insight

      Do not ignore the impact of a build or buy decision on the various management levels in an IT organization.

      Deciding whether to build or buy

      It is as much about what you gain as it is about what problem you choose to have

      BUILD BUY

      Multi-Source Best of Breed

      Integrate various technologies that provide subset(s) of the features needed for supporting the business functions.

      Vendor Add-Ons & Integrations

      Enhance an existing vendor’s offerings by using their system add-ons either as upgrades, new add-ons, or integrations.
      Pros
      • Flexibility in choice of tools
      • In some cases, cost may be lower
      • Easier to enhance with in-house teams
      Cons
      • Introduces tool sprawl
      • Requires resources to understand tools and how they integrate
      • Some of the tools necessary may not be compatible with one another
      Pros
      • Reduces tool sprawl
      • Supports consistent tool stack
      • Vendor support can make enhancement easier
      • Total cost of ownership may be lower
      Cons
      • Vendor lock-in
      • The processes to enhance may require tweaking to fit tool capability

      Multi-Source Custom

      Integrate systems built in-house with technologies developed by external organizations.

      Single Source

      Buy an application/system from one vendor only.
      Pros
      • Flexibility in choice of tools
      • In some cases, cost may be lower
      • Easier to enhance with in-house teams
      Cons
      • May introduce tool sprawl
      • Requires resources to have strong technical skills
      • Some of the tools necessary may not be compatible with one another
      Pros
      • Reduces tool sprawl
      • Supports consistent tool stack
      • Vendor support can make enhancement easier
      • Total cost of ownership may be lower
      Cons
      • Vendor lock-in
      • The processes to enhance may require tweaking to fit tool capability

      1.2.1 Understand the benefits and drawbacks of build versus buy in your organizational context

      30 minutes

      Output: A common understanding of the different approaches to build versus buy applied to your organizational context

      Participants: Product management team, Software development leadership team, Key stakeholders

      1. Look at the previous slide, Deciding whether to build or buy.
      2. Discuss the pros and cons listed for each approach.
        1. Do they apply in your context? Why or why not?
        2. Are there some approaches not applicable in terms of how you wish to work?
      3. Record the curated list of pros and cons for the different build/buy approaches.
      4. For each approach, arrange the pros and cons in order of importance.

      Document results in the Define a Sourcing Strategy Workbook

      Step 1.3

      Choose the Right Sourcing Strategy

      Activities
      • 1.3.1 Determine the right sourcing strategy for your needs

      This step involves the following participants:

      • Product management team
      • Software development leadership team
      • Key stakeholders

      Outcomes of this step

      Choose your desired sourcing strategy based on your current state and needs.

      Define a Sourcing Strategy for Your Development Team

      Step 1.1 Step 1.2 Step 1.3

      Choose the right sourcing strategy

      • Based on our research, finding the right sourcing strategy for a particular situation is a function of three key areas:
        • Business drivers
        • Organizational drivers
        • Technical drivers
      • Each area has key characteristics that must be assessed to confirm which strategy is best suited for the situation.
      • Once you have assessed the factors and ranked them from low to high, we can then match your results with the best-fit strategy.
      Business
      • Business knowledge/ expertise required
      • Product owner maturity

      Technical

      • Complexity and maturity of technical environment
      • Required level of integration

      Organizational

      • Your culture
      • Desired geographic proximity
      • Required vendor management skills

      Business drivers

      To choose the right sourcing strategy, you need to assess your key drivers of delivery

      Product Knowledge
      • The level of business involvement required to support the development team is a critical factor in determining the sourcing model.
      • Both the breadth and depth of involvement are critical factors.
      Strategic Value
      • The strategic value of the application to the company is also a critical component.
      • The more strategic the application is to the company, the closer the sourcing should be maintained.
      • Value can be assessed based on the revenue derived from the application and the depth of use of the application by the organization.
      Product Ownership Maturity
      • To support sourcing models that move further from organizational boundaries a strong product ownership function is required.
      • Product owners should ideally be fully allocated to the role and engaged with the development teams.
      • Product owners should be empowered to make decisions related to the product, its vision, and its roadmap.
      • The higher their allocation and empowerment, the higher the chances of success in external sourcing engagements.
      Stock image of a person running up a line with a positive trend.

      Case Study: The GoodLabs Studio Experience Logo for GoodLabs Studio.

      INDUSTRY: Software Development | SOURCE: Interview with Thomas Lo, Co-Founder, GoodLabs Studio
      Built to Outsource Development Teams
      • GoodLabs is an advanced software innovation studio that provides bespoke team extensions or turnkey digital product development with high-caliber software engineers.
      • Unlike other consulting firms, GoodLabs works very closely with its customers as a unified team to deliver the most significant impact on clients’ projects.
      • With this approach, it optimizes the delivery of strong software engineering skills with integrated product ownership from the client, enabling long-term and continued success for its clients.
      Results
      • GoodLabs is able to attract top engineering talent by focusing on a variety of complex projects that materially benefit from technical solutions, such as cybersecurity, fraud detection, and AI syndrome surveillance.
      • Taking a partnership approach with the clients has led to the successful delivery of many highly innovative and challenging projects for the customers.

      Organizational drivers

      To choose the right sourcing strategy for a particular problem you need to assess the organization’s key capabilities

      Stock photo of someone placing blocks with illustrated professionals one on top of the other. Vendor Management
      • Vendor management is a critical skill for effective external sourcing.
      • This can be assessed based on the organization’s ability to cultivate and grow long-term relationships of mutual value.
      • The longevity and growth of existing vendor relationships can be a good benchmark for future success.
      Absorptive Capacity
      • To effectively make use of external sourcing models, the organization must have a well-developed track record of absorbing outside knowledge.
      • This can be assessed by looking at past cases where external knowledge was sourced and internalized, such as past vendor development engagements or use of open-source code.
      Organizational Culture
      • Another factor in success of vendor engagements and long-term relationships is the matching of organizational cultures.
      • It is key to measure the organization’s current position on items like communication strategy, geographical dispersal, conflict resolution strategy, and hierarchical vs flat management.
      • These factors should be documented and matched with partners to determine the best fit.

      Case Study: WCIRB California Logo for WCIRB California.

      INDUSTRY: Workers Compensation Insurance | SOURCE: Interview with Roger Cottman, Senior VP and CIO, WCIRB California
      Trying to Find the Right Match
      • WCIRB is finding it difficult to hire local resources in California.
      • Its application is a niche product. Since no off-the-shelf alternatives exist, the organization will require a custom application.
      • WCIRB is in the early stages of a digital platform project and is looking to bring in a partner to provide a full development team, with the goal of ideally bringing the application back in-house once it is built.
      • The organization is looking for a local player that will be able to integrate well with the business.
      • It has engaged with two mid-sized players but both have been slow to respond, so it is now considering alternative approaches.
      Info-Tech’s Recommended Approach
      • WCIRB is finding that mid-sized players don’t fit its needs and is now looking for a larger player
      • Based on our research we have advised that WCIRB should ensure the partner is geographically close to its location and can be a strategic partner, not simply work on an individual project.

      Technical drivers

      To choose the right sourcing strategy for a particular problem you need to assess your technical situation and capabilities

      Environment Complexity
      • The complexity of your technical environment is a hurdle that must be overcome for external sourcing models.
      • The number of environments used in the development lifecycle and the location of environments (physical, virtual, on-premises, or cloud) are key indicators.
      Integration Requirements
      • The complexity of integration is another key technical driver.
      • The number of integrations required for the application is a good measuring stick. Will it require fewer than 5, 5-10, or more than 10?
      Testing Capabilities
      • Testing of the application is a key technical driver of success for external models.
      • Having well-defined test cases, processes, and shared execution with the business are all steps that help drive success of external sourcing models.
      • Test automation can also help facilitate success of external models.
      • Measure the percentage of test cases that are standardized, the level of business involvement, and the percentage of test cases that are automated.
      Stock image of pixelated light.

      Case Study: Management Control Systems (MC Systems) Logo for MC Systems.

      INDUSTRY: Technology Services | SOURCE: Interview with Kathryn Chin See, Business Development and Research Analyst, MC Systems
      Seeking to Outsource Innovation
      • MC Systems is seeking to outsource its innovation function to get budget certainty on innovation and reduce costs. It is looking for a player that has knowledge of the application areas it is looking to enhance and that would augment its own business knowledge.
      • In previous outsourcing experiences with skills augmentation and application development the organization had issues related to the business depth and product ownership it could provide. The collaborations did not lead to success as MC Systems lacked product ownership and the ability to reintegrate the outside knowledge.
      • The organization is concerned about testing of a vendor-built application and how the application will be supported.
      Info-Tech’s Recommended Approach
      • To date MC Systems has had success with its outsourcing approach when outsourcing specific work items.
      • It is now looking to expand to outsourcing an entire application.
      • Info-Tech’s recommendation is to seek partners who can take on development of the application.
      • MC Systems will still need resources to bring knowledge back in-house for testing and to provide operational support.

      Choosing the right model


      Legend for the table below using circles with quarters to represent Low (0 quarters) to High (4 quarters).
      Determinant Key Questions to Ask Onshore Nearshore Offshore Outsource Role(s) Outsource Team Outsource Product(s)
      Business Dependence How much do you rely on business resources during the development cycle? Circle with 4 quarters. Circle with 3 quarters. Circle with 1 quarter. Circle with 2 quarters. Circle with 1 quarter. Circle with 0 quarters.
      Absorptive Capacity How successful has the organization been at bringing outside knowledge back into the firm? Circle with 0 quarters. Circle with 1 quarter. Circle with 1 quarter. Circle with 2 quarters. Circle with 1 quarter. Circle with 4 quarters.
      Integration Complexity How many integrations are required for the product to function – fewer than 5, 5-10, or more than 10? Circle with 4 quarters. Circle with 3 quarters. Circle with 3 quarters. Circle with 2 quarters. Circle with 1 quarter. Circle with 0 quarters.
      Product Ownership Do you have full-time product owners in place for the products? Do product owners have control of their roadmaps? Circle with 1 quarter. Circle with 2 quarters. Circle with 3 quarters. Circle with 2 quarters. Circle with 4 quarters. Circle with 4 quarters.
      Organization Culture Fit What are your organization’s communication and conflict resolution strategies? Is your organization geographically dispersed? Circle with 1 quarter. Circle with 1 quarter. Circle with 3 quarters. Circle with 1 quarter. Circle with 3 quarters. Circle with 4 quarters.
      Vendor Mgmt Skills What is your skill level in vendor management? How long are your longest-standing vendor relationships? Circle with 0 quarters. Circle with 1 quarter. Circle with 1 quarter. Circle with 2 quarters. Circle with 3 quarters. Circle with 4 quarters.

      1.3.1 Determine the right sourcing strategy for your needs

      60 minutes

      Output: A scored matrix of the key drivers of the sourcing strategy

      Participants: Development leaders, Product management team, Key stakeholders

      Choose one of your products or product families and assess the factors below on a scale of None, Low, Medium, High, and Full.

      • 3.1 Assess the business factors that drive selection using these key criteria (20 minutes):
        • 3.1.1 Product knowledge
        • 3.1.2 Strategic value
        • 3.1.3 Product ownership
      • 3.2 Assess the organizational factors that drive selection using these key criteria (20 minutes):
        • 3.2.1 Vendor management
        • 3.2.2 Absorptive capacity
        • 3.2.3 Organization culture
      • 3.3 Assess the technical factors that drive selection using these key criteria (20 minutes):
        • 3.3.1 Environments
        • 3.3.2 Integration
        • 3.3.3 Testing

      Document results in the Define a Sourcing Strategy Workbook

      Things to Consider When Implementing

      Once you have built your strategy there are some additional things to consider

      Things to Consider Before Acting on Your Strategy

      By now you understand what goes into an effective sourcing strategy. Before implementing one, there are a few key items you need to consider:

      Example 'Sourcing Strategy for Your Portfolio' with initiatives like 'Client-Facing Apps' and 'ERP Software' assigned to 'Onshore Dev', 'Outsource Team', 'Offshore Dev', 'Outsource App (Buy)', 'Outsource Dev', or 'Outsource Roles'. Start with a pilot
      • Changing sourcing needs to start with one team.
      • Grow as skills develop to limit risk.
      Build an IT workforce plan Enhance your vendor management skills Involve the business early and often
      • The business should feel they are part of the discussion.
      • See our Agile/DevOps Research Center for more information on how the business and IT can better work together.
      Limit sourcing complexity
      • Having too many different partners and models creates confusion and will strain your ability to manage vendors effectively.

      Bibliography

      Apfel, Isabella, et al. “IT Project Member Turnover and Outsourcing Relationship Success: An Inverted-U Effect.” Developments, Opportunities and Challenges of Digitization, 2020. Web.

      Benamati, John, and Rajkumar, T.M. “The Application Development Outsourcing Decision: An Application of the Technology Acceptance Model.” Journal of Computer Information Systems, vol. 42, no. 4, 2008, pp. 35-43. Web.

      Benamati, John, and Rajkumar, T.M. “An Outsourcing Acceptance Model: An Application of TAM to Application Development Outsourcing Decisions.” Information Resources Management Journal, vol. 21, no. 2, pp. 80-102, 2008. Web.

      Broekhuizen, T. L. J., et al. “Digital Platform Openness: Drivers, Dimensions and Outcomes.” Journal of Business Research, vol. 122, July 2019, pp. 902-914. Web.

      Brook, Jacques W., and Albert Plugge. “Strategic Sourcing of R&D: The Determinants of Success.” Business Information Processing, vol. 55, Aug. 2010, pp. 26-42. Web.

      Delen, G. P A.J., et al. “Foundations for Measuring IT-Outsourcing Success and Failure.” Journal of Systems and Software, vol. 156, Oct. 2019, pp. 113-125. Web.

      Elnakeep, Eman, et al. “Models and Frameworks for IS Outsourcing Structure and Dimensions: A Holistic Study.” Lecture notes in Networks and Systems, 2019. Web.

      Ghei, Suneel. Modeling Absorptive Capacity for Open Innovation in the Software Industry. 2020. Faculty of Graduate Studies, Athabasca University, 2020. DBA Dissertation.

      “IT Outsourcing Market Research Report by Service Model, Organization Sizes, Deployment, Industry, Region – Global Forecast to 2027 – Cumulative Impact of COVID-19.” ReportLinker, April 2022. Web.

      Jeong, Jongkil Jay, et al. “Enhancing the Application and Measurement of Relationship Quality in Future IT Outsourcing Studies.” 26th European Conference on Information Systems: Beyond Digitization – Facets of Socio-Tehcnical Change: Proceedings of ECIS 2018, Portsmouth, UK, June 23-28, 2018. Edited by Peter Bednar, et al., 2018. Web.

      Könning, Michael. “Conceptualizing the Effect of Cultural Distance on IT Outsourcing Success.” Proceedings of Australasian Conference on Information Systems 2018, Sydney, Australia, Dec. 3-5, 2018. Edited by Matthew Noble, UTS ePress, 2018. Web.

      Lee, Jae-Nam, et al. “Holistic Archetypes of IT Outsourcing Strategy: A Contingency Fit and Configurational Approach.” MIS Quarterly, vol. 43, no. 4, Dec. 2019, pp. 1201-1225. Web.

      Loukis, Euripidis, et al. “Determinants of Software-as-a-Service Benefits and Impact on Firm Performance.” Decision Support Systems, vol. 117, Feb. 2019, pp. 38-47. Web.

      Martensson, Anders. “Patterns in Application Development Sourcing in the Financial Industry.” Proceedings of the 13th European Conference of Information Systems, 2004. Web.

      Martínez-Sánchez, Angel, et al. “The Relationship Between R&D, the Absorptive Capacity of Knowledge, Human Resource Flexibility and Innovation: Mediator Effects on Industrial Firms.” Journal of Business Research, vol. 118, Sept. 2020, pp. 431-440. Web.

      Moreno, Valter, et al. “Outsourcing of IT and Absorptive Capacity: A Multiple Case Study in the Brazilian Insurance Sector.” Brazilian Business Review, vol. 17, no. 1, Jan.-Feb. 2020, pp. 97-113. Web.

      Ozturk, Ebru. “The Impact of R&D Sourcing Strategies on Basic and Developmental R&D in Emerging Economies.” European Journal of Innovation Management, vol. 21, no. 7, May 2018, pp. 522-542. Web.

      Ribas, Imma, et al. “Multi-Step Process for Selecting Strategic Sourcing Options When Designing Supply Chains.” Journal of Industrial Engineering and Management, vol. 14, no. 3, 2021, pp. 477-495. Web.

      Striteska, Michaela Kotkova, and Viktor Prokop. “Dynamic Innovation Strategy Model in Practice of Innovation Leaders and Followers in CEE Countries – A Prerequisite for Building Innovative Ecosystems.” Sustainability, vol. 12, no. 9, May 2020. Web.

      Thakur-Wernz, Pooja, et al. “Antecedents and Relative Performance of Sourcing Choices for New Product Development Projects.” Technovation, 2020. Web.

      The Complete Manual for Layoffs

      • Buy Link or Shortcode: {j2store}514|cart{/j2store}
      • member rating overall impact: 10.0/10 Overall Impact
      • member rating average dollars saved: $30,999 Average $ Saved
      • member rating average days saved: 20 Average Days Saved
      • Parent Category Name: Lead
      • Parent Category Link: /lead

      When the economy is negatively influenced by factors beyond any organization’s control, the impact can be felt almost immediately on the bottom line. This decline in revenue as a result of a weakening economy will force organizations to reconsider every dollar they spend.

      Our Advice

      Critical Insight

      • The remote work environment many organizations find themselves in adds a layer of complexity to the already sensitive process of laying off employees.
      • Carrying out layoffs must be done while keeping personal contact as your first priority. That personal contact should be the basis for all subsequent communication with laid-off and remaining staff, even after layoffs have occurred.

      Impact and Result

      By following our process, we can provide your organization with the direction, tools, and best practices to lay off employees. This will need to be done with careful consideration into your organization’s short- and longer-term strategic goals.

      The Complete Manual for Layoffs Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Prepare for layoffs

      Understand the most effective cost-cutting solutions and set layoff policies and guidelines.

      • The Complete Manual for Layoffs Storyboard
      • Layoffs SWOT Analysis Template
      • Redeployment and Layoff Strategy Workbook
      • Sample Layoffs Policy
      • Cost-Cutting Planning Tool
      • Termination Costing Tool

      2. Objectively identify employees

      Develop an objective layoff selection method and plan for the transfer of essential responsibilities.

      • Workforce Planning Tool
      • Employee Layoff Selection Tool

      3. Prepare to meet with employees

      Plan logistics, training, and a post-layoff plan communication.

      • Termination Logistics Tool
      • IT Knowledge Transfer Risk Assessment Tool
      • IT Knowledge Transfer Plan Template
      • IT Knowledge Identification Interview Guide Template
      • Knowledge Transfer Job Aid
      • Layoffs Communication Package

      4. Meet with employees

      Collaborate with necessary departments and deliver layoffs notices.

      • Employee Departure Checklist Tool

      5. Monitor and manage departmental effectiveness

      Plan communications for affected employee groups and monitor organizational performance.

      • Ten Ways to Connect With Your Employees
      • Creating Connections
      [infographic]

      Build an IT Risk Management Program

      • Buy Link or Shortcode: {j2store}192|cart{/j2store}
      • member rating overall impact: 8.3/10 Overall Impact
      • member rating average dollars saved: $31,532 Average $ Saved
      • member rating average days saved: 17 Average Days Saved
      • Parent Category Name: IT Governance, Risk & Compliance
      • Parent Category Link: /it-governance-risk-and-compliance
      • Risk is unavoidable. Without a formal program to manage IT risk, you may be unaware of your severest IT risks.
      • The business could be making decisions that are not informed by risk.
      • Reacting to risks AFTER they occur can be costly and crippling, yet it is one of the most common tactics used by IT departments.

      Our Advice

      Critical Insight

      • IT risk is business risk. Every IT risk has business implications. Create an IT risk management program that shares accountability with the business.

      Impact and Result

      • Transform your ad hoc IT risk management processes into a formalized, ongoing program, and increase risk management success.
      • Take a proactive stance against IT threats and vulnerabilities by identifying and assessing IT’s greatest risks before they occur.
      • Involve key stakeholders including the business senior management team to gain buy-in and to focus on IT risks most critical to the organization.

      Build an IT Risk Management Program Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Build an IT Risk Management Program – A holistic approach to managing IT risks within your organization and involving key business stakeholders.

      Gain business buy-in to understanding the key IT risks that could negatively impact the organization and create an IT risk management program to properly identify, assess, respond, monitor, and report on those risks.

      • Build an IT Risk Management Program – Phases 1-3

      2. Risk Management Program Manual – A single source of truth for the risk management program to exist and be updated to reflect changes.

      Leverage this Risk Management Program Manual to ensure that the decisions around how IT risks will be governed and managed can be documented in a single source accessible by those involved.

      • Risk Management Program Manual

      3. Risk Register & Risk Costing Tool – A set of tools to document identified risk events. Assess each risk event and consider the appropriate response based on your organization’s threshold for risk.

      Engage these tools in your organization if you do not currently have a GRC tool to document risk events as they relate to the IT function. Consider the best risk response to high severity risk events to ensure all possible situations are considered.

      • Risk Register Tool
      • Risk Costing Tool

      4. Risk Event Action Plan and Risk Report – A template to document the chosen risk responses and ensure accountable owners agree on selected response method.

      Establish clear guidelines and responses to risk events that will leave your organization vulnerable to unwanted threats. Ensure risk owners have agreed to the risk responses and are willing to take accountability for that response.

      • Risk Event Action Plan
      • Risk Report

      Infographic

      Workshop: Build an IT Risk Management Program

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Review IT Risk Fundamentals and Governance

      The Purpose

      To assess current risk management maturity, develop goals, and establish IT risk governance.

      Key Benefits Achieved

      Identified obstacles to effective IT risk management.

      Established attainable goals to increase maturity.

      Clearly laid out risk management accountabilities and responsibilities for IT and business stakeholders.

      Activities

      1.1 Assess current program maturity

      1.2 Complete RACI chart

      1.3 Create the IT risk council

      1.4 Identify and engage key stakeholders

      1.5 Add organization-specific risk scenarios

      1.6 Identify risk events

      Outputs

      Maturity Assessment

      Risk Management Program Manual

      Risk Register

      2 Identify IT Risks

      The Purpose

      Identify and assess all IT risks.

      Key Benefits Achieved

      Created a comprehensive list of all IT risk events.

      Risk events prioritized according to risk severity – as defined by the business.

      Activities

      2.1 Identify risk events (continued)

      2.2 Augment risk event list using COBIT 5 processes

      2.3 Determine the threshold for (un)acceptable risk

      2.4 Create impact and probability scales

      2.5 Select a technique to measure reputational cost

      2.6 Conduct risk severity level assessment

      Outputs

      Finalized List of IT Risk Events

      Risk Register

      Risk Management Program Manual

      3 Identify IT Risks (continued)

      The Purpose

      Prioritize risks, establish monitoring responsibilities, and develop risk responses for top risks.

      Key Benefits Achieved

      Risk monitoring responsibilities are established.

      Risk response strategies have been identified for all key risks.

      Activities

      3.1 Conduct risk severity level assessment

      3.2 Document the proximity of the risk event

      3.3 Conduct expected cost assessment

      3.4 Develop key risk indicators (KRIs) and escalation protocols

      3.5 Root cause analysis

      3.6 Identify and assess risk responses

      Outputs

      Risk Register

      Risk Management Program Manual

      Risk Event Action Plans

      4 Monitor, Report, and Respond to IT Risk

      The Purpose

      Assess and select risk responses for top risks and effectively communicate recommendations and priorities to the business.

      Key Benefits Achieved

      Thorough analysis has been conducted on the value and effectiveness of risk responses for high severity risk events.

      Authoritative risk response recommendations can be made to senior leadership.

      A finalized Risk Management Program Manual is ready for distribution to key stakeholders.

      Activities

      4.1 Identify and assess risk responses

      4.2 Risk response cost-benefit analysis

      4.3 Create multi-year cost projections

      4.4 Review techniques for embedding risk management in IT

      4.5 Finalize the Risk Report and Risk Management Program Manual

      4.6 Transfer ownership of risk responses to project managers

      Outputs

      Risk Report

      Risk Management Program Manual

      Further reading

      Build an IT Risk Management Program

      Mitigate the IT risks that could negatively impact your organization.

      Table of Contents

      3 Executive Brief

      4 Analyst Perspective

      5 Executive Summary

      19 Phase 1: Review IT Risk Fundamentals & Governance

      43 Phase 2: Identify and Assess IT Risk

      74 Phase 3: Monitor, Communicate, and Respond to IT Risk

      102 Appendix

      108 Bibliography

      Build an IT Risk Management Program

      Mitigate the IT risks that could negatively impact your organization.

      EXECUTIVE BRIEF

      Analyst Perspective

      Siloed risks are risky business for any enterprise.

      Photo of Valence Howden, Principal Research Director, CIO Practice.
      Valence Howden
      Principal Research Director, CIO Practice
      Photo of Brittany Lutes, Senior Research Analyst, CIO Practice.
      Brittany Lutes
      Senior Research Analyst, CIO Practice

      Risk is an inherent part of life but not very well understood or executed within organizations. This has led to risk being avoided or, when it’s implemented, being performed in isolated siloes with inconsistencies in understanding of impact and terminology.

      Looking at risk in an integrated way within an organization drives a truer sense of the thresholds and levels of risks an organization is facing – making it easier to manage and leverage risk while reducing risks associated with different mitigation responses to the same risk events.

      This opens the door to using risk information – not only to prevent negative impacts but as a strategic differentiator in decision making. It helps you know which risks are worth taking, driving strong positive outcomes for your organization.

      Executive Summary

      Your Challenge

      IT has several challenges when it comes to addressing risk management:

      • Risk is unavoidable. Without a formal program to manage IT risk, you may be unaware of your severest IT risks.
      • The business could be making decisions that are not informed by risk.
      • Reacting to risks after they occur can be costly and crippling, yet it is one of the most common tactics used by IT departments.

      Common Obstacles

      Many IT organizations realize these obstacles:

      • IT risks and business risks are often addressed separately, causing inconsistencies in the approach.
      • Security risk receives such a high profile that it often eclipses other important IT risks, leaving the organization vulnerable.
      • Failing to include the business in IT risk management leaves IT leaders too accountable; the business must have accountability as well.

      Info-Tech’s Approach

      • Transform your ad hoc IT risk management processes into a formalized, ongoing program and increase risk management success.
      • Take a proactive stance against IT threats and vulnerabilities by identifying and assessing IT’s greatest risks before they occur.
      • Involve key stakeholders, including the business senior management team, to gain buy-in and to focus on the IT risks most critical to the organization.

      Info-Tech Insight

      IT risk is business risk. Every IT risk has business implications. Create an IT risk management program that shares accountability with the business.

      Ad hoc approaches to managing risk fail because…

      If you are like the majority of IT departments, you do not have a consistent and comprehensive strategy for managing IT risk.

      1. Ad hoc risk management is reactionary.
      2. Ad hoc risk management is often focused only on IT security.
      3. Ad hoc risk management lacks alignment with business objectives.

      The results:

      • Increased business risk exposure caused by a lack of understanding of the impact of IT risks on the business.
      • Increased IT non-compliance, resulting in costly settlements and fines.
      • IT audit failure.
      • Ineffective management of risk caused by poor risk information and wrong risk response decisions.
      • Increased unnecessary and avoidable IT failures and fixes.

      58% of organizations still lack a systematic and robust method to actually report on risks (Source: AICPA, 2021)

      Data is an invaluable asset – ensure it’s protected

      Case Studies

      Logo for Cognyte.

      Cognyte, a vendor hired to be a cybersecurity analytics company, had over five billion records exposed in Spring 2021. The data was compromised for four days, providing attackers with plenty of opportunities to obtain personally identifying information. (SecureBlink., 2021 & Security Magazine, 2021)

      Logo for Facebook.

      Facebook, the world’s largest social media giant, had over 533 million Facebook users’ personal data breached when data sets were able to be cross-listed with one another. (Business Insider, 2021 & Security Magazine, 2021)

      Logo for MGM Resorts.

      In 2020, over 10.6 million customers experienced some sort of data being accessible, with 1,300 having serious personally identifying information breached. (The New York Times, 2020)

      Risk management is a business enabler

      Formalize risk management to increase your likelihood of success.

      By identifying areas of risk exposure and creating solutions proactively, obstacles can be removed or circumvented before they become a real problem.

      A certain amount of risk is healthy and can stimulate innovation:

      • A formal risk management strategy doesn’t mean trying to mitigate every possible risk; it means exposing the organization to the right amount of risk.
      • Taking a formal risk management approach allows an organization to thoughtfully choose which risks it is willing to accept.
      • Organizations with high risk management maturity will vault themselves ahead of the competition because they will be aware of which risks to prepare for, which risks to ignore, and which risks to take.

      Only 12% of organizations are using risk as a strategic tool most or all of the time (Source: AICPA, 2021)

      IT risk is enterprise risk

      Accountability for IT risks and the decisions made to address them should be shared between IT and the business.

      Multiple types of risk, 'Finance', 'IT', 'People', and 'Digital', funneling into 'ENTERPRISE RISKS'. IT risks have a direct and often aggregated impact on enterprise risks and opportunities in the same way other business risks can. This relationship must be understood and addressed through integrated risk management to ensure a consistent approach to risk.

      Follow the steps of this blueprint to build or optimize your IT risk management program

      Cycle of 'Goverance' beginning with '1. Identify', '2. Assess', '3. Respond', '4. Monitor', '5. Report'.

      Start Here

      PHASE 1
      Review IT Risk Fundamentals and Governance
      PHASE 2
      Identify and Assess IT Risk
      PHASE 3
      Monitor, Report, and Respond to IT Risk

      1.1

      Review IT Risk Management Fundamentals

      1.2

      Establish a Risk Governance Framework

      2.1

      Identify IT Risks

      2.2

      Assess and Prioritize IT Risks

      3.1

      Monitor IT Risks and Develop Risk Responses

      3.2

      Report IT Risk Priorities

      Integrate Risk and Use It to Your Advantage

      Accelerate and optimize your organization by leveraging meaningful risk data to make intelligent enterprise risk decisions.

      Risk management is more than checking an audit box or demonstrating project due diligence.

      Risk Drivers
      • Audit & compliance
      • Preserve value & avoid loss
      • Previous risk impact driver
      • Major transformation
      • Strategic opportunities
      Arrow pointing right. Only 7% of organizations are in a “leading” or “aspirational” level of risk maturity. (OECD, 2021) 63% of organizations struggle when it comes to defining their appetite toward strategy related risks. (“Global Risk Management Survey,” Deloitte, 2021) Late adopters of risk management were 70% more likely to use instinct over data or facts to inform an efficient process. (Clear Risk, 2020) 55% of organizations have little to no training on ERM to properly implement such practices. (AICPA, NC State Poole College of Management, 2021)
      1. Assess Enterprise Risk Maturity 3. Build a Risk Management Program Plan 4. Establish Risk Management Processes 5. Implement a Risk Management Program
      2. Determine Authority with Governance
      Unfortunately, less than 50% of those in risk focused roles are also in a governance role where they have the authority to provide risk oversight. (Governance Institute of Australia, 2020)
      IT can improve the maturity of the organization’s risk governance and help identify risk owners who have authority and accountability.

      Governance and related decision making is optimized with integrated and aligned risk data.

      List of 'Integrated Risk Maturity Categories': '1. Context & Strategic Direction', '2. Risk Culture and Authority', '3. Risk Management Process', and '4. Risk Program Optimization'. The five types of a risk in 'Enterprise Risk Management (ERM)': 'IT', 'Security', 'Digital', 'Vendor/TPRM', and 'Other'.

      ERM incorporates the different types of risk, including IT, security, digital, vendor, and other risk types.

      The program plan is meant to consider all the major risk types in a unified approach.

      The 'Risk Process' cycle starting with '1. Identify', '2. Assess', '3. Respond', '4. Monitor', '5. Report', and back to the beginning. Implementation of an integrated risk management program requires ongoing access to risk data by those with decision making authority who can take action.

      Blueprint deliverables

      Each step of this blueprint is accompanied by supporting deliverables to help you accomplish your goals:

      Key deliverable:

      Risk Management Program Manual

      Use the tools and activities in each phase of the blueprint to create a comprehensive, customized program manual for the ongoing management of IT risk.

      Sample of the key deliverable, Risk Manangement Program Fund.
      Integrated Risk Maturity Assessment

      Assess the organization's current maturity and readiness for integrated risk management (IRM).

      Sample of the Integrated Risk Maturity Assessment blueprint. Centralized Risk Register

      The repository for all the risks that have been identified within your environment.

      Sample of the Centralized Risk Register blueprint.
      Risk Costing Tool

      A potential cost-benefit analysis of possible risk responses to determine a good method to move forward.

      Sample of the Risk Costing Tool blueprint. Risk Report & Risk Event Action Plan

      A method to report risk severity and hold risk owners accountable for chosen method of responding.

      Samples of the Risk Report & Risk Event Action Plan blueprints.

      Benefit from industry-leading best practices

      As a part of our research process, we used the COSO, ISO 31000, and COBIT 2019 frameworks. Contextualizing IT risk management within these frameworks ensured that our project-focused approach is grounded in industry-leading best practices for managing IT risk.

      Logo for COSO.

      COSO’s Enterprise Risk Management — Integrating with Strategy and Performance addresses the evolution of enterprise risk management and the need for organizations to improve their approach to managing risk to meet the demands of an evolving business environment. (COSO)

      Logo for ISO.

      ISO 31000
      Risk Management can help organizations increase the likelihood of achieving objectives, improve the identification of opportunities and threats, and effectively allocate and use resources for risk treatment. (ISO 31000)

      Logo for COBIT.

      COBIT 2019’s IT functions were used to develop and refine our Ten IT Risk Categories used in our top-down risk identification methodology. (COBIT 2019)

      Abandon ad hoc risk management

      A strong risk management foundation is valuable when building your IT risk management program.

      This research covers the following IT risk fundamentals:

      • Benefits of formalized risk management
      • Key terms and definitions
      • Risk management within ERM
      • Risk management independent of ERM
      • Four key principles of IT risk management
      • Importance of a risk management program manual
      • Importance of buy-in and support from the business

      Drivers of Formalized Risk Management:

      Drivers External to IT
      External Audit Internal Audit
      Mandated by ERM
      Occurrence of Risk Event
      Demonstrating IT’s value to the business Proactive initiative
      Emerging IT risk awareness
      Grassroots Drivers

      Blueprint benefits

      IT Benefits

      • Increased on-time, in-scope, and on-budget completion of IT projects.
      • Meet the business’ service requirements.
      • Improved satisfaction with IT by senior leadership and business units.
      • Fewer resources wasted on fire-fighting.
      • Improved availability, integrity, and confidentiality of sensitive data.
      • More efficient use of resources.
      • Greater ability to respond to evolving threats.

      Business Benefits

      • Reduced operational surprises or failures.
      • Improved IT flexibility when responding to risk events and market fluctuations.
      • Reduced budget uncertainty.
      • Improved ability to make decisions when developing long-term strategies.
      • Improved stakeholder and shareholder confidence.
      • Achieved compliance with external regulations.
      • Competitive advantage over organizations with immature risk management practices.

      Info-Tech offers various levels of support to best suit your needs

      DIY Toolkit

      Guided Implementation

      Workshop

      Consulting

      "Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful." "Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track." "We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place." "Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project."

      Diagnostics and consistent frameworks used throughout all four options

      Guided Implementation

      A Guided Implementation (GI) is a series of calls with an Info-Tech analyst to help implement our best practices in your organization.

      A typical GI is 6 to 8 calls over the course of 3 to 6 months.

      What does a typical GI on this topic look like?

        Phase 1

      • Call #1: Assess current risk maturity and organizational buy-in.
      • Call #2: Establish an IT risk council and determine IT risk management program goals.
      • Phase 2

      • Call #3: Identify the risk categories used to organize risk events.
      • Call #4: Identify the threshold for risk the organization can withstand.
      • Phase 3

      • Call #5: Create a method to assess risk event severity.
      • Call #6: Establish a method to monitor priority risks and consider possible risk responses.
      • Call #7: Communicate risk priorities to the business and implement risk management plan.

      Workshop Overview

      Contact your account representative for more information.
      workshops@infotech.com 1-888-670-8889

      Day 1 Day 2 Day 3 Day 4 Day 5
      Activities
      Review IT Risk Fundamentals and Governance

      1.1 Assess current program maturity

      1.2 Complete RACI chart

      1.3 Create the IT risk council

      1.4 Identify and engage key stakeholders

      1.5 Add organization-specific risk scenarios

      1.6 Identify risk events

      Identify IT Risks

      2.1 Identify risk events (continued)

      2.2 Augment risk event list using COBIT5 processes

      2.3 Determine the threshold for (un)acceptable risk

      2.4 Create impact and probability scales

      2.5 Select a technique to measure reputational cost

      2.6 Conduct risk severity level assessment

      Assess IT Risks

      3.1 Conduct risk severity level assessment

      3.2 Document the proximity of the risk event

      3.3 Conduct expected cost assessment

      3.4 Develop key risk indicators (KRIs) and escalation protocols

      3.5 Perform root cause analysis

      3.6 Identify and assess risk responses

      Monitor, Report, and Respond to IT Risk

      4.1 Identify and assess risk responses

      4.2 Risk response cost-benefit analysis

      4.3 Create multi-year cost projections

      4.4 Review techniques for embedding risk management in IT

      4.5 Finalize the Risk Report and Risk Management Program Manual

      4.6 Transfer ownership of risk responses to project managers

      Next Steps and Wrap-Up (offsite)

      5.1 Complete in-progress deliverables from previous four days

      5.2 Set up review time for workshop deliverables and to discuss next steps

      Outcomes
      1. Maturity Assessment
      2. Risk Management Program Manual
      1. Finalized List of IT Risk Events
      2. Risk Register
      3. Risk Management Program Manual
      1. Risk Register
      2. Risk Event Action Plans
      3. Risk Management Program Manual
      1. Risk Report
      2. Risk Management Program Manual
      1. Workshop Report
      2. Risk Management Program Manual

      Build an IT Risk Management Program

      Phase 1

      Review IT Risk Fundamentals and Governance

      Phase 1

      • 1.1 Review IT Risk Management Fundamentals
      • 1.2 Establish a Risk Governance Framework

      Phase 2

      • 2.1 Identify IT Risks
      • 2.2 Assess and Prioritize IT Risks

      Phase 3

      • 3.1 Develop Risk Responses and Monitor IT Risks
      • 3.2 Report IT Risk Priorities

      This phase will walk you through the following activities:

      • Gain buy-in from senior leadership
      • Assess current program maturity
      • Identify obstacles and pain points
      • Determine the risk culture of the organization
      • Develop risk management goals
      • Develop SMART project metrics
      • Create the IT risk council
      • Complete a RACI chart

      This phase involves the following participants:

      • IT executive leadership
      • Business executive leadership

      Step 1.1

      Review IT Risk Management Fundamentals

      Activities
      • 1.1.1 Gain buy-in from senior leadership
      • 1.1.2 Assess current program maturity

      This step involves the following participants:

      • IT executive leadership
      • Business executive leadership

      Outcomes of this step

      • Reviewed key IT principles and terminology
      • Gained understanding of the relationship between IT risk management and ERM
      • Introduced to Info-Tech’s IT Risk Management Framework
      • Obtained the support of senior leadership
      Step 1.1 Step 1.2

      Effective IT risk management is possible with or without ERM

      Whether or not your organization has ERM, integrating your IT risk management program with the business is possible.

      Most IT departments find themselves in one of these two organizational frameworks for managing IT risk:

      Core Responsibilities With an ERM Without an ERM
      • Risk Decision-Making Authority
      • Final Accountability
      Senior Leadership Team Senior Leadership Team
      • Risk Governance
      • Risk Prioritization & Communication
      ERM IT Risk Management
      • Risk Identification
      • Risk Assessment
      • Risk Monitoring
      IT Risk Management
      Pro: IT’s risk management responsibilities are defined (assessment schedules, escalation and reporting procedures).
      Con: IT may lack autonomy to implement IT risk management best practices.
      Pro: IT is free to create its own IT risk council and develop customized processes that serve its unique needs.
      Con: Lack of clear reporting procedures and mechanisms to share accountability with the business.

      Info-Tech’s IT risk management framework walks you through each step to achieve risk readiness

      IT Risk Management Framework

      Risk Governance
      • Optimize Risk Management Processes
      • Assess Risk Maturity
      • Measure the Success of the Program
      A cycle surrounds the words 'Business Objectives', referring to the surrounding lists. On the top half is 'Communication', and the bottom is 'Monitoring'. Risk Identification
      • Engage Stakeholder Participation
      • Use Risk Identification Frameworks
      • Compile IT-Related Risks
      Risk Response
      • Establish Monitoring Responsibilities
      • Perform Cost-Benefit Analysis
      • Report Risk Response Actions
      Risk Assessment
      • Establish Thresholds for Unacceptable Risk
      • Calculate Expected Cost
      • Determine Risk Severity & Prioritize IT Risks

      Effective IT risk management benefits

      Obtain the support of the senior leadership team or IT steering committee by communicating how IT risk impacts their priorities.

      Risk management benefits To engage the business...
      IT is compliant with external laws and regulations. Identify the industry or legal legislation and regulations your organization abides by.
      IT provides support for business compliance. Find relevant business compliance issues, and relate compliance failures to cost.
      IT regularly communicates costs, benefits, and risks to the business. Acknowledge the number of times IT and the business miscommunicate critical information.
      Information and processing infrastructure are very secure. Point to past security breaches or potential vulnerabilities in your systems.
      IT services are usually delivered in line with business requirements. Bring up IT services that the business was unsatisfied with. Explain that their inputs in identifying risks are correlated with project quality.
      IT related business risks are managed very well. Make it clear that with no risk tracking process, business processes become exposed and tend to slow down.
      IT projects are completed on time and within budget. Point out late or over-budget projects due to the occurrence of unforeseen risks.

      1.1.1 Gain buy-in from senior leadership

      1-4 hours

      Input: List of IT personnel and business stakeholders

      Output: Buy-in from senior leadership for an IT risk management program

      Materials: Risk Management Program Manual

      Participants: IT executive leadership, Business executive leadership

      The resource demands of IT risk management will vary from organization to organization. Here are typical requirements:

      • Occasional participation of key IT personnel and select business stakeholders in IT risk council meetings (e.g. once every two weeks).
      • Periodic risk assessments (e.g. 4 days, twice a year).
      • IT personnel must take on risk monitoring responsibilities (e.g. 1-4 hours per week).
      • Record the results in the Program Manual sections 3.3, 3.4 and 3.5.

      Record the results in the Risk Management Program Manual.

      Integrated Risk Maturity Assessment

      The purpose of the Integrated Risk Maturity Assessment is to assess the organization's current maturity and readiness for integrated risk management (IRM)

      Frequently and continually assessing your organization’s maturity toward integrated risk ensures the right risk management program can be adopted by your organization.

      Integrated Risk Maturity Assessment
      A simple tool to understand if your organization is ready to embrace integrated risk management by measuring maturity across four key categories: Context & Strategic Direction, Risk Culture & Authority, Risk Management Process, and Risk Program Optimization.
      Sample of the Integrated Risk Maturity Assessment deliverable.

      Use the results from this integrated risk maturity assessment to determine the type of risk management program that can and should be adopted by your organizations.

      Some organizations will need to remain siloed and focused on IT risk management only, while others will be able to integrate risk-related information to start enabling automatic controls that respond to this data.

      1.1.2 Assess current program maturity

      1-4 hours

      Input: List of IT personnel and business stakeholders

      Output: Maturity scores across four key risk categories

      Materials: Integrated Risk Maturity Assessment Tool

      Participants: IT executive leadership, Business executive leadership

      This assessment is intended for frequent use; process completeness should be re-evaluated on a regular basis.

      How to Use This Assessment:

      1. Download the Integrated Risk Management Maturity Assessment Tool.
      2. Tab 2, "Data Entry:" This is a qualitative assessment of your integrated risk management process and is organized by the categories of integrated risk maturity. You will be asked to rate the extent to which you are executing the activities required to successfully complete each phase of the assessment. Use the drop-down menus provided to select the appropriate level of execution for each activity listed.
      3. Tab 3, "Results:" This tab will display your rate of IRM completeness/maturity. You will receive a score for each category as well as an overall score. The results will be displayed numerically, by percentage, and graphically.

      Record the results in the Integrated Risk Maturity Assessment.

      Integrated Risk Maturity Categories

      Semi-circle with colored points indicating four categories.

      1

      Context & Strategic Direction Understanding of the organization’s main objectives and how risk can support or enhance those objectives.

      2

      Risk Culture and Authority Examine if risk-based decisions are being made by those with the right level of authority and if the organization’s risk appetite is embedded in the culture.

      3

      Risk Management Process Determine if the current process to identify, assess, respond to, monitor, and report on risks is benefitting the organization.

      4

      Risk Program Optimization Consider opportunities where risk-related data is being gathered, reported, and used to make informed decisions across the enterprise.

      Step 1.2

      Establish a Risk Governance Framework

      Activities
      • 1.2.1 Identify pain points/obstacles and opportunities
      • 1.2.2 Determine the risk culture of the organization
      • 1.2.3 Develop risk management goals
      • 1.2.4 Develop SMART project metrics
      • 1.2.5 Create the IT risk council
      • 1.2.6 Complete a RACI chart

      This step involves the following participants:

      • IT executive leadership
      • Business executive leadership

      Outcomes of this step

      • Developed goals for the risk management program
      • Established the IT risk council
      • Assigned accountability and responsibility for risk management processes

      Review IT Risk Fundamentals and Governance

      Step 1.1 Step 1.2

      Create an IT risk governance framework that integrates with the business

      Follow these best practices to make sure your requirements are solid:

      1. Self-assess your current approach to IT risk management.
      2. Identify organizational obstacles and set attainable risk management goals.
      3. Track the effectiveness and success of the program using SMART risk management metrics.
      4. Establish an IT risk council tasked with managing IT risk.
      5. Set clear risk management accountabilities and responsibilities for IT and business stakeholders.

      Key metrics for your IT risk governance framework

      Challenges:
      • Key stakeholders are left out or consulted once risks have already occurred.
      • Failure to employ consistent risk identification methodologies results in omitted and unknown risks.
      • Risk assessments do not reflect organizational priorities and may not align with thresholds for acceptable risk.
      • Risk assessment occurs sporadically or only after a major risk event has already occurred.
      Key metrics:
      • Number of risk management processes done ad hoc.
      • Frequency that IT risk appears as an agenda item at IT steering committee meetings.
      • Percentage of IT employees whose performance evaluations reflect risk management objectives.
      • Percentage of IT risk council members who are trained in risk management activities.
      • Number of open positions in the IT risk council.
      • Cost of risk management program operations per year.

      Info-Tech Insight

      Metrics provide the foundation for determining the success of your IT risk management program and ensure ongoing funding to support appropriate risk responses.

      IT risk management success factors

      Support and sponsorship from senior leadership

      IT risk management has more success when initiated by a member of the senior leadership team or the board, rather than emerging from IT as a grassroots initiative.

      Sponsorship increases the likelihood that risk management is prioritized and receives the necessary resources and attention. It also ensures that IT risk accountability is assumed by senior leadership.

      Risk culture and awareness

      A risk-aware organizational culture embraces new policies and processes that reflect a proactive approach to risk.

      An organization with a risk-aware culture is better equipped to facilitate communication vertically within the organization.

      Risk awareness can be embedded by revising job descriptions and performance assessments to reflect IT risk management responsibilities.

      Organization size

      Smaller organizations can often institute a mature risk management program much more quickly than larger organizations.

      It is common for key personnel within smaller organizations to be responsible for multiple roles associated with risk management, making it easier to integrate IT and business risk management.

      Larger organizations may find it more difficult to integrate a more complex and dispersed network of individuals responsible for various risk management responsibilities.

      1.2.1 Identify obstacles and pain points

      1-4 hours

      Input: Integrated Risk Maturity Assessment

      Output: Obstacles and pain points identified

      Materials: IT Risk Management Success Factors

      Participants: IT executive leadership, Business executive leadership

      Anticipate potential challenges and “blind spots” by determining which success factors are missing from your current situation.

      Instructions:

      1. List the potential obstacles and missing success factors that you must overcome to effectively manage IT risk and build a risk management program.
      2. Consider some opportunities that could be leveraged to increase the success of this program.
      3. Use this list in Activity 1.2.3 to develop program goals.

      Risk Management

      Replace the example pain points and opportunities with real scenarios in your organization.

      Pain Points/Obstacles
      • Lack of leadership buy-in
      • Skills and understanding around risk management within IT
      • Skills and understanding around risk management within the organization
      • Lack of a defined risk management posture
      Opportunities
      • Changes in regulations related to risk
      • Organization moving toward an integrated risk management program
      • Ability to leverage lessons learned from similar companies
      • Strong process management and adherence to policies by employees in the organization

      1.2.2 Determine the risk culture of your organization

      1-3 hours

      Determine how your organization fits the criteria listed below. Descriptions and examples do not have to match your organization perfectly.

      Risk Tolerant
      • You have no compliance requirements.
      • You have no sensitive data.
      • Customers do not expect you to have strong security controls.
      • Revenue generation and innovative products take priority and risk is acceptable.
      • The organization does not have remote locations.
      • It is likely that your organization does not operate within the following industries:
        • Finance
        • Health care
        • Telecom
        • Government
        • Research
        • Education
      Moderate
      • You have some compliance requirements, e.g.:
        • HIPAA
        • PIPEDA
      • You have sensitive data, and are required to retain records.
      • Customers expect strong security controls.
      • Information security is visible to senior leadership.
      • The organization has some remote locations.
      • Your organization most likely operates within the following industries:
        • Government
        • Research
        • Education
      Risk Averse
      • You have multiple, strict compliance and/or regulatory requirements.
      • You house sensitive data, such as medical records.
      • Customers expect your organization to maintain strong and current security controls.
      • Information security is highly visible to senior management and public investors.
      • The organization has multiple remote locations.
      • Your organization operates within the following industries:
        • Finance
        • Healthcare
        • Telecom

      Be aware of the organization’s attitude towards risk

      Risk culture is an organization’s attitude towards taking risks. This attitude manifests itself in two ways:

      One element of risk culture is what levels of risk the organization is willing to accept to pursue its objectives and what levels of risk are deemed unacceptable. This is often called risk appetite.
      Risk tolerant

      Risk-tolerant organizations embrace the potential of accelerating growth and the attainment of business objectives by taking calculated risks.

      Risk averse

      Risk-averse organizations prefer consistent, gradual growth and goal attainment by embracing a more cautious stance toward risk.

      The other component of risk culture is the degree to which risk factors into decision making.
      Risk conscious

      Risk-conscious organizations place a high priority on being aware of all risks impacting business objectives, regardless of whether they choose to accept or respond to those risks.

      Unaware

      Organizations that are largely unaware of the impact of risk generally believe there are few major risks impacting business objectives and choose to invest resources elsewhere.

      Info-Tech Insight

      Organizations typically fall in the middle of these spectrums. While risk culture will vary depending on the industry and maturity of the organization, a culture with a balanced risk appetite that is extremely risk conscious is able to make creative, dynamic decisions with reasonable limits placed on risk-related decision making.

      1.2.3 Develop goals for the IT risk management program

      1-4 hours

      Input: Integrated Risk Maturity Assessment, Risk Culture, Pain Points and Opportunities

      Output: Goals for the IT risk management program

      Materials: Risk Management Program Manual

      Participants: IT executive leadership, Business executive leadership

      Translate your maturity assessment and knowledge about organizational risk culture, potential obstacles, and success factors to develop goals for your IT risk management program.

      Instructions:

      1. In the Risk Management Program Manual, revise, replace, or add to the high-level goals provided in section 2.4.
      2. Make sure that you have three to five high-level goals that reflect the current and targeted maturity of IT risk management processes.
      3. Integrate potential obstacles, pain points, and insights from the organization’s risk culture.

      Record the results in the Risk Management Program Manual.

      1.2.4 Develop SMART project metrics

      1-3 hours

      Create metrics for measuring the success of the IT risk management program.

      Ensure that all success metrics are SMART Instructions
      1. Document a list of appropriate metrics to assess the success of the IT risk management program on a whiteboard.
      2. Use the sample metrics listed in the table on the next slide as a starting point.
      3. Fill in the chart to indicate the:
        1. Name of the success metric
        2. Method for measuring success
        3. Baseline measurement
        4. Target measurement
        5. Actual measurements at various points throughout the process of improving the risk management program
        6. A deadline for each metric to meet the target measurement
      Strong Make sure the objective is clear and detailed.
      Measurable Objectives are measurable if there are specific metrics assigned to measure success. Metrics should be objective.
      Actionable Objectives become actionable when specific initiatives designed to achieve the objective are identified.
      Realistic Objectives must be achievable given your current resources or known available resources.
      Time-Bound An objective without a timeline can be put off indefinitely. Furthermore, measuring success is challenging without a timeline.

      1.2.4 Develop SMART project metrics (continued)

      1-3 hours

      Attach metrics to your goals to gauge the success of the IT risk management program.

      Replace the example metrics with accurate KPIs or metrics for your organization.

      Sample Metrics
      Name Method Baseline Target Deadline Checkpoint 1 Checkpoint 2 Final
      Number of risks identified (per year) Risk register 0 100 Dec. 31
      Number of business units represented (risk identification) Meeting minutes 0 5 Dec. 31
      Frequency of risk assessment Assessments recorded in risk management program manual 0 2 per year Year 2
      Percentage of identified risk events that undergo expected cost assessment Ratio of risks assessed in the risk costing tool to risks assessed in the risk register 0 20% Dec. 31
      Number of top risks without an identified risk response Risk register 5 0 March 1
      Cost of risk management program operations per year Meeting frequency and duration, multiplied by the cost of participation $2,000 $5,000 Dec. 31

      Create the IT risk committee (ITRC)

      Responsibilities of the ITRC:
      1. Formalize risk management processes.
      2. Identify and review major risks throughout the IT department.
      3. Recommend an appropriate risk appetite or level of exposure.
      4. Review the assessment of the impact and likelihood of identified risks.
      5. Review the prioritized list of risks.
      6. Create a mitigation plan to minimize risk likelihood and impact.
      7. Review and communicate overall risk impact and risk management success.
      8. Assign risk ownership responsibilities of key risks to ensure key risks are monitored and risk responses are effectively implemented.
      9. Address any concerns in regards to the risk management program, including, but not limited to, reviewing their risk management duties and resourcing.
      10. Communicate risk reports to senior management annually.
      11. Make any alterations to the committee roster and the individuals’ responsibilities as needed and document changes.
      Must be on the ITRC:
      • CIO
      • CRO (if applicable)
      • Senior Directors
      • Security Officer
      • Head of Operations

      Must be on the ITRC:

      • CFO
      • Senior representation from every business unit impacted by IT risk

      1.2.5 Create the IT risk council

      1-4 hours

      Input: List of IT personnel and business stakeholders

      Output: Goals for the IT risk management program

      Materials: Risk Management Program Manual

      Participants: CIO, CRO (if applicable), Senior Directors, Head of Operations

      Identify the essential individuals from both the IT department and the business to create a permanent committee that meets regularly and carries out IT risk management activities.

      Instructions:

      1. Review sections 3.1 (Mandate) and 3.2 (Agenda and Responsibilities) of the IT Risk Committee Charter, located in the Risk Management Program Manual. Make any necessary revisions.
      2. In section 3.3, document how frequently the council is scheduled to meet.
      3. In section 3.4, document members of the IT risk council.
      4. Obtain sign-off for the IT risk council from the CIO or another member of the senior leadership team in section 3.5 of the manual.

      Record the results in the Risk Management Program Manual.

      1.2.6 Complete RACI chart

      1-3 hours

      A RACI diagram is a useful visualization that identifies redundancies and ensures that every role, project, or task has an accountable party.

      RACI is an acronym made up of four participatory roles: Instructions
      1. Use the template provided on the following slide, and add key stakeholders who do not appear and are relevant for your organization.
      2. For each activity, assign each stakeholder a letter.
      3. There must be an accountable party for each activity (every activity must have an “A”).
      4. For activities that do not apply to a particular stakeholder, leave the space blank.
      5. Once the chart is complete, copy/paste it into section 4.1 of the Risk Management Program Manual.
      Responsible Stakeholders who undertake the activity.
      Accountable Stakeholders who are held responsible for failure or take credit for success.
      Consulted Stakeholders whose opinions are sought.
      Informed Stakeholders who receive updates.

      1.2.6 Complete RACI chart (continued)

      1-3 hours

      Assign risk management accountabilities and responsibilities to key stakeholders:

      Stakeholder Coordination Risk Identification Risk Thresholds Risk Assessment Identify Responses Cost-Benefit Analysis Monitoring Risk Decision Making
      ITRC A R I R R R A C
      ERM C I C I I I I C
      CIO I A A A A A I R
      CRO I R C I R
      CFO I R C I R
      CEO I R C I A
      Business Units I C C C
      IT I I I I I I R C
      PMO C C C
      Legend: Responsible Accountable Consulted Informed

      Build an IT Risk Management Program

      Phase 2

      Identify and Assess IT Risk

      Phase 1

      • 1.1 Review IT Risk Management Fundamentals
      • 1.2 Establish a Risk Governance Framework

      Phase 2

      • 2.1 Identify IT Risks
      • 2.2 Assess and Prioritize IT Risks

      Phase 3

      • 3.1 Develop Risk Responses and Monitor IT Risks
      • 3.2 Report IT Risk Priorities

      This phase will walk you through the following activities:

      • Add organization-specific risk scenarios
      • Identify risk events
      • Augment risk event list using COBIT 2019 processes
      • Conduct a PESTLE analysis
      • Determine the threshold for (un)acceptable risk
      • Create a financial impact assessment scale
      • Select a technique to measure reputational cost
      • Create a likelihood scale
      • Assess risk severity level
      • Assess expected cost

      This phase involves the following participants:

      • IT risk council
      • Relevant business stakeholders
      • Representation from senior management team
      • Business Risk Owners

      Step 2.1

      Identify IT Risks

      Activities
      • 2.1.1 Add organization-specific risk scenarios
      • 2.1.2 Identify risk events
      • 2.1.3 Augment risk event list using COBIT 19 processes
      • 2.1.4 Conduct a PESTLE analysis

      This step involves the following participants:

      • IT executive leadership
      • IT Risk Council
      • Business executive leadership
      • Business risk owners

      Outcomes of this step

      • Participation of key stakeholders
      • Comprehensive list of IT risk events
      Identify and Assess IT Risk
      Step 2.1 Step 2.2

      Get to know what you don’t know

      1. Engage the right stakeholders in risk identification.
      2. Employ Info-Tech’s top-down approach to risk identification.
      3. Augment your risk event list using alternative frameworks.
      Key metrics:
      • Total risks identified
      • New risks identified
      • Frequency of updates to the Risk Register Tool
      • Number of realized risk events not identified in the Risk Register Tool
      • Level of business participation in enterprise IT risk identification
        • Number of business units represented
        • Number of meetings attended in person
        • Number of risk reports received

      Info-Tech Insight

      What you don’t know CAN hurt you. How do you identify IT-related threats and vulnerabilities that you are not already aware of? Now that you have created a strong risk governance framework that formalizes risk management within IT and connects it to the enterprise, follow the steps outlined in this section to reveal all of IT’s risks.

      Engage key stakeholders

      Ensure that all key risks are identified by engaging key business stakeholders.

      Benefits of obtaining business involvement during the risk identification stage:
      • You will identify risk events you had not considered or you weren’t aware of.
      • You will identify risks more accurately.
      • Risk identification is an opportunity to raise awareness of IT risk management early in the process.

      Executive Participation:

      • CIO participation is integral when building a comprehensive register of risk events impacting IT.
      • CIOs and IT directors possess a holistic view of all of IT’s functions.
      • CIOs and IT directors are uniquely placed to identify how IT affects other business units and the attainment of business objectives. If applicable, CRO and CTO participation is also critical.

      Prioritizing and Selecting Stakeholders

      1. Reliance on IT services and technologies to achieve business objectives.
      2. Relationship with IT, and willingness to engage in risk management activities.
      3. Unique perspectives, skills, and experiences that IT may not possess.

      Info-Tech Insight

      While IT personnel are better equipped to identify IT risk than anyone, IT does not always have an accurate view of the business’ exposure to IT risk. Strive to maintain a 3 to 1 ratio of IT to non-IT personnel involved in the process.

      Enable IT to target risk holistically

      Take a top-down approach to risk identification to guide brainstorming

      Info-Tech’s risk categories are consistent with a risk identification method called Risk Prompting.

      A risk prompt list is a list that categorizes risks into types or areas. The n10 risk categories encapsulate the services, activities, responsibilities, and functions of most IT departments. Use these categories and the example risk scenarios provided as prompts to guide brainstorming and organize risks.

      Risk Category: High-level groupings that describe risk pertaining to major IT functions. See the following slide for all ten of Info-Tech’s IT risk categories. Risk Scenario: An abstract profile representing common risk groups that are more specific than risk categories. Typically, organizations are able to identify two to five scenarios for each category. Risk Event: Specific threats and vulnerabilities that fall under a particular risk scenario. Organizations are able to identify anywhere between 1 and 20 events for each scenario. See the Appendix of the Risk Management Program Manual for a list of risk event examples.

      Risk Category

      Risk Scenario

      Risk Event

      Compliance Regulatory compliance Being fined for not complying/being aware of a new regulation.
      Externally originated attack Phishing attack on the organization.
      Operational Technology evaluation & selection Partnering with a vendor that is not in compliance with a key regulation.
      Capacity planning Not having sufficient resources to support a DRP.
      Third-Party Risk Vendor management Vendor performance requirements are improperly defined.
      Vendor selection Vendors are improperly selected to meet the defined use case.

      2.1.1 Add organization-specific risk scenarios

      1-3 hours

      Review Info-Tech’s ten IT risk categories and add risk scenarios to the examples provided.

      IT Reputational
      • Negative PR
      • Consumers writing negative reviews
      • Employees writing negative reviews
      IT Financial
      • Stock prices drop
      • Value of the organization is reduced
      IT Strategic
      • Organization prioritizes innovation but remains focused on operational
      • Unable to access data to support strategic initiative
      Operational
      • Enterprise architecture
      • Technology evaluation and selection
      • Capacity planning
      • Operational errors
      Availability
      • Power outage
      • Increased data workload
      • Single source of truth
      • Lacking knowledge transfer processes for critical tasks
      Performance
      • Network failure
      • Service levels not being met
      • Capacity overload
      Compliance
      • Regulatory compliance
      • Standards compliance
      • Audit compliance
      Security
      • Malware
      • Internally originated attack
      Third Party
      • Vendor selection
      • Vendor management
      • Contract termination
      Digital
      • No back-up process if automation fails

      2.1.2 Identify risk events

      1-4 hours

      Input: IT risk categories

      Output: Risk events identified and categorized

      Materials: Risk Register Tool

      Participants: IT risk council, Relevant business stakeholders, Representation from senior management team, Business risk owners, CRO (if applicable)

      Use Info-Tech’s IT risk categories and scenarios to brainstorm a comprehensive list of IT-related threats and vulnerabilities impacting your organization.

      Instructions:

      1. Document risk events in the Risk Register Tool.
      2. List risk scenarios (organized by risk category) in the Risk Events/Threats column.
      3. Disseminate the list to key stakeholders who were unable to participate and solicit their feedback.
        • Consult the RACI chart located in section 4.1 of the Risk Management Program Manual.
      4. Attack one scenario at a time, exhausting all realistic risk events for that grouping before moving onto the next scenario. Each scenario should take approximately 45-60 minutes.

      Tip: If disagreement arises regarding whether a specific risk event is relevant to the organization or not and it cannot be resolved quickly, include it in the list. The applicability of these risks will become apparent during the assessment process.

      Record the results in the Risk Register Tool.

      2.1.3 Augment the risk event list using COBIT 2019 processes (Optional)

      1-3 hours

      Other industry-leading frameworks provide alternative ways of conceptualizing the functions and responsibilities of IT and may help you uncover additional risk events.

      1. Managed IT Management Framework
      2. Managed Strategy
      3. Managed Enterprise Architecture
      4. Managed Innovation
      5. Managed Portfolio
      6. Managed Budget and Costs
      7. Managed Human Resources
      8. Managed Relationships
      9. Managed Service Agreements
      10. Managed Vendors
      11. Managed Quality
      12. Managed Risk
      13. Managed Security
      14. Managed Data
      15. Managed Programs
      16. Managed Requirements Definition
      17. Managed Solutions Identification and Build
      18. Managed Availability and Capacity
      19. Managed Organizational Change Enablement
      20. Managed IT Changes
      1. Managed IT Change Acceptance and Transitioning
      2. Managed Knowledge
      3. Managed Assets
      4. Managed Configuration
      5. Managed Projects
      6. Managed Operations
      7. Managed Service Requests and Incidents
      8. Managed Problems
      9. Managed Continuity
      10. Managed Security Services
      11. Managed Business Process Controls
      12. Managed Performance and Conformance Monitoring
      13. Managed System of Internal Control
      14. Managed Compliance with External Requirements
      15. Managed Assurance
      16. Ensured Governance Framework Setting and Maintenance
      17. Ensured Benefits Delivery
      18. Ensured Risk Optimization
      19. Ensured Resource Optimization
      20. Ensured Stakeholder Engagement

      Instructions:

      1. Review COBIT 2019’s 40 IT processes and identify additional risk events.
      2. Match risk events to the corresponding risk category and scenario and add them to the Risk Register Tool.

      2.1.4 Finalize your risk register by conducting a PESTLE analysis (Optional)

      1-3 hours

      Explore alternative identification techniques to incorporate external factors and avoid “groupthink.”

      Consider the External Environment – PESTLE Analysis

      Despite efforts to encourage equal participation in the risk identification process, key risks may not have been shared in previous exercises.

      Conduct a PESTLE analysis as a final safety net to ensure that all key risk events have been identified.

      Avoid “Groupthink” – Nominal Group Technique

      The Nominal Group Technique uses the silent generation of ideas and an enforced “safe” period of time where ideas are shared but not discussed to encourage judgement-free idea generation.

      • Ideas are generated silently and independently.
      • Ideas are then shared and documented; however, discussion is delayed until all of the group’s ideas have been recorded.
      • Idea generation can occur before the meeting and be kept anonymous.

      Note: Employing either of these techniques will lengthen an already time-consuming process. Only consider these techniques if you have concerns regarding the homogeneity of the ideas being generated or if select individuals are dominating the exercise.

      List the following factors influencing the risk event:
      • Political factors
      • Economic factors
      • Social factors
      • Technological factors
      • Legal factors
      • Environmental factors
      'PESTLE Analysis' presented as a wheel with the acronym's meanings surrounding the title. 'Political Factors', 'Economic Factors', 'Social Factors', 'Technological Factors', 'Legal Factors', and 'Environmental Factors'.

      Step 2.2

      Assess and Prioritize IT Risks

      Activities
      • 2.2.1 Determine the threshold for (un)acceptable risk
      • 2.2.2 Create a financial impact assessment scale
      • 2.2.3 Select a technique to measure reputational cost
      • 2.2.4 Create a likelihood scale
      • 2.2.5 Risk severity level assessment
      • 2.2.6 Expected cost assessment

      This step involves the following participants:

      • IT risk council
      • Relevant business stakeholders
      • Representation from senior management team
      • Business risk owners

      Outcomes of this step

      • Business-approved thresholds for unacceptable risk
      • Completed Risk Register Tool with risks prioritized according to severity
      • Expected cost calculations for high-priority risks

      Identify and Assess IT Risk

      Step 2.1 Step 2.2

      Reveal the organization’s greatest IT threats and vulnerabilities

      1. Establish business-approved risk thresholds for acceptable and unacceptable risk.
      2. Conduct a streamlined assessment of all risks to separate acceptable and unacceptable risks.
      3. Perform a deeper, cost-based assessment of prioritized risks.
      Key metrics:
      • Frequency of IT risk assessments
        • (Annually, bi-annually, etc.)
      • Assessment accuracy
        • Percentage of risk assessments that are substantiated by later occurrences or testing
        • Ratio of cumulative actual costs to expected costs
      • Assessment consistency
        • Percentage of risk assessments that are substantiated by third-party audit
      • Assessment rigor
        • Percentage of identified risk events that undergo first-level assessment (severity scores)
        • Percentage of identified risk events that undergo second-level assessment (expected cost)
      • Stakeholder oversight and participation
        • Level of executive participation in IT risk assessment (attend in person, receive report, etc.)
        • Number of business stakeholder reviews per risk assessment

      Info-Tech Insight

      Risk is money. It’s impossible to make intelligent decisions about risks without knowing what their financial impact will be.

      Review risk assessment fundamentals

      Risk assessment provides you with the raw materials to conduct an informed cost-benefit analysis and make robust risk response decisions.

      In this section, you will be prioritizing your IT risks according to their risk severity, which is a reflection of their expected cost.

      Calculating risk severity

      How much you expect a risk event to cost if it were to occur:

      Likelihood of Risk Impact

      e.g. $250,000 or “High”

      X

      Calibrated by how likely the risk is to occur:

      Likelihood of Risk Occurrence

      e.g. 10% or “Low”

      =

      Produces a dollar value or “severity level” for comparing risks:

      Risk Severity

      e.g. $25,000 or “Medium”
      Which must be evaluated against thresholds for acceptable risk and the cost of risk responses.

      Risk Tolerance
      Risk Response

      CBA
      Cost-benefit analysis

      Maintain the engagement of key stakeholders in the risk assessment process

      1

      Engage the Business During Assessment Process

      Asking business stakeholders to make significant contributions to the assessment exercise may be unrealistic (particularly for members of the senior leadership team, other than the CIO).

      Ensure that they work with you to finalize thresholds for acceptable or unacceptable risk.

      2

      Verify the Risk Impact and Assessment

      If IT has ranked risk events appropriately, the business will be more likely to offer their input. Share impact and likelihood values for key risks to see if they agree with the calculated risk severity scores.

      3

      Identify Where the Business Focuses Attention

      While verifying, pay attention to the risk events that the business stresses as key risks. Keep these risks in mind when prioritizing risk responses as they are more likely to receive funding.

      Try to communicate the assessments of these risk events in terms of expected cost to attract the attention of business leaders.

      Info-Tech Insight

      If business executives still won’t provide the necessary information to update your initial risk assessments, IT should approach business unit leaders and lower-level management. Lean on strong relationships forged over time between IT and business managers or supervisors to obtain any additional information.

      Info-Tech recommends a two-level approach to risk assessment

      Review the two levels of risk assessment offered in this blueprint.

      Risk severity level assessment (mandatory)

      1

      Information

      Number of risks: Assess all risk events identified in Phase 1.
      Units of measurement: Use customized likelihood and impact “levels.”
      Time required: One to five minutes per risk event.

      Assess Likelihood

      Negligible
      Low
      Moderate
      High
      Very High

      X

      Assess Likelihood

      Negligible
      Low
      Moderate
      High
      Very High

      =

      Output


      Risk Security Level:

      Moderate

      Example of a risk severity level assessment chart.
      Chart risk events according to risk severity as this allows you to organize and prioritize IT risks.

      Assess all of your identified risk events with a risk severity-level assessment.

      • By creating a likelihood and impact assessment scale divided into three to nine “levels” (sometimes referred to as “buckets”), you can evaluate every risk event quickly while being confident that risks are being assessed accurately.
      • In the following activities, you will create likelihood and impact scales that align with your organizational risk appetite and tolerance.
      • Severity-level assessment is a “first pass” of your risk list, revealing your organization’s most severe IT risks, which can be assessed in greater detail by incorporating expected cost into your evaluation.

      Info-Tech recommends a two-level approach to risk assessment (continued)

      Expected cost assessment (optional)

      2

      Information

      Number of risks: Only assess high-priority risks revealed by severity-level assessment.
      Units of measurement: Use actual likelihood values (%) and impact costs ($).
      Time required: 10-20 minutes per risk event.

      Assess Likelihood

      15%

      Moderate

      X

      Assess Likelihood

      $100,000

      High

      =

      Output


      Expected Cost:

      $15,000

      Expected cost is useful for conducting cost-benefit analysis and comparing IT risks to non-IT risks and other budget priorities for the business.

      Conduct expected cost assessments for IT’s greatest risks.

      For risk events warranting further analysis, translate risk severity levels into hard expected-cost numbers.

      Why conduct expected cost assessments?
      • Expected cost represents how much you would expect to pay in an average year for each risk event.
      • Communicate risk priorities to the business in language they can understand.
      • While risk severity levels are useful for comparing one IT risk to another, expected cost data allows the business to compare IT risks to non-IT risks that may not use the same scales.
      Why is expected cost assessment optional?
      • Determining robust likelihood values and precise impact estimates can be challenging and time consuming.
      • Some risk events may require extensive data gathering and industry analysis.

      Implement and leverage a centralized risk register

      The purpose of the risk register is to act as the repository for all the risks that have been identified within your environment.

      Use this tool to:

      1. Collect and maintain a repository for all IT risk events impacting the organization and relevant information for each risk.
        • Capture all relevant IT risk information in one location.
        • Organize risk identification and assessment information for transparent risk management, stakeholder review, and/or internal audit.
      2. Calculate risk severity scores to prioritize risk events and determine which risks require a risk response.
        • Separate acceptable and unacceptable risks (as determined by the business).
        • Rank risks based on severity levels.
      3. Assess risk responses and calculate residual risk.
        • Evaluate the effect that proposed risk response actions will have on top risk events and quantify residual risk magnitude.
        • This step will be completed in section 3.1

      2.2.1 Determine the threshold for (un)acceptable risk

      1-4 hours

      Input: Risk events, Risk appetite

      Output: Threshold for risk identified

      Materials: Risk Register Tool, Risk Management Program Manual

      Participants: IT risk council, Relevant business stakeholders, Representation from senior management team, Business risk owner

      Instructions:

      There are times when the business needs to know about IT risks with high expected costs.

      1. Create an expected cost threshold that defines what constitutes an acceptable and unacceptable risk for the organization. This figure should be a concrete dollar value. In the next exercises, you will build risk impact and likelihood scales with this value in mind, ensuring that “high” or “extreme” risks are immediately communicated to senior leadership.
      2. Do not consider IT budget restrictions when developing this number. The acceptable risk threshold should reflect the business’ tolerance/appetite for risk.

      This threshold is typically based on the organization’s ability to absorb financial losses, and its tolerance/appetite towards risk.

      If your organization has ERM, adopt the existing acceptability threshold.

      Record this threshold in section 5.3 of the Risk Management Program Manual

      2.2.2 Create a financial impact assessment scale

      1-4 hours

      Input: Risk events, Risk threshold

      Output: Financial impact scale created

      Materials: Risk Register Tool, Risk Management Program Manual

      Participants: IT risk council, Relevant business stakeholders, Representation from senior management team, Business risk owner

      Instructions:

      1. Create a scale to assess the financial impact of risk events.
        • Typically, risk impacts are assessed on a scale of 1-5; however, some organizations may prefer to assess risks using 3, 4, 7, or 9-point scales.
      2. Ensure that the unacceptable risk threshold is reflected in the scale.
        • In the example provided, the unacceptable risk threshold ($100,000) is represented as “High” on the impact scale.
      3. Attach labels to each point on the scale. Effective labels will easily distinguish between risks on either side of the unacceptable risk threshold.

      Record the risk impact scale in section 5.3 of the Risk Management Program Manual

      Convert project overruns and service outages into costs

      Use the tables below to quickly convert impacts typically measured in units of time to financial cost. Replace the values in the table with those that reflect your own costs.

      • While project overruns and service outages may have intangible impacts beyond the unexpected costs stemming from paying employees and lost revenue (such as adding complexity to project management and undermining the business’ confidence in IT), these measurements will provide adequate impact estimations for risk assessment.
      • Remember, complex risk events can be analyzed further with an expected cost assessment.
      Project Overruns Scale for the use of cost assessment with dollar amounts associated with impact levels. '$250,000 - Extreme', '$100,000 - High', '$60,000 - Moderate', '$35,000 - Low', '$10,000 - Negligible'.

      Project

      Time (days)

      20 days

      Number of employees

      8

      Average cost per employee (per day)

      $300

      Estimated cost

      $48,000
      Service Outages

      Service

      Time (hours)

      4 hours

      Lost revenue (per hour)

      $10,000

      Estimated cost

      $40,000

      Impact scale

      Low

      2.2.3 Select a technique to measure reputational cost (1 of 3)

      1-3 hours

      Realized risk events may have profound reputational costs that do not immediately impact your bottom line.

      Reputational cost can take several forms, including the internal and external perception of:
      1. Brand likeability
      2. Product quality
      3. Leadership capability
      4. Social responsibility

      Based on your industry and the nature of the risk, select one of the three techniques described in this section to incorporate reputational costs into your risk assessment.

      Technique #1 – Use financial indicators:

      For-profit companies typically experience reputational loss as a gradual decline in the strength of their brand, exclusion from industry groups, or lost revenue.

      If possible, use these measures to put a price on reputational loss:

      • Lost revenue attributable to reputation loss
      • Loss of market share attributable to reputation loss
      • Drops in share price attributable to reputation loss (for public companies)

      Match this dollar value to the corresponding level on the impact scale created in Activity 2.2.2.

      • If you are not able to effectively translate all reputational costs into financial costs, proceed to techniques 2 and 3 on the following slides.

      2.2.3 Select a technique to measure reputational cost (2 of 3)

      1-3 hours
      It is common for public sector or not-for-profit organizations to have difficulty putting a price tag on intangible reputational costs.
      • For example, a government organization may be unable to directly quantify the cost of losing the confidence and/or support of the public.
      • A helpful technique is to reframe how reputation is assigned value.
      Technique #2 – Calculate the value of avoiding reputational cost:
      1. Imagine that the particular risk event you are assessing has occurred. Describe the resulting reputational cost using qualitative language.

      For example:

      A data breach, which caused the unsanctioned disclosure of 2,000 client files, has inflicted high reputational costs on the organization. These have impacted the organization in the following ways:

      • Loss of organizational trust in IT
      • IT’s reputation as a value provider to the organization is tarnished
      • Loss of client trust in the organization
      • Potential for a public reprimand of the organization by the government to restore public trust
    • Then, determine (hypothetically) how much money the organization would be willing to spend to prevent the reputational cost from being incurred.
    • Match this dollar value to the corresponding level on the impact scale created in Activity 2.2.2.
    • 2.2.3 Select a technique to measure reputational cost (3 of 3)

      1-3 hours

      If you feel that the other techniques have not reflected reputational impacts in the overall severity level of the risk, create a parallel scale that roughly matches your financial impact scale.

      Technique #3 – Create a parallel scale for reputational impact:

      Visibility is a useful metric for measuring reputational impact. Visibility measures how widely knowledge of the risk event has spread and how negatively the organization is perceived. Visibility has two main dimensions:

      • Internal vs. External
      • Low Amplification vs. High Amplification
      • Internal/External: The further outside of the organization that the risk event is visible, the higher the reputational impact.
        Low/High Amplification: The greater the ability of the actor to communicate and amplify the occurrence of a risk event, the higher the reputational impact.
        After establishing a scale for reputational impact, test whether it reflects the severity of the financial impact levels in the financial impact scale.

      • For example, if the media learns about a recent data breach, does that feel like a $100,000 loss?
      Example:
      Scale for the use of cost assessment  of reputational impact with dimension combinations associated with impact levels. 'External, High Amp, (regulators, lawsuits) - Extreme', 'Internal, High Amp, (CEO) - Low', 'Internal, Low Amp (IT) - Negligible'.

      2.2.4 Create a likelihood scale

      1-3 hours

      Instructions:
      1. Create a scale to assess the likelihood that a risk event will occur over a given period of time.
        • Info-Tech recommends assessing the likelihood that the risk event will occur over a period of one year (the IT risk council should be reassessing the risk event no less than once per year).
      2. Ensure that the likelihood scale contains the same number of levels as the financial impact scale (3, 4, 5, 7, or 9).
      3. The example provided is likely to satisfy most IT departments; however, you may customize the distribution of likelihood values to reflect the organization’s aversion towards uncertainty.
        • For example, an extremely risk-averse organization may consider any risk event with a likelihood greater than 20% to have a “High” likelihood of occurrence.
      4. Attach the same labels used for the financial impact scale (Low, Moderate, High, etc.)

      Record the risk impact scale in section 5.3 of the Risk Management Program Manual

      Scale to assess the likelihood that a risk event will occur. '80-99% - Extreme', '60-79% - High', '40-59% - Moderate' '20-39% - Low', '1-19% - Negligible'.

      Info-Tech Insight

      Note: Info-Tech endorses the use of likelihood values (1-99%) rather than frequency (3 times per year) as a measurement.
      For an explanation of why likelihood values lead to more precise and robust risk assessment, see the Appendix.

      2.2.5 Risk severity level assessment

      6-10 hours

      Input: Risk events identified

      Output: Assessed the likelihood of occurrence and impact for all identified risk events

      Materials: Risk Register Tool

      Participants: IT risk council, Relevant business stakeholders, Representation from senior management team, Business risk owner

      Instructions:

      1. Document the “Risk Category” and “Existing Controls.” in the Risk Register Tool.
        • (See the slide following this activity for tips on identifying existing controls.)
      2. Assign each risk event a likelihood and impact level.
        • Remember, you are assessing the impact that a risk event will have on the organization as a whole, not just on IT.
      3. When assigning a financial impact level to a risk event, factor in the likely number of instances that the event will occur within the time frame for which you are assessing (usually one year).
        • For risk events like third-party service outages that typically occur a few times each year, assign them an impact level that reflects the likelihood of financial impact the risk event will have over the entire year.
        • E.g. If your organization is likely to experience two major service outages next year and each outage costs the organization approximately $15,000, the total financial impact is $30,000.

      Record results in the Risk Register Tool

      2.2.5 Risk severity level assessment (continued)

      Instructions (continued):
      1. Assign a risk owner to non-negligible risk events.
        • For organizations that practice ongoing risk management and frequently reassess their risk portfolio (minimum once per year), risk ownership does not need to be assigned to “Negligible” or low-level risks.
        • View the following slides for advice on how to select a risk owner and information on their responsibilities.
      2. As you input the first few likelihood and impact values, compare them to one another to ensure consistency and accuracy:
        • Is a service outage really twice as impactful as our primary software provider going out of business?
        • Is a data breach far more likely than a ›1 hour web-services outage?
      Tips for Selecting Likelihood Values:

      Does ~10% sound right?

      Test a likelihood estimate by assessing the truth of the following statements:

      • The risk event will likely occur once in the next ten years (if the environment remains nearly identical).
      • If ten organizations existed that were nearly identical to our own, it is likely that one out of ten would experience the risk event this year.

      Screenshot of a risk severity level assessment.

      Identify current risk controls

      Consider how IT is already addressing key risks.

      Types of current risk control

      Tactical controls

      Apply to individual risks only.

      Example: A tactical control for backup/replication failure is faster WAN lines.

      Tactical risk control Strategic controls

      Apply to multiple risks.

      Example: A strategic control for backup/replication failure is implementing formal DR plans.

      Strategic risk control
      Risk event Risk event Risk event

      Screenshot of the column headings on the risk severity level assessment with 'Current Controls' highlighted.
      Consider both tactical and strategic controls already in place when filling out risk event information in the Risk Register Tool.

      Info-Tech Insight

      Identifying existing risk controls (past risk responses) provides a clear picture of the measures already in place to avoid, mitigate, or transfer key risks. This reveals opportunities to improve existing risk controls, or where new strategies are needed, to reduce risk severity levels below business thresholds.

      Assign a risk owner for each risk event

      Designate a member of the IT risk council to be responsible for each risk event.

      Selecting the Appropriate Risk Owner

      Use the following considerations to determine the best owner for each risk:

      • The risk owner should be familiar with the process, project, or IT function related to the risk event.
      • The risk owner should have access to the necessary data to monitor and measure the severity of the risk event.
      • The risk owner’s performance assessment should reflect their ability to demonstrate the ongoing management of their assigned risk events.

      Screenshot of the column headings on the risk severity level assessment with 'Risk Owner' highlighted.

      Risk Owner Responsibilities

      Risk ownership means that an individual is responsible for the following activities:

      • Monitoring the threat or vulnerability for changes in the likelihood of occurrence and/or likely impact.
      • Monitoring changes in the market and external environment that may alter the severity of the risk event.
      • Monitoring changes of closely related risks with interdependencies.
      • Developing and using key risk indicators (KRIs) to measure changes in risk severity.
      • Regularly reporting changes in risk severity to the IT risk council.
      • If necessary, escalating the risk event to other IT risk council personnel or senior management for reassessment.
      • Monitoring risk severity levels for risk events after a risk response has been implemented.

      Use Info-Tech’s Risk Costing Tool to calculate the expected cost of IT’s high-priority risks (optional)

      Sample of the Risk Costing Tool.

      Use this tool to:

      1. Conduct a deeper analysis of severe risks.
        • Determine specific likelihood and financial impact values to communicate the severity of the risk in the Expected Cost tab.
        • Identify the maximum financial impact that the risk event may inflict.
      2. Assess the effectiveness of multiple risk responses for each risk event.
        • Determine how proposed risk events will change the likelihood of occurrence and financial impact of the risk event.
      3. Incorporate risk proximity into your cost-benefit analysis of risk responses.
        • Illustrate how spending decisions will impact the expected cost of the risk event over time.

      2.2.6 Expected cost assessment (optional)

      Assign likelihood and financial impact values to high-priority risks.

      Select risks with these characteristics:

      Strongly consider conducting an expected cost assessment for risk events that meet one or more of the following criteria.

      The risk:

      • Has been assigned to the highest risk severity level.
      • Has exposed the organization previously and had severe implications.
      • Exceeds the organization’s threshold for financial impact.
      • Involves an IT function that is highly visible to the business.
      • Will likely require risk response actions that will exceed current IT budgetary constraints.
      • Is conducive to expected cost assessment:
        • There is general consensus on likelihood estimates.
        • There is general consensus on financial impact estimates.
        • Historical data exists to support estimates.
      Determine which risks require a deeper assessment:

      Info-Tech recommends conducting a second-level assessment for 5-15% of your IT risk register.

      Communicating the expected cost of high-priority risks significantly increases awareness of IT risks by the business.

      Communicating risks to the business using their language also increases the likelihood that risk responses will receive the necessary support and investment


      Record the list of risk events requiring second-level assessment in the Risk Costing Tool.

      • Transfer the likelihood and impact levels for each event into the Risk Costing Tool using data from the Risk Register Tool.

      2.2.6 Expected cost assessment (continued)

      Assign likelihood and financial impact values to high-priority risks.

      Instructions:
      1. Go through the list of prioritized risks in the Risk Costing Tool one by one. Indicate the likelihood and impact level (from the Risk Register Tool) for the risk event being assessed.
      2. Record likelihood values (1-99%) and impact values ($) from participants.
        • Only record values from individuals that indicate they are fairly confident with their estimates.
        • Keep likelihood estimates to values that are multiples of five.
      3. Estimate and record the maximum impact that the risk event could inflict.
        • See Appendix III for information on how the possibility of high-impact scenarios may influence your decision making.
      4. Discuss the estimates provided. Eliminate outliers and retracted estimates.
        • If you are unable to achieve consensus, take the average of the values provided.
      5. If you are having difficulty arriving at a likelihood or impact value, select the median value of the level assigned to the risk during the risk severity level assessment.
        • E.g. Risk event assigned to likelihood level “Moderate” (20-39%). Select a likelihood value of 30%.

      Screenshot of the column headings on the risk severity level assessment with 'Optional Inherent Likelihood Parameters' and 'Optional Inherent Impact Parameters' highlighted.

      Who should participate?
      • Depending on the size of your IT risk council, you may want to consider conducting this exercise in a smaller group.
      • Ideally, you should try to find the right balance between ensuring that the necessary experience and knowledge is in the room while insulating the exercise from outlier opinions, noise, and distractions.

      Evaluate likelihood and impact

      Refine your risk assessment process by developing more accurate measurements of likelihood and impact.

      Intersubjective likelihood

      The goal of the expected cost assessment is to develop robust intersubjective estimates of likelihood and financial impact.

      By aggregating a number of expert opinions of what they deem to be the “correct” value, you will arrive at a collectively determined value that better reflects reality than an individual opinion.

      Example: The Delphi Method

      The Delphi Method is a common technique to produce a judgement that is representative of the collective opinion of a group.

      • Participants are sent a series of sequential questionnaires (typically by email).
      • The first questionnaire asks them what the likelihood, likely impact, and expected cost is for a specific risk event.
      • Data from the questionnaire is compiled and then communicated in a subsequent questionnaire, which encourages participants to restate or revise their estimates given the group’s judgements.
      • With each successive questionnaire, responses will typically converge around a single intersubjective value.
      Justifying Your Estimates:

      When asked to explain the numbers you arrived at during the risk assessment, pointing to an assessment methodology gives greater credibility to your estimates.

      • Assign one individual to take notes during the assessment exercise.
      • Have them document the main rationale behind each value and the level of consensus.

      Info-Tech Insight

      The underlying assumption behind intersubjective forecasting is that group judgements are more accurate than individual judgements. However, this may not be the case at all.

      Sometimes, a single expert opinion is more valuable than many uninformed opinions. Defining whose opinion is valuable and whose is not is an unpleasant exercise; therefore, selecting the right personnel to participate in the exercise is crucially important.

      Build an IT Risk Management Program

      Phase 3

      Monitor, Respond, and Report on IT Risk

      Phase 1

      • 1.1 Review IT Risk Management Fundamentals
      • 1.2 Establish a Risk Governance Framework

      Phase 2

      • 2.1 Identify IT Risks
      • 2.2 Assess and Prioritize IT Risks

      Phase 3

      • 3.1 Develop Risk Responses and Monitor IT Risks
      • 3.2 Report IT Risk Priorities

      This phase will walk you through the following activities:

      • Develop key risk indicators (KRIs) and escalation protocols
      • Establish the reporting schedule
      • Identify and assess risk responses
      • Analyze risk response cost-benefit
      • Create multi-year cost projections
      • Obtain executive approval for risk action plans
      • Socialize the Risk Report
      • Transfer ownership of risk responses to project managers
      • Finalize the Risk Management Program Manual

      This phase involves the following participants:

      • IT risk council
      • Relevant business stakeholders
      • Representation from senior management team
      • Risk business owner

      Step 3.1

      Monitor IT Risks and Develop Risk Responses

      Activities
      • 3.1.1 Develop key risk indicators (KRIs) and escalation protocols
      • 3.1.2 Establish the reporting schedule
      • 3.1.3 Identify and assess risk responses
      • 3.1.4 Risk response cost-benefit analysis
      • 3.1.5 Create multi-year cost projections

      This step involves the following participants:

      • IT risk council
      • Relevant business stakeholders
      • Representation from senior management team
      • Business risk owner

      Outcomes of this step

      • Completed risk event action plans
      • Risk responses identified and assessed for top risks
      • Risk response selected for top risks

      Monitor, Respond, and Report on IT Risk

      Step 3.1 Step 3.2

      Use Info-Tech’s Risk Event Action Plan to manage high-priority risks

      Manage risks in between risk assessments and create a paper trail for key risks that exceed the unacceptable risk threshold. Use a new form for every high-priority risk that requires tracking.

      Risk Event Action Plan Sample of the Risk Event Action Plan deliverable.

      Obtaining sign-off from the senior leadership team or from the ERM office is an important step of the risk management process. The Risk Event Action Plan ensures that high-priority risks are closely monitored and that changes in risk severity are detected and reported.

      Clear documentation is a way to ensure that critical information is shared with management so that they can make informed risk decisions. These reports should be succinct yet comprehensive; depending on time and resources, it is good practice to fill out this form and obtain sign-off for the majority of IT risks.

      3.1.1 Develop key risk indicators (KRIs) and escalation protocols

      The risk owner should be held accountable for monitoring their assigned risks but may delegate responsibility for these tasks.

      Instructions:
      1. Design key risk indicators (KRIs) for risks that measure changes in their severity and document them in the Risk Event Action Plan.
        • See the following slide for examples.
      2. Clearly document the risk owner and the individual(s) carrying out risk monitoring activities (delegates) in the Risk Event Action Plan.

      Note: Examples of KRIs can be found on the following slide.

      What are KRIs?
      • KRIs should be observable metrics that alert the IT risk council and management when risk severity exceeds acceptable risk thresholds.
      • KRIs should serve as tripwires or early-warning indicators that trigger further actions to be taken on the risk.
      • Further actions may include:
        • Escalation to the risk owner (if delegated) or to a member of the senior leadership team.
        • Reporting to the IT risk council or IT steering committee.
        • Reassessment.
        • Updating the risk monitoring schedule.

      Document KRIs, escalation thresholds, and escalation protocols for each risk in a Risk Event Action Plan.

      Developing KRIs for success

      Visualization of KRI development, from the 'Risk Event' to the 'Intermediate Steps' with 'KRI Measurements' to the image of a growing seed.

      Examples of KRIs

      • Number of resources who quit or were fired who had access to critical data
      • Number of risk mitigation initiatives unfunded
      • Changes in time horizon of mitigation implementation
      • Number of employees who did not report phishing attempts
      • Amount of time required to get critical operations access to necessary data
      • Number of days it takes to implement a new regulation or compliance control

      3.1.2 Establish the reporting schedule

      For each risk event, document how frequently the risk owner must report to the IT risk council in the Risk Event Action Plan.

      • A clear reporting schedule enforces accountability for each risk event, ensuring that risk owners are fulfilling their monitoring responsibilities.
      • The ongoing discussion of risks between assessment cycles also increases overall awareness of how IT risks are not static but constantly evolving.
      Reporting Risk Event
      Weekly reports to ITRC Risk event severity represented as a thermometer with levels 'Extreme', 'High', 'Moderate', 'Low', and 'Negligible'.
      Bi-weekly reports to ITRC
      Monthly reports to ITRC
      Report to ITRC only if KRI thresholds triggered
      No reports; reassessed bi-annually

      Use Info-Tech’s tools to identify, analyze, and select risk responses

      1

      (Mandatory)
      Tool

      Screenshot of the Risk Register Tool.

      Risk Register Tool

      Information
      • Develop risk responses for all risk events pre-populated on the “2. Risk Register” sheet of the Risk Register Tool.
      • Document the root cause of the risk (Activity 3.1.3) and other contributing factors (Activity 3.1.4).
      • Identify risk responses (Activity 3.1.5).
      • Predict the effectiveness of the risk response, if implemented, by estimating the residual likelihood and impact of the risk (Activity 3.1.5).
      • The tool will calculate the residual severity of the risk after applying the risk response.

      2

      (Optional)
      Tool

      Screenshot of the Risk Costing Tool.

      Risk Costing Tool

      Information
      • Continue your second-level risk analysis for top risks for which you calculated expected cost in section 2.2.
      • Activity 3.1.5:
        • Identify between one and four risk response options for each risk.
        • Develop precise values for residual likelihood and impact.
        • Compare expected cost of the risk event to expected residual cost.
        • Select the risk response to recommend to senior leadership and document it in the Risk Register Tool.

      Determine the root cause of IT risks

      Root cause analysis

      Use the “Five Whys” methodology to identify the root cause and contributing/exacerbating factors for each risk event.

      Diagnosing the root cause of a risk as well as the environmental factors that increase its potential impact and likelihood of occurring allow you to identify more effective risk responses.

      Risk responses that only address the symptoms of the risk are less likely to succeed than responses that address the core issue.

      Concentric circles with 'Root Cause' at the center, 'Contributing Factors' around it, and 'Symptoms' on the outer circle.

      Example of 'The Five Whys Methodology', tracing symptoms to their root cause. In 'Symptoms' we see 'Risk Event: Network outage', Why? 'Network congestion', Why? Then on to 'Contributing Factors' the answer is 'Inadequate bandwidth for latency-sensitive applications', Why? 'Increased business use of latency-sensitive applications', Why? And finally to the 'Root Cause', 'Business units rely on 'real-time' data gathered from latency-sensitive applications', Why?

      Identify factors that contribute to the severity of the risk

      Environmental factors interact with the root cause to increase the likelihood or impact of the risk event.

      What factors matter?

      Identify relevant actors and assets that amplify or diminish the severity of the risk.

      Actors

      • Internal (business units)
      • External (vendor, regulator, market, competitor, hostile actor)

      Assets/Resources

      • Infrastructure
      • Applications
      • Processes
      • Information/data
      • Personnel
      • Reputation
      • Operations
      Develop risk responses that target contributing factors.
      Root cause:
      Business units rely on “real-time” data gathered from latency-sensitive applications

      Actors: Enterprise App users (Finance, Product Development, Product Management)

      Asset/resource: Applications, network

      Risk response:
      Decrease the use of latency-sensitive applications.

      X

      Decreasing the use of key apps contradicts business objectives.

      Contributing factors:
      Unreliable router software

      Actors: Network provider, router vendor, router software vendor, IT department

      Asset/resource: Network, router, router software

      Risk response:
      Replace the vendor that provides routers and router software.

      Replacing the vendor would reduce network outages at a relatively low cost.

      Symptoms:
      Network outage

      Actors: All business units, network provider

      Asset/resource: Network, business operations, employee productivity

      Risk response:
      Replace legacy systems.

      X

      Replacing legacy systems would be too costly.

      3.1.3 Identify and assess risk responses

      Instructions:
      Complete the following steps for each risk event.
      1. Identify a risk response action that will help reduce the likelihood of occurrence or the impact if the event were to occur.
        • Indicate the type of risk response (avoidance, mitigation, transfer, acceptance, or no risk exists).
      2. Assign each risk response action a residual likelihood level and a residual impact level.
        • This is the same step performed in Activity 2.2.6, when initial likelihood and impact levels were determined; however, now you are estimating the likelihood and impact of the risk event after the risk response action has been implemented successfully.
        • The Risk Register Tool will generate a residual risk severity level for each risk event.
      3. Identify the potential Risk Action Owner (Project Manager) if the response is selected and turned into an IT project, and document this in the Risk Register Tool.
      Document the following in the Risk Event Action Plan for each risk event:
        • Risk response actions
        • Residual likelihood and impact levels
        • Residual risk severity level
      • Review the following slides about the four types of risk response to help complete the activity.
        1. Avoidance
        2. Mitigation
        3. Transfer
        4. Acceptance

      Record the results in the Risk Event Action Plan.

      Take actions to avoid the risk entirely

      Risk Avoidance

      • Risk avoidance involves taking evasive maneuvers to avoid the risk event.
      • Risk avoidance targets risk likelihood, decreasing the likelihood of the risk event occurring.
      • Since risk avoidance measures are fairly drastic, the likelihood is often reduced to negligible levels.
      • However, risk avoidance response actions often sacrifice potential benefits to eliminate the possibility of the risk entirely.
      • Typically, risk avoidance measures should only be taken for risk events with extremely high severity and when the severity (expected cost) of the risk event exceeds the cost (benefits sacrificed) of avoiding the risk.

      Example

      Risk event: Information security vulnerability from third-party cloud services provider.

      • Risk avoidance action: Store all data in-house.
      • Benefits sacrificed: Cost savings, storage flexibility, etc.
      Stock photo of a person hikiing along a damp, foggy, valley path.

      Pursue projects that reduce the likelihood or impact of the risk event

      Risk Mitigation

      • Risk mitigation actions are risk responses that reduce the likelihood and impact of the risk event.
      • Risk mitigation actions can be to either implement new controls or enhance existing ones.
      Example 1

      Most risk responses will reduce both the likelihood of the risk event occurring and its potential impact.

      Example

      Mitigation: Purchase and implement enterprise mobility management (EMM) software with remote wipe capability.

      • EMM reduces the likelihood that sensitive data is accessed by a nefarious actor.
      • The remote-wipe capability reduces the impact by closing the window that sensitive data can be accessed from.
      Example 2

      However, some risk responses will have a greater effect on decreasing the likelihood of a risk event with little effect on decreasing impact.

      Example

      Mitigation: Create policies that restrict which personnel can access sensitive data on mobile devices.

      • This mitigation decreases the number of corporate phones that have access to (or are storing) sensitive data, thereby decreasing the likelihood that a device is compromised.
      Example 3

      Others will reduce the potential impact without decreasing its likelihood of occurring.

      Example

      Mitigation: Use robust encryption for all sensitive data.

      • Corporate-issued mobile phones are just as likely to fall into the hands of nefarious actors, but the financial impact they can inflict on the organization is greatly reduced.

      Pursue projects that reduce the likelihood or impact of the risk event (continued)

      Use the following IT functions to guide your selection of risk mitigation actions:

      Process Improvement

      Key processes that would most directly improve the risk profile:

      • Change Management
      • Project Management
      • Vendor Management
      Infrastructure Management
      • Disaster Recovery Plan/Business Continuity Plan
      • Redundancy and Resilience
      • Preventative Maintenance
      • Physical Environment Security
      Personnel
      • Greater staff depth in key areas
      • Increased discipline around documentation
      • Knowledge Management
      • Training
      Rationalization and Simplification

      This is a foundational activity, as complexity is a major source of risk:

      • Application Rationalization – reducing the number of applications
      • Data Management – reducing the volume and locations of data

      Transfer risks to a third party

      Risk transfer: the exchange of uncertain future costs for fixed present costs.

      Insurance

      The most common form of risk transfer is the purchase of insurance.

      • The uncertain future cost of an IT risk event can be transferred to an insurance company who assumes the risk in exchange for insurance premiums.
      • The most common form of IT-relevant insurance is cyberinsurance.

      Not all risks can be insured. Insurable risks typically possess the following five characteristics:

      1. The loss must be accidental (the risk event cannot be insured if it could have been avoided by taking reasonable actions).
      2. The insured cannot profit from the occurrence of the risk event.
      3. The loss must be able to be measured in monetary terms.
      4. The organization must have an insurable interest (it must be the party that incurs the loss).
      5. An insurance company must offer insurance against that risk.
      Other Forms of Risk Transfer

      Other forms of risk transfer include:

      • Self-insurance
        • Appropriate funds can be set aside in advance to address the financial impact of a risk event should it occur.
      • Warranties
      • Contractual transfer
        • The financial impact of a risk event can be transferred to a third party through clauses agreed to in a contract.
        • For example, a vendor can be contractually obligated to assume all costs resulting from failing to secure the organization’s data.
      • Example email addressing fields of an IT Risk Transfer to an insurance company.

      Accept risks that fall below established thresholds

      Risk Acceptance

      Accepting a risk means tolerating the expected cost of a risk event. It is a conscious and deliberate decision to retain the threat.

      You may choose to accept a risk event for one of the following three reasons:

      1. The risk severity (expected cost) of the risk event falls below acceptability thresholds and does not justify an investment in a risk avoidance, mitigation, or transfer measure.
      2. The risk severity (expected cost) exceeds acceptability thresholds but all effective risk avoidance, mitigation, and transfer measures are ineffective or prohibitively expensive.
      3. The risk severity (expected cost) exceeds acceptability thresholds but there are no feasible risk avoidance, mitigation, and transfer measures to be implemented.

      Info-Tech Insight

      Constant monitoring and the assignment of responsibility and accountability for accepted risk events is crucial for effective management of these risks. No IT risk should be accepted without detailed documentation outlining the reasoning behind that decision and evidence of approval by senior management.

      3.1.4 Risk response cost-benefit analysis (optional)

      The purpose of a cost-benefit analysis (CBA) is to guide financial decision making.

      This helps IT make risk-conscious investment decisions that fall within the IT budget and helps the organization make sound budgetary decisions for risk response projects that cannot be addressed by IT’s existing budget.

      Instructions:
      1. Reopen the Risk Costing Tool. For each risk that you conducted an expected cost assessment in section 2.2 for, find the Excel sheet that corresponds to the risk number (e.g. R001).
      2. Identify between one and four risk response options for the risk event and document them in the Risk Costing Tool.
        • The “Risk Response 1” field will be automatically populated with expected cost data for a scenario where no action was taken (risk acceptance). This will serve as a baseline for comparing alternative responses.
        • For the following steps, go through the risk responses one by one.
      3. Estimate the first-year cost for the risk response.
        • This cost should reflect initial capital expenditures and first-year operating expenditures.
      Screenshot of the Risk Response cost-benefit-analysis from the Risk Costing Tool with 'Capital Expenditures' and 'Operating Expenditures' highlighted.

      Record the results in the Risk Costing Tool.

      3.1.4 Risk response cost-benefit analysis (continued)

      The purpose of a cost-benefit analysis (CBA) is to guide financial decision making.

      Instructions:

      1. Estimate residual risk likelihood and financial impact for Year 1 with the risk response in place.
        • Rather than estimating the likelihood level (low, medium, high), determine a precise likelihood value of the risk event occurring once the response has been implemented.
        • Estimate the dollar value of financial impacts if the risk event were to occur with the risk response in place.
        • Screenshot of the Risk Response cost-benefit-analysis from the Risk Costing Tool with figured for 'Financial Impact' and 'Probability' highlighted. The tool will calculate the expected residual cost of the risk event: (Financial Impact x Likelihood) - Costs = Expected Residual Cost
      2. Select the highest value risk response and document it in the Risk Register Tool.
      3. Document your analysis and recommendations in the Risk Event Action Plan.

      Note: See Activity 3.1.5 to build multi-year cost projections for risk responses.

      3.1.5 Create multi-year cost projections (optional)

      Select between risk response options by projecting their costs and benefits over multiple years.

      • It can be difficult to choose between risk response options that require different payment schedules. A risk response project with costs spread out over more than one year (e.g. incremental upgrades to an IT system) may be more advantageous than a project with costs concentrated up front that may cost less in the long run (e.g. replacing the system).
      • However, the impact that risk response projects have on reducing risk severity is not necessarily static. For example, an expensive project like replacing a system may drastically reduce the risk severity of a system failure. Whereas, incremental system upgrades may only marginally reduce risk severity in the short term but reach similar levels as a full system replacement in a few years.
      Instructions:

      Calculate expected cost for multiple years using the Risk Costing Tool for:

      • Risk events that are subject to change in severity over time.
      • Risk responses that reduce the severity of the risk gradually.
      • Risk responses that cannot be implemented immediately.

      Copy and paste the graphs into the Risk Report and the Risk Event Action Plan for the risk event.

      Sample charts on the cost of risk responses from the Risk Costing Tool.

      Record the results in the Risk Costing Tool.

      Step 3.2

      Report IT Risk Priorities

      Activities
      • 3.2.1 Obtain executive approval for risk action plans
      • 3.2.2 Socialize the Risk Report
      • 3.2.3 Transfer ownership of risk responses to project managers
      • 3.2.4 Finalize the Risk Management Program Manual

      This step involves the following participants:

      • IT risk council
      • Relevant business stakeholders
      • Representation from senior management team

      Outcomes of this step

      • Obtained approval for risk action plans
      • Communicated IT’s risk recommendations to senior leadership
      • Embedded risk management into day-to-day IT operations

      Monitor, Respond, and Report on IT Risk

      Step 3.1 Step 3.2

      Effectively deliver IT risk expertise to the business

      Communicate IT risk management in two directions:

      1. Up to senior leadership (and ERM if applicable)
      2. Down to IT employees (embedding risk awareness)
      3. Visualization of communicating Up to 'Senior Leadership' and Down to 'IT Personnel'.

      Create a strong paper trail and obtain sign-off for the ITRC’s recommendations.

      Now that you have collected all of the necessary raw data, you must communicate your insights and recommendations effectively.

      A fundamental task of risk management is communicating risk information to senior management. It is your responsibility to enable them to make informed risk decisions. This can be considered upward communication.

      The two primary goals of upward communication are:

      1. Transferring accountability for high-priority IT risks to the ERM or to senior leadership.
      2. Obtaining funds for risk response projects recommended by the ITRC.

      Good risk management also has a trickle-down effect impacting all of IT. This can be considered downward communication.

      The two primary goals of downward communication are:

      1. Fostering a risk-aware IT culture.
      2. Ensuring that the IT risk management program maintains momentum and runs effectively.

      3.2.1 Obtain executive approval for risk action plans

      Best Practices and Key Benefits

      Best practice is for all acceptable risks to also be signed-off by senior leadership. However, for ITRCs that brainstorm 100+ risks, this may not be possible. If this is the case, prioritize accepted risks that were assessed to be closest to the organization’s thresholds.

      By receiving a stamp of approval for each key risk from senior management, you ensure that:

      1. The organization is aware of important IT risks that may impact business objectives.
      2. The organization supports the risk assessment conducted by the ITRC.
      3. The organization supports the plan of action and monitoring responsibilities proposed by the ITRC.
      4. If a risk event were to occur, the organization holds ultimate accountability.
      Sample of the Risk Event Action Plan template.

      Task:
      All IT risks that were flagged for exceeding the organization’s severity thresholds must obtain sign-off by the CIO or another member of the senior leadership team.

      • In the assessment phase, you evaluated risks using severity thresholds approved by the business and determined whether or not they justified a risk response.
      • Whether your recommendation was to accept the risk or to analyze possible risk responses, the business should be made aware of most IT risks.

      3.2.2 Socialize the risk report

      Create a succinct, impactful document that summarizes the outcomes of risk assessment and highlights the IT risk council’s top recommendations to the senior leadership team.

      The Risk Report contains:
      • An executive summary page highlighting the main takeaways for senior management:
        • A short summary of results from the most recent risk assessment
        • Dashboard
        • A list of top 10 risks ordered from most severe to least
      • Subsequent individual risk analyses (1 to 10)
        • Detailed risk assessment data
        • Risk responses
        • Risk response analysis
        • Multi-year cost projection (see the following slide)
        • Dashboard
        • Recommendations
      Sample of the Risk Report template.

      Risk Report

      Pursue projects that reduce the likelihood or impact of the risk event

      Encourage risk awareness to extend the benefits of risk management to every aspect of IT.

      Benefits of risk awareness:

      • More preventative and proactive approaches to IT projects are discussed and considered.
      • Changes to the IT threat landscape are more likely to be detected, communicated, and acted upon.
      • IT possesses a realistic perception of its ability to perform functions and provide services.
      • Contingency plans are put in place to hedge against risk events.
      • Fewer IT risks go unidentified.
      • CIOs and business executives make better risk decisions.

      Consequences of low risk awareness:

      • False confidence about the number of IT risks impacting the organization and their severity.
      • Risk-relevant information is not communicated to the ITRC, which may result in inaccurate risk assessments.
      • Confusion surrounding whose responsibility it is to consider how risk impacts IT decision making.
      • Uncertainty and panic when unanticipated risks impact the IT department and the organization.

      Embedding risk management in the IT department is a full-time job

      Take concrete steps to increase risk-aware decision making in IT.

      The IT risk council plays an instrumental role in fostering a culture of risk awareness throughout the IT department. In addition to periodic risk assessments, fulfilling reporting requirements, and undertaking ongoing monitoring responsibilities, members of the ITRC can take a number of actions to encourage other IT employees to adopt a risk-focused approach, particularly at the project planning stage.

      Embed risk management in project planning

      Make time for discussing project risks at every project kick-off.
      • A main benefit of including senior personnel from across IT in the ITRC is that they are able to disseminate the IT risk council’s findings to their respective practices.
      • At project kick-off meetings, schedule time to identify and assess project-specific risks.
      • Encourage the project team to identify strategies to reduce the likelihood and impact of those risks and document these in the project charter.
      • Lead by example by being clear and open about what constitutes acceptable and unacceptable risks.

      Embed risk management with employee

      Train IT staff on the ITRC’s planned responses to specific risk events.
      • If a response to a particular risk event is not to implement a project but rather to institute new policies or procedures, ensure that changes are communicated to employees and that they receive training.
      Provide risk management education opportunities.
      • Remember that a more risk-aware IT employee provides more value to the organization.
      • Invest in your employees by encouraging them to pursue education opportunities like receiving risk management accreditation or providing them with educational experiences such as workshops, seminars, and eLearning.

      Embedding risk management in the IT department is a full-time job (continued)

      Encourage risk awareness by adjusting performance metrics and job titles.

      Performance metrics:

      Depending on the size of your IT department and the amount of resources dedicated to ongoing risk management, you may consider embedding risk management responsibilities into the performance assessments of certain ITRC members or other IT personnel.

      • Personalize the risk management program metrics you have documented in your Risk Management Program Manual.
      • Evidence that KPIs are monitored and frequently reported is also a good indicator that risk owners are fulfilling their risk management responsibilities.
      • Info-Tech Insight

        If risk management responsibilities are not built into performance assessments, it is less likely that they will invest time and energy into these tasks. Adding risk management metrics to performance assessments directly links good job performance with good risk management, making it more likely that ITRC activities and initiatives gain traction throughout the IT department.

      Job descriptions:

      Changing job titles to reflect the focus of an individual’s role on managing IT risk may be a good way to distinguish personnel tasked with developing KRIs and monitoring risks on a week-to-week basis.

      • Some examples include IT Risk Officer, IT Risk Manager, and IT Risk Analyst.

      3.2.3 Transfer ownership of risk responses to project managers

      Once risk responses have obtained approval and funding, it is time to transform them into fully-fledged projects.

      Image of a hand giving a key to another hand and a circle split into quadrants of Governance with 'Governance of Risks' being put into 'Governance of Projects'.

      3.2.4 Finalize the Risk Management Program Manual

      Go back through the Risk Management Program Manual and ensure that the material will accurately reflect your approach to risk management going forward.

      Remember, the program manual is a living document that should be evolving alongside your risk management program, reflecting best practices, knowledge, and experiences accrued from your own assessments and experienced risk events.

      The best way to ensure that the program manual continues to guide and document your risk management program is to make it the focal point of every ITRC meeting and ensure that one participant is tasked with making necessary adjustments and additions.

      Sample of the Risk Management Program Manual. Risk Management Program Manual

      “Upon completing the Info-Tech workshop, the deliverables that we were left with were really outstanding. We put together a 3-year project plan from a high level, outlining projects that will touch upon our high risk areas.” (Director of Security & Risk, Water Management Company)

      Don’t allow your risk management program to flatline

      54% of small businesses haven’t implemented controls to respond to the threat of cyber attacks (Source: Insurance Bureau of Canada, 2021)

      Don’t be lulled into a false sense of security. It might be your greatest risk.

      So you’ve identified the most important IT risks and implemented projects to protect IT and the business.

      Unfortunately, your risk assessment is already outdated.

      Perform regular health checks to keep your finger on the pulse of the key risks threatening the business and your reputation.

      To continue the momentum of your newly forged IT risk management program, read Info-Tech’s research on conducting periodic risk assessments and “health checks”:

      Revive Your Risk Management Program With a Regular Health Check

      • Complete Info-Tech’s Risk Management Health Check to seize the momentum you created by building a robust IT risk management program and create a process for conducting periodic health checks and embedding ongoing risk management into every aspect of IT.
      • Our focus is on using data to make IT risk assessment less like an art and more like a science. Ongoing data-driven risk management is self-improving and grounded in historical data.

      Appendix I: Familiarize yourself with key risk terminology

      Review important risk management terms and definitions.

      Risk

      An uncertain event or set of events which, should it occur, will have an effect on the achievement of objectives. A risk consists of a combination of the likelihood of a perceived threat or opportunity occurring and the magnitude of its impact on objectives (Office of Government Commerce, 2007).

      Threat

      An event that can create a negative outcome (e.g. hostile cyber/physical attacks, human errors).

      Vulnerability

      A weakness that can be taken advantage of in a system (e.g. weakness in hardware, software, business processes).

      Risk Management

      The systematic application of principles, approaches, and processes to the tasks of identifying and assessing risks, and then planning and implementing risk responses. This provides a disciplined environment for proactive decision making (Office of Government Commerce, 2007).

      Risk Category

      Distinct from a risk event, a category is an abstract profile of risk. It represents a common group of risks. For example, you can group certain types of risks under the risk category of IT Operations Risks.

      Risk Event

      A specific occurrence of an event that falls under a particular risk category. For example, a phishing attack is a risk event that falls under the risk category of IT Security Risks.

      Risk Appetite

      An organization’s attitude towards risk taking, which determines the amount of risk that it considers acceptable. Risk appetite also refers to an organization’s willingness to take on certain levels of exposure to risk, which is influenced by the organization’s capacity to financially bear risk.

      Enterprise Risk Management

      (ERM) – A strategic business discipline that supports the achievement of an organization’s objectives by addressing the full spectrum of organizational risks and managing the combined impact of those risks as an interrelated risk portfolio (RIMS, 2015).

      Appendix II: Likelihood vs. Frequency

      Why we measure likelihood, not frequency:

      The basic formula of Likelihood x Impact = Severity is a common methodology used across risk management frameworks. However, some frameworks measure likelihood using Frequency rather than Likelihood.

      Frequency is typically measured as the number of instances an event occurs over a given period of time (e.g. once per month).

      • For risk assessment, historical data regarding the frequency of a risk event is commonly used to indicate the likelihood that the event will happen in the future.

      Likelihood is a numerical representation of the “degree of belief” that the risk event will occur in a given future timeframe (e.g. 25% likelihood that the event will occur within the next year).

      False Objectivity

      While some may argue that frequency provides an objective measurement of likelihood, it is well understood in the field of likelihood theory that historical data regarding the frequency of a risk event may have little bearing over the likelihood of that event happening in the future. Frequency is often an indication of future likelihood but should not be considered an objective measurement of it.

      Likelihood scales that use frequency underestimate the magnitude of risks that lack historical precedent. For example, an IT department that has never experienced a high-impact data breach would adopt a very low likelihood score using the frequentist approach. However, if all of the organization’s major competitors have suffered a major breach within the last two years, they ought to possess a much higher degree of belief that the risk event will occur within the next year.

      Likelihood is a more comprehensive measurement of future likelihood, as frequency can be used to inform the selection of a likelihood value. The process of selecting intersubjective likelihood values will naturally internalize historical data such as the frequency that the event occurred in the past. Further, the frequency that the event is expected to occur in the future can be captured by the expected impact value. For example, a risk event that has an expected impact per occurrence of $10,000 that is expected to occur three times over the next year has an expected impact of $30,000.

      Appendix III: Should max impacts sway decision making?

      Don’t just fixate on the most likely impact – be aware of high-impact outcomes.

      During assessment, risks are evaluated according to their most likely financial impact.

      • For example, a service outage will likely last for two hours and may have an expected cost of $14,000.

      Naturally, focusing on the most likely financial impact will exclude higher impacts that – while theoretically possible – are so unlikely that they do not warrant any real consideration.

      • For example, it is possible that a service outage could last for days; however, the likelihood for such an event may be well below 1%.

      While the risk severity level assessment allows you to present impacts as a range of values (e.g. $50,000 to $75,000), the expected cost assessment requires you to select specific values.

      • However, this analysis may fail to consider much higher potential impacts that have non-negligible likelihood values (likelihood values that you cannot ignore).
      • What you consider “non-negligible” will depend on your organizational risk tolerance/appetite.

      Sometimes called Black Swan events or Fat-Tailed outcomes, high-impact events may occur when the far right of the likelihood distribution – or the “tail” – is thicker than a normal distribution (see fig. 2).

      • A good example is a data breach. While small to medium impacts are far more likely to occur than a devastating intrusion, the high-impact scenario cannot be ignored completely.

      For risk events that contain non-negligible likelihoods (too high to be ignored) consider elevating the risk severity level or expected cost.

      Figure 1 is a graph presenting a 'Normal Likelihood Distribution', the axes being 'Likelihood' and 'Financial Impact'.
      Figure 2 is a graph presenting a 'Fat-Tailed Likelihood Distribution' with a point at the top of the parabola labelled 'Most Likely Impact' but with a much wider bottom labelled 'Fat-Tailed Outcomes', the axes being 'Likelihood' and 'Financial Impact'.

      Leverage Info-Tech’s research on security and compliance risk to identify additional risk events

      Title card of the Info-tech blueprint 'Take Control of Compliance Improvement to Conquer Every Audit' with subtitle 'Don't gamble recklessly with external compliance. Play a winning system and take calculated risks to stack the odds in your favor.


      Take Control of Compliance Improvement to Conquer Every Audit

      Info-Tech Insight

      Don’t gamble recklessly with external compliance. Play a winning system and take calculated risks to stack the odds in your favor.

      Take an agile approach to analyze your gaps and prioritize your remediations. You don’t always have to be fully compliant as long as your organization understands and can live with the consequences.

      Stock photo of a woman sitting at a computer surrounded by rows of computers.


      Develop and Implement a Security Risk Management Program

      Info-Tech Insight

      Security risk management equals cost effectiveness.

      Time spent upfront identifying and prioritizing risks can mean the difference between spending too much and staying on budget.

      Research Contributors and Experts

      Sandi Conrad
      Principal Research Director
      Info-Tech Research Group

      Christine Coz
      Executive Counsellor
      Info-Tech Research Group

      Milena Litoiu
      Principal Research Director
      Info-Tech Research Group

      Scott Magerfleisch
      Executive Advisor
      Info-Tech Research Group

      Aadil Nanji
      Research Director
      Info-Tech Research Group

      Andy Neill
      Associate Vice-President of Research
      Info-Tech Research Group

      Daisha Pennie
      IT Risk Management
      Oklahoma State University

      Ken Piddington
      CIO and Executive Advisor
      MRE Consulting

      Frank Sewell
      Research Director
      Info-Tech Research Group

      Andrew Sharpe
      Research Director
      Info-Tech Research Group

      Chris Warner
      Consulting Director- Security
      Info-Tech Research Group

      Sterling Bjorndahl
      Director of IT Operations
      eHealth Saskatchewan

      Research Contributors and Experts

      Ibrahim Abdel-Kader
      Research Analyst
      Info-Tech Research Group

      Tamara Dwarika
      Internal Auditor
      A leading North American Utility

      Anne Leroux
      Director
      ES Computer Training

      Ian Mulholland
      Research Director
      Info-Tech Research Group

      Michel Fossé
      Consulting Services Manager
      IBM Canada (LGS)

      Petar Hristov
      Research Director
      Info-Tech Research Group

      Steve Woodward
      Research Director
      CEO, Cloud Perspectives

      *Plus 10 additional interviewees who wish to remain anonymous.

      Bibliography

      “2021 State of the CIO.” IDG, 28 January 2021. Web.

      “4 Reasons Why CIOs Lose Their Jobs.” Silverton Consulting, 2012. Web.

      Beasley, Mark, Bruce Branson, and Bonnie Hancock. “The State of Risk Oversight,” AICPA, April 2021. Web.

      COBIT 2019. ISACA, 2019. Web.

      “Cognyte jeopardized its database exposing 5 billion records, including earlier data breaches.” SecureBlink, 21 June 2021. Web.

      Culp, Steve. “Accenture 2019 Global Risk Management Study, Financial Services Report.” Accenture, 2019. Web.

      Curtis, Patchin, and Mark Carey. “Risk Assessment in Practice.” COSO Committee of Sponsoring Organizations of the Treadway Commission, Deloitte & Touche LLP, 2012. Web.

      “Cyber Risk Management.” Insurance Bureau of Canada (IBC), 2022. Web.

      Eccles, Robert G., Scott C. Newquist, and Roland Schatz. “Reputation and Its Risks.” Harvard Business Review, February 2007. Web.

      Eden, C. and F. Ackermann. Making Strategy: The Journey of Strategic Management. Sage Publications, 1998.

      “Enterprise Risk Management Maturity Model.” OECD, 9 February 2021. Web.

      Ganguly, Saptarshi, Holger Harreis, Ben Margolis, and Kayvaun Rowshankish. “Digital Risks: Transforming risk management for the 2020s.” McKinsey & Company, 10 February 2017. Web.

      “Governance Institute of Australia Risk Management Survey 2020.” Governance Institute of Australia, 2020. Web.

      “Guidance on Enterprise Risk Management.” COSO, 2022. Web.

      Henriquez, Maria. “The Top 10 Data Breaches of 2021” Security Magazine, 9 December 2021. Web.

      Holmes, Aaron. “533 million Facebook users’ phone numbers and personal data have been leaked online.” Business Insider, 3 April 2021. Web.

      Bibliography

      “Integrated Risk and Compliance Management for Banks and Financial Services Organizations: Benefits of a Holistic Approach.” MetricStream, 2022. Web.

      “ISACA’s Risk IT Framework Offers a Structured Methodology for Enterprises to Manage Information and Technology Risk.” ISACA, 25 June 2020. Web.

      ISO 31000 Risk Management. ISO, 2018. Web.

      Lawton, George. “10 Enterprise Risk Management Trends in 2022.” TechTarget, 2 February 2022. Web.

      Levenson, Michael. “MGM Resorts Says Data Breach Exposed Some Guests’ Personal Information.” The New York Times, 19 February 2020. Web.

      Management of Risk (M_o_R): Guidance for Practitioners. Office of Government Commerce, 2007. Web.

      “Many small businesses vulnerable to cyber attacks.” Insurance Bureau of Canada (IBC), 5 October 2021.

      Maxwell, Phil. “Why risk-informed decision-making matters.” EY, 3 December 2019. Web.

      “Measuring and Mitigating Reputational Risk.” Marsh, September 2014. Web.

      Natarajan, Aarthi. “The Top 6 Business Risks you should Prepare for in 2022.” Diligent, 22 December 2021. Web.

      “Operational Risk Management Excellence – Get to Strong Survey: Executive Report.” KMPG and RMA, 2014. Web.

      “Third-party risk is becoming a first priority challenge.” Deloitte, 2022. Web.

      Thomas, Adam, and Dan Kinsella. “Extended Enterprise Risk Management Survey, 2020.” Deloitte, 2021. Web.

      Treasury Board Secretariat. “Guide to Integrated Risk Management.” Government of Canada, 12 May 2016. Web.

      Webb, Rebecca. “6 Reasons Data is Key for Risk Management.” ClearRisk, 13 January 2021. Web.

      “What is Enterprise Risk Management (ERM)?” RIMS, 2015. Web.

      Wiggins, Perry. “Do you spend enough time assessing strategic risks?” CFO, 26 January 2022. Web.

      Build a Chatbot Proof of Concept

      • Buy Link or Shortcode: {j2store}532|cart{/j2store}
      • member rating overall impact: 8.8/10 Overall Impact
      • member rating average dollars saved: $9,566 Average $ Saved
      • member rating average days saved: 7 Average Days Saved
      • Parent Category Name: Service Desk
      • Parent Category Link: /service-desk
      • Implement a chatbot proof of concept mapped to business needs.
      • Scale up customer service delivery in a cost-effective manner.
      • Objectively measure the success of the chatbot proof of concept with metrics-based data.
      • Choose the ticket categories to build during your chatbot proof of concept.

      Our Advice

      Critical Insight

      • Build your chatbot to create business value. Whether it is increasing service or resource efficiency, keep the goal of value in mind when making decisions with your proof of concept.

      Impact and Result

      • When implemented effectively, chatbots can help save costs, generate new revenue, and ultimately increase customer satisfaction for both external- and internal-facing customers.

      Build a Chatbot Proof of Concept Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you should build a chatbot proof of concept, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Form your chatbot strategy

      Build action-based metrics to measure the success of your chatbot proof of concept.

      • Chatbot ROI Calculator
      • Chatbot POC Metrics Tool

      2. Build your chatbot foundation

      Put business value first to architect your chatbot before implementation.

      • Chatbot Conversation Tree Library (Visio)
      • Chatbot Conversation Tree Library (PDF)

      3. Continually improve your chatbot

      Continue to grow your chatbot beyond the proof of concept.

      • Chatbot POC RACI
      • Chatbot POC Implementation Roadmap
      • Chatbot POC Communication Plan
      [infographic]

      Workshop: Build a Chatbot Proof of Concept

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Build Your Strategy

      The Purpose

      Build your strategy.

      Key Benefits Achieved

      Calculate your chatbot’s ROI to determine its success.

      Organize your chatbot proof of concept (POC) metrics to keep the project on track.

      Objectively choose chatbot ticket categories.

      Activities

      1.1 Customize your chatbot ROI calculator.

      1.2 Choose your proof of concept ticket categories.

      1.3 Design chatbot metrics to measure success.

      Outputs

      Chatbot ROI Calculator

      Chatbot POC Implementation Roadmap

      Chatbot POC Metrics Tool

      2 Architect Your Chatbot

      The Purpose

      Architect your chatbot.

      Key Benefits Achieved

      Design your integrations with business value in mind.

      Begin building chatbot decision trees.

      Activities

      2.1 List and map your chatbot integrations.

      2.2 Build your conversation tree library.

      Outputs

      Chatbot Integration Map

      Chatbot Conversation Tree Library

      3 Architect Your Chatbot Conversations

      The Purpose

      Architect your chatbot conversations.

      Key Benefits Achieved

      Detail your chatbot conversations in the decision trees.

      Activities

      3.1 Build your conversation tree library.

      Outputs

      Chatbot Conversation Tree Library

      4 Continually Grow Your Chatbot

      The Purpose

      Continually grow your chatbot.

      Key Benefits Achieved

      Identify talent for chatbot support.

      Create an implementation plan.

      Activities

      4.1 Outline the support responsibilities for your chatbot.

      4.2 Build a communication plan.

      Outputs

      Chatbot POC RACI

      Chatbot POC Communication Plan

      Build an Application Integration Strategy

      • Buy Link or Shortcode: {j2store}198|cart{/j2store}
      • member rating overall impact: 8.0/10 Overall Impact
      • member rating average dollars saved: After each Info-Tech experience, we ask our members to quantify the real-time savings, monetary impact, and project improvements our research helped them achieve.
      • member rating average days saved: Read what our members are saying
      • Parent Category Name: Enterprise Integration
      • Parent Category Link: /enterprise-integration
      • Even though organizations are now planning for Application Integration (AI) in their projects, very few have developed a holistic approach to their integration problems resulting in each project deploying different tactical solutions.
      • Point-to-point and ad hoc integration solutions won’t cut it anymore: the cloud, big data, mobile, social, and new regulations require more sophisticated integration tooling.
      • Loosely defined AI strategies result in point solutions, overlaps in technology capabilities, and increased maintenance costs; the correlation between business drivers and technical solutions is lost.

      Our Advice

      Critical Insight

      • Involving the business in strategy development will keep them engaged and align business drivers with technical initiatives.
      • An architectural approach to AI strategy is critical to making appropriate technology decisions and promoting consistency across AI solutions through the use of common patterns.
      • Get control of your AI environment with an appropriate architecture, including policies and procedures, before end users start adding bring-your-own-integration (BYOI) capabilities to the office.

      Impact and Result

      • Engage in a formal AI strategy and involve the business when aligning business goals with AI value; each double the AI success rate.
      • Benefits from a formal AI strategy largely depend on how gaps will be filled.
      • Create an Integration Center of Competency for maintaining architectural standards and guidelines.
      • AI strategies are continuously updated as new business drivers emerge from changing business environments and/or essential technologies.

      Build an Application Integration Strategy Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Make the Case for AI Strategy

      Obtain organizational buy-in and build a standardized and formal AI blueprint.

      • Storyboard: Build an Application Integration Strategy

      2. Assess the organization's readiness for AI

      Assess your people, process, and technology for AI readiness and realize areas for improvement.

      • Application Integration Readiness Assessment Tool

      3. Develop a Vision

      Fill the required AI-related roles to meet business requirements

      • Application Integration Architect
      • Application Integration Specialist

      4. Perform a Gap Analysis

      Assess the appropriateness of AI in your organization and identify gaps in people, processes, and technology as it relates to AI.

      • Application Integration Appropriateness Assessment Tool

      5. Build an AI Roadmap

      Compile the important information and artifacts to include in the AI blueprint.

      • Application Integration Strategy Template

      6. Build the Integration Blueprint

      Keep a record of services and interfaces to reduce waste.

      • Integration Service Catalog Template

      Infographic

      Workshop: Build an Application Integration Strategy

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Make the Case for AI Strategy

      The Purpose

      Uncover current and future AI business drivers, and assess current capabilities.

      Key Benefits Achieved

      Perform a current state assessment and create a future vision.

      Activities

      1.1 Identify Current and Future Business Drivers

      1.2 AI Readiness Assessment

      1.3 Integration Service Catalog Template

      Outputs

      High-level groupings of AI strategy business drivers.

      Determine the organization’s readiness for AI, and identify areas for improvement.

      Create a record of services and interfaces to reduce waste.

      2 Know Current Environment

      The Purpose

      Identify building blocks, common patterns, and decompose them.

      Key Benefits Achieved

      Develop an AI Architecture.

      Activities

      2.1 Integration Principles

      2.2 High-level Patterns

      2.3 Pattern decomposition and recomposition

      Outputs

      Set general AI architecture principles.

      Categorize future and existing interactions by pattern to establish your integration framework.

      Identification of common functional components across patterns.

      3 Perform a Gap Analysis

      The Purpose

      Analyze the gaps between the current and future environment in people, process, and technology.

      Key Benefits Achieved

      Uncover gaps between current and future capabilities and determine if your ideal environment is feasible.

      Activities

      3.1 Gap Analysis

      Outputs

      Identify gaps between the current environment and future AI vision.

      4 Build a Roadmap for Application Integration

      The Purpose

      Define strategic initiatives, know your resource constraints, and use a timeline for planning AI.

      Key Benefits Achieved

      Create a plan of strategic initiatives required to close gaps.

      Activities

      4.1 Identify and prioritize strategic initiatives

      4.2 Distribute initiatives on a timeline

      Outputs

      Use strategic initiatives to build the AI strategy roadmap.

      Establish when initiatives are going to take place.

      Build Resilience Against Ransomware Attacks

      • Buy Link or Shortcode: {j2store}317|cart{/j2store}
      • member rating overall impact: 9.5/10 Overall Impact
      • member rating average dollars saved: $68,467 Average $ Saved
      • member rating average days saved: 21 Average Days Saved
      • Parent Category Name: Threat Intelligence & Incident Response
      • Parent Category Link: /threat-intelligence-incident-response
      • Sophisticated ransomware attacks are on the rise and evolving quickly.
      • Executives want reassurance but are not ready to write a blank check. We need to provide targeted and justified improvements.
      • Emerging strains can exfiltrate sensitive data, encrypt systems, and destroy backups in hours, which makes recovery a grueling challenge.

      Our Advice

      Critical Insight

      • Malicious agents design progressive, disruptive attacks to pressure organizations to pay a ransom.
      • Organizations misunderstand ransomware risk scenarios, which obscures the likelihood and impact of an attack.
      • Conventional approaches focus on response and recovery, which do nothing to prevent an attack and are often ineffective against sophisticated attacks.

      Impact and Result

      • Conduct a thorough assessment of your current state; identify potential gaps and assess the possible outcomes of an attack.
      • Analyze attack vectors and prioritize controls that prevent ransomware attacks, and implement ransomware protections and detection to reduce your attack surface.
      • Visualize, plan, and practice your response and recovery to reduce the potential impact of an attack.

      Build Resilience Against Ransomware Attacks Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Build Resilience Against Ransomware Attacks

      Use this step-by-step guide to assess your ransomware readiness and implement controls that will improve your ability to prevent incursions and defend against attacks.

      • Build Resilience Against Ransomware Attacks – Phases 1-4

      2. Ransomware Resilience Assessment – Complete the ransomware resilience assessment and establish metrics.

      Use this assessment tool to assess existing protection, detection, response, and recovery capabilities and identify potential improvements.

      • Ransomware Resilience Assessment

      3. Threat Preparedness Workbook – Improve protection and detection capabilities.

      Use this threat preparedness workbook to evaluate the threats and tactics in the ransomware kill chain using the MITRE framework and device appropriate countermeasures.

      • Enterprise Threat Preparedness Workbook

      4. Tabletop Planning Exercise and Example Results – Improve response and recovery capabilities with a tabletop exercise for your internal IT team.

      Adapt this tabletop planning session template to plan and practice the response of your internal IT team to a ransomware scenario.

      • Tabletop Exercise – Internal (Ransomware Template)
      • Ransomware Tabletop Planning Results – Example (Visio)
      • Ransomware Tabletop Planning Results – Example (PDF)

      5. Ransomware Response Runbook and Workflow – Document ransomware response steps and key stakeholders.

      Adapt these workflow and runbook templates to coordinate the actions of different stakeholders through each stage of the ransomware incident response process.

      • Ransomware Response Runbook Template
      • Ransomware Response Workflow Template (Visio)
      • Ransomware Response Workflow Template (PDF)

      6. Extended Tabletop Exercise and Leadership Guide – Run a tabletop test to plan and practice the response of your leadership team.

      Adapt this tabletop planning session template to plan leadership contributions to the ransomware response workflow. This second tabletop planning session will focus on communication strategy, business continuity plan, and deciding whether the organization should pay a ransom.

      • Tabletop Exercise – Extended (Ransomware Template)
      • Leadership Guide for Extended Ransomware

      7. Ransomware Resilience Summary Presentation – Summarize status and next steps in an executive presentation.

      Summarize your current state and present a prioritized project roadmap to improve ransomware resilience over time.

      • Ransomware Resilience Summary Presentation

      Infographic

      Workshop: Build Resilience Against Ransomware Attacks

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Assess Ransomware Resilience

      The Purpose

      Set workshop goals, review ransomware trends and risk scenarios, and assess the organization’s resilience to ransomware attacks.

      Key Benefits Achieved

      Develop a solid understanding of the likelihood and impact of a ransomware attack on your organization.

      Complete a current state assessment of key security controls in a ransomware context.

      Activities

      1.1 Review incidents, challenges, and project drivers.

      1.2 Diagram critical systems and dependencies and build risk scenario.

      1.3 Assess ransomware resilience.

      Outputs

      Workshop goals

      Ransomware Risk Scenario

      Ransomware Resilience Assessment

      2 Protect and Detect

      The Purpose

      Improve your capacity to protect your organization from ransomware and detect attacks along common vectors.

      Key Benefits Achieved

      Identify targeted countermeasures that improve protection and detection capabilities.

      Activities

      2.1 Assess ransomware threat preparedness.

      2.2 Determine the impact of ransomware techniques on your environment.

      2.3 Identify countermeasures to improve protection and detection capabilities.

      Outputs

      Targeted ransomware countermeasures to improve protection and detection capabilities.

      Targeted ransomware countermeasures to improve protection and detection capabilities.

      Targeted ransomware countermeasures to improve protection and detection capabilities.

      3 Respond and Recover

      The Purpose

      · Improve your organization’s capacity to respond to ransomware attacks and recover effectively.

      Key Benefits Achieved

      Build response and recovery capabilities that reduce the potential business disruption of successful ransomware attacks.

      Activities

      3.1 Review the workflow and runbook templates.

      3.2 Update/define your threat escalation protocol.

      3.3 Define scenarios for a range of incidents.

      3.4 Run a tabletop planning exercise (IT).

      3.5 Update your ransomware response runbook.

      Outputs

      Security Incident Response Plan Assessment.

      Tabletop Planning Session (IT)

      Ransomware Workflow and Runbook.

      4 Improve Ransomware Resilience.

      The Purpose

      Identify prioritized initiatives to improve ransomware resilience.

      Key Benefits Achieved

      Identify the role of leadership in ransomware response and recovery.

      Communicate workshop outcomes and recommend initiatives to improve ransomware resilience.

      Activities

      4.1 Run a tabletop planning exercise (Leadership).

      4.2 Identify initiatives to close gaps and improve resilience.

      4.3 Review broader strategies to improve your overall security program.

      4.4 Prioritize initiatives based on factors such as effort, cost, and risk.

      4.5 Review the dashboard to fine tune your roadmap.

      4.6 Summarize status and next steps in an executive presentation.

      Outputs

      Tabletop Planning Session (Leadership)

      Ransomware Resilience Roadmap and Metrics

      Ransomware Workflow and Runbook

      Further reading

      Build Ransomware Resilience

      Prevent ransomware incursions and defend against ransomware attacks

      EXECUTIVE BRIEF

      Executive Summary

      Your Challenge

      Ransomware is a high-profile threat that demands immediate attention:

      • Sophisticated ransomware attacks are on the rise and evolving quickly.
      • Emerging strains can exfiltrate sensitive data, encrypt systems, and destroy backups in only a few hours, which makes recovery a grueling challenge.
      • Executives want reassurance but aren't ready to write a blank check. Improvements must be targeted and justified.

      Common Obstacles

      Ransomware is more complex than other security threats:

      • Malicious agents design progressive, disruptive attacks to pressure organizations to pay a ransom.
      • Organizations misunderstand ransomware risk scenarios, which obscures the likelihood and impact of an attack.
      • Conventional approaches focus on response and recovery, which do nothing to prevent an attack and are often ineffective against sophisticated attacks.

      Info-Tech's Approach

      To prevent a ransomware attack:

      • Conduct a through assessment of your current state, identify potential gaps, and assess the possible outcomes of an attack.
      • Analyze attack vectors and prioritize controls that prevent ransomware attacks, and implement ransomware protection and detection to reduce your attack surface.
      • Visualize, plan, and practice your response and recovery to reduce the potential impact of an attack.

      Info-Tech Insight

      Resilience is not a trampoline, where you're down one moment and up the next. It's more like climbing a mountain. It takes time, planning, and help from people around you to work through challenges. Focus on what is in your organization's control, and cultivate strengths that allow you to protect assets, detect incursions, respond effectively, and recovery quickly.

      Analyst Perspective

      Ransomware is an opportunity and a challenge.

      As I write, the frequency and impact of ransomware attacks continue to increase, with no end in sight. Most organizations will experience ransomware in the next 24 months, some more than once, and business leaders know it. You will never have a better chance to implement best practice security controls as you do now.

      The opportunity comes with important challenges. Hackers need to spend less time in discovery before they deploy an attack, which have become much more effective. You can't afford to rely solely on your ability to respond and recover. You need to build a resilient organization that can withstand a ransomware event and recover quickly.

      Resilient organizations are not impervious to attack, but they have tools to protect assets, detect incursions, and respond effectively. Resilience is not a trampoline, where you're down one moment and up the next. It's more like climbing a mountain. It takes time, planning, and help from people around you to overcome challenges and work through problems. But eventually you reach the top and look back at how far you've come.

      This is an image of Michael Hébert

      Michel Hébert
      Research Director, Security and Privacy
      Info-Tech Research Group

      Ransomware attacks are on the rise and evolving quickly.

      Three factors contribute to the threat:

      • The rise of ransomware-as-a-service, which facilitates attacks.
      • The rise of crypto-currency, which facilitates anonymous payment.
      • State sponsorship of cybercrime.

      Elementus maps ransomware payments made through bitcoin. Since 2019, victims made at least $2B in payments.

      A handful of criminal organizations, many of whom operate out of cybercrime hotbeds in Russia, are responsible for most of the damage. The numbers capture only the ransom paid, not the clean-up cost and economic fallout over attacks during this period.

      Total ransom money collected (2015 – 2021): USD 2,592,889,121

      This image contains a bubble plot graph showing the total ransom money collected between the years 2015 - 2021.

      The frequency and impact of ransomware attacks are increasing

      Emerging strains can exfiltrate sensitive data, encrypt systems and destroy backups in only a few hours, which makes recovery a grueling challenge.

      Sophos commissioned a vendor agnostic study of the real-world experience of 5,600 IT professionals in mid-sized organizations across 31 countries and 15 industries.

      The survey was conducted in Jan – Feb 2022 and asked about the experience of respondents over the previous year.

      66%
      Hit by ransomware in 2021
      (up from 37% in 2020)

      90%
      Ransomware attack affected their ability to operate

      $812,360 USD
      Average ransom payment

      $4.54M
      Average remediation cost (not including ransom)

      ONE MONTH
      Average recovery time

      Meanwhile, organizations continue to put their faith in ineffective ransomware defenses.

      Of the respondents whose organizations weren't hit by ransomware in 2021 and don't expect to be hit in the future, 72% cited either backups or cyberinsurance as reasons why they anticipated an attack.

      While these elements can help recover from an attack, they don't prevent it in the first place.

      Source: Sophos, State of Ransomware (2022)
      IBM, Cost of A Data Breach (2022)

      The 3-step ransomware attack playbook

      • Get in
      • Spread
      • Profit

      At each point of the playbook, malicious agents need to achieve something before they can move to the next step.

      Resilient organizations look for opportunities to:

      • Learn from incursions
      • Disrupt the playbook
      • Measure effectiveness

      Initial access

      Execution

      Privilege Escalation

      Credential Access

      Lateral Movement

      Collection

      Data Exfiltration

      Data encryption

      Deliver phishing email designed to avoid spam filter.

      Launch malware undetected.

      Identify user accounts.

      Target an admin account.

      Use brute force tactics to crack it.

      Move through the network and collect data.

      Infect as many critical systems and backups as possible to limit recovery options.

      Exfiltrate data to gain leverage.

      Encrypt data, which triggers alert.

      Deliver ransom note.

      Ransomware is more complex than other security threats

      Ransomware groups thrive through extortion tactics.

      • Traditionally, ransomware attacks focused on encrypting files as an incentive for organizations to pay up.
      • As organizations improved backup and recovery strategies, gangs began targeting, encrypting, and destroying back ups.
      • Since 2019, gangs have focused on a double-extortion strategy: exfiltrate sensitive or protected data before encrypting systems and threaten to publish them.

      Organizations misunderstand ransomware risk scenarios, which obscures the potential impact of an attack.

      Ransom is only a small part of the equation. Four process-related activities drive ransomware recovery costs:

      • Detection and Response – Activities that enable detection, containment, eradication and recovery.
      • Notification – Activities that enable reporting to data subjects, regulators, law enforcement, and third parties.
      • Lost Business – Activities that attempt to minimize the loss of customers, business disruption, and revenue.
      • Post Breach Response – Redress activities to victims and regulators, and the implementation of additional controls.

      Source: IBM, Cost of a Data Breach (2022)

      Disrupt the attack each stage of the attack workflow.

      An effective response with strong, available backups will reduce the operational impact of an attack, but it won't spare you from its reputational and regulatory impact.

      Put controls in place to disrupt each stage of the attack workflow to protect the organization from intrusion, enhance detection, respond quickly, and recover effectively.

      Shortening dwell time requires better protection and detection

      Ransomware dwell times and average encryption rates are improving dramatically.

      Hackers spend less time in your network before they attack, and their attacks are much more effective.

      Avg dwell time
      3-5 Days

      Avg encryption rate
      70 GB/h

      Avg detection time
      11 Days

      What is dwell time and why does it matter?

      Dwell time is the time between when a malicious agent gains access to your environment and when they are detected. In a ransomware attack, most organizations don't detect malicious agents until they deploy ransomware, encrypt their files, and lock them out until they pay the ransom.

      Effective time is a measure of the effectiveness of the encryption algorithm. Encryption rates vary by ransomware family. Lockbit has the fastest encryption rate, clocking in at 628 GB/h.

      Dwell times are dropping, and encryption rates are increasing.

      It's more critical than ever to build ransomware resilience. Most organizations do not detect ransomware incursions in time to prevent serious business disruption.

      References: Bleeping Computers (2022), VentureBeat, Dark Reading, ZDNet.

      Resilience depends in part on response and recovery capabilities

      This blueprint will focus on improving your ransomware resilience to:

      • Protect against ransomware.
      • Detect incursions.
      • Respond and recovery effectively.

      Response

      Recovery

      This image depicts the pathway for response and recovery from a ransomware event.

      For in-depth assistance with disaster recovery planning, refer to Info-Tech's Create a Right-Sized Disaster Recovery.

      Info-Tech's ransomware resilience framework

      Disrupt the playbooks of ransomware gangs. Put controls in place to protect, detect, respond and recover effectively.

      Prioritize protection

      Put controls in place to harden your environment, train savvy end users, and prevent incursions.

      Support recovery

      Build and test a backup strategy that meets business requirements to accelerate recovery and minimize disruption.

      Protect Detect Respond

      Recover

      Threat preparedness

      Review ransomware threat techniques and prioritize detective and mitigation measures for initial and credential access, privilege escalation, and data exfiltration.

      Awareness and training

      Develop security awareness content and provide cybersecurity and resilience training to employees, contractors and third parties.

      Perimeter security

      Identify and implement network security solutions including analytics, network and email traffic monitoring, and intrusion detection and prevention.

      Respond and recover

      Identify disruption scenarios and develop incident response, business continuity, and disaster recovery strategies.

      Access management

      Review the user access management program, policies and procedures to ensure they are ransomware-ready.

      Vulnerability management

      Develop proactive vulnerability and patch management programs that mitigate ransomware techniques and tactics.

      This image contains the thought map for Info-Tech's Blueprint: Build Resilience Against Ransomware Attacks.

      Info-Tech's ransomware resilience methodology

      Assess resilience Protect and detect Respond and recover Improve resilience
      Phase steps
      1. Build ransomware risk scenario
      2. Conduct resilience assessment
      1. Assess attack vectors
      2. Identify countermeasures
      1. Review Security Incident Management Plan
      2. Run Tabletop Test (IT)
      3. Document Workflow and Runbook
      1. Run Tabletop Test (Leadership)
      2. Prioritize Resilience Initiatives
      Phase outcomes
      • Ransomware Resilience Assessment
      • Risk Scenario
      • Targeted ransomware countermeasures to improve protection and detection capabilities
      • Security Incident Response Plan Assessment
      • Tabletop Test (IT)
      • Ransomware Workflow and Runbook
      • Tabletop Test (Leadership)
      • Ransomware Resilience Roadmap & Metrics

      Insight Summary

      Shift to a ransomware resilience model

      Resilience is not a trampoline, where you're down one moment and up the next. It's more like climbing a mountain. It takes time, planning, and help from people around you to work through challenges.

      Focus on what is in your organization's control, and cultivate strengths that allow you to protect assets, detect incursions, and respond and recover quickly

      Visualize challenges

      Build risk scenarios that describe how a ransomware attack would impact organizational goals.

      Understand possible outcomes to motivate initiatives, protect your organization, plan your response, and practice recovery.

      Prioritize protection

      Dwell times and effective times are dropping dramatically. Malicious agents spend less time in your network before they deploy an attack, and their attacks are much more effective. You can't afford to rely on your ability to respond and recover alone.

      Seize the moment

      The frequency and impact of ransomware attacks continue to increase, and business leaders know it. You will never have a better chance to implement best practice security controls than you do now.

      Measure ransomware resilience

      The anatomy of ransomware attack is relatively simple: malicious agents get in, spread, and profit. Deploy ransomware protection metrics to measure ransomware resilience at each stage.

      Key deliverable

      Ransomware resilience roadmap

      The resilience roadmap captures the key insights your work will generate, including:

      • An assessment of your current state and a list of initiatives you need to improve your ransomware resilience.
      • The lessons learned from building and testing the ransomware response workflow and runbook.
      • The controls you need to implement to measure and improve your ransomware resilience over time.

      Project deliverables

      Info-Tech supports project and workshop activities with deliverables to help you accomplish your goals and accelerate your success.

      Ransomware Resilience Assessment

      Measure ransomware resilience, identify gaps, and draft initiatives.

      Enterprise Threat Preparedness Workbook

      Analyze common ransomware techniques and develop countermeasures.

      Ransomware Response Workflow & Runbook

      Capture key process steps for ransomware response and recovery.

      Ransomware Tabletop Tests

      Run tabletops for your IT team and your leadership team to gather lessons learned.

      Ransomware Resilience Roadmap

      Capture project insights and measure resilience over time.

      Plan now or pay later

      Organizations worldwide spent on average USD 4.62M in 2021 to rectify a ransomware attack. These costs include escalation, notification, lost business and response costs, but did not include the cost of the ransom. Malicious ransomware attacks that destroyed data in destructive wiper-style attacks cost an average of USD 4.69M.

      Building better now is less expensive than incurring the same costs in addition to the clean-up and regulatory and business disruption costs associated with successful ransomware attacks.

      After each Info-Tech experience, we ask our members to quantify the real-time savings, monetary impact, and project improvements our research and advisory services helped them achieve.

      Source: IBM, Cost of a Data Breach (2022)

      See what members have to say about the ransomware resilience blueprint:

      • Overall Impact: 9.8 / 10
      • Average $ Saved: $98,796
      • Average Days Saved: 17

      "Our advisor was well-versed and very polished. While the blueprint alone was a good tool to give us direction, his guidance made it significantly faster and easier to accomplish than if we had tried to tackle it on our own."

      CIO, Global Manufacturing Organization

      Blueprint benefits

      IT benefits

      Business benefits

      • Provide a structured approach for your organization to identify gaps, quantify the risk, and communicate status to drive executive buy-in.
      • Create a practical ransomware incident response plan that combines a high-level workflow with a detailed runbook to coordinate response and recovery.
      • Present an executive-friendly project roadmap with resilience metrics that summarizes your plan to address gaps and improve your security posture.
      • Enable leadership to make risk-based, informed decisions on resourcing and investments to improve ransomware readiness.
      • Quantify the potential impact of a ransomware attack on your organization to drive risk awareness.
      • Identify existing gaps so they can be addressed, whether by policy, response plans, technology, or a combination of these.

      Info-Tech offers various levels of support to best suit your needs

      DIY Toolkit

      "Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful."

      Guided Implementation

      "Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track."

      Workshop

      "We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place."

      Consulting

      "Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project."

      Diagnostics and consistent frameworks used throughout all four options

      Executive brief case study

      SOURCE: Interview with CIO of large enterprise

      Organizations who "build back better" after a ransomware attack often wish they had used relevant controls sooner.

      Challenge

      In February 2020, a large organization found a ransomware note on an admin's workstation. They had downloaded a local copy of the organization's identity management database for testing and left a port open on their workstation. Hackers exfiltrated it and encrypted the data on the workstation. They demanded a ransom payment to decrypt the data.

      Complication

      Because private information was breached, the organization informed the state-level regulator. With 250,000 accounts affected, plans were made to require password changes en masse. A public announcement was made two days after the breach to ensure that everyone affected could be reached.

      The organization decided not to pay the ransom because it had a copy on an unaffected server.

      Resolution

      The organization was praised for its timely and transparent response.

      The breach motivated the organization to put more protections in place, including:

      • The implementation of a deny-by-default network.
      • The elimination of remote desktop protocol and secure shell.
      • IT mandating MFA.
      • New endpoint-detection and response systems.

      Executive brief case study

      SOURCE: Info-Tech Workshop Results
      iNDUSTRY: Government

      Regional government runs an Info-Tech workshop to fast-track its ransomware incident response planning

      The organization was in the middle of developing its security program, rolling out security awareness training for end users, and investing in security solutions to protect the environment and detect incursions. Still, the staff knew they still had holes to fill. They had not yet fully configured and deployed security solutions, key security policies were missing, and they had didn't have a documented ransomware incident response plan.

      Workshop results

      Info-Tech advisors helped the organization conduct a systematic review of existing processes, policies, and technology, with an eye to identify key gaps in the organization's ransomware readiness. The impact analysis quantified the potential impact of a ransomware attack on critical systems to improve the organizational awareness ransomware risks and improve buy-in for investment in the security program.

      Info-Tech's tabletop planning exercise provided a foundation for the organization's actual response plan. The organization used the results to build a ransomware response workflow and the framework for a more detailed runbook. The workshop also helped staff identifies ways to improve the backup strategy and bridge further gaps in their ability to recover.

      The net result was a current-state response plan, appropriate capability targets aligned with business requirements, and a project roadmap to achieve the organization's desired state of ransomware readiness.

      Guided implementation

      What kind of analyst experiences do clients have when working through this blueprint?

      Scoping Call Phase 1 Phase 2 Phase 3 Phase 4

      Call #1:

      Discuss context, identify challenges, and scope project requirements.

      Identify ransomware resilience metrics.

      Call #2:

      Build ransomware risk scenario.

      Call #4:

      Review common ransomware attack vectors.

      Identify and assess mitigation controls.

      Call #5:

      Document ransomware workflow and runbook.

      Call #7:

      Run tabletop test with leadership.

      Call #3:

      Assess ransomware resilience.

      Call #6:

      Run tabletop test with IT.

      Call #8:

      Build ransomware roadmap.

      Measure ransomware resilience metrics.

      A guided implementation (GI) is a series of calls with an Info-Tech analyst to help implement our best practices in your organization.

      A typical GI is 6 to 8 calls over the course of 4 to 6 months.

      Workshop overview

      Contact your account representative for more information.
      workshops@infotech.com 1-888-670-8889

      Day 1 Day 2 Day 3 Day 4 Day 5
      Activities

      Assess ransomware resilience

      Protect and detect

      Respond and recover

      Improve ransomware resilience

      Wrap-up (offsite and offline)

      1.1 1 Review incidents, challenges, and project drivers.

      1.1.2 Diagram critical systems and dependencies.

      1.1.3 Build ransomware risk scenario.

      2.1 1. Assess ransomware threat preparedness.

      2.2 2. Determine the impact of ransomware techniques on your environment.

      2.3 3. Identify countermeasures to improve protection and detection capabilities.

      3.1.1 Review the workflow and runbook templates.

      3.1.2 Update/define your threat escalation protocol.

      3.2.1 Define scenarios for a range of incidents.

      3.2.2 Run a tabletop planning exercise (IT).

      3.3.1 Update your ransomware response workflow.

      4.1.1 Run a tabletop planning exercise (leadership).

      4.1.2 Identify initiatives to close gaps and improve resilience.

      4.1.3 Review broader strategies to improve your overall security program.

      4.2.1 Prioritize initiatives based on factors such as effort, cost, and risk.

      4.2.2 Review the dashboard to fine tune your roadmap.

      4.3.1 Summarize status and next steps in an executive presentation.

      5.1 Complete in-progress deliverables from previous four days.

      5.2 Set up review time for workshop deliverables and to discuss next steps.

      5.3 Revisit ransomware resilience metrics in three months.

      Deliverables
      1. Workshop goals
      2. Ransomware Risk Scenario
      3. Ransomware Resilience Assessment
      1. Targeted ransomware countermeasures to improve protection and detection capabilities.
      1. Security Incident Response Plan Assessment
      2. Tabletop Planning Session (IT)
      3. Ransomware Workflow and Runbook
      1. Tabletop Planning Session (Leadership)
      2. Ransomware Resilience Roadmap and Metrics
      3. Ransomware Summary Presentation
      1. Completed Ransomware Resilience Roadmap
      2. Ransomware Resilience Assessment
      3. Ransomware Resilience Summary Presentation

      Phase 1

      Assess ransomware resilience

      Phase 1 Phase 2 Phase 3 Phase 4

      1.1 Build ransomware risk scenario

      1.2 Conduct resilience assessment

      2.1 Assess attack vectors

      2.2 Identify countermeasures

      3.1 Review Security Incident Management Plan

      3.2 Run Tabletop Test (IT)

      3.3 Document Workflow and Runbook

      4.1 Run Tabletop Test (Leadership)

      4.2 Prioritize resilience initiatives

      4.3 Measure resilience metrics

      This phase will walk you through the following activities:

      • Conducting a maturity assessment.
      • Reviewing selected systems and dependencies.
      • Assessing a ransomware risk scenario.

      This phase involves the following participants:

      • Security Incident Response Team (SIRT)
      • System subject-matter experts (SMEs)

      Build Ransomware Resilience

      Step 1.1

      Build ransomware risk scenario

      Activities

      1.1.1 Review incidents, challenges and project drivers

      1.1.2 Diagram critical systems and dependencies

      1.1.3 Build ransomware risk scenario

      Assess ransomware resilience

      This step will guide you through the following activities:

      • Reviewing incidents, challenges, and drivers.
      • Diagraming critical systems and dependencies.
      • Building a ransomware risk scenario.

      This step involves the following participants:

      • Security Incident Response Team (SIRT)
      • Subject-Matter Experts

      Outcomes of this step

      • Establish a repeatable process to evaluate and improve ransomware readiness across your environment.
      • Build a ransomware risk scenario to assess the likelihood and impact of an attack.

      1.1.1 Review incidents, challenges, and project drivers

      1 hour

      Brainstorm the challenges you need to address in the project. Avoid producing solutions at this stage, but certainly record suggestions for later. Use the categories below to get the brainstorming session started.

      Past incidents and other drivers

      • Past incidents (be specific):
        • Past security incidents (ransomware and other)
        • Close calls (e.g. partial breach detected before damage done)
      • Audit findings
      • Events in the news
      • Other?

      Security challenges

      • Absent or weak policies
      • Lack of security awareness
      • Budget limitations
      • Other?

      Input

      • Understanding of existing security capability and past incidents.

      Output

      • Documentation of past incidents and challenges.
      • Level-setting across the team regarding challenges and drivers.

      Materials

      • Whiteboard or flip chart (or a shared screen if staff are remote)

      Participants

      • Security Incident Response Team (SIRT)

      1.1.2 Diagram critical systems and dependencies (1)

      1 hour

      Brainstorm critical systems and their dependencies to build a ransomware risk scenario. The scenario will help you socialize ransomware risks with key stakeholders and discuss the importance of ransomware resilience.

      Focus on a few key critical systems.

      1. On a whiteboard or flip chart paper, make a list of systems to potentially include in scope. Consider:
        1. Key applications that support critical business operations.
        2. Databases that support multiple key applications.
        3. Systems that hold sensitive data (e.g. data with personally identifiable information [PII]).
      2. Select five to ten systems from the list.
        1. Select systems that support different business operations to provide a broader sampling of potential impacts and recovery challenges.
        2. Include one or two non-critical systems to show how the methodology addresses a range of criticality and context.

      Input

      • High-level understanding of critical business operations and data sets.

      Output

      • Clarify context, dependencies, and security and recovery challenges for some critical systems.

      Materials

      • Whiteboard or flip chart (or a shared screen if staff are remote)

      Participants

      • Security Incident Response Team (SIRT)
      • System SMEs (if not covered by SIRT members)

      1.1.2 Diagram critical systems and dependencies (2)

      1 hour

      1. A high-level topology or architectural diagram is an effective way to identify dependencies and communicate risks to stakeholders.

      Start with a WAN diagram, then your production data center, and then each critical
      system. Use the next three slides as your guide.

      Notes:

      • If you have existing diagrams, you can review those instead. However, if they are too detailed, draw a higher-level diagram to provide context. Even a rough sketch is a useful reference tool for participants.
      • Keep the drawings tidy and high level. Visualize the final diagram before you start to draw on the whiteboard to help with spacing and placement.
      • Collaborate with relevant SMEs to identify dependencies.

      Input

      • High-level understanding of critical business operations and data sets.

      Output

      • Clarify context, dependencies, and security and recovery challenges for some critical systems.

      Materials

      • Whiteboard or flip chart (or a shared screen if staff are remote)

      Participants

      • Security Incident Response Team (SIRT)
      • System SMEs (if not covered by SIRT members)

      For your WAN diagram, focus on data center and business locations

      Start with a high-level network diagram like this one, and then dig deeper (see following slides) to provide more context. Below is an example; of course, your sketched diagrams may be rougher.

      This image contains a nexample of a High level Network Diagram.

      Diagram your production data center to provide context for the systems in scope

      Creating a high-level diagram provides context across different IT disciplines involved in creating your DRP. If you have multiple production data centers, focus on the data center(s) relevant to the selected systems. Below is an example.

      This image contains a nexample of a high level diagram which focuses on the data centers relevent to the selected system.

      Diagram each selected system to identify specific dependencies and redundancies

      Diagram the "ecosystem" for each system, identifying server, storage, and network dependencies. There may be overlap with the production data center diagram – but aim to be specific here. Below is an example that illustrates front-end and back-end components.

      When you get to this level of detail, use this opportunity to level-set with the team. Consider the following:

      • Existing security (Are these systems protected by your existing security monitoring and threat detection tools?).
      • Security challenges (e.g. public-facing systems).
      • Recovery challenges (e.g. limited or infrequent backups).
      This is an example of a diagram of a system ecosystem.

      Note the limitations of your security, backup, and DR solutions

      Use the diagrams to assess limitations. Gaps you identify here will often apply to other aspects of your environment.

      1. Security limitations
      • Are there any known security vulnerabilities or risks, such as external access (e.g. for a customer portal)? If so, are those risks mitigated? Are existing security solutions being fully used?
    • Backup limitations
      • What steps are taken to ensure the integrity of your backups (e.g. through inline or post-backup scanning, or the use of immutable backups)? Are there multiple restore points to provide more granularity when determining how far back you need to go for a clean backup?
    • Disaster recovery limitations
      • Does your DR solution account for ransomware attacks or is it designed only for one-way failover (i.e. for a smoking hole scenario)?
    • We will review the gaps we identify through the project in phase 4.

      For now, make a note of these gaps and continue with the next step.

      Draft risk scenarios to illustrate ransomware risk

      Risk scenarios help decision-makers understand how adverse events affect business goals.

      • Risk-scenario building is the process of identifying the critical factors that contribute to an adverse event and crafting a narrative that describes the circumstances and consequences if it were to happen.
      • Risk scenarios set up the risk analysis stage of the risk assessment process. They are narratives that describe in detail:
        • The asset at risk.
        • The threat that can act against the asset.
        • Their intent or motivation.
        • The circumstances and threat actor model associated with the threat event.
        • The potential effect on the organization.
        • When or how often the event might occur.

      Risk scenarios are further distilled into a single sentence or risk statement that communicates the essential elements from the scenario.

      Risk identification → Risk scenario → Risk statement

      Well-crafted risk scenarios have four components

      The slides walk through how to build a ransomware risk scenario

      THREAT Exploits an ASSET Using a METHOD Creating an EFFECT.

      An actor capable of harming an asset

      Anything of value that can be affected and results in loss

      Technique an actor uses to affect an asset

      How loss materializes

      Examples: Malicious or untrained employees, cybercriminal groups, malicious state actors

      Examples: Systems, regulated data, intellectual property, people

      Examples: Credential compromise, privilege escalation, data exfiltration

      Examples: Loss of data confidentiality, integrity, or availability; impact on staff health and safety

      Risk scenarios are concise, four to six sentence narratives that describe the core elements of forecasted adverse events.

      Use them to engage stakeholders with the right questions and guide them to make informed decisions about how to address ransomware risks.

      1.1.3 Build ransomware risk scenario (1)

      2 hours

      In a ransomware risk scenario, the threat, their motivations, and their methods are known. Malicious agents are motivated to compromise critical systems, sabotage recovery, and exfiltrate data for financial gain.

      The purpose of building the risk scenario is to highlight the assets at risk and the potential effect of a ransomware attack.

      As a group, consider critical or mission-essential systems identified in step 1.1.2. On a whiteboard, brainstorm the potential adverse effect of a loss of system availability, confidentiality or integrity.

      Consider the impact on:

      • Information systems.
      • Sensitive or regulated data.
      • Staff health and safety.
      • Critical operations and objectives.
      • Organizational finances.
      • Reputation and brand loyalty.

      Input

      • Understanding of critical systems and dependencies.

      Output

      • Ransomware risk scenario to engage guide stakeholders to make informed decisions about addressing risks.

      Materials

      • Whiteboard or flip chart (or a shared screen if staff are remote)

      Participants

      • Security Incident Response Team (SIRT)

      1.1.3 Build ransomware risk scenario (2)

      2 hours

      1. On a whiteboard, brainstorm how threat agents will exploit vulnerabilities in critical assets to reach their goal. Redefine attack vectors to capture what could result from a successful initial attack.
      2. Bring together the critical risk elements into a single risk scenario.
      3. Distill the risk scenario into a single risk statement that captures the threat, the asset it will exploit, the method it will use, and the impact it will have on the organization.
      4. You can find a sample risk scenario and risk statement on the next slide.

      THREAT Exploits an ASSET Using a METHOD Creating an EFFECT.

      Inputs for risk scenario identification

      Risk analysis

      Critical assets

      ERP, CRM, FMS, LMS

      Operational technology

      Sensitive or regulated data

      Threat agents

      Cybercriminals

      Methods

      Compromise end user devices through social engineering attacks,. Compromise networks through external exposures and software vulnerabilities.

      Identify and crack administrative account. Escalate privileges. Move laterally.

      Collect data, destroy backups, exfiltrate data for leverage, encrypt systems,.

      Threaten to publish exfiltrated data and demand ransom.

      Adverse effect

      Serious business disruption

      Financial damage

      Reputational damage

      Potential litigation

      Average downtime: 30 Days

      Average clean-up costs: USD 1.4M

      Sample ransomware risk scenario

      Likelihood: Medium
      Impact: High

      Risk scenario

      Cyber-criminals penetrate the network, exfiltrate critical or sensitive data, encrypt critical systems, and demand a ransom to restore access.

      They threaten to publish sensitive data online to pressure the organization to pay the ransom, and reach out to partners, staff, and students directly to increase the pressure on the organization.

      Network access likely occurs through a phishing attack, credential compromise, or remote desktop protocol session.

      Risk statement

      Cybercriminals penetrate the network, compromise backups, exfiltrate and encrypt data, and disrupt computer systems for financial gain.

      Threat Actor:

      • Cybercriminals

      Assets:

      • Critical systems (ERP, FMS, CRM, LMS)
      • HRIS and payroll
      • Data warehouse
      • Office 365 ecosystem (email, Teams)

      Effect:

      • Loss of system availability
      • Lost of data confidentiality

      Methods:

      • Phishing
      • Credential compromise
      • Compromised remote desktop protocol
      • Privilege escalation
      • Lateral movement
      • Data collection
      • Data exfiltration
      • Data encryption

      Step 1.2

      Conduct resilience assessment

      Activities

      1.2.1 Complete resilience assessment

      1.2.2 Establish resilience metrics

      This step will guide you through the following activities :

      • Completing a ransomware resilience assessment
      • Establishing baseline metrics to measure ransomware resilience.

      This step involves the following participants:

      • Security Incident Response Team (SIRT)
      • Subject-matter experts

      .Outcomes of this step

      • Current maturity, targets, and initial gap analysis

      Maturity levels in this blueprint draw on the CMMI framework

      The maturity levels are based on the Capability Maturity Model Integration framework. We outline our modifications below.

      CMMI Maturity Level – Default Descriptions:

      CMMI Maturity Level – Modified for This Assessment:

      • Level 1 – Initial: Unpredictable and reactive. Work gets completed but is often delayed and over budget.
      • Level 2 – Managed: Managed on the project level. Projects are planned, performed, measured, and controlled.
      • Level 3 – Defined: Proactive rather than reactive. Organization-wide standards provide guidance across projects, programs, and portfolios.
      • Level 4 – Quantitatively managed: Measured and controlled. Organization is data-driven, with quantitative performance improvement objectives that are predictable and align to meet the needs of internal and external stakeholders.
      • Level 5 – Optimizing: Stable and flexible. Organization is focused on continuous improvement and is built to pivot and respond to opportunity and change. The organization's stability provides a platform for agility and innovation.
      • Level 1 – Initial/ad hoc: Not well defined and ad hoc in nature.
      • Level 2 – Developing: Established but inconsistent and incomplete.
      • Level 3 – Defined: Formally established, documented, and repeatable.
      • Level 4 – Managed and measurable: Managed using qualitative and quantitative data to ensure alignment with business requirements.
      • Level 5 – Optimizing: Qualitative and quantitative data is used to continually improve.

      (Source: CMMI Institute, CMMI Levels of Capability and Performance)

      Info-Tech's ransomware resilience framework

      Disrupt the playbooks of ransomware gangs. Put controls in place to protect, detect, respond and recover effectively.

      Prioritize protection

      Put controls in place to harden your environment, train savvy end users, and prevent incursions.

      Support recovery

      Build and test a backup strategy that meets business requirements to accelerate recovery and minimize disruption.

      Protect Detect Respond

      Recover

      Threat preparedness

      Review ransomware threat techniques and prioritize detective and mitigation measures for initial and credential access, privilege escalation, and data exfiltration.

      Awareness and training

      Develop security awareness content and provide cybersecurity and resilience training to employees, contractors and third parties.

      Perimeter security

      Identify and implement network security solutions including analytics, network and email traffic monitoring, and intrusion detection and prevention.

      Respond and recover

      Identify disruption scenarios and develop incident response, business continuity, and disaster recovery strategies.

      Access management

      Review the user access management program, policies and procedures to ensure they are ransomware-ready.

      Vulnerability management

      Develop proactive vulnerability and patch management programs that mitigate ransomware techniques and tactics.

      1.2.1 Complete the resilience assessment

      2-3 hours

      Use the Ransomware Resilience Assessment Tool to assess maturity of existing controls, establish a target state, and identify an initial set of initiatives to improve ransomware resilience.

      Keep the assessment tool on hand to add gap closure initiatives as you proceed through the project.

      Download the Ransomware Resilience Assessment

      Outcomes:

      • Capture baseline resilience metrics to measure progress over time.
        • Low scores are common. Use them to make the case for security investment.
        • Clarify the breadth of security controls.
        • Security controls intersect with a number of key processes and technologies, each of which are critical to ransomware resilience.
      • Key gaps identified.
        • Allocate more time to subsections with lower scores.
        • Repeat the scorecard at least annually to clarify remaining areas to address.

      Input

      • Understanding of current security controls

      Output

      • Current maturity, targets, and gaps

      Materials

      • Ransomware Resilience Assessment Tool

      Participants

      • Security Incident Response Team (SIRT)

      This is an image of the Ransomeware Resilience Assessment Table from Info-Tech's Ransomware Resilience Assessment Blueprint.

      1.2.2 Establish resilience metrics

      Ransomware resilience metrics track your ability to disrupt a ransomware attack at each stage of its workflow.

      Measure metrics at the start of the project to establish a baseline, as the project nears completion to measure progress.

      Attack workflow Process Metric Target trend Current Goal
      GET IN Vulnerability Management % Critical patches applied Higher is better
      Vulnerability Management # of external exposures Fewer is better
      Security Awareness Training % of users tested for phishing Higher is better
      SPREAD Identity and Access Management Adm accounts / 1000 users Lower is better
      Identity and Access Management % of users enrolled for MFA Higher is better
      Security Incident Management Avg time to detect Lower is better
      PROFIT Security Incident Management Avg time to resolve Lower is better
      Backup and Disaster Recovery % critical assets with recovery test Higher is better
      Backup and Disaster Recovery % backup to immutable storage Higher is better

      Phase 2

      Improve protection and detection capabilities

      Phase 1Phase 2Phase 3Phase 4

      1.1 Build ransomware risk scenario

      1.2 Conduct resilience assessment

      2.1 Assess attack vectors

      2.2 Identify countermeasures

      3.1 Review Security Incident Management Plan

      3.2 Run Tabletop Test (IT)

      3.3 Document Workflow and Runbook

      4.1 Run Tabletop Test (Leadership)

      4.2 Prioritize resilience initiatives

      4.3 Measure resilience metrics

      This phase will walk you through the following activities:

      • Assessing common ransomware attack vectors.
      • Identifying countermeasures to improve protection and detection capabilities.

      This phase involves the following participants:

      • Security Incident Response Team (SIRT)
      • System subject-matter experts (SMEs)

      Build Ransomware Resilience

      Step 2.1

      Assess attack vectors

      Activities

      2.1.1 Assess ransomware threat preparedness

      2.1.2 Determine the impact of ransomware techniques on your environment

      This step involves the following activities:

      • Assessing ransomware threat preparedness.
      • Configuring the threat preparedness tool.

      This step involves the following participants:

      • Security Incident Response Team (SIRT)
      • System subject-matter experts (SMEs)

      Outcomes of this step

      Assess risks associated with common ransomware attack vectors.

      Improve protection and detection capabilities

      Use the MITRE attack framework to prepare

      This phase draws on MITRE to improve ransomware protection and detection capabilities

      • The activities in this phase provide guidance on how to use the MITRE attack framework to protect your organizations against common ransomware techniques and tactics, and detect incursions.
      • You will:
        • Review common ransomware tactics and techniques.
        • Assess their impact on your environment.
        • Identify relevant countermeasures.
      • The Enterprise Threat Preparedness Workbook included with the project blueprint will be set up to deal with common ransomware threats and tactics.

      Download the Enterprise Threat Preparedness Workbook

      Review ransomware tactics and techniques

      Ransomware attack workflow

      Deliver phishing email designed to avoid spam filter.

      Launch malware undetected.

      Identify user accounts.

      Target an admin account.

      Use brute force tactics to crack it.

      Move through the network. Collect data.

      Infect critical systems and backups to limit recovery options.

      Exfiltrate data to gain leverage.

      Encrypt data, which triggers alert.

      Deliver ransom note.

      Associated MITRE tactics and techniques

      • Initial access
      • Execution
      • Privilege escalation
      • Credential access
      • Lateral movement
      • Collection
      • Data Exfiltration
      • Data encryption

      Most common ransomware attack vectors

      • Phishing and social engineering
      • Exploitation of software vulnerabilities
      • Unsecured external exposures
        • e.g. remote desktop protocols
      • Malware infections
        • Email attachments
        • Web pages
        • Pop-ups
        • Removable media

      2.1.1 Assess ransomware threat preparedness

      Estimated Time: 1-4 hours

      1. Read through the instructions in the Enterprise Threat Preparedness Workbook.
      2. Select ransomware attack tactics to analyze. Use the workbook to understand:
        1. Risks associated with each attack vector.
        2. Existing controls that can help you protect the organization and detect an incursion.
      3. This initial analysis is meant to help you understand your risk before you apply additional controls.

      Once you're comfortable, follow the instructions on the following pages to configure the MITRE ransomware analysis and identify how to improve your protection and detection capabilities.

      Download the Enterprise Threat Preparedness Workbook

      Input

      • Knowledge about existing infrastructure.
      • Security protocols.
      • Information about ransomware attack tactics, techniques, and mitigation protocols.

      Output

      • Structured understanding of the risks facing the enterprise based on your current preparedness and security protocols.
      • Protective and detective measures to improve ransomware resilience.

      Materials

      • Enterprise Threat Preparedness Workbook

      Participants

      • Security Incident Response Team (SIRT)
      • System subject-matter experts (SMEs)

      2.1.2 Determine the impact of techniques

      Estimated Time: 1-4 hours

      1. The Enterprise Threat Preparedness Workbook included with the project blueprint is set up to deal with common ransomware use cases.

      If you would like to change the set-up, go through the following steps.

      • Review the enterprise matrix. Select the right level of granularity for your analysis. If you are new to threat preparedness exercises, the Technique Level is a good starting point.
      • As you move through each tactic, align each sheet to your chosen technique domain to ensure the granularity of your analysis is consistent.
      • Read the tactics sheet from left to right. Determine the impact of the technique on your environment. For each control, indicate current mitigation levels using the dropdown list.

      The following slides walk you through the process with screenshots from the workbook.

      Download the Enterprise Threat Preparedness Workbook

      Input

      • Knowledge about existing infrastructure.
      • Security protocols.
      • Information about ransomware attack tactics, techniques, and mitigation protocols.

      Output

      • Structured understanding of the risks facing the enterprise based on your current preparedness and security protocols.
      • Protective and detective measures to improve ransomware resilience.

      Materials

      • Enterprise Threat Preparedness Workbook

      Participants

      • Security Incident Response Team (SIRT)
      • System subject-matter experts (SMEs)

      Select the domain for the analysis

      • The Tactics Dashboard is a live feed of your overall preparedness for the potential attack vectors that your organization may face. These 14 tactics correspond to the Enterprise Matrix used by the MITRE ATT&CK® framework.
      • The technique domain on the right side of the sheet is split in two main groups:
      • The Technique Level
        • - High-level techniques that an attacker may use to gain entry to your network.
        • - The Technique Level is a great starting point if you are new to threat preparedness.
      • The Sub-Technique Level
        • - Individual sub-techniques found throughout the MITRE ATT&CK® Framework.
        • - More mature organizations will find the Sub-Technique Level generates a deeper and more precise understanding of their current preparedness.

      Info-Tech Insight

      Dwell times and effective times are dropping dramatically. Malicious agents spend less time in your network before they deploy an attack, and their attacks are much more effective. You can't afford to rely on your ability to respond and recover alone.

      This is the first screenshot from Info-Tech's Tactic Preparedness Assessment Dashboard.

      Keep an eye on the enterprise matrix

      As you fill out the Tactic tabs with your evaluation, the overall reading will display the average of your overall preparedness for that tactic.

      Choosing the Technique Domain level will increase the accuracy of the reporting at the cost of speed.

      The Technique level is faster but provides less specifics for each control and analyzes them as a group.

      The Sub-Technique level is much more granular, but each tactic and technique has several sub-techniques that you will need to account for.

      Check with the dashboard to see the associated risk level for each of the tactics based on the legend. Tactics that appear white have not yet been assessed or are rated as "N/A" (not applicable).

      This is the second screenshot from Info-Tech's Tactic Preparedness Assessment Dashboard.

      When you select your Technique Domain, you cannot change it again. Changing the domain mid-analysis will introduce inaccuracies in your security preparedness.

      Configure the tactics tabs

      • Each tactic has a corresponding tab at the bottom of the Excel workbook.
        Adjusting the Technique Domain level will change the number of controls shown.
      • Next, align the sheet to the domain you selected on Tab 2 before you continue. As shown in the example to the right,
        • Select "1" for Technique Level.
        • Select "2" for Sub-Technique Level.
      • This will collapse the controls to your chosen level of granularity.

      This is a screenshot showing how you can configure the tactics tab of the Ransomware Threat Preparedness Workbook

      Read tactic sheets from left to right

      This is a screenshot of the tactics tab of the Ransomware Threat Preparedness Workbook

      Technique:

      How an attacker will attempt to achieve their goals through a specific action.

      ID:

      The corresponding ID number on the MITRE ATT&CK® Matrix for quick reference.

      Impact of the Technique(s):

      If an attack of this type is successful on your network, how deep does the damage run?

      Current Mitigations:

      What security protocols do you have in place right now that can help prevent an attacker from successfully executing this attack technique? The rating is based on the CMMI scale.

      Determine the impact of the technique

      • For each control, indicate the current mitigation level using the dropdown list.
      • Only use "N/A" if you are confident that the control is not required in your organization.

      Info-Tech Insight

      We highly recommend that you write comments about your current-state security protocols. First, it's great to have documented your thought processes in the event of a threat modeling session. Second, you can speak to deficits clearly, when asked.

      This is the second screenshot from Info-Tech's Reconnaissance Tactic Analysis

      Review technique preparedness

      • If you have chosen the Technique level, the tool should resemble this image:
        • High-level controls are analyzed, and sub-controls hidden.
        • The sub-techniques under the broader technique show how a successful attack from this vector would impact your network.
      • Each sub-technique has a note for additional context:
        • Under Impact, select the overall impact for the listed controls to represent how damaging you believe the controls to be.
        • Next select your current preparedness maturity in terms of preparedness for the same techniques. Ask yourself "What do I have that contributes to blocking this technique?"

      This is the third screenshot from Info-Tech's Reconnaissance Tactic Analysis

      Info-Tech Insight

      You may discover that you have little to no mitigation actions in place to deal with one or many of these techniques. However, look at this discovery as a positive: You've learned more about the potential vectors and can actively work toward remediating them rather than hoping that a breach never happens through one of these avenues.

      Review sub-technique preparedness

      If you have chosen the Sub-Technique level, the tool should resemble this image.

      • The granular controls are being analyzed. However, the grouped controls will still appear. It is important to not fill the grouped sections, to make sure the calculations run properly.
      • The average of your sub-techniques will be calculated to show your overall preparedness level.
      • Look at the sub-techniques under the broader technique and consider how a successful attack from this vector would impact your network.

      Each sub-technique has a note for additional context and understanding about what the techniques are seeking to do and how they may impact your enterprise.

      • Because of the enhanced granularity, the final risk score is more representative of an enterprise's current mitigation capabilities.
      This is the fourth screenshot from Info-Tech's Reconnaissance Tactic Analysis

      Step 2.2

      Identify countermeasures

      Activities

      2.2.1 Identify countermeasures

      This step involves the following activities:

      • Identifying countermeasures

      This step involves the following participants:

      • Security Incident Response Team (SIRT)
      • System subject-matter experts (SMEs)

      Outcomes of this step

      Identification of countermeasures to common ransomware techniques, and tactics to improve protection and detection capabilities.

      Improve Protection and Detection Capabilities

      Review technique countermeasures

      As you work through the tool, your dashboard will prioritize your threat preparedness for each of the various attack techniques to give you an overall impression of your preparedness.

      For each action, the tool includes detection and remediation actions for you to consider either for implementation or as table stakes for your next threat modeling sessions.

      Note: Some sheets will have the same controls. However, the context of the attack technique may change your answers. Be sure to read the tactic and technique that you are on when responding to the controls.

      This is an image of the Privilege Escalation Tactic Analysis Table

      This is an image of the Defense Evasion Tactic Analysis Table

      Prioritize the analysis of ransomware tactics and sub-techniques identified on slide 45. If your initial analysis in Activity 2.2.1 determined that you have robust security protocols for some of the attack vectors, set these domains aside.

      2.2.1 Identify countermeasures

      Estimated Time: 1-4 hours

      1. Review the output of the Enterprise Threat Preparedness Workbook. Remediation efforts are on the right side of the sheet. These are categorized as either detection actions or mitigation actions.
        1. Detection actions:
        • What can you do before an attack occurs, and how can you block attacks? Detection actions may thwart an attack before it ever occurs.
      2. Mitigation actions:
        • If an attacker is successful through one of the attack methods, how do you lessen the impact of the technique? Mitigation actions address this function to slow and hinder the potential spread or damage of a successful attack.
    • Detection and mitigation measures are associated with each technique and sub-technique. Not all techniques will be able to be detected properly or mitigated. However, understanding their relationships can better prepare your defensive protocols.
    • Add relevant control actions to the initiative list in the Ransomware Resilience Assessment.
    • Input

      • Knowledge about existing infrastructure.
      • Security protocols.
      • Information about ransomware attack tactics, techniques, and mitigation protocols.
      • Outputs from the Threat Preparedness Workbook.

      Output

      • Structured understanding of the risks facing the enterprise based on your current preparedness and security protocols.
      • Protective and detective measures to improve ransomware resilience.

      Materials

      • Enterprise Threat Preparedness Workbook
      • Ransomware Resilience Assessment

      Participants

      • Security Incident Response Team (SIRT)
      • System subject-matter experts (SMEs)

      Phase 3

      Improve response and recovery capabilities

      Phase 1Phase 2Phase 3Phase 4

      1.1 Build ransomware risk scenario

      1.2 Conduct resilience assessment

      2.1 Assess attack vectors

      2.2 Identify countermeasures

      3.1 Review Security Incident Management Plan

      3.2 Run Tabletop Test (IT)

      3.3 Document Workflow and Runbook

      4.1 Run Tabletop Test (Leadership)

      4.2 Prioritize resilience initiatives

      4.3 Measure resilience metrics

      This phase will guide you through the following steps:

      • Documenting your threat escalation protocol.
      • Identify response steps and gaps.
      • Update your response workflow and runbook.

      This phase involves the following participants:

      • Security Incident Response Team (SIRT)

      Build Ransomware Resilience

      Step 3.1

      Review security incident management plan

      Activities

      3.1.1 Review the workflow and runbook templates

      3.1.2 Update/define your threat escalation protocol

      This step will walk you through the following activities:

      • Reviewing the example Workflow and Runbook
      • Updating and defining your threat escalation protocol.

      This step involves the following participants:

      • Security Incident Response Team (SIRT)

      Outcomes of this step

      • Clear escalation path for critical incidents.
      • Common understanding of incident severity that will drive escalation.

      Improve response and recovery capabilities

      3.1.1 Review the workflow and runbook templates

      30 minutes

      This blueprint includes sample information in the Ransomware Response Workflow Template and Ransomware Response Runbook Template to use as a starting points for the steps in Phase 3, including documenting your threat escalation protocol.

      • The Ransomware Response Workflow Template contains an example of a high-level security incident management workflow for a ransomware attack. This provides a structure to follow for the tabletop planning exercise and a starting point for your ransomware response workflow.
        The Workflow is aimed at incident commanders and team leads. It provides an at-a-glance view of the high-level steps and interactions between stakeholders to help leaders coordinate response.
      • The Ransomware Response Runbook Template is an example of a security incident management runbook for a ransomware attack. This includes a section for a threat escalation protocol that you can use as a starting point.
        The Runbook is aimed at the teams executing the response. It provides more specific actions that need to be executed at each phase of the incident response.

      Download the Ransomware Response Workflow Template

      Download the Ransomware Response Runbook Template

      Input

      • No Input Required

      Output

      • Visualize the end goal

      Materials

      • Example workflow and runbook in this blueprint

      Participants

      • Security Incident Response Team (SIRT)

      Two overlapping screenshots are depicted, including the table of contents from the Ransomware Response Runbook.

      3.1.2 Update/define your threat escalation protocol

      1-2 hours

      Document the Threat Escalation Protocol sections in the Ransomware Response Workflow Template or review/update your existing runbook. The threat escalation protocol defines which stakeholders to involve in the incident management process, depending on impact and scope. Specifically, you will need to define the following:

      Impact and scope criteria: Impact considers factors such as the criticality of the system/data, whether PII is at risk, and whether public notification is required. Scope considers how many systems or users are impacted.

      Severity assessment: Define the severity levels based on impact and scope criteria.

      Relevant stakeholders: Identify stakeholders to notify for each severity level, which can include external stakeholders.

      If you need additional guidance, see Info-Tech's Develop and Implement a Security Incident Management Program blueprint, which takes a broader look at security incidents.

      Input

      • Current escalation process (formal or informal).

      Output

      • Define criteria for severity levels and relevant stakeholders.

      Materials

      • Ransomware Response Workflow Template

      Participants

      • Security Incident Response Team (SIRT)

      This is an image of the Threat Escalation Protocol Criteria and Stakeholders.

      Step 3.2

      Run Tabletop Test (IT)

      Activities

      3.2.1 Define scenarios for a range of incidents

      3.2.2 Run a tabletop planning exercise

      This step will guide you through the following activities:

      • Defining scenarios for a range of incidents.
      • Running a tabletop planning exercise.

      This step involves the following participants:

      • Security Incident Response Team (SIRT)
      • Other stakeholders (as relevant)

      Outcomes of this step

      • Current-state incident response workflow, including stakeholders, steps, timeline.
      • Process and technology gaps to be addressed.

      Improve response and recovery capabilities

      3.2.1 Define scenarios for a range of incidents

      30 minutes

      As a group, collaborate to define scenarios that enable you to develop incident response details for a wide range of potential incidents. Below are example scenarios:

      • Scenario 1: An isolated attack on one key system. The database for a critical application is compromised. Assume the attack was not detected until files were encrypted, but that you can carry out a repair-in-place by wiping the server and restoring from backups.
      • Scenario 2: A site-wide impact that warrants broader disaster recovery. Several critical systems are compromised. It would take too long to repair in-place, so you need to failover to your DR environment, in addition to executing security response steps. (Note: If you don't have a DRP, see Info-Tech's Create a Right-Sized Disaster Recovery Plan.)
      • Scenario 3: A critical outsourced service or cloud service is compromised. You need to work with the vendor to determine the scope of impact and execute a response. This includes determining if your on-prem systems were also compromised.
      • Scenario 4: One or multiple end-user devices are compromised. Your response to the above scenarios would include assessing end-user devices as a possible source or secondary attack, but this scenario would provide more focus on the containing an attack on end-user devices.

      Note: The above is too much to execute in one 30-minute session, so plan a series of exercises as outlined on the next slide.

      Input

      • No input required

      Output

      • Determine the scope of your tabletop planning exercises

      Materials

      • Whiteboard or flip chart (or a shared screen if staff are remote)

      Participants

      • Security Incident Response Team (SIRT)

      Optimize the time spent by participants by running a series of focused exercises

      Not all stakeholders need to be present at every tabletop planning exercise. First, run an exercise with IT that focuses on the technical response. Run a second tabletop for non-IT stakeholders that focuses on the non-IT response, such as crisis communications, working with external stakeholders (e.g. law enforcement, cyberinsurance).

      Sample schedule:

      • Q1: Hold two sessions that run Scenarios 1 and 2 with relevant IT participants (see Activity 3.2.1). The focus for these sessions will be primarily on the technical response. For example, include notifying leadership and their role in decision making, but don't expand further on the details of their process. Similarly, don't invite non-IT participants to these sessions so you can focus first on understanding the IT response. Invite executives to the Q2 exercise, where they will have more opportunity to be involved.
      • Q2: Hold one session with the SIRT and non-IT stakeholders. Use the results of the Q1 exercises as a starting point and expand on the non-IT response steps (e.g. notifying external parties, executive decisions on response options).
      • Q3 and Q4: Run other sessions (e.g. for Scenarios 3 and 4) with relevant stakeholders. Ensure your ransomware incident response plan covers a wide range of possible scenarios.
      • Run ongoing exercises at least annually. Once you have a solid ransomware incident response plan, incorporate ransomware-based tabletop planning exercises into your overall security incident management testing and maintenance schedule.

      Info-Tech Insight

      Schedule these sessions well in advance to ensure appropriate resources are available. Document this in an annual test plan summary that outlines the scope, participants, and dates and times for the planned sessions.

      3.2.2 Run a tabletop planning exercise

      1-2 hours

      Remember that the goal is a deeper dive into how you would respond to an attack so you can clarify steps and gaps. This is not meant to just be a read-through of your plan. Follow the guidelines below:

      1. Select your scenario and invite relevant participants (see the previous slides).
      2. Guide participants through the incident and capture the steps and gaps along the way. Focus on one stakeholder at a time through each phase but be sure to get input from everyone. For example, focus on the Service Desk's steps for detection, then do the same as relevant to other stakeholders. Move on to analysis and do the same. (Tip: The distinction between phases is not always clear, and that's okay. Similarly, eradication and recovery might be the same set of steps. Focus on capturing the detail; you can clarify the relevant phase later.)
      3. Record the results (e.g. capture it in Visio) for reference purposes. (Tip: You can run the exercise directly in Visio. However, there's a risk that the tool may become a distraction. Enlist a scribe who is proficient with Visio so you don't need to wait for information to be captured and plan to save the detailed formatting and revising for later. )

      Refer to the Ransomware Tabletop Planning Results – Example as a guide for what to capture. Aim for more detail than found in your Ransomware Response Workflow (but not runbook-level detail).

      Download the Ransomware Tabletop Planning Results – Example

      Input

      • Baseline ransomware response workflow

      Output

      • Clarify your response workflow, capabilities, and gaps

      Materials

      • Whiteboard or sticky notes or index cards, or a shared screen

      Participants

      • Security Incident Response Team (SIRT)

      This is an example of a Ransomware Response Tabletop Planning Results Page.

      Step 3.3

      Document Workflow and Runbook

      Activities

      3.3.1 Update your ransomware response workflow

      3.3.2 Update your ransomware response runbook

      This step will guide you through the following activities:

      • Updating your ransomware response workflow.
      • Updating your ransomware response runbook.

      This step involves the following participants:

      • Security Incident Response Team (SIRT)

      Outcomes of this step

      • An updated incident response workflow and runbook based on current capabilities.

      Improve response and recovery capabilities

      3.3.1 Update your ransomware response workflow

      1 hour

      Use the results from your tabletop planning exercises (Activity 3.2.2) to update and clarify your ransomware response workflow. For example:

      • Update stakeholder swim-lanes: Clarify which stakeholders need a swim lane (e.g. where interactions between groups needs to be clarified). For example, consider an SIRT swim-lane that combines the relevant technical response roles, but have separate swim-lanes for other groups that the SIRT interacts with (e.g. Service Desk, the Executive Team).
      • Update workflow steps: Use the detail from the tabletop exercises to clarify and/or add steps, as well as further define the interactions between swim-lanes.(Tip: Your workflow needs to account for a range of scenarios. It typically won't be as specific as the tabletop planning results, which focus on only one scenario.)
      • Clarify the overall the workflow: Look for and correct any remaining areas of confusion and clutter. For example, consider adding "Go To" connectors to minimize lines crossing each other, adding color-coding to highlight key related steps (e.g. any communication steps), and/or resizing swim-lanes to reduce the overall size of the workflow to make it easier to read.
      • Repeat the above after each exercise: Continue to refine the workflow as needed until you reach the stage where you just need to validate that your workflow is still accurate.

      Input

      • Results from tabletop planning exercises (Activity 3.2.2)

      Output

      • Clarify your response workflow

      Materials

      • Ransomware Response Workflow

      Participants

      • Security Incident Response Team (SIRT)

      This is a screenshot from the ransomeware response tabletop planning

      3.3.2 Update your ransomware response runbook

      1 hour

      Use the results from your tabletop planning exercises (Activity 3.2.2) to update your ransomware response runbook. For example:

      • Align stakeholder sections with the workflow: Each stakeholder swim-lane in the workflow needs its own section in the runbook.
      • Update incident response steps: Use the detail from the tabletop exercise to clarify instructions for each stakeholder. This can include outlining specific actions, defining which stakeholders to work with, and referencing relevant documentation (e.g. vendor documentation, step-by-step restore procedures). (Tip: As with the workflow, the runbook needs to account for a range of scenarios, so it will include a list of actions that might need to be taken depending on the incident, as illustrated in the example runbook.)
      • Review and update your threat escalation protocol: It's best to define your threat escalation protocol before the tabletop planning exercise to help identify participants and avoid confusion. Now use the exercise results to validate or update that documentation.
      • Repeat the above after each exercise. Continue to refine your runbook as needed until you reach the stage where you just need to validate that your runbook is still accurate.

      Input

      • Results from tabletop planning exercises (Activity 3.2.2)

      Output

      • Clarified response runbook

      Materials

      • Ransomware Response Workflow

      Participants

      • Security Incident Response Team (SIRT)

      This is a screenshot of the Ransomware Response Runbook

      Phase 4

      Improve ransomware resilience

      Phase 1Phase 2Phase 3Phase 4

      1.1 Build ransomware risk scenario

      1.2 Conduct resilience assessment

      2.1 Assess attack vectors

      2.2 Identify countermeasures

      3.1 Review Security Incident Management Plan

      3.2 Run Tabletop Test (IT)

      3.3 Document Workflow and Runbook

      4.1 Run Tabletop Test (Leadership)

      4.2 Prioritize resilience initiatives

      4.3 Measure resilience metrics

      This phase will guide you through the following steps:

      • Identifying initiatives to improve ransomware resilience.
      • Prioritizing initiatives in a project roadmap.
      • Communicating status and recommendations.

      This phase involves the following participants:

      • Security Incident Response Team (SIRT)

      Build Ransomware Resilience

      Step 4.1

      Run Tabletop Test (leadership)

      Activities

      • 4.1.1 Identify initiatives to close gaps and improve resilience
      • 4.1.2 Review broader strategies to improve your overall security program

      This step will walk you through the following activities:

      • Identifying initiatives to close gaps and improve resilience.
      • Reviewing broader strategies to improve your overall security program.

      This step involves the following participants:

      • Security Incident Response Team (SIRT)

      Outcomes of this step

      • Specific potential initiatives based on a review of the gaps.
      • Broader potential initiatives to improve your overall security program.

      Improve ransomware resilience

      4.1.1 Identify initiatives to close gaps and improve resilience

      1 hour

      1. Use the results from the activities you have completed to identify initiatives to improve your ransomware readiness.
      2. Set up a blank spreadsheet with two columns and label them "Gaps" and "Initiatives." (It will be easier to copy the gaps and initiatives from this spreadsheet to you project roadmap, rather than use the Gap Initiative column in the Ransomware Readiness Maturity Assessment Tool.)
      3. Review your tabletop planning results:
        1. Summarize the gaps in the "Gaps" column in your spreadsheet created for this activity.
        2. For each gap, write down potential initiatives to address the gap.
        3. Where possible, combine similar gaps and initiatives. Similarly, the same initiative might address multiple gaps, so you don't need to identify a distinct initiative for every gap.
      4. Review the results of your maturity assessment completed in Phase 1 to identify additional gaps and initiatives in the spreadsheet created for this activity.

      Input

      • Tabletop planning results
      • Maturity assessment

      Output

      • Identify initiatives to improve ransomware readiness

      Materials

      • Blank spreadsheet

      Participants

      • Security Incident Response Team (SIRT)

      4.1.2 Review broader strategies to improve your overall security program

      1 hour

      1. Review the following considerations as outlined on the next few slides:
        • Implement core elements of an effective security program – strategy, operations, and policies. Leverage the work completed in this blueprint to provide context and address your immediate gaps while developing an overarching security strategy based on business requirements, risk tolerance, and overall security considerations. Security operations and policies are key to executing your overall security strategy and day to day incident management.
        • Update your backup strategy to account for ransomware attacks. Consider what your options would be today if your primary backups were infected? If those options aren't very good, your backup strategy needs a refresh.
        • Consider a zero-trust strategy. Zero trust reduces your reliance on perimeter security and moves controls to where the user accesses resources. However, it takes time to implement. Evaluate your readiness for this approach.
      2. As a team, discuss the merits of these strategies in your organization and identify potential initiatives. Depending on what you already have in place, the project may be to evaluate options (e.g. if you have not already initiated zero trust, assign a project to evaluate your options and readiness).

      Input

      • An understanding of your existing security practices and backup strategy.

      Output

      • Broader initiatives to improve ransomware readiness.

      Materials

      • Whiteboard or flip chart (or a shared screen if staff are remote)

      Participants

      • Security Incident Response Team (SIRT)

      Implement core elements of an effective security program

      There is no silver bullet. Ransomware readiness depends on foundational security best practices. Where budget allows, support that foundation with more advanced AI-based tools that identify abnormal behavior to detect an attack in progress.

      Leverage the following blueprints to implement the foundational elements of an effective security program:

      • Build an Information Security Strategy: Consider the full spectrum of information security, including people, processes, and technologies. Then base your security strategy on the risks facing your organization – not just on best practices – to ensure alignment with business goals and requirements.
      • Develop a Security Operations Strategy: Establish unified security operations that actively monitor security events and threat information, and turn that into appropriate security prevention, detection, analysis, and response processes.
      • Develop and Deploy Security Policies: Improve cybersecurity through effective policies, from acceptable use policies aimed at your end users to system configuration management policies aimed at your IT operations.

      Supplement foundational best practices with AI-based tools to counteract more sophisticated security attacks:

      • The evolution of ransomware gangs and ransomware as a service means the most sophisticated tools designed to bypass perimeter security and endpoint protection are available to a growing number of hackers.
      • Rather than activate the ransomware virus immediately, attackers will traverse the network using legitimate commands to infect as many systems as possible and exfiltrate data without generating alerts, then finally encrypt infected systems.
      • AI-based tools learn what is normal behavior and therefore can recognize unusual traffic (which could be an attack in progress) before it's too late. For example, a "user" accessing a server they've never accessed before.
      • Engage an Info-Tech analyst or consult SoftwareReviews to review products that will add this extra layer of AI-based security.

      Update your backup strategy to account for ransomware attacks

      Apply a defense-in-depth strategy. A daily disk backup that goes offsite once a week isn't good enough.

      In addition to applying your existing security practices to your backup solution (e.g. anti-malware, restricted access), consider:

      • Creating multiple restore points. Your most recent backup might be infected. Frequent backups allow you to be more granular when determining how far you need to roll back.
      • Having offsite backups and using different storage media. Reduce the risk of infected backups by using different storage media (e.g. disk, NAS, tape) and backup locations (e.g. offsite). If you can make the attackers jump through more hoops, you have a greater chance of detecting the attack before all backups are infected.
      • Investing in immutable backups. Most leading backup solutions offer options to ensure backups are immutable (cannot be altered after they are written).
      • Using the BIA you completed in Phase 2 to help decide where to prioritize investments. All the above strategies add to your backup costs and might not be feasible for all data. Use your BIA results to decide which data sets require higher levels of protection.

      This example strategy combines multiple restore points, offsite backup, different storage media, and immutable backups.

      This is an example of a backup strategy to account for ransomware attacks.

      Refer to Info-Tech's Establish an Effective Data Protection Plan blueprint for additional guidance.

      Explore zero-trust initiatives

      Zero trust is a set of principles, not a set of controls.

      Reduces reliance on perimeter security.

      Zero trust is a strategy that reduces reliance on perimeter security and moves controls to where your user accesses resources. It often consolidates security solutions, reduces operating costs, and enables business mobility.

      Zero trust must benefit the business first.

      IT security needs to determine how zero trust initiatives will affect core business processes. It's not a one-size-fits-all approach to IT security. Zero trust is the goal – but some organizations can only get so close to that ideal.

      For more information, see Build a Zero-Trust Roadmap.

      Info-Tech Insight

      A successful zero-trust strategy should evolve. Use an iterative and repeatable process to assess available zero-trust technologies and principles and secure the most relevant protect surfaces. Collaborate with stakeholders to develop a roadmap with targeted solutions and enforceable policies.

      Step 4.2

      Prioritize resilience initiatives

      Activities

      • 4.2.1 Prioritize initiatives based on factors such as effort, cost, and risk
      • 4.2.2 Review the dashboard to fine tune your roadmap

      This step will guide you through the following activities:

      • Prioritizing initiatives based on factors such as effort, cost, and risk.
      • Reviewing the dashboard to fine-tune your roadmap.

      This step involves the following participants:

      • Security Incident Response Team (SIRT)

      Outcomes of this step

      • An executive-friendly project roadmap dashboard summarizing your initiatives.
      • A visual representation of the priority, effort, and timeline required for suggested initiatives.

      Review the Ransomware Resilience Assessment

      Tabs 2 and 3 list initiatives relevant to your ransomware readiness improvement efforts.

      • At this point in the project, the Ransomware Resilience Assessment should contain a number of initiatives to improve ransomware resilience.
      • Tab 2 is prepopulated with examples of gap closure actions to consider, which are categorized into initiatives listed on Tab 3.
      • Follow the instructions in the Ransomware Resilience Assessment to:
        • Categorize gap control actions into initiatives.
        • Prioritize initiatives based on cost, effort, and benefit.
        • Construct a roadmap for consideration.

      Download the Ransomware Resilience Assessment

      4.2.1 Prioritize initiatives based on factors such as effort, cost, and risk

      1 hour

      Prioritize initiatives in the Ransomware Resilience Assessment.

      1. The initiatives listed on Tab 3 Initiative List will be copied automatically on Tab 5 Prioritization.
      2. On Tab 1 Setup:
        1. Review the weight you want to assign to the cost and effort criteria.
        2. Update the default values for FTE and Roadmap Start as needed.
      3. Go back to Tab 5 Prioritization:
        1. Fill in the cost, effort, and benefit evaluation criteria for each initiative. Hide optional columns you don't plan to use, to avoid confusion.
        2. Use the cost and benefit scores to prioritize waves and schedule initiatives on Tab 6 Gantt Chart.

      Input

      • Gaps and initiatives identified in Step 4.1

      Output

      • Project roadmap dashboard

      Materials

      • Ransomware Resilience Assessment

      Participants

      • Security Incident Response Team (SIRT)

      4.2.2 Review the dashboard to fine-tune the roadmap

      1 hour

      Review and update the roadmap dashboard in your Ransomware Resilience Assessment.

      1. Review the Gantt chart to ensure:
        1. The timeline is realistic. Avoid scheduling many high-effort projects at the same time.
        2. Higher-priority items are scheduled sooner than low-priority items.
        3. Short-term projects include quick wins (e.g. high-priority, low-effort items).
        4. It supports the story you wish to communicate (e.g. a plan to address gaps, along with the required effort and timeline).
      2. Update the values on the 5 Prioritization and 6 Gantt Chart tabs based on your review.

      Input

      • Gaps and initiatives identified in Step 4.1

      Output

      • Project roadmap dashboard

      Materials

      • Ransomware Resilience Assessment

      Participants

      • Security Incident Response Team (SIRT)

      This is an image of a sample roadmap for the years 2022-2023

      Step 4.3

      Measure resilience metrics

      Activities

      4.3.1 Summarize status and next steps in an executive presentation

      This step will guide you through the following activities:

      • Summarizing status and next steps in an executive presentation.

      This step involves the following participants:

      • Security Incident Response Team (SIRT)

      Outcomes of this step

      • Gain stakeholder buy-in by communicating the risk of the status quo and achievable next steps to improve your organization's ransomware readiness.

      Improve ransomware resilience

      4.3.1 Summarize status and next steps in an executive presentation

      1 hour

      Gain stakeholder buy-in by communicating the risk of the status quo and recommendations to reduce that risk. Specifically, capture and present the following from this blueprint:

      • Phase 1: Maturity assessment results, indicating your organization's overall readiness as well as specific areas that need to improve.
      • Phase 2: Business impact results, which objectively quantify the potential impact of downtime and data loss.
      • Phase 3: Current incident response capabilities including steps, timeline, and gaps.
      • Phase 4: Recommended projects to close specific gaps and improve overall ransomware readiness.

      Overall key findings and next steps.

      Download the Ransomware Readiness Summary Presentation Template

      Input

      • Results of all activities in Phases 1-4

      Output

      • Executive presentation

      Materials

      • Ransomware Readiness Summary Presentation Template

      Participants

      • Security Incident Response Team (SIRT)

      This is a screenshot of level 2 of the ransomware readiness maturity tool.

      Revisit metrics

      Ransomware resilience metrics track your ability to disrupt a ransomware attack at each stage of its workflow.

      Revisit metrics as the project nears completion and compare them against your baseline to measure progress.

      Attack workflow Process Metric Target trend Current Goal
      GET IN Vulnerability Management % Critical patches applied Higher is better
      Vulnerability Management # of external exposures Fewer is better
      Security Awareness Training % of users tested for phishing Higher is better
      SPREAD Identity and Access Management Adm accounts / 1000 users Lower is better
      Identity and Access Management % of users enrolled for MFA Higher is better
      Security Incident Management Avg time to detect Lower is better
      PROFIT Security Incident Management Avg time to resolve Lower is better
      Backup and Disaster Recovery % critical assets with recovery test Higher is better
      Backup and Disaster Recovery % backup to immutable storage Higher is better

      Summary of accomplishments

      Project overview

      Project deliverables

      This blueprint helped you create a ransomware incident response plan for your organization, as well as identify ransomware prevention strategies and ransomware prevention best practices.

      • Ransomware Resilience Assessment: Measure your current readiness, then identify people, policy, and technology gaps to address.
      • Ransomware Response Workflow: An at-a-glance summary of the key incident response steps across all relevant stakeholders through each phase of incident management.
      • Ransomware Response Runbook: Includes your threat escalation protocol and detailed response steps to be executed by each stakeholder.
      • Ransomware Tabletop Planning : This deep dive into a ransomware scenario will help you develop a more accurate incident management workflow and runbook, as well as identify gaps to address.
      • Ransomware Project Roadmap: This prioritized list of initiatives will address specific gaps and improve overall ransomware readiness.
      • Ransomware Readiness Summary Presentation: Your executive presentation will communicate the risk of the status quo, present recommended next steps, and drive stakeholder buy-in.

      Project phases

      Phase 1: Assess ransomware resilience

      Phase 2: Protect and detect

      Phase 3: Respond and recover

      Phase 4: Improve ransomware resilience

      Related Info-Tech Research

      Tab 3. Initiative List in the Ransomware Resilience Assessment identifies relevant Info-Tech Research to support common ransomware resilience initiatives.

      Related security blueprints:

      Related disaster recovery blueprints:

      Research Contributors and Experts

      This is an image of Jimmy Tom

      Jimmy Tom
      AVP of Information Technology and Infrastructure
      Financial Horizons

      This is an image of Dan Reisig

      Dan Reisig
      Vice President of Technology
      UV&S

      This is an image of Samuel Sutto

      Samuel Sutton
      Computer Scientist (Retired)
      FBI

      This is an image of Ali Dehghantanha

      Ali Dehghantanha
      Canada Research Chair in Cybersecurity and Threat Intelligence,
      University of Guelph

      This is an image of Gary Rietz

      Gary Rietz
      CIO
      Blommer Chocolate Company

      This is an image of Mark Roman

      Mark Roman
      CIO
      Simon Fraser University

      This is an image of Derrick Whalen

      Derrick Whalen
      Director, IT Services
      Halifax Port Authority

      This is an image of Stuart Gaslonde

      Stuart Gaslonde
      Director of IT & Digital Services
      Falmouth-Exeter Plus

      This is an image of Deborah Curtis

      Deborah Curtis
      CISO
      Placer County

      This is an image of Deuce Sapp

      Deuce Sapp
      VP of IT
      ISCO Industries

      This is an image of Trevor Ward

      Trevor Ward
      Information Security Assurance Manager
      Falmouth-Exeter Plus

      This is an image of Brian Murphy

      Brian Murphy
      IT Manager
      Placer County

      This is an image of Arturo Montalvo

      Arturo Montalvo
      CISO
      Texas General Land Office and Veterans Land Board

      No Image Available

      Mduduzi Dlamini
      IT Systems Manager
      Eswatini Railway

      No Image Available

      Mike Hare
      System Administrator
      18th Circuit Florida Courts

      No Image Available

      Linda Barratt
      Director of Enterprise architecture, IT Security, and Data Analytics, Toronto Community Housing Corporation

      This is an image of Josh Lazar

      Josh Lazar
      CIO
      18th Circuit Florida Courts

      This is an image of Douglas Williamson

      Douglas Williamson
      Director of IT
      Jamaica Civil Aviation Authority

      This is an image of Ira Goldstein

      Ira Goldstein
      Chief Operating Officer
      Herjavec Group

      This is an image of Celine Gravelines

      Celine Gravelines
      Senior Cybersecurity Analyst
      Encryptics

      This is an image of Dan Mathieson

      Dan Mathieson
      Mayor
      City of Stratford

      This is an image of Jacopo Fumagalli

      Jacopo Fumagalli
      CISO
      Omya

      This is an image of Matthew Parker

      Matthew Parker
      Program Manager
      Utah Transit Authority

      Two Additional Anonymous Contributors

      Bibliography

      2019-Data-Breach-Investigations-Report.-Verizon,-May-2019.
      2019-Midyear-Security-Roundup:-Evasive-Threats,-Persistent-Effects.-Trend-Micro,-2019.
      Abrams,-Lawrence.-"Ryuk-Ransomware-Uses-Wake-on-Lan-to-Encrypt-Offline-Devices."-Bleeping-Computer,-14-Jan.-2020.
      Abrams,-Lawrence.-"Sodinokibi-Ransomware-Publishes-Stolen-Data-for-the-First-Time."-Bleeping-Computer,-11-Jan.-2020.
      Canadian-Center-for-Cyber-Security,-"Ransomware-Playbook,"-30-November-2021.-Accessed-21-May-2022.-
      Carnegie-Endowment-for-International-Peace.-"Ransomware:-Prevention-and-Protection."-Accessed-May-2022.-
      Cawthra,-Jennifer,-Michael-Ekstrom,-Lauren-Lusty,-Julian-Sexton,-John-Sweetnam.-Special-Publication-1800-26-Data-Integrity:-Detecting-and-Responding-to-Ransomware-and-Other-Destructive-Events.-NIST,-Jan.-2020.
      Cawthra,-Jennifer,-Michael-Ekstrom,-Lauren-Lusty,-Julian-Sexton,-John-Sweetnam.-Special-Publication-1800-25-Data-Integrity:-Identifying-and-Protecting-Assets-Against-Ransomware-and-Other-Destructive-Events.-NIST,-Jan.-2020.-
      Cichonski,-P.,-T.-Millar,-T.-Grance,-and-K.-Scarfone.-"Computer-Security-Incident-Handling-Guide."-SP-800-61-Rev.-2.-NIST,-Aug.-2012.
      Cimpanu,-Catalin.-"Company-shuts-down-because-of-ransomware,-leaves-300-without-jobs-just-before-holidays."-ZDNet,-3-Jan.-2020.
      Cimpanu,-Catalin.-"Ransomware-attack-hits-major-US-data-center-provider."-ZDNet,-5-Dec.-2019.
      CISA,-"Stop-Ransomware,"-Accessed-12-May-2022.
      "CMMI-Levels-of-Capability-and-Performance."-CMMI-Institute.-Accessed-May-2022.-
      Connolly,-Lena-Yuryna,-"An-empirical-study-of-ransomware-attacks-on-organizations:-an-assessment-of-severity-and-salient-factors-affecting-vulnerability."-Journal-of-Cybersecurity,-2020,.-1-18.
      "Definitions:-Backup-vs.-Disaster-Recovery-vs.-High-Availability."-CVM-IT-&-Cloud-Services,-12-Jan.-2017.
      "Don't-Become-a-Ransomware-Target-–-Secure-Your-RDP-Access-Responsibly."-Coveware,-2019.-
      Elementus,-"Rise-of-the-Ransomware-Cartels-"(2022).-YouTube.-Accessed-May-2022.-
      Global-Security-Attitude-Survey.-CrowdStrike,-2019.
      Graham,-Andrew.-"September-Cyberattack-cost-Woodstock-nearly-$670,00:-report."-
      Global-News,-10-Dec.-2019.
      Harris,-K.-"California-2016-Data-Breach-Report."-California-Department-of-Justice,-Feb.-2016.
      Hiscox-Cyber-Readiness-Report-2019.-Hiscox-UK,-2019.
      Cost-of-A-Data-Breach-(2022).-IBM.-Accessed-June-2022.--
      Ikeda,-Scott.-"LifeLabs-Data-Breach,-the-Largest-Ever-in-Canada,-May-Cost-the-Company-Over-$1-Billion-in-Class-Action-Lawsuit."-CPO-Magazine,-2020.
      Kessem,-Limor-and-Mitch-Mayne.-"Definitive-Guide-to-Ransomware."-IBM,-May-2022.
      Krebs,-Brian.-"Ransomware-Gangs-Now-Outing-Victim-Businesses-That-Don't-Pay-Up."-Krebson-Security,-16-Dec.-2019.
      Jaquith,-Andrew-and-Barnaby-Clarke,-"Security-metrics-to-help-protect-against-ransomware."-Panaseer,-July-29,-2021,-Accessed-3-June-2022.
      "LifeLabs-pays-ransom-after-cyberattack-exposes-information-of-15-million-customers-in-B.C.-and-Ontario."-CBC-News,-17-Dec.-2019.
      Matthews,-Lee.-"Louisiana-Suffers-Another-Major-Ransomware-Attack."-Forbes,-20-Nov.-2019.
      NISTIR-8374,-"Ransomware-Risk-Management:-A-Cybersecurity-Framework-Profile."-NIST-Computer-Security-Resource-Center.-February-2022.-Accessed-May-2022.-
      "Ransomware-attack-hits-school-district-twice-in-4-months."-Associated-Press,-10-Sept.-2019.
      "Ransomware-Costs-Double-in-Q4-as-Ryuk,-Sodinokibi-Proliferate."-Coveware,-2019.
      Ransomware-Payments-Rise-as-Public-Sector-is-Targeted,-New-Variants-Enter-the-Market."-Coveware,-2019.
      Rector,-Kevin.-"Baltimore-to-purchase-$20M-in-cyber-insurance-as-it-pays-off-contractors-who-helped-city-recover-from-ransomware."-The-Baltimore-Sun,-16-Oct.-2019.
      "Report:-Average-time-to-detect-and-contain-a-breach-is-287-days."-VentureBeat,-May-25,-2022.-Accessed-June-2022.-
      "Five-Lessons-Learned-from-over-600-Ransomware-Attacks."-Riskrecon.-Mar-2022.-Accessed-May-2022.-
      Rosenberg,-Matthew,-Nicole-Perlroth,-and-David-E.-Sanger.-"-'Chaos-is-the-Point':-Russian-Hackers-and-Trolls-Grow-Stealthier-in-2020."-The-New-York-Times,-10-Jan.-2020.
      Rouse,-Margaret.-"Data-Archiving."-TechTarget,-2018.
      Siegel,-Rachel.-"Florida-city-will-pay-hackers-$600,000-to-get-its-computer-systems-back."-The-Washington-Post,-20-June-2019.
      Sheridan,-Kelly.-"Global-Dwell-Time-Drops-as-Ransomware-Attacks-Accelerate."-DarkReading,-13-April-2021.-Accessed-May-2022.-
      Smith,-Elliot.-"British-Banks-hit-by-hacking-of-foreign-exchange-firm-Travelex."-CNBC,-9-Jan.-2020.
      "The-State-of-Ransomware-2022."-Sophos.-Feb-2022.-Accessed-May-2022.-
      "The-State-of-Ransomware-in-the-U.S.:-2019-Report-for-Q1-to-Q3."-Emsisoft-Malware-Lab,-1-Oct.2019.
      "The-State-of-Ransomware-in-the-U.S.:-Report-and-Statistics-2019."-Emsisoft-Lab,-12-Dec.-2019.
      "The-State-of-Ransomware-in-2020."-Black-Fog,-Dec.-2020.
      Toulas,-Bill.-"Ten-notorious-ransomware-strains-put-to-the-encryption-speed-test."-Bleeping-Computers,-23-Mar-2022.-Accessed-May-2022.
      Tung,-Liam-"This-is-how-long-hackers-will-hide-in-your-network-before-deploying-ransomware-or-being-spotted."-zdnet.-May-19,-2021.-Accessed-June-2022.-

      Debunk Machine Learning Endpoint Security Solutions

      • Buy Link or Shortcode: {j2store}168|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Endpoint Security
      • Parent Category Link: /endpoint-security
      • Threat actors are more innovative than ever before and developing sophisticated methods of endpoints attacks capable of avoiding detection with traditional legacy anti-virus software.
      • Legacy anti-virus solutions rely on signatures and hence fail at detecting memory objects, and new and mutating malware.
      • Combined with the cybersecurity talent gap and the sheer volume of endpoint attacks, organizations need endpoint security solutions capable of efficiently and accurately blocking never-before-seen malware types and variants.

      Our Advice

      Critical Insight

      • Don’t make machine learning a goal in itself. Think of how machine learning can help you achieve your goals.
      • Determine your endpoint security requirements and goals prior to shopping around for a vendor. Vendors can easily suck you into a vortex of marketing jargon and sell you tools that your organization does not need.
      • Machine learning alone is not a solution to catching malware. It is a computational method that can generalize and analyze large datasets, and output insights quicker than a human security analyst.

      Impact and Result

      • Consider deploying an endpoint protection technology that leverages machine learning into your existing endpoint security strategy to counteract against the unknown and to quickly sift through the large volumes of data.
      • Understand how machine learning methods can help drive your organization’s security goals.
      • Identify vendors that utilize machine learning in their endpoint security products.
      • Understand use cases of where machine learning in endpoint security has been successful.

      Debunk Machine Learning Endpoint Security Solutions Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you should consider machine learning in endpoint security solutions, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Demystify machine learning concepts

      Understand basic machine learning concepts used in endpoint security.

      • Debunk Machine Learning Endpoint Security Solutions – Phase 1: Demystify Machine Learning Concepts

      2. Evaluate vendors that leverage machine learning

      Determine feature requirements to evaluate vendors.

      • Debunk Machine Learning Endpoint Security Solutions – Phase 2: Evaluate Vendors That Leverage Machine Learning
      • Endpoint Protection Request for Proposal
      [infographic]

      Apply Design Thinking to Build Empathy With the Business

      • Buy Link or Shortcode: {j2store}89|cart{/j2store}
      • member rating overall impact: 8.5/10 Overall Impact
      • member rating average dollars saved: $20,772 Average $ Saved
      • member rating average days saved: 13 Average Days Saved
      • Parent Category Name: Innovation
      • Parent Category Link: /innovation
      • Business satisfaction with IT is low.
      • IT and the business have independently evolving strategy, initiatives, and objectives.
      • IT often exceeds their predicted project costs and has difficulty meeting the business’ expectations of project quality and time-to-market.

      Our Advice

      Critical Insight

      • Business needs are unclear or ambiguous.
      • IT and the business do not know how to leverage each other’s talent and resources to meet their common goals.
      • Not enough steps are taken to fully understand and validate problems.
      • IT can’t pivot fast enough when the business’s needs change.

      Impact and Result

      Product, service, and process design should always start with an intimate understanding of what the business is trying to accomplish and why it is important.

      Apply Design Thinking to Build Empathy With the Business Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you should apply experience design to partner with the business, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Research

      Identify goals and objectives for experience design, establish targeted stakeholders, and conduct discovery interviews.

      • Apply Design Thinking to Build Empathy With the Business – Phase 1: Research
      • Stakeholder Discovery Interview Template

      2. Map and iterate

      Create the journey map, design a research study to validate your hypotheses, and iterate and ideate around a refined, data-driven understanding of stakeholder problems.

      • Apply Design Thinking to Build Empathy With the Business – Phase 2: Map and Iterate
      • Journey Map Template
      • Research Study Log Tool
      [infographic]

      Workshop: Apply Design Thinking to Build Empathy With the Business

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Introduction to Journey Mapping

      The Purpose

      Understand the method and purpose of journey mapping.

      Key Benefits Achieved

      Initial understanding of the journey mapping process and the concept of end-user empathy.

      Activities

      1.1 Introduce team and discuss workshop motivations and goals.

      1.2 Discuss overview of journey mapping process.

      1.3 Perform journey mapping case study activity.

      Outputs

      Case Study Deliverables – Journey Map and Empathy Maps

      2 Persona Creation

      The Purpose

      Begin to understand the goals and motivations of your stakeholders using customer segmentation and an empathy mapping exercise.

      Key Benefits Achieved

      Understand the demographic and psychographic factors driving stakeholder behavior.

      Activities

      2.1 Discuss psychographic stakeholder segmentation.

      2.2 Create empathy maps for four segments.

      2.3 Generate problem statements.

      2.4 Identify target market.

      Outputs

      Stakeholder personas

      Target market of IT

      3 Interview Stakeholders and Start a Journey Map

      The Purpose

      Get first-hand knowledge of stakeholder needs and start to capture their perspective with a first-iteration journey map.

      Key Benefits Achieved

      Capture the process stakeholders use to solve problems and empathize with their perspectives, pains, and gains.

      Activities

      3.1 Review discovery interviewing techniques.

      3.2 Review and modify the discovery questionnaire

      3.3 Demonstrate stakeholder interview.

      3.4 Synthesize learnings and begin creating a journey map.

      Outputs

      Customized discovery interview template

      Results of discovery interviewing

      4 Complete the Journey Map and Create a Research Study

      The Purpose

      Hypothesize the stakeholder journey, identify assumptions, plan a research study to validate your understanding, and ideate around critical junctures in the journey.

      Key Benefits Achieved

      Understand the stakeholder journey and ideate solutions with the intention of improving their experience with IT.

      Activities

      4.1 Finish the journey map.

      4.2 Identify assumptions and create hypotheses.

      4.3 Discuss field research and hypothesis testing.

      4.4 Design the research study.

      4.5 Discuss concluding remarks and next steps.

      Outputs

      Completed journey map for one IT process, product, or service

      Research study design and action plan

      Evaluate and Learn From Your Negotiation Sessions More Effectively

      • Buy Link or Shortcode: {j2store}226|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Vendor Management
      • Parent Category Link: /vendor-management
      • Forty-eight percent of CIOs believe their budgets are inadequate.
      • CIOs and IT departments are getting more involved with negotiations to reduce costs and risk.
      • Confident negotiators tend to be more successful, but even confident negotiators have room to improve.
      • Skilled negotiators are in short supply.

      Our Advice

      Critical Insight

      • Improving your negotiation skills requires more than practice or experience (i.e. repeatedly negotiating).
      • Creating and updating a negotiations lessons-learned library helps negotiators improve and provides a substantial return for the organization.
      • Failure is a great teacher; so is success … but you have to pay attention to indicators, not just results.

      Impact and Result

      Addressing and managing the negotiation debriefing process will help you:

      • Improve negotiation skills.
      • Implement your negotiation strategy more effectively.
      • Improve negotiation results.

      Evaluate and Learn From Your Negotiation Sessions More Effectively Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you should create and follow a scalable process for preparing to negotiate with vendors, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Negotiations continuing

      This phase will help you debrief after each negotiation session and identify the parts of your strategy that must be modified before your next negotiation session.

      • Evaluate and Learn From Your Negotiation Sessions More Effectively – Phase 1: Negotiations Continuing

      2. Negotiations completed

      This phase will help you conduct evaluations at three critical points after the negotiations have concluded.

      • Evaluate and Learn From Your Negotiation Sessions More Effectively – Phase 2: Negotiations Completed
      [infographic]

      Workshop: Evaluate and Learn From Your Negotiation Sessions More Effectively

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 12 Steps to Better Negotiation Preparation

      The Purpose

      Improve negotiation skills and outcomes; share lessons learned.

      Understand the value of debriefing sessions during the negotiation process.

      Understand how to use the Info-Tech After Negotiations Tool.

      Key Benefits Achieved

      A better understanding of how and when to debrief during the negotiation process to leverage key insights.

      The After Negotiations Tool will be reviewed and configured for the customer’s environment (as applicable).

      Activities

      1.1 Debrief after each negotiation session

      1.2 Determine next steps

      1.3 Return to preparation phase

      1.4 Conduct Post Mortem #1

      1.5 Conduct Implementation Assessment

      1.6 Conduct Post Mortem #2

      Outputs

      Negotiation Session Debrief Checklist and Questionnaire

      Next Steps Checklist

      Discussion

      Post Mortem #1 Checklist & Dashboard

      Implementation Assessment Checklist and Questionnaire

      Post Mortem #2 Checklist & Dashboard

      Dive Into Five Years of Security Strategies

      • Buy Link or Shortcode: {j2store}247|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Security Strategy & Budgeting
      • Parent Category Link: /security-strategy-and-budgeting
      • As organizations build their security programs, there is often the question of what are other companies doing.
      • Part of this is a desire to know whether challenges are unique to certain companies, but also to understand how people are tackling some of their security gaps.

      Our Advice

      Critical Insight

      Don’t just wonder what others are doing – use this report to see how companies are faring in their current state, where they want to target in their future state, and the ways they’re planning to raise their security posture.

      Impact and Result

      • Whether you’re building out your security program for the first time or are just interested in how others are faring, review insights from 66 security strategies in this report.
      • This research complements the blueprint, Build an Information Security Program, and can be used as a guide while completing that project.

      Dive Into Five Years of Security Strategies Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Start here – read the Executive Brief

      Read our concise Executive Brief to find out what this report contains.

      [infographic]

      Embrace the Inevitability of Multicloud

      • Buy Link or Shortcode: {j2store}115|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Strategy and Organizational Design
      • Parent Category Link: /strategy-and-organizational-design

      It used to be easy: pick your cloud, build out your IT footprint, and get back to business. But the explosion of cloud adoption has also led to an explosion of options for cloud providers, platforms, and deployment options. And that’s just when talking about infrastructure as a service!

      Our Advice

      Critical Insight

      • Multicloud isn’t good or bad; it’s inevitable.
      • Embracing multicloud in your organization is an opportunity to gain control while enabling choice. Although it increases complexity for both IT operations and governance, with the right tools and principles in place you can reduce the IT burden and increase business agility at the same time.

      Impact and Result

      • Understand what multicloud is, what it isn’t, and why you need to accept it in your organization.
      • Keep your cloud strategy but adapt your approach and tools.
      • Leverage best practices and principles that will help you keep control of the volatility and complexity that comes with multicloud.

      Embrace the Inevitability of Multicloud Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Embrace the Inevitability of Multicloud Storyboard – A deck that helps you implement best practices for your multicloud strategy.

      Use this research to understand the risks and benefits that come with a multicloud posture.

      • Embrace the Inevitability of Multicloud Storyboard

      Infographic

      Further reading

      Embrace the Inevitability of Multicloud

      The heterogeneous ecosystem is worth it; you just need a cohesive strategy.

      Executive summary

      Your Challenge

      Common Obstacles

      Info-Tech’s Approach

      It used to be easy: pick your cloud, build out your IT footprint, and get back to business. But the explosion of cloud adoption has also led to an explosion of options for cloud providers, platforms, and deployment. And that’s just when talking about infrastructure as a service!

      For many businesses, one of the key benefits of the cloud ecosystem is enabling choice for different users, groups, and projects in the organization. But this means embracing multiple cloud platforms. Is it worth it?

      The reality is that multicloud is inevitable for most organizations, and if it’s not yet a reality for your IT team, it soon will be. This brings new challenges:

      1. How do I decide what platforms and offerings to use where? Is my old cloud strategy obsolete?
      2. How do I identify what I want out of multicloud, and what tools and best practices need to be in place to keep control?

      By defining your end goals, framing solutions based on the type of visibility and features your multicloud footprint needs to deliver, you can enable choice and improve performance, flexibility, and availability.

      1. Understand what multicloud is, what it isn’t, and why you need to accept it in your organization.
      2. Keep your cloud strategy but adapt your approach and tools.
      3. Leverage best practices and principles that will help you keep control of the volatility and complexity that comes with multicloud.

      Info-Tech Insight

      Embracing multicloud in your organization is an opportunity to gain control while enabling choice. Although it increases complexity for both IT operations and governance, with the right tools and principles in place you can reduce the IT burden and increase business agility at the same time.

      Project overview

      Multicloud isn’t good or bad; it’s inevitable

      The reality is multicloud is usually not a choice. For most organizations, the requirement to integrate with partners, subsidiaries, and parent organizations, as well as the need to access key applications in the software-as-a-service ecosystem, means that going multicloud is a matter of when, not if.

      The real question most businesses should ask is not whether to go multicloud, but rather how to land in multicloud with intent and use it to their best advantage.

      Your workloads will guide the way

      One piece of good news is that multicloud doesn’t change the basic principles of a good cloud strategy. In fact, a well-laid-out multicloud approach can make it even easier to put the right workloads in the right place – and then even move them around as needed.

      This flexibility isn’t entirely free, though. It’s important to know how and when to apply this type of portability and balance its benefits against the cost and complexity that come with it.

      Don’t fall in reactively; land on your feet

      Despite the risks that come with the increased scale and complexity of multicloud, it is possible to maintain control, realize the benefits, and even use multicloud as a springboard for leveraging cloud benefits in your business. By adopting best practices and forethought in key areas of multicloud risk, you can hit the ground running.

      Aligning the terms

      Modern organizations have multiple IT footprints. How do we classify different stances?

      01 Hybrid Cloud
      Private cloud and public cloud infrastructure managed as one entity

      02 Multicloud
      Includes multiple distinct public cloud services, or “footprints”

      03 Hybrid IT
      Putting the right workloads in the right places with an overall management framework

      Info-Tech Insight

      • Hybrid cloud is about applying the same service model across multiple deployment models (most commonly public and private clouds).
      • Multicloud is about using multiple cloud offerings irrespective of differences in service model or deployment model.

      Multicloud

      • An approach that includes multiple distinct public cloud services (e.g. AWS EC2 but also Salesforce and M365)
      • Usually defined around a steady state for each workload and footprint
      • Everything in its right place (with portability for events and disasters)
      • NOT everything everywhere all at once
      The image contains the Info-Tech thought model for multicloud.

      Multicloud is inevitable

      The SaaS ecosystem has led organizations to encourage business units to exercise the IT choices that are best for them.

      The multicloud maturity journey

      1. Move a workload to the cloud
      2. Move more workloads to the same cloud
      3. Move the right workloads to the right clouds
      4. Hybrid cloud & multicloud
      5. Integrate cloud and traditional/ on-premises footprints

      Hybrid IT: Aggregate Management, Monitoring, Optimization, Continuous Improvement

      Multicloud is about enabling choice while maintaining oversight

      The broader your footprint, the harder it becomes to manage risks across each environment.

      The image contains a screenshot of a diagram of maintaining oversight with multicloud.

      Managing multicloud risks

      The risks in multicloud are the same as in traditional cloud but amplified by the differences across footprints and providers in your ecosystem.

      • Variations across platforms include:
        • Rules
        • Security
        • Mapping corresponding products and services
      • Training and certifications by platform/provider
      • Managing cost across footprints
      • Complexity of integration
      • Managing compliance across platforms
      • Loss of standardization due to multicloud fragmentation

      Info-Tech Insight

      Don’t be afraid to ask for help! Each cloud platform you adopt in your multicloud posture requires training, knowledge, and execution. If you’re already leveraging an ecosystem of cloud providers, leverage the ecosystem of cloud enablers as needed to help you on your way.

      Despite the risks, multicloud is a springboard

      Increasing flexibility & accelerating integration

      Because multicloud increases the number of platforms and environments available to us, we can
      use it as a way to increase our agility (from both a DevOps and a resource deployment perspective) as well as to provide an answer to the problem of vendor lock-in.

      Multicloud also can be a catalyst for integrating and stitching together resources and services that were previously isolated from each other. Because of the modular design and API architecture prevalent in cloud services, they can be easily consumed and integrated from your various footprints.

      Modernizing data strategy

      While it may seem counterintuitive, a proactive multicloud approach will allow you to regain visibility and control of your entire data ecosystem. Defining your data architecture and policies with an eye to the inevitability of multicloud means you can go beyond just regaining control of data stranded in SaaS and other platforms; you can start to really understand the flows of data and how they affect your business processes for better or worse.

      Move to cloud-native IT & design

      Embracing multicloud is also a great opportunity to embrace the refactoring and digital transformation you’ve been blocked on. Instead of treading water with respect to keeping control of fragmented applications, services, and workloads, a proactive approach to multicloud allows you to embrace open standards built to deliver cloud-native power and portability and to build automations that increase reliability, performance, and cost effectiveness while reducing your total in-house work burden.

      Info-Tech Insight

      Don’t bite off more than you can chew! Especially with IaaS and PaaS services, it’s important to ensure you have the skills and bandwidth to manage and deploy services effectively. It’s better to start with one IaaS platform, master it, and then expand.

      Let your workloads guide the way

      Multicloud is a road to best-of-breed everything


      A screenshot of multiclouds.

      Stick with a workload-level approach

      The principles of cloud strategy don’t change with multicloud! The image contains a screenshot of a workload-level approach.
      If anything, a multicloud approach increases your ability to put the right workloads in the right places, wherever that may be.
      It can also (with some work and tooling) provide even broader options for portability and resilience.

      Multicloud = multiple right places

      Put everything in its right place.

      Just like with any cloud strategy, start with a workload-level approach and figure out the right migration path and landing point for your workload in cloud.

      Understand the other right places!

      Multicloud means for many workloads, especially IaaS- and PaaS-focused ones, you will have multiple footprints you can use for secondary locations as desired for portability, resilience, and high availability (with the right tooling and design).

      Info-Tech Insight

      Portability is always a matter of balancing increased flexibility, availability, and resilience against increased complexity, maintenance effort, and cost. Make sure to understand the requirement for your workloads and apply portability efforts where they make the most sense

      Your management will need to evolve

      Don’t manage multicloud with off-the-rack tools.

      The default dashboards and management tools from most cloud vendors are a great starting point when managing a single cloud. Unfortunately, most of these tools do not extend well to other platforms, which can lead to multiple dashboards for multiple footprints.

      These ultimately lead to an inability to view your multicloud portfolio in aggregate and fragmentation of metrics and management practices across your various platforms. In such a situation maintaining compliance and control of IT can become difficult, if not impossible!

      Unified standards and tools that work across your entire cloud portfolio will help keep you on track, and the best way to realize these is by applying repeatable, open standards across your various environments and usually adopting new software and tools from the ecosystem of multicloud management software platforms available in the market.

      Info-Tech Insight

      Even in multicloud, don’t forget that the raw data available from the vendor’s default dashboards is a critical source of information for optimizing performance, efficiency, and costs.

      Multicloud management tool selection

      The ecosystem is heterogeneous.

      The explosion of cloud platforms and stacks means no single multicloud management tool can provide support for every stack in the private and public cloud ecosystem. This challenge becomes even greater when moving from IaaS/PaaS to addressing the near-infinite number of offerings available in the SaaS market.

      When it comes to selecting the right multicloud management tool, it’s important to keep a few things in mind:

      1. Mapping your requirements to the feature sets for your multicloud management platform is critical.
      2. Depending on your goals and metrics, and the underlying platforms and data you need to collect from them, you may need more than one tool.
      3. Especially when it comes to integrating SaaS into your multicloud tool(s), development or partners may be required.

      Key Features

      • Portability
      • Cost management
      • Automation across vendors
      • Standardization of configuration
      • Security alignment across vendors
      • Unified provisioning and self-service

      Info-Tech Insight

      SaaS always presents a unique challenge for gathering necessary cloud management data. It’s important to understand what data is and isn’t available and how it can be accessed and made available to your multicloud management tools.

      Understand your vendors

      Define what you are looking for as a first step.

      • To best understand your options, you need to understand the focus, features, and support services for each vendor. Depending on your requirements, you may need to adopt more than one tool.
      • Remember that SaaS presents unique challenges in terms of accessing and ingesting data into your management tools. This will generally require development to leverage the provider’s API.
      • Within the following slides, you will find a defined activity with a working template that will create a vendor profile for each vendor.

      As a working example, you can review these vendors on the following slides:

      • VMware CloudHealth
      • ServiceNow ITOM
      • CloudCheckr

      Info-Tech Insight

      Creating vendor profiles will help quickly identify the management tools that meet your multicloud needs.

      Vendor Profile #1

      VMware CloudHealth

      Vendor Summary

      CloudHealth is a VMware management suite that provides visibility into VMware-based as well as public cloud platforms. CloudHealth focuses on providing visibility to costs and governance as well as applying automation and standardization of configuration and performance across cloud platforms.

      URL: cloudhealth.vmware.com

      Supported Platforms

      Supports AWS, Azure, GCP, OCI, VMware

      Feature Sets

      • Portability
      • Cost management
      • Automation across platforms
      • Standardization of configuration
      • Security alignment across platforms
      • Unified provisioning and self-service

      Vendor Profile #2

      ServiceNow ITOM

      Vendor Summary

      ServiceNow IT Operations Management (ITOM) is a module for the ServiceNow platform that allows deep visibility and automated intervention/remediation for resources across multiple public and private cloud platforms. In addition to providing a platform for managing workload portability and costs across multiple cloud platforms, ServiceNow ITOM offers features focused on delivering “proactive digital operations with AIOps.”

      URL: servicenow.com/products/it-operations-management.html

      Supported Platforms

      Supports CloudFormation, ARM, GDM, and Terraform templates. Also provisions virtualized VMware environments.

      Feature Sets

      • Portability
      • Cost management
      • Automation across platforms
      • Standardization of configuration
      • Security alignment across platforms
      • Unified provisioning and self-service

      Vendor Profile #3

      CloudCheckr

      Vendor Summary

      CloudCheckr is a SaaS platform that provides end-to-end cloud management to control cost, ensure security, optimize resources, and enable services. Primarily focused on enabling management of public cloud services, CloudCheckr’s broad platform support and APIs can be used to deliver unified visibility across many multicloud postures.

      URL: cloudcheckr.com

      Supported Platforms

      Supports AWS, Azure, GCP, SAP Hana

      Feature Sets

      • Portability
      • Cost management
      • Automation across platforms
      • Standardization of configuration
      • Security alignment across platforms
      • Unified provisioning and self-service

      Activity

      Understand your vendor options

      This activity involves the following participants:

      • IT strategic direction decision makers
      • Cloud governance team
      • Cloud deployment team
      • Vendor and portfolio management

      Outcomes of this step:

      • Vendor profile template (ppt)

      Info-Tech Insight

      This checkpoint process creates transparency around agreement costs with the business and gives the business an opportunity to reevaluate its requirements for a potentially leaner agreement.

      Create your vendor profiles

      Define what you are looking for and score vendors accordingly.

      1. Create a vendor profile for every vendor of interest.
      2. Leverage our starting list and template to track and record the advantages of each vendor.

      Vendor Profile Template

      The image contains a screenshot of a Vendor Profile Template.

      Land on your feet

      Best practices to hit the ground running in multicloud

      Focus your multicloud posture on SaaS (to start)

      SaaS

      While every service model and deployment model has its place in multicloud, depending on the requirements of the workload and the business, most organizations end up in multicloud because of the wide ecosystem of options available at the SaaS level.

      Enabling the ability to adopt SaaS offerings into your multicloud footprint should be an area of focus for most IT organizations, as it’s the easiest way to deliver business impact (without taking on additional infrastructure work).

      IaaS and PaaS

      Although IaaS and PaaS also have their place in multicloud, the benefits are usually focused more on increased portability and availability rather than on enabling business-led IT.

      Additionally, multicloud at these levels can often be complex and/or costly to implement and maintain. Make sure you understand the cost-benefit for implementing multicloud at this level!

      Where the data sits matters

      With multiple SaaS workloads as well as IaaS and PaaS footprints, one of the biggest challenges to effective multicloud is understanding where any given data is, what needs access to it, and how to stitch it all together.

      In short, you need a strategy to understand how to collect and consolidate data from your multiple footprints.

      Relying solely on the built-in tools and dashboards provided by each provider inevitably leads to data fragmentation – disparate data sets that make it difficult to gain clear, unified visibility into your cloud’s data.

      To address the challenge of fragmented data, many organizations will require a multicloud-capable management platform that can provide access and visibility to data from all sources in a unified way.

      Weigh portability against nativeness

      When it comes to multicloud, cloud-native design is both your enemy and your friend. On one hand, it provides the ability to fully leverage the power and flexibility of your chosen platform to run your workload in the most on-demand, performance-efficient, utility-optimized way possible.

      But it’s important to remember that building cloud-native for one platform directly conflicts with that workload’s portability to other platforms! You need to understand the balance between portability and native effectiveness that works best for each of your workloads.

      Info-Tech Insight

      You can (sort of) have the best of both worlds! While the decision to focus on the cloud-native products, services, and functions from a given cloud platform must be weighed carefully, it’s still a good idea to leverage open standards and architectures for your workloads, as those won’t hamper your portability in the same way.

      Broaden your cost management approach

      Even on singular platforms, cloud cost management is no easy task. In multicloud, this is amplified by the increased scale and scope of providers, products, rates, and units of measure.

      There is no easy solution to this – ultimately the same accountabilities and tasks that apply to good cost management on one cloud also apply to multicloud, just at greater scale and impact.

      The image contains a screenshot of cost management approach.

      Info-Tech Insight

      Evolving your tooling applies to cost management too. While the vendor-provided tools and dashboards for cost control on any given cloud provider’s platform are a good start and a critical source for data, to get a proper holistic view you will usually require multicloud cost management software (and possibly some development work).

      Think about the sky between the clouds

      A key theme in cloud service pricing is “it’s free to come in, but it costs to leave.” This is a critical consideration when designing the inflows and outflows of data, interactions, transactions, and resources among workloads sitting on different platforms and different regions or footprints.

      When defining your multicloud posture, think about what needs to flow between your various clouds and make sure to understand how these flows will affect costs, performance, and throughput of your workloads and the business processes they support.

      • Integration and Interfaces
      • Business Process and Application Flows
      • Inter-cloud Transit Costs

      Mature your management technology

      Automation Is Your Friend

      Managing multicloud is a lot of work. It makes sense to eliminate the most burdensome and error-prone tasks. Automating these tasks also increases the ease and speed of workload portability in most cases.

      Automation and scheduling are also key enablers of standardization – which is critical to managing costs and other risks in multicloud. Create policies that manage and optimize costs, resource utilization, and asset configuration. Use these to reduce the management burden and risk profile.

      Evolve Your Tooling

      Effective multicloud management requires a clear picture of your entire cloud ecosystem across all footprints. This generally isn’t possible using the default tools for any given cloud vendor. Fortunately, there is a wide ecosystem of multicloud tools to help provide you with a unified view.

      The best cloud management tools will not only allow you to get a unified view of your IT operations regardless of where the resources lie but also help you to evaluate your multiple cloud environments in a unified way, providing a level playing field to compare and identify opportunities for improvement.

      Info-Tech Insight

      Embrace openness! Leveraging open standards and technologies doesn’t just ease portability in multicloud; it also helps rationalize telemetry and metrics across platforms, making it easier to achieve a unified management view.

      Multicloud security

      Multicloud security challenges remain focused around managing user and role complexity

      • Fragmentation of identity and access management
      • Controlling access across platforms
      • Increased complexity of roles
      • API security
      • Managing different user types and subscriptions across different service models
      • Managing security best practices across multiple platforms
      • Potential increased attack surface

      Info-Tech Insight

      Don’t reinvent the wheel! Where possible, leverage your existing identity and access management platforms and role-based access control (RBAC) discipline and extend them out to your cloud footprints.

      Don’t fall in reactively!

      1. Multicloud isn’t bad or good.
      2. Put everything the right place; understand the other right places.
      3. Know where your data goes.
      4. Automation is your friend.
      5. Strategy fundamentals don’t change.
      6. Focus on SaaS (to start).
      7. Embrace openness.
      8. Modernize your tools.

      Related Info-Tech Research

      Define Your Cloud Vision
      This blueprint covers a workload-level approach to determining cloud migration paths

      10 Secrets for Successful Disaster Recovery in the Cloud
      This research set covers general cloud best practices for implement DR and resilience in the cloud.

      Bibliography

      “7 Best Practices for Multi-Cloud Management.” vmware.com, 29 April 2022. Web.
      Brown, Chalmers. “Six Best Practices For Multi-Cloud Management.” Forbes, 22 Jan. 2019. Web.
      Curless, Tim. “The Risks of Multi-Cloud Outweigh the Benefits.” AHEAD, n.d. Web.
      Tucker, Ryan. “Multicloud Security: Challenges and Solutions.” Megaport, 29 Sept 2022. Web.
      Velimirovic, Andreja. “How to Implement a Multi Cloud Strategy.” pheonixNAP, 23 June 2021. Web.
      “What is a Multi-Cloud Strategy?” vmware.com, n.d. Web.

      IT Governance

      • Buy Link or Shortcode: {j2store}22|cart{/j2store}
      • Related Products: {j2store}22|crosssells{/j2store}
      • Up-Sell: {j2store}22|upsells{/j2store}
      • member rating overall impact: 9.2/10
      • member rating average dollars saved: $124,127
      • member rating average days saved: 37
      • Parent Category Name: Strategy and Governance
      • Parent Category Link: /strategy-and-governance
      Read our concise Executive Brief to find out why you may want to redesign your IT governance, Review our methodology, and understand how we can support you in completing this process.

      IT Management and Policies

      • Buy Link or Shortcode: {j2store}23|cart{/j2store}
      • Related Products: {j2store}23|crosssells{/j2store}
      • InfoTech Academy Title: IT management and policies videos
      • InfoTech Academy Excerpt: More videos are available once you join. Contact us for more information.
      • Teaser Video: Visit Website
      • Teaser Video Title: Policies Academy Overview
      • member rating overall impact: 9.5/10
      • member rating average dollars saved: $23101
      • member rating average days saved: 11
      • Parent Category Name: Strategy and Governance
      • InfotechAcademy-Executivebrief: Visit Website
      • Parent Category Link: /strategy-and-governance
      Create policies that matter most to your organization.

      Management, policy, policies

      Redesign Your IT Organizational Structure

      • Buy Link or Shortcode: {j2store}275|cart{/j2store}
      • member rating overall impact: 9.2/10 Overall Impact
      • member rating average dollars saved: $71,830 Average $ Saved
      • member rating average days saved: 25 Average Days Saved
      • Parent Category Name: Organizational Design
      • Parent Category Link: /organizational-design

      Most organizations go through an organizational redesign to:

      • Better align to the strategic objectives of the organization.
      • Increase the effectiveness of IT as a function.
      • Provide employees with clarity in their roles and responsibilities.
      • Support new capabilities.
      • Better align IT capabilities to suit the vision.
      • Ensure the IT organization can support transformation initiatives.

      Our Advice

      Critical Insight

      • Organizational redesign is only as successful as the process leaders engage in. It shapes a story framed in a strong foundation of need and a method to successfully implement and adopt the new structure.
      • Benchmarking your organizational redesign to other organizations will not work. Other organizations have different strategies, drivers, and context. It’s important to focus on your organization, not someone else's.
      • You could have the best IT employees in the world, but if they aren’t structured well your organization will still fail in reaching its vision.

      Impact and Result

      • We are often unsuccessful in organizational redesign because we lack an understanding of why this initiative is required or fail to recognize that it is a change initiative.
      • Successful organizational design requires a clear understanding of why it is needed and what will be achieved by operating in a new structure.
      • Additionally, understanding the impact of the change initiative can lead to greater adoption by core stakeholders.

      Redesign Your IT Organizational Structure Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Redesign Your IT Organizational Structure Deck – A defined method of redesigning your IT structure that is founded by clear drivers and consistently considering change management practices.

      The purpose of this storyboard is to provide a four-phased approach to organizational redesign.

      • Redesign Your IT Organizational Structure – Phases 1-4

      2. Communication Deck – A method to communicate the new organizational structure to critical stakeholders to gain buy-in and define the need.

      Use this templated Communication Deck to ensure impacted stakeholders have a clear understanding of why the new organizational structure is needed and what that structure will look like.

      • Organizational Design Communications Deck

      3. Redesign Your IT Organizational Structure Executive Summary Template – A template to secure executive leadership buy-in and financial support for the new organizational structure to be implemented.

      This template provides IT leaders with an opportunity to present their case for a change in organizational structure and roles to secure the funding and buy-in required to operate in the new structure.

      • Redesign Your IT Organizational Structure Executive Summary

      4. Redesign Your IT Organizational Structure Workbook – A method to document decisions made and rationale to support working through each phase of the process.

      This Workbook allows IT and business leadership to work through the steps required to complete the organizational redesign process and document key rationale for those decisions.

      • Redesign Your IT Organizational Structure Workbook

      5. Redesign Your IT Organizational Structure Operating Models and Capability Definitions – A tool that can be used to provide clarity on the different types of operating models that exist as well as the process definitions of each capability.

      Refer to this tool when working through the redesign process to better understand the operating model sketches and the capability definitions. Each capability has been tied back to core frameworks that exist within the information and technology space.

      • Redesign Your IT Organizational Structure Operating Models and Capability Definitions

      Infographic

      Workshop: Redesign Your IT Organizational Structure

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Establish the Organizational Design Foundation

      The Purpose

      Lay the foundation for your organizational redesign by establishing a set of organizational design principles that will guide the redesign process.

      Key Benefits Achieved

      Clearly articulate why this organizational redesign is needed and the implications the strategies and context will have on your structure.

      Activities

      1.1 Define the org design drivers.

      1.2 Document and define the implications of the business context.

      1.3 Align the structure to support the strategy.

      1.4 Establish guidelines to direct the organizational design process.

      Outputs

      Clear definition of the need to redesign the organizational structure

      Understanding of the business context implications on the organizational structure creation.

      Strategic impact of strategies on organizational design.

      Customized Design Principles to rationalize and guide the organizational design process.

      2 Create the Operating Model Sketch

      The Purpose

      Select and customize an operating model sketch that will accurately reflect the future state your organization is striving towards. Consider how capabilities will be sourced, gaps in delivery, and alignment.

      Key Benefits Achieved

      A customized operating model sketch that informs what capabilities will make up your IT organization and how those capabilities will align to deliver value to your organization.

      Activities

      2.1 Augmented list of IT capabilities.

      2.2 Capability gap analysis

      2.3 Identified capabilities for outsourcing.

      2.4 Select a base operating model sketch.

      2.5 Customize the IT operating model sketch.

      Outputs

      Customized list of IT processes that make up your organization.

      Analysis of which capabilities require dedicated focus in order to meet goals.

      Definition of why capabilities will be outsourced and the method of outsourcing used to deliver the most value.

      Customized IT operating model reflecting sourcing, centralization, and intended delivery of value.

      3 Formalize the Organizational Structure

      The Purpose

      Translate the operating model sketch into a formal structure with defined functional teams, roles, reporting structure, and responsibilities.

      Key Benefits Achieved

      A detailed organizational chart reflecting team structures, reporting structures, and role responsibilities.

      Activities

      3.1 Categorize your IT capabilities within your defined functional work units.

      3.2 Create a mandate statement for each work unit.

      3.3 Define roles inside the work units and assign accountability and responsibility.

      3.4 Finalize your organizational structure.

      Outputs

      Capabilities Organized Into Functional Groups

      Functional Work Unit Mandates

      Organizational Chart

      4 Plan for the Implementation & Change

      The Purpose

      Ensure the successful implementation of the new organizational structure by strategically communicating and involving stakeholders.

      Key Benefits Achieved

      A clear plan of action on how to transition to the new structure, communicate the new organizational structure, and measure the effectiveness of the new structure.

      Activities

      4.1 Identify and mitigate key org design risks.

      4.2 Define the transition plan.

      4.3 Create the change communication message.

      4.4 Create a standard set of FAQs.

      4.5 Align sustainment metrics back to core drivers.

      Outputs

      Risk Mitigation Plan

      Change Communication Message

      Standard FAQs

      Implementation and sustainment metrics.

      Further reading

      Redesign Your IT Organizational Structure

      Designing an IT structure that will enable your strategic vision is not about an org chart – it’s about how you work.

      EXECUTIVE BRIEF

      Analyst Perspective

      Structure enables strategy.

      The image contains a picture of Allison Straker.

      Allison Straker

      Research Director,

      Organizational Transformation

      The image contains a picture of Brittany Lutes.

      Brittany Lutes

      Senior Research Analyst,

      Organizational Transformation

      An organizational structure is much more than a chart with titles and names. It defines the way that the organization operates on a day-to-day basis to enable the successful delivery of the organization’s information and technology objectives. Moreover, organizational design sees beyond the people that might be performing a specific role. People and role titles will and often do change frequently. Those are the dynamic elements of organizational design that allow your organization to scale and meet specific objectives at defined points of time. Capabilities, on the other hand, are focused and related to specific IT processes.

      Redesigning an IT organizational structure can be a small or large change transformation for your organization. Create a structure that is equally mindful of the opportunities and the constraints that might exist and ensure it will drive the organization towards its vision with a successful implementation. If everyone understands why the IT organization needs to be structured that way, they are more likely to support and adopt the behaviors required to operate in the new structure.

      Executive Summary

      Your Challenge

      Your organization needs to reorganize itself because:

      • The current IT structure does not align to the strategic objectives of the organization.
      • There are inefficiencies in how the IT function is currently operating.
      • IT employees are unclear about their role and responsibilities, leading to inconsistencies.
      • New capabilities or a change in how the capabilities are organized is required to support the transformation.

      Common Obstacles

      Many organizations struggle when it comes redesigning their IT organizational structure because they:

      • Jump right into creating the new organizational chart.
      • Do not include the members of the IT leadership team in the changes.
      • Do not include the business in the changes.
      • Consider the context in which the change will take place and how to enable successful adoption.

      Info-Tech’s Approach

      Successful IT organization redesign includes:

      • Understanding the drivers, context, and strategies that will inform the structure.
      • Remaining objective by focusing on capabilities over people or roles.
      • Identifying gaps in delivery, sourcing strategies, customers, and degrees of centralization.
      • Remembering that organizational design is a change initiative and will require buy-in.

      Info-Tech Insight

      A successful redesign requires a strong foundation and a plan to ensure successful adoption. Without these, the organizational chart has little meaning or value.

      Your challenge

      This research is designed to help organizations who are looking to:

      • Redesign the IT structure to align to the strategic objectives of the enterprise.
      • Increase the effectiveness in how the IT function is operating in the organization.
      • Provide clarity to employees around their roles and responsibilities.
      • Ensure there is an ability to support new IT capabilities and/or align capabilities to better support the direction of the organization.
      • Align the IT organization to support a business transformation such as becoming digitally enabled or engaging in M&A activities.

      Organizational design is a challenge for many IT and digital executives

      69% of digital executives surveyed indicated challenges related to structure, team silos, business-IT alignment, and required roles when executing on a digital strategy.

      Source: MIT Sloan, 2020

      Common obstacles

      These barriers make IT organizational redesign difficult to address for many organizations:

      • Confuse organizational design and organizational charts as the same thing.
      • Start with the organizational chart, not taking into consideration the foundational elements that will make that chart successful.
      • Fail to treat organizational redesign as a change management initiative and follow through with the change.
      • Exclude impacted or influential IT leaders and/or business stakeholders from the redesign process.
      • Leverage an operating model because it is trending.

      To overcome these barriers:

      • Understand the context in which the changes will take place.
      • Communicate the changes to those impacted to enable successful adoption and implementation of a new organizational structure.
      • Understand that organizational design is for more than just HR leaders now; IT executives should be driving this change.

      Succeed in Organizational Redesign

      75% The percentage of change efforts that fail.

      Source: TLNT, 2019

      55% The percentage of practitioners who identify how information flows between work units as a challenge for their organization.

      Source: Journal of Organizational Design, 2019

      Organizational design defined

      If your IT strategy is your map, your IT organizational design represents the optimal path to get there.

      IT organizational design refers to the process of aligning the organization’s structure, processes, metrics, and talent to the organization’s strategic plan to drive efficiency and effectiveness.

      Why is the right IT organizational design so critical to success?

      Adaptability is at the core of staying competitive today

      Structure is not just an organizational chart

      Organizational design is a never-ending process

      Digital technology and information transparency are driving organizations to reorganize around customer responsiveness. To remain relevant and competitive, your organizational design must be forward looking and ready to adapt to rapid pivots in technology or customer demand.

      The design of your organization dictates how roles function. If not aligned to the strategic direction, the structure will act as a bungee cord and pull the organization back toward its old strategic direction (ResearchGate.net, 2014). Structure supports strategy, but strategy also follows structure.

      Organization design is not a one-time project but a continuous, dynamic process of organizational self-learning and continuous improvement. Landing on the right operating model will provide a solid foundation to build upon as the organization adapts to new challenges and opportunities.

      Understand the organizational differences

      Organizational Design

      Organizational design the process in which you intentionally align the organizational structure to the strategy. It considers the way in which the organization should operate and purposely aligns to the enterprise vision. This process often considers centralization, sourcing, span of control, specialization, authority, and how those all impact or are impacted by the strategic goals.

      Operating Model

      Operating models provide an architectural blueprint of how IT capabilities are organized to deliver value. The placement of the capabilities can alter the culture, delivery of the strategic vision, governance model, team focus, role responsibility, and more. Operating model sketches should be foundational to the organizational design process, providing consistency through org chart changes.

      Organizational Structure

      The organizational structure is the chosen way of aligning the core processes to deliver. This can be strategic, or it can be ad hoc. We recommend you take a strategic approach unless ad hoc aligns to your culture and delivery method. A good organizational structure will include: “someone with authority to make the decisions, a division of labor and a set of rules by which the organization operates” (Bizfluent, 2019).

      Organizational Chart

      The capstone of this change initiative is an easy-to-read chart that visualizes the roles and reporting structure. Most organizations use this to depict where individuals fit into the organization and if there are vacancies. While this should be informed by the structure it does not necessarily depict workflows that will take place. Moreover, this is the output of the organizational design process.

      Sources: Bizfluent, 2019; Strategy & Business, 2015; SHRM, 2021

      The Technology Value Trinity

      The image contains a diagram of the Technology Value Trinity as described in the text below.

      All three elements of the Technology Value Trinity work in harmony to delivery business value and achieve strategic needs. As one changes, the others need to change as well.

      How do these three elements relate?

      • Digital and IT strategy tells you what you need to achieve to be successful.
      • Operating model and organizational design align resources to deliver on your strategy and priorities. This is done by strategically structuring IT capabilities in a way that enables the organizations vision and considers the context in which the structure will operate.
      • I&T governance is the confirmation of IT’s goals and strategy, which ensures the alignment of IT and business strategy and is the mechanism by which you continuously prioritize work to ensure that what is delivered is in line with the strategy.

      Too often strategy, organizational design, and governance are considered separate practices – strategies are defined without teams and resources to support. Structure must follow strategy.

      Info-Tech’s approach to organizational design

      Like a story, a strategy without a structure to deliver on it is simply words on paper.

      Books begin by setting the foundation of the story.

      Introduce your story by:

      • Defining the need(s) that are driving this initiative forward.
      • Introducing the business context in which the organizational redesign must take place.
      • Outlining what’s needed in the redesign to support the organization in reaching its strategic IT goals.

      The plot cannot thicken without the foundation. Your organizational structure and chart should not exist without one either.

      The steps to establish your organizational chart - with functional teams, reporting structure, roles, and responsibilities defined – cannot occur without a clear definition of goals, need, and context. An organizational chart alone won’t provide the insight required to obtain buy-in or realize the necessary changes.

      Conclude your story through change management and communication.

      Good stories don’t end without referencing what happened before. Use the literary technique of foreshadowing – your change management must be embedded throughout the organizational redesign process. This will increase the likelihood that the organizational structure can be communicated, implemented, and reinforced by stakeholders.

      Info-Tech uses a capability-based approach to help you design your organizational structure

      Once your IT strategy is defined, it is critical to identify the capabilities that are required to deliver on those strategic initiatives. Each initiative will require a combination of these capabilities that are only supported through the appropriate organization of roles, skills, and team structures.

      The image contains a diagram of the various services and blueprints that Info-Tech has to offer.

      Embed change management into organizational design

      Change management practices are needed from the onset to ensure the implementation of an organizational structure.

      For each phase of this blueprint, its important to consider change management. These are the points when you need to communicate the structure changes:

      • Phase 1: Begin to socialize the idea of new organizational structure with executive leadership and explain how it might be impactful to the context of the organization. For example, a new control, governance model, or sourcing approach could be considered.
      • Phase 2: The chosen operating model will influence your relationships with the business and can create/eliminate silos. Ensure IT and business leaders have insight into these possible changes and a willingness to move forward.
      • Phase 3: The new organizational structure could create or eliminate teams, reduce or increase role responsibilities, and create different reporting structures than before. It’s time to communicate these changes with those most impacted and be able to highlight the positive outcomes of the various changes.
      • Phase 4: Should consider the change management practices holistically. This includes the type of change and length of time to reach the end state, communication, addressing active resistors, acquiring the right skills, and measuring the success of the new structure and its adoption.

      Info-Tech Insight

      Do not undertake an organizational redesign initiative if you will not engage in change management practices that are required to ensure its successful adoption.

      Measure the value of the IT organizational redesign

      Given that the organizational redesign is intended to align with the overall vision and objectives of the business, many of the metrics that support its success will be tied to the business. Adapt the key performance indicators (KPIs) that the business is using to track its success and demonstrate how IT can enable the business and improve its ability to reach those targets.

      Strategic Resources

      The percentage of resources dedicated to strategic priorities and initiatives supported by IT operating model. While operational resources are necessary, ensuring people are allocating time to strategic initiatives as well will drive the business towards its goal state. Leverage Info-Tech’s IT Staffing Assessment diagnostic to benchmark your IT resource allocation.

      Business Satisfaction

      Assess the improvement in business satisfaction overall with IT year over year to ensure the new structure continues to drive satisfaction across all business functions. Leverage Info-Tech’s CIO Business Vision diagnostic to see how your IT organization is perceived.

      Role Clarity

      The degree of clarity that IT employees have around their role and its core responsibilities can lead to employee engagement and retention. Consider measuring this core job driver by leveraging Info-Tech’s Employee Engagement Program.

      Customer & User Satisfaction

      Measure customer satisfaction with technology-enabled business services or products and improvements in technology-enabled client acquisition or retention processes. Assess the percentage of users satisfied with the quality of IT service delivery and leverage Info-Tech’s End-User Satisfaction Survey to determine improvements.

      Info-Tech’s methodology for Redesigning Your IT Organization

      Phase

      1. Establish the Organizational Design Foundation

      2. Create the Operating Model Sketch

      3. Formalize the Organizational Structure

      4. Plan for Implementation and Change

      Phase Outcomes

      Lay the foundation for your organizational redesign by establishing a set of organizational design principles that will guide the redesign process.

      Select and customize an operating model sketch that will accurately reflect the future state your organization is striving towards. Consider how capabilities will be sourced, gaps in delivery, and alignment.

      Translate the operating model sketch into a formal structure with defined functional teams, roles, reporting structure, and responsibilities.

      Ensure the successful implementation of the new organizational structure by strategically communicating and involving stakeholders.

      Insight summary

      Overarching insight

      Organizational redesign processes focus on defining the ways in which you want to operate and deliver on your strategy – something an organizational chart will never be able to convey.

      Phase 1 insight

      Focus on your organization, not someone else's’. Benchmarking your organizational redesign to other organizations will not work. Other organizations have different strategies, drivers, and context.

      Phase 2 insight

      An operating model sketch that is customized to your organization’s specific situation and objectives will significantly increase the chances of creating a purposeful organizational structure.

      Phase 3 insight

      If you follow the steps outlined in the first three phases, creating your new organizational chart should be one of the fastest activities.

      Phase 4 insight

      Throughout the creation of a new organizational design structure, it is critical to involve the individuals and teams that will be impacted.

      Tactical insight

      You could have the best IT employees in the world, but if they aren’t structured well your organization will still fail in reaching its vision.

      Blueprint deliverables

      Each step of this blueprint is accompanied by supporting deliverables to help you accomplish your goals:


      Communication Deck

      Communicate the changes to other key stakeholders such as peers, managers, and staff.

      Workbook

      As you work through each of the activities, use this workbook as a place to document decisions and rationale.

      Reference Deck

      Definitions for every capability, base operating model sketches, and sample organizational charts aligned to those operating models.

      Job Descriptions

      Key deliverable:

      Executive Presentation

      Leverage this presentation deck to gain executive buy-in for your new organizational structure.

      Blueprint benefits

      IT Benefits

      • Create an organizational structure that aligns to the strategic goals of IT and the business.
      • Provide IT employees with clarity on their roles and responsibilities to ensure the successful delivery of IT capabilities.
      • Highlight and sufficiently staff IT capabilities that are critical to the organization.
      • Define a sourcing strategy for IT capabilities.
      • Increase employee morale and empowerment.

      Business Benefits

      • IT can carry out the organization’s strategic mission and vision of all technical and digital initiatives.
      • Business has clarity on who and where to direct concerns or questions.
      • Reduce the likelihood of turnover costs as IT employees understand their roles and its importance.
      • Create a method to communicate how the organizational structure aligns with the strategic initiatives of IT.
      • Increase ability to innovate the organization.

      Executive Brief Case Study

      IT design needs to support organizational and business objectives, not just IT needs.

      INDUSTRY: Government

      SOURCE: Analyst Interviews and Working Sessions

      Situation

      IT was tasked with providing equality to the different business functions through the delivery of shared IT services. The government created a new IT organizational structure with a focus on two areas in particular: strategic and operational support capabilities.

      Challenge

      When creating the new IT structure, an understanding of the complex and differing needs of the business functions was not reflected in the shared services model.

      Outcome

      As a result, the new organizational structure for IT did not ensure adequate meeting of business needs. Only the operational support structure was successfully adopted by the organization as it aligned to the individual business objectives. The strategic capabilities aspect was not aligned to how the various business lines viewed themselves and their objectives, causing some partners to feel neglected.

      Info-Tech offers various levels of support to best suit your needs.

      DIY Toolkit

      "Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful."

      Guided Implementation

      "Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track."

      Workshop

      "We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place."

      Consulting

      "Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project."

      Diagnostics and consistent frameworks are used throughout all four options.

      Guided Implementation

      What does a typical GI on this topic look like?

      A Guided Implementation (GI) is a series of calls with an Info-Tech analyst to help implement our best practices in your organization. A typical GI is 8 to 12 calls over the course of 4 to 6 months.

      Phase 1

      Call #1: Define the process, understand the need, and create a plan of action.

      Phase 2

      Call #2: Define org. design drivers and business context.

      Call #3: Understand strategic influences and create customized design principles.

      Call #4: Customize, analyze gaps, and define sourcing strategy for IT capabilities.

      Call #5: Select and customize the IT operating model sketch.

      Phase 3

      Call #6: Establish functional work units and their mandates.

      Call #7: Translate the functional organizational chart to an operational organizational chart with defined roles.

      Phase 4

      Call #8: Consider risks and mitigation tactics associated with the new structure and select a transition plan.

      Call #9: Create your change message, FAQs, and metrics to support the implementation plan.

      Workshop Overview

      Contact your account representative for more information.

      workshops@infotech.com 1-888-670-8889

      Day 1

      Day 2

      Day 3

      Day 4

      Day 5

      Establish the Organizational Redesign Foundation

      Create the Operating Model Sketch

      Formalize the Organizational Structure

      Plan for Implementation and Change

      Next Steps and
      Wrap-Up (offsite)

      Activities

      1.1 Define the org. design drivers.

      1.2 Document and define the implications of the business context.

      1.3 Align the structure to support the strategy.

      1.4 Establish guidelines to direct the organizational design process.

      2.1 Augment list of IT capabilities.

      2.2 Analyze capability gaps.

      2.3 Identify capabilities for outsourcing.

      2.4 Select a base operating model sketch.

      2.5 Customize the IT operating model sketch.

      3.1 Categorize your IT capabilities within your defined functional work units.

      3.2 Create a mandate statement for each work unit.

      3.3 Define roles inside the work units and assign accountability and responsibility.

      3.4 Finalize your organizational structure.

      4.1 Identify and mitigate key org. design risks.

      4.2 Define the transition plan.

      4.3 Create the change communication message.

      4.4 Create a standard set of FAQs.

      4.5 Align sustainment metrics back to core drivers.

      5.1 Complete in-progress deliverables from previous four days.

      5.2 Set up review time for workshop deliverables and to discuss next steps.

      Deliverables

      1. Foundational components to the organizational design
      2. Customized design principles
      1. Heat mapped IT capabilities
      2. Defined outsourcing strategy
      3. Customized operating model
      1. Capabilities organized into functional groups
      2. Functional work unit mandates
      3. Organizational chart
      1. Risk mitigation plan
      2. Change communication message
      3. Standard FAQs
      4. Implementation and sustainment metrics
      1. Completed organizational design communications deck

      This blueprint is part one of a three-phase approach to organizational transformation

      PART 1: DESIGN

      PART 2: STRUCTURE

      PART 3: IMPLEMENT

      IT Organizational Architecture

      Organizational Sketch

      Organizational Structure

      Organizational Chart

      Transition Strategy

      Implement Structure

      1. Define the organizational design drivers, business context, and strategic alignment.

      2. Create customized design principles.

      3. Develop and customize a strategically aligned operating model sketch.

      4. Define the future-state work units.

      5. Create future-state work unit mandates.

      6. Define roles by work unit.

      7. Turn roles into jobs with clear capability accountabilities and responsibilities.

      8. Define reporting relationships between jobs.

      9. Assess options and select go-forward organizational sketch.

      11. Validate organizational sketch.

      12. Analyze workforce utilization.

      13. Define competency framework.

      14. Identify competencies required for jobs.

      15. Determine number of positions per job

      16. Conduct competency assessment.

      17. Assign staff to jobs.

      18. Build a workforce and staffing plan.

      19. Form an OD implementation team.

      20. Develop change vision.

      21. Build communication presentation.

      22. Identify and plan change projects.

      23. Develop organizational transition plan.

      24. Train managers to lead through change.

      25. Define and implement stakeholder engagement plan.

      26. Develop individual transition plans.

      27. Implement transition plans.

      Risk Management: Create, implement, and monitor risk management plan.

      HR Management: Develop job descriptions, conduct job evaluation, and develop compensation packages.

      Monitor and Sustain Stakeholder Engagement

      Phase 1

      Establish the Organizational Redesign Foundation

      This phase will walk you through the following activities:

      1.1 Define the organizational redesign driver(s)

      1.2 Create design principles based on the business context

      1.3a (Optional Exercise) Identify the capabilities from your value stream

      1.3b Identify the capabilities required to deliver on your strategies

      1.4 Finalize your list of design principles

      This phase involves the following participants:

      • CIO
      • IT Leadership
      • Business Leadership

      Embed change management into the organizational design process

      Articulate the Why

      Changes are most successful when leaders clearly articulate the reason for the change – the rationale for the organizational redesign of the IT function. Providing both staff and executive leaders with an understanding for this change is imperative to its success. Despite the potential benefits to a redesign, they can be disruptive. If you are unable to answer the reason why, a redesign might not be the right initiative for your organization.

      Employees who understand the rationale behind decisions made by executive leaders are 3.6 times more likely to be engaged.

      McLean & Company Engagement Survey Database, 2021; N=123,188

      Info-Tech Insight

      Successful adoption of the new organizational design requires change management from the beginning. Start considering how you will convey the need for organizational change within your IT organization.

      The foundation of your organizational design brings together drivers, context, and strategic implications

      All aspects of your IT organization’s structure should be designed with the business’ context and strategic direction in mind.

      Use the following set of slides to extract the key components of your drivers, business context, and strategic direction to land on a future structure that aligns with the larger strategic direction.

      REDESIGN DRIVERS

      Driver(s) can originate from within the IT organization or externally. Ensuring the driver(s) are easy to understand and articulate will increase the successful adoption of the new organizational structure.

      BUSINESS CONTEXT

      Defines the interactions that occur throughout the organization and between the organization and external stakeholders. The context provides insight into the environment by both defining the purpose of the organization and the values that frame how it operates.

      STRATEGY IMPLICATIONS

      The IT strategy should be aligned to the overall business strategy, providing insight into the types of capabilities required to deliver on key IT initiatives.

      Understand IT’s desired maturity level, alignment with business expectations, and capabilities of IT

      Where are we today?

      Determine the current overall maturity level of the IT organization.

      Where do we want to be as an organization?

      Use the inputs from Info-Tech’s diagnostic data to determine where the organization should be after its reorganization.

      How can you leverage these results?

      The result of these diagnostics will inform the design principles that you’ll create in this phase.

      Leverage Info-Tech’s diagnostics to provide an understanding of critical areas your redesign can support:

      CIO Business Vision Diagnostic

      Management & Governance Diagnostic

      IT Staffing Diagnostic

      The image contains a picture of Info-Tech's maturity ladder.

      Consider the organizational design drivers

      Consider organizational redesign if …

      Effectiveness is a concern:

      • Insufficient resources to meet demand
      • Misalignment to IT (and business) strategies
      • Lack of clarity around role responsibility or accountability
      • IT functions operating in silos

      New capabilities are needed:

      • Organization is taking on new capabilities (digital, transformation, M&A)
      • Limited innovation
      • Gaps in the capabilities/services of IT
      • Other external environmental influences or changes in strategic direction

      Lack of business understanding

      • Misalignment between business and IT or how the organization does business
      • Unhappy customers (internal or external)

      Workforce challenges

      • Frequent turnover or inability to attract new skills
      • Low morale or employee empowerment

      These are not good enough reasons …

      • New IT leader looking to make a change for the sake of change or looking to make their legacy known
      • To work with specific/hand-picked leaders over others
      • To “shake things up” to see what happens
      • To force the organization to see IT differently

      Info-Tech Insight

      Avoid change for change’s sake. Restructuring could completely miss the root cause of the problem and merely create a series of new ones.

      1.1 Define the organizational redesign driver(s)

      1-2 hours

      1. As a group, brainstorm a list of current pain points or inhibitors in the current organizational structure, along with a set of opportunities that can be realized during your restructuring. Group these pain points and opportunities into themes.
      2. Leverage the pain points and opportunities to help further define why this initiative is something you’re driving towards. Consider how you would justify this initiative to different stakeholders in the organization.
      3. Questions to consider:
        1. Who is asking for this initiative?
        2. What are the primary benefits this is intended to produce?
        3. What are you optimizing for?
        4. What are we capable of achieving as an IT organization?
        5. Are the drivers coming from inside or outside the IT organization?
      4. Once you’ve determined the drivers for redesigning the IT organization, prioritize those drivers to ensure there is clarity when communicating why this is something you are focusing time and effort on.

      Input

      Output

      • Knowledge of the current organization
      • Pain point and opportunity themes
      • Defined drivers of the initiative

      Materials

      Participants
      • Whiteboard/flip charts (physical or electronic)
      • CIO
      • IT Leadership
      • Business Leadership

      Record the results in the Organizational Design Communications Deck

      Frame the organizational design within the context of the business

      Workforce Considerations:

      • How does your organization view its people resources? Does it have the capacity to increase the number of resources?
      • Do you currently have sufficient staff to meet the demands of the organization? Are you able to outsource resources when demand requires it?
      • Are the members of your IT organization unionized?
      • Is your workforce distributed? Do time zones impact how your team can collaborate?

      Business Context Consideration

      IT Org. Design Implication

      Culture:

      Culture, "the way we do things here,” has huge implications for executing strategy, driving engagement, and providing a guiding force that ensures organizations can work together toward common goals.

      • What is the culture of your organization? Is it cooperative, traditional, competitive, or innovative? (See appendix for details.)
      • Is this the target culture or a stepping-stone to the ideal culture?
      • How do the attitudes and behaviors of senior leaders in the organization reinforce this culture?

      Consider whether your organization’s culture can accept the operating model and organizational structure changes that make sense on paper.

      Certain cultures may lean toward particular operating models. For example, the demand-develop-service operating model may be supported by a cooperative culture. A traditional organization may lean towards the plan-build-run operating model.

      Ensure you have considered your current culture and added exercises to support it.

      If more capacity is required to accomplish the goals of the organization, you’ll want to prepare the leaders and explain the need in your design principles (to reflect training, upskilling, or outsourcing). Unionized environments require additional consideration. They may necessitate less structural changes, and so your principles will need to reflect other alternatives (hiring additional resources, creative options) to support organizational needs. Hybrid or fully remote workforces may impact how your organization interacts.

      Business context considerations

      Business Context Consideration

      IT Org. Design Implication

      Control & Governance:

      It is important to consider how your organization is governed, how decisions are made, and who has authority to make decisions.

      Strategy tells what you do, governance validates you’re doing the right things, and structure is how you execute on what’s been approved.

      • How do decisions get considered and approved in your organization? Are there specific influences that impact the priorities of the organization?
      • Are those in the organization willing to release decision-making authority around specific IT components?
      • Should the organization take on greater accountability for specific IT components?

      Organizations that require more controls may lean toward more centralized governance. Organizations that are looking to better enable and empower their divisions (products, groups, regions, etc.) may look to embed governance in these parts of the organization.

      For enterprise organizations, consider where IT has authority to make decisions (at the global, local, or system level). Appropriate governance needs to be built into the appropriate levels.

      Business context considerations

      Business Context Consideration

      IT Org. Design Implication

      Financial Constraints:

      Follow the money: You may need to align your IT organization according to the funding model.

      • Do partners come to IT with their budgets, or does IT have a central pool that they use to fund initiatives from all partners?
      • Are you able to request finances to support key initiatives/roles prioritized by the organization?
      • How is funding aligned: technology, data, digital, etc.? Is your organization business-line funded? Pooled?
      • Are there special products or digital transformation initiatives with resources outside IT? Product ownership funding?
      • How are regulatory changes funded?
      • Do you have the flexibility to adjust your budget throughout the fiscal year?
      • Are chargebacks in place? Are certain services charged back to business units

      Determine if you can move forward with a new model or if you can adjust your existing one to suit the financial constraints.

      If you have no say over your funding, pre-work may be required to build a business case to change your funding model before you look at your organizational structure – without this, you might have to rule out centralized and focus on hybrid/centralized. If you don’t control the budget (funding comes from your partners), it will be difficult to move to a more centralized model.

      A federated business organization may require additional IT governance to help prioritize across the different areas.

      Budgets for digital transformation might come from specific areas of the business, so resources may need to be aligned to support that. You’ll have to consider how you will work with those areas. This may also impact the roles that are going to exist within your IT organization – product owners or division owners might have more say.

      Business context considerations

      Business Context Consideration

      IT Org. Design Implication

      Business Perspective of IT:

      How the business perceives IT and how IT perceives itself are sometimes not aligned. Make sure the business’ goals for IT are well understood.

      • Are your business partners satisfied if IT is an order taker? Do they agree with the need for IT to become a business partner? Is IT expected to innovate and transform the organization?
      • Is what the business needs from IT the same as what IT is providing currently?

      Business Organization Structure and Growth:

      • How is the overall organization structured: Centralized/decentralized? Functionally aligned? Divided by regions?
      • In what areas does the organization prioritize investments?
      • Is the organization located across a diverse geography?
      • How big is the organization?
      • How is the organization growing and changing – by mergers and acquisitions?

      If IT needs to become more of a business partner, you’ll want to define what that means to your organization and focus on the capabilities to enable this. Educating your partners might also be required if you’re not aligned.

      For many organizations, this will include stakeholder management, innovation, and product/project management. If IT and its business partners are satisfied with an order-taker relationship, be prepared for the consequences of that.

      A global organization will require different IT needs than a single location. Specifically, site reliability engineering (SRE) or IT support services might be deployed in each region. Organizations growing through mergers and acquisitions can be structured differently depending on what the organization needs from the transaction. A more centralized organization may be appropriate if the driver is reuse for a more holistic approach, or the organization may need a more decentralized organization if the acquisitions need to be handled uniquely.

      Business context considerations

      Business Context Consideration

      IT Org. Design Implication

      Sourcing Strategy:

      • What are the drivers for sourcing? Staff augmentation, best practices, time zone support, or another reason?
      • What is your strategy for sourcing?
      • Does IT do all of your technology work, or are parts being done by business or other units?
      • Are we willing/able to outsource, and will that place us into non-compliance (regulations)?
      • Do you have vendor management capabilities in areas that you might outsource?
      • How cloud-driven is your organization?
      • Do you have global operations?

      Change Tolerance:

      • What’s your organization’s tolerance to make changes around organizational design?
      • What's the appetite and threshold for risk?

      Your sourcing strategy affects your organizational structure, including what capabilities you group together. Since managing outsourced capabilities also includes the need for vendor management, you’ll need to ensure there aren’t too many capabilities required per leader. Look closely at what can be achieved through your operating model if IT is done through other groups. Even though these groups may not be in scope of your organization changes, you need to ensure your IT team works with them effectively.

      If your organization is going to push back if there are big structural changes, consider whether the changes are truly necessary. It may be preferred to take baby steps – use an incremental versus big-bang approach.

      A need for incremental change might mean not making a major operating model change.

      Business context considerations

      Business Context Consideration

      IT Org Design. Implication

      Stakeholder Engagement & Focus:

      Identify who your customers and stakeholders are; clarify their needs and engagement model.

      • Who is the customer for IT products and services?
      • Is your customer internal? External? Both?
      • How much of a priority is customer focus for your organization?
      • How will IT interact with customers, end users, and partners? What is the engagement model desired?

      Business Vision, Services, and Products:

      Articulate what your organization was built to do.

      • What does the organization create or provide?
      • Are these products and services changing?
      • What are the most critical capabilities to your organization?
      • What makes your organization a success? What are critical success factors of the organization and how are they measuring this to determine success?

      For a customer or user focus, ensure capabilities related to understanding needs (stakeholder, UX, etc.) are prioritized. Hybrid, decentralized, or demand-develop-service models often have more of a focus on customer needs.

      Outsourcing the service desk might be a consideration if there’s a high demand for the service. A differentiation between these users might mean there’s a different demand for services.

      Think broadly in terms of your organizational vision, not just the tactical (widget creation). You might need to choose an operating model that supports vision.

      Do you need to align your organization with your value stream? Do you need to decentralize specific capabilities to enable prioritization of the key capabilities?

      1.2 Create design principles based on the business context

      1-3 hours

      1. Discuss the business context in which the IT organizational redesign will be taking place. Consider the following standard components of the business context; include other relevant components specific to your organization:
      • Culture
      • Workforce Considerations
      • Control and Governance
      • Financial Constraints
      • Business Perspective of IT
      • Business Organization Structure and Growth
      • Sourcing Strategy
      • Change Tolerance
      • Stakeholder Engagement and Focus
      • Business Vision, Services, and Products
    • Different stakeholders can have different perspectives on these questions. Be sure to consider a holistic approach and engage these individuals.
    • Capture your findings and use them to create initial design principles.
    • Input

      Output

      • Business context
      • Design principles reflecting how the business context influences the organizational redesign for IT

      Materials

      Participants

      • Whiteboard/flip charts (physical or electronic)
      • List of Context Questions
      • CIO
      • IT Leadership
      • Business Leadership

      Record the results in the Organizational Design Communications Deck

      How your IT organization is structured needs to reflect what it must be built to do

      Structure follows strategy – the way you design will impact what your organization can produce.

      Designing your IT organization requires an assessment of what it needs to be built to do:

      • What are the most critical capabilities that you need to deliver, and what does success look like in those different areas?
      • What are the most important things that you deliver overall in your organization?

      The IT organization must reflect your business needs:

      • Understand your value stream and/or your prioritized business goals.
      • Understand the impact of your strategies – these can include your overall digital strategy and/or your IT strategy

      1.3a (Optional Exercise) Identify the capabilities from your value stream

      1 hour

      1. Identify your organization’s value stream – what your overall organization needs to do from supplier to consumer to provide value. Leverage Info-Tech’s industry reference architectures if you haven’t identified your value stream, or use the Document Your Business Architecture blueprint to create yours.
      2. For each item in your value stream, list capabilities that are critical to your organizational strategy and IT needs to further invest in to enable growth.
      3. Also, list those that need further support, e.g. those that lead to long wait times, rework time, re-tooling, down-time, unnecessary processes, unvaluable processes.*
      4. Capture the IT capabilities required to enable your business in your draft principles.
      The image contains a screenshot of the above activity: Sampling Manufacturing Business Capabilities.
      Source: Six Sigma Study Guide, 2014
      Input Output
      • Organization’s value stream
      • List of IT capabilities required to support the IT strategy
      Materials Participants
      • Whiteboard/flip charts (physical or electronic)
      • CIO
      • IT Leadership
      • Business Leadership

      Record the results in the Organizational Design Communications Deck

      Your strategy will help you decide on your structure

      Ensure that you have a clear view of the goals and initiatives that are needed in your organization. Your IT, digital, business, and/or other strategies will surface the IT capabilities your organization needs to develop. Identify the goals of your organization and the initiatives that are required to deliver on them. What capabilities are required to enable these? These capabilities will need to be reflected in your design principles.

      Sample initiatives and capabilities from an organization’s strategies

      The image contains a screenshot of sample initiatives and capabilities from an organization's strategies.

      1.3b Identify the capabilities required to deliver on your strategies

      1 hour

      1. For each IT goal, there may be one or more initiatives that your organization will need to complete in order to be successful.
      2. Document those goals and infinitives. For each initiative, consider which core IT capabilities will be required to deliver on that goal. There might be one IT capability or there might be several.
      3. Identify which capabilities are being repeated across the different initiatives. Consider whether you are currently investing in those capabilities in your current organizational structure.
      4. Highlight the capabilities that require IT investment in your design principles.
      InputOutput
      • IT goals
      • IT initiatives
      • IT, digital, and business strategies
      • List of IT capabilities required to support the IT strategy
      MaterialsParticipants
      • Whiteboard/flip charts (physical or electronic)
      • CIO
      • IT Leadership
      • Business Leadership

      Record the results in the Organizational Design Communications Deck

      Create your organizational design principles

      Your organizational design principles should define a set of loose rules that can be used to design your organizational structure to the specific needs of the work that needs to be done. These rules will guide you through the selection of the appropriate operating model that will meet your business needs. There are multiple ways you can hypothetically organize yourself to meet these needs, and the design principles will point you in the direction of which solution is the most appropriate as well as explain to your stakeholders the rationale behind organizing in a specific way. This foundational step is critical: one of the key reasons for organizational design failure is a lack of requisite time spent on the front-end understanding what is the best fit.

      The image contains an example of organizing design principles as described above.

      1.4 Finalize your list of design principles

      1-3 hours

      1. As a group, review the key outputs from your data collection exercises and their implications.
      2. Consider each of the previous exercises – where does your organization stand from a maturity perspective, what is driving the redesign, what is the business context, and what are the key IT capabilities requiring support. Identify how each will have an implication on your organizational redesign. Leverage this conversation to generate design principles.
      3. Vote on a finalized list of eight to ten design principles that will guide the selection of your operating model. Have everyone leave the meeting with these design principles so they can review them in more detail with their work units or functional areas and elicit any necessary feedback.
      4. Reconvene the group that was originally gathered to create the list of design principles and make any final amendments to the list as necessary. Use this opportunity to define exactly what each design principle means in the context of your organization so everyone has the same understanding of what this means moving forward.
      InputOutput
      • Organizational redesign drivers
      • Business context
      • IT strategy capabilities
      • Organizational design principles to help inform the selection of the right operating model sketch
      MaterialsParticipants
      • Whiteboard/flip charts (physical or electronic)
      • CIO
      • IT Leadership
      • Business Leadership

      Record the results in the Organizational Design Communications Deck

      Example design principles

      Your eight to ten design principles will be those that are most relevant to YOUR organization. Below are samples that other organizations have created, but yours will not be the same.

      Design Principle

      Description

      Decision making

      We will centralize decision making around the prioritization of projects to ensure that the initiatives driving the most value for the organization as a whole are executed.

      Fit for purpose

      We will build and maintain fit-for-purpose solutions based on business units’ unique needs.

      Reduction of duplication

      We will reduce role and application duplication through centralized management of assets and clearly differentiated roles that allow individuals to focus within key capability areas.

      Managed security

      We will manage security enterprise-wide and implement compliance and security governance policies.

      Reuse > buy > build

      We will maximize reuse of existing assets by developing a centralized application portfolio management function and approach.

      Managed data

      We will create a specialized data office to provide data initiatives with the focus they need to enable our strategy.

      Design Principle

      Description

      Controlled technical diversity

      We will control the variety of technology platforms we use to allow for increased operability and reduction of costs.

      Innovation

      R&D and innovation are critical – we will build an innovation team into our structure to help us meet our digital agenda.

      Resourcing

      We will separate our project and maintenance activities to ensure each are given the dedicated support they need for success and to reduce the firefighting mentality.

      Customer centricity

      The new structure will be directly aligned with customer needs – we will have dedicated roles around relationship management, requirements, and strategic roadmapping for business units.

      Interoperability

      We will strengthen our enterprise architecture practices to best prepare for future mergers and acquisitions.

      Cloud services

      We will move toward hosted versus on-premises infrastructure solutions, retrain our data center team in cloud best practices, and build roles around effective vendor management, cloud provisioning, and architecture.

      Phase 2

      Create the Operating Model Sketch

      This phase will walk you through the following activities:

      2.1 Augment the capability list

      2.2 Heatmap capabilities to determine gaps in service

      2.3 Identify the target state of sourcing for your IT capabilities

      2.4 Review and select a base operating model sketch

      2.5 Customize the selected overlay to reflect the desired future state

      This phase involves the following participants:

      • CIO
      • IT Leadership

      Embed change management into the organizational design process

      Gain Buy-In

      Obtain desire from stakeholders to move forward with organizational redesign initiative by involving them in the process to gain interest. This will provide the stakeholders with assurance that their concerns are being heard and will help them to understand the benefits that can be anticipated from the new organizational structure.

      “You’re more likely to get buy-in if you have good reason for the proposed changes – and the key is to emphasize the benefits of an organizational redesign.”

      Source: Lucid Chart

      Info-Tech Insight

      Just because people are aware does not mean they agree. Help different stakeholders understand how the change in the organizational structure is a benefit by specifically stating the benefit to them.

      Info-Tech uses capabilities in your organizational design

      We differentiate between capabilities and competencies.

      Capabilities

      • Capabilities are focused on the entire system that would be in place to satisfy a particular need. This includes the people who are competent to complete a specific task and also the technology, processes, and resources to deliver.
      • Capabilities work in a systematic way to deliver on specific need(s).
      • A functional area is often made up of one or more capabilities that support its ability to deliver on that function.
      • Focusing on capabilities rather then the individuals in organizational redesign enables a more objective and holistic view of what your organization is striving toward.

      Competencies

      • Competencies on the other hand are specific to an individual. It determines if the individual poses the skills or ability to perform.
      • Competencies are rooted in the term competent, which looks to understand if you are proficient enough to complete the specific task at hand.
      • Source: The People Development Magazine, 2020

      Use our IT capabilities to establish your IT organization design

      The image contains a diagram of the various services and blueprints that Info-Tech has to offer.

      2.1 Augment the capability list

      1-3 hours

      1. Using the capability list on the previous slide, go through each of the IT capabilities and remove any capabilities for which your IT organization is not responsible and/or accountable. Refer to the Operating Model and Capability Definition List for descriptions of each of the IT capabilities.
      2. Augment the language of specific capabilities that you feel are not directly reflective of what is being done within your organizational context or that you feel need to be changed to reflect more specifically how work is being done in your organization.
      • For example, some organizations may refer to their service desk capability as help desk or regional support. Use a descriptive term that most accurately reflects the terminology used inside the organization today.
    • Add any core capabilities from your organization that are missing from the provided IT capability list.
      • For example, organizations that leverage DevOps capabilities for their product development may desire to designate this in their operating model.
    • Document the rationale for decisions made for future reference.
    • Input Output
      • Baseline list of IT capabilities
      • IT capabilities required to support IT strategy
      • Customized list of IT capabilities
      Materials Participants
      • Whiteboard/Flip Charts
      • CIO
      • IT Leadership

      Record the results in the Organizational Design Workbook

      Gaps in delivery

      Identify areas that require greater focus and attention.

      Assess the gaps between where you currently are and where you need to be. Evaluate how critical and how effective your capabilities are:

      • Criticality = Importance
        • Try to focus on those which are highly critical to the organization.
        • These may be capabilities that have been identified in your strategies as areas to focus on.
      • Effectiveness = Performance
        • Identify those where the process or system is broken or ineffective, preventing the team from delivering on the capability.
        • Effectiveness could take into consideration how scalable, adaptable, or sustainable each capability is.
        • Focus on the capabilities that are low or medium in effectiveness but highly critical. Addressing the delivery of these capabilities will lead to the most positive outcomes in your organization.

      Remember to identify what allows the highly effective capabilities to perform at the capacity they are. Leverage this when increasing effectiveness elsewhere.

      High Gap

      There is little to no effectiveness (high gap) and the capability is highly important to your organization.

      Medium Gap

      Current ability is medium in effectiveness (medium gap) and there might be some priority for that capability in your organization.

      Low Gap

      Current ability is highly effective (low gap) and the capability is not necessarily a priority for your organization.

      2.2 Heatmap capabilities to determine gaps in delivery

      1-3 hours

      1. At this point, you should have identified what capabilities you need to have to deliver on your organization's goals and initiatives.
      2. Convene a group of the key stakeholders involved in the IT organizational design initiative.
      3. Review your IT capabilities and color each capability border according to the effectiveness and criticality of that capability, creating a heat map.
      • Green indicates current ability is highly effective (low gap) and the capability is not necessarily a priority for your organization.
      • Yellow indicates current ability is medium in effectiveness (medium gap) and there might be some priority for that capability in your organization.
      • Red indicates that there is little to no effectiveness (high gap) and the capability is highly important to your organization.
      Input Output
      • Selected capabilities from activity 2.1
      • Gap analysis in delivery of capabilities currently
      Materials Participants
      • Whiteboard/Flip Charts
      • CIO
      • IT Leadership

      Record the results in the Organizational Design Workbook

      Don’t forget the why: why are you considering outsourcing?

      There are a few different “types” of outsourcing:

      1. Competitive Advantage – Working with a third-party organization for the knowledge, insights, and best practices they can bring to your organization.
      2. Managed Service– The third party manages a capability or function for your organization.
      3. Staff Augmentation – Your organization brings in contractors and third-party organizations to fill specific skills gaps.

      Weigh which sourcing model(s) will best align with the needed capabilities to deliver effectively

      Insourcing

      Staff Augmentation

      Managed Service

      Competitive Advantage

      Description

      The organization maintains full responsibility for the management and delivery of the IT capability or service.

      Vendor provides specialized skills and enables the IT capability or service together with the organization to meet demand.

      Vendor completely manages the delivery of value for the IT capability, product or service.

      Vendor has unique skills, insights, and best practices that can be taught to staff to enable insourced capability and competency.

      Benefits

      • Retains in-house control over proprietary knowledge and assets that provide competitive or operational advantage.
      • Gains efficiency due to integration into the organization’s processes.
      • Provision of unique skills.
      • Addresses variation in demand for resources.
      • Labor cost savings.
      • Improves use of internal resources.
      • Improves effectiveness due to narrow specialization.
      • Labor cost savings.
      • Gain insights into aspects that could provide your organization with advantages over competitors.
      • Long-term labor cost savings.
      • Short-term outsourcing required.
      • Increase in-house competencies.

      Drawbacks

      • Quality of services/capabilities might not be as high due to lack of specialization.
      • No labor cost savings.
      • Potentially inefficient distribution of labor for the delivery of services/capabilities.
      • Potential conflicts in management or delivery of IT services and capabilities.
      • Negative impact on staff morale.
      • Limited control over services/capabilities.
      • Limited integration into organization’s processes.
      • Short-term labor expenses.
      • Requires a culture of continuous learning and improvement.

      Your strategy for outsourcing will vary with capability and capacity

      The image contains a diagram to show the Develop Vendor Management Capabilities, as described in the text below.

      Capability

      Capacity

      Outsourcing Model

      Low

      Low

      Your solutions may be with you for a long time, so it doesn’t matter whether it is a strategic decision to outsource development or if you are not able to attract the talent required to deliver in your market. Look for a studio, agency, or development shop that has a proven reputation for long-term partnership with its clients.

      Low

      High

      Your team has capacity but needs to develop new skills to be successful. Look for a studio, agency, or development shop that has a track record of developing its customers and delivering solutions.

      High

      Low

      Your organization knows what it is doing but is strapped for people. Look at “body shops” and recruiting agencies that will support short-term development contracts that can be converted to full-time staff or even a wholesale development shop acquisition.

      High

      High

      You have capability and capacity for delivering on your everyday demands but need to rise to the challenge of a significant, short-term rise in demand on a critical initiative. Look for a major system integrator or development shop with the specific expertise in the appropriate technology.

      Use these criteria to inform your right sourcing strategy

      Sourcing Criteria

      Description

      Determine whether you’ll outsource using these criteria

      1. Critical or commodity

      Determine whether the component to be sourced is critical to your organization or if it is a commodity. Commodity components, which are either not strategic in nature or related to planning functions, are likely candidates for outsourcing. Will you need to own the intellectual property created by the third party? Are you ok if they reuse that for their other clients?

      2. Readiness to outsource

      Identify how easy it would be to outsource a particular IT component. Consider factors such as knowledge transfer, workforce reassignment or reduction, and level of integration with other components.

      Vendor management readiness – ensuring that you have sufficient capabilities to manage vendors – should also be considered here.

      3. In-house capabilities

      Determine if you have the capability to deliver the IT solutions in-house. This will help you establish how easy it would be to insource an IT component.

      4. Ability to attract resources (internal vs. outsourced)

      Determine if the capability is one that is easily sourced with full-time, internal staff or if it is a specialty skill that is best left for a third-party to source.

      Determine your sourcing model using these criteria

      5. Cost

      Consider the total cost (investment and ongoing costs) of the delivery of the IT component for each of the potential sourcing models for a component.

      6. Quality

      Define the potential impact on the quality of the IT component being sourced by the possible sourcing models.

      7. Compliance

      Determine whether the sourcing model would fit with regulations in your industry. For example, a healthcare provider would only go for a cloud option if that provider is HIPAA compliant.

      8. Security

      Identify the extent to which each sourcing option would leave your organization open to security threats.

      9. Flexibility

      Determine the extent to which the sourcing model will allow your organization to scale up or down as demand changes.

      2.3 Identify capabilities that could be outsourced

      1-3 hours

      1. For each of the capabilities that will be in your future-state operating model, determine if it could be outsourced. Review the sourcing criteria available on the previous slide to help inform which sourcing strategy you will use for each capability.
      2. When looking to outsource or co-source capabilities, consider why that capability would be outsourced:
      • Competitive Advantage – Work with a third-party organization for the knowledge, insights, and best practices they can bring to your organization.
      • Managed Service – The third party manages a capability or function for your organization.
      • Staff Augmentation – Your organization brings in contractors and third-party organizations to fill specific skills gaps.
    • Place an asterisk (*) around the capabilities that will be leveraging one of the three previous sourcing options.
    • InputOutput
      • Customized IT capabilities
      • Sourcing strategy for each IT capability
      MaterialsParticipants
      • Whiteboard/Flip Charts
      • CIO
      • IT Leadership

      Record the results in the Organizational Design Workbook

      What is an operating model?

      Leverage a cohesive operating model throughout the organizational design process.

      An IT operating model sketch is a visual representation of the way your IT organization needs to be designed and the capabilities it requires to deliver on the business mission, strategic objectives, and technological ambitions. It ensures consistency of all elements in the organizational structure through a clear and coherent blueprint.

      The visual should be the optimization and alignment of the IT organization’s structure to deliver the capabilities required to achieve business goals. Additionally, it should clearly show the flow of work so that key stakeholders can understand where inputs flow in and outputs flow out of the IT organization. Investing time in the front end getting the operating model right is critical. This will give you a framework to rationalize future organizational changes, allowing you to be more iterative and your model to change as the business changes.

      The image contains an example of an operating model as described in the text above.

      Info-Tech Insight

      Every structure decision you make should be based on an identified need, not on a trend.Build your IT organization to enable the priorities of the organization.

      Each IT operating model is characterized by a variety of advantages and disadvantages

      Centralized

      Hybrid

      Decentralized

      Advantages
      • Maximum flexibility to allocate IT resources across business units.
      • Low-cost delivery model and greatest economies of scale.
      • Control and consistency offers opportunity for technological rationalization and standardization and volume purchasing at the highest degree.
      • Centralizes processes and services that require consistency across the organization.
      • Decentralizes processes and services that need to be responsive to local market conditions.
      • Eliminates duplication and redundancy by allowing effective use of common resources (e.g. shared services, standardization).
      • Goals are aligned to the distinct business units or functions.
      • Greater flexibility and more timely delivery of services.
      • Development resources are highly knowledgeable about business-unit-specific applications.
      • Business unit has greatest control over IT resources and can set and change priorities as needed.

      Disadvantages

      • Less able to respond quickly to local requirements with flexibility.
      • IT can be resistant to change and unwilling to address the unique needs of end users.
      • Business units can be frustrated by perception of lack of control over resources.
      • Development of special business knowledge can be limited.
      • Requires the most disciplined governance structure and the unwavering commitment of the business; therefore, it can be the most difficult to maintain.
      • Requires new processes as pooled resources must be staffed to approved projects.
      • Redundancies, conflicts, and incompatible technologies can result from business units having differentiated services and applications – increasing cost.
      • Ability to share IT resources is low due to lack of common approaches.
      • Lack of integration limits the communication of data between businesses and reduces common reporting.

      Decentralization can take many forms – define what it means to your organization

      Decentralization can take a number of different forms depending on the products the organization supports and how the organization is geographically distributed. Use the following set of explanations to understand the different types of decentralization possible and when they may make sense for supporting your organizational objectives.

      Line of Business

      Decentralization by lines of business (LoB) aligns decision making with business operating units based on related functions or value streams. Localized priorities focus the decision making from the CIO or IT leadership team. This form of decentralization is beneficial in settings where each line of business has a unique set of products or services that require specific expertise or flexible resourcing staffing between the teams.

      Product Line

      Decentralization by product line organizes your team into operationally aligned product families to improve delivery throughput, quality, and resource flexibility within the family. By adopting this approach, you create stable product teams with the right balance between flexibility and resource sharing. This reinforces value delivery and alignment to enterprise goals within the product lines.

      Geographical

      Geographical decentralization reflects a shift from centralized to regional influences. When teams are in different locations, they can experience a number of roadblocks to effective communication (e.g. time zones, regulatory differences in different countries) that may necessitate separating those groups in the organizational structure, so they have the autonomy needed to make critical decisions.

      Functional

      Functional decentralization allows the IT organization to be separated by specialty areas. Organizations structured by functional specialization can often be organized into shared service teams or centers of excellence whereby people are grouped based on their technical, domain, or functional area within IT (Applications, Data, Infrastructure, Security, etc.). This allows people to develop specialized knowledge and skills but can also reinforce silos between teams.

      2.4 Review and select a base operating model sketch

      1 hour

      1. Review the set of base operating model sketches available on the following slides.
      2. For each operating model sketch, there are benefits and risks to be considered. Make an informed selection by understanding the risks that your organization might be taking on by adopting that particular operating model.
      3. If at any point in the selection process the group is unsure about which operating model will be the right fit, refer back to your design principles established in activity 1.4. These should guide you in the selection of the right operating model and eliminate those which will not serve the organization.
      InputOutput
      • Organizational design principles
      • Customized list of IT capabilities
      • Operating model sketch examples
      • Selected operating model sketch
      MaterialsParticipants
      • Whiteboard/Flip Charts
      • CIO
      • IT Leadership

      Record the results in the Organizational Design Workbook

      Centralized Operating Model #1: Plan-Build-Run

      I want to…

      • Establish a formalized governance process that takes direction from the organization on which initiatives should be prioritized by IT.
      • Ensure there is a clear separation between teams that are involved in strategic planning, building solutions, and delivering operational support.
      • Be able to plan long term by understanding the initiatives that are coming down the pipeline and aligning to an infrequent budgeting plan.

      BENEFITS

      • Effective at implementing long-term plans efficiently; separates maintenance and projects to allow each to have the appropriate focus.
      • More oversight over financials; better suited for fixed budgets.
      • Works across centralized technology domains to better align with the business’ strategic objectives – allows for a top-down approach to decision making.
      • Allows for economies of scale and expertise pooling to improve IT’s efficiency.
      • Well-suited for a project-driven environment that employs waterfall or a hybrid project management methodology that is less iterative.

      RISKS

      • Creates artificial silos between the build (developers) and run (operations staff) teams, as both teams focus on their own responsibilities and often fail to see the bigger picture.
      • Miss opportunities to deliver value to the organization or innovate due to an inability to support unpredictable/shifting project demands as decision making is centralized in the plan function.
      • The portfolio of initiatives being pursued is often determined before requirements analysis takes place, meaning the initiative might be solving the wrong need or problem.
      • Depends on strong hand-off processes to be defined and strong knowledge transfer from build to run functions in order to be successful.
      The image contains an example of a Centralized Operating Model: Plan-Build-Run.

      Centralized Operating Model #2: Demand-Develop-Service

      I want to…

      • Listen to the business to understand new initiatives or service enhancements being requested.
      • Enable development and operations to work together to seamlessly deliver in a DevOps culture.
      • Govern and confirm that initiatives being requested by the business are still aligned to IT’s overarching strategy and roadmap before prioritizing those initiatives.

      BENEFITS

      • Aligns well with an end-to-end services model; constant attention to customer demand and service supply.
      • Centralizes service operations under one functional area to serve shared needs across lines of business.
      • Allows for economies of scale and expertise pooling to improve IT’s efficiency.
      • Elevates sourcing and vendor management as its own strategic function; lends well to managed service and digital initiatives.
      • Development and operations housed together; lends well to DevOps-related initiatives and reduces the silos between these two core groups.

      RISKS

      • IT prioritizes the initiatives it thinks are a priority to the business based on how well it establishes good stakeholder relations and communications.
      • Depends on good governance to prevent enhancements and demands from being prioritized without approval from those with accountability and authority.
      • This model thrives in a DevOps culture but does not mean it ensures your organization is a “DevOps” organization. Be sure you're encouraging the right behaviors and attitudes.

      The image contains an example of a Centralized Operating Model: Demand, Develop, Service.

      Hybrid Operating Model #1: LOB/Functional Aligned

      I want to…

      • Better understand the various needs of the organization to align IT priorities and ensure the right services can be delivered.
      • Keep all IT decisions centralized to ensure they align with the overarching strategy and roadmap that IT has set.
      • Organize your shared services in a strategic manner that enables delivery of those services in a way that fits the culture of the organization and the desired method of operating.

      BENEFITS

      • Best of both worlds of centralization and decentralization; attempts to channel benefits from both centralized and decentralized models.
      • Embeds key IT functions that require business knowledge within functional areas, allowing for critical feedback and the ability to understand those business needs.
      • Places IT in a position to not just be “order takers” but to be more involved with the different business units and promote the value of IT.
      • Achieves economies of scale where necessary through the delivery of shared services that can be requested by the function.
      • Shared services can be organized to deliver in the best way that suits the organization.

      RISKS

      • Different business units may bypass governance to get their specific needs met by functions – to alleviate this, IT must have strong governance and prioritize amongst demand.
      • Decentralized role can be viewed as an order taker by the business if not properly embedded and matured.
      • No guaranteed synergy and integration across functions; requires strong communication, collaboration, and steering.
      • Cannot meet every business unit’s needs – can cause tension from varying effectiveness of the IT functions.

      The image contains an example of a Hybrid Operating Model: LOB/Functional Aligned.

      Hybrid Model #2: Product-Aligned Operating Model

      I want to…

      • Align my IT organization into core products (services) that IT provides to the organization and establish a relationship with those in the organization that have alignment to that product.
      • Have roles dedicated to the lifecycle of their product and ensure the product can continuously deliver value to the organization.
      • Maintain centralized set of standards as it applies to overall IT strategy, security, and architecture to ensure consistency across products and reduce silos.

      BENEFITS

      • Focus is on the full lifecycle of a product – takes a strategic view of how technology enables the organization.
      • Promotes centralized backlog around a specific value creator, rather than a traditional project focus that is more transactional.
      • Dedicated teams around the product family ensure you have all of the resources required to deliver on your product roadmap.
      • Reduces barriers between IT and business stakeholders; focuses on technology as a key strategic enabler.
      • Delivery is largely done through frequent releases that can deliver value.

      RISKS

      • If there is little or no business involvement, it could prevent IT from truly understanding business demand and prioritizing the wrong work.
      • A lack of formal governance can create silos between the IT products, causing duplication of efforts, missed opportunities for collaboration, and redundancies in application or vendor contracts.
      • Members of each product can interpret the definition of standards (e.g. architecture, security) differently.

      The image contains an example of the Hybrid Operating Model: Product-Aligned Operating Model.

      Hybrid Operating Model #3: Service-Aligned Operating Model

      I want to…

      • Decentralize the IT organization by the various IT services it offers to the organization while remaining centralized with IT strategy, governance, security and operational services.
      • Ensure IT services are defined and people resources are aligned to deliver on those services.
      • Enable each of IT’s services to have the autonomy to understand the business needs and be able to manage the operational and new project initiatives with a dedicated service owner or business relationship manager.

      BENEFITS

      • Strong enabler of agility as each service has the autonomy to make decisions around operational work versus project work based on their understanding of the business demand.
      • Individuals in similar roles that are decentralized across services are given coaching to provide common direction.
      • Allows teams to efficiently scale with service demand.
      • This is a structurally baseline DevOps model. Each group will have services built within that have their own dedicated teams that will handle the full gambit of responsibilities, from new features to enhancements and maintenance.

      RISKS

      • Service owners require a method to collaborate to avoid duplication of efforts or projects that conflict with the efforts of other IT services.
      • May result in excessive cost through role redundancies across different services, as each will focus on components like integration, stakeholder management, project management, and user experiences.
      • Silos cause a high degree of specialization, making it more difficult for team members to imagine moving to another defined service group, limiting potential career advancement opportunities.
      • The level of complex knowledge required by shared services (e.g. help desk) is often beyond what they can provide, causing them to rely on and escalate to defined service groups more than with other operating models.

      The image contains an example of the Hybrid Operating Model: Service-Aligned Operating Model.

      Decentralized Model: Division Decentralization (LoB, Geography, Function, Product)

      I want to…

      • Decentralize the IT organization to enable greater autonomy within specific groups that have differing customer demands and levels of support.
      • Maintain a standard level of service that can be provided by IT for all divisions.
      • Ensure each division has access to critical data and reports that supports informed decision making.

      BENEFITS

      • Organization around functions allows for diversity in approach in how areas are run to best serve a specific business unit’s needs.
      • Each functional line exists largely independently, with full capacity and control to deliver service at the committed SLAs.
      • Highly responsive to shifting needs and demands with direct connection to customers and all stages of the solution development lifecycle.
      • Accelerates decision making by delegating authority lower into the function.
      • Promotes a flatter organization with less hierarchy and more direct communication with the CIO.

      RISKS

      • Requires risk and security to be centralized and have oversight of each division to prevent the decisions of one division from negatively impacting other divisions or the enterprise.
      • Less synergy and integration across what different lines of business are doing can result in redundancies and unnecessary complexity.
      • Higher overall cost to the IT group due to role and technology duplication across different divisions.
      • It will be difficult to centralize aspects of IT in the future, as divisions adopt to a culture of IT autonomy.

      The image contains an example of the Decentralized Model: Division Decentralization.

      Enterprise Model: Multi-Modal

      I want to…

      • Have an organizational structure that leverages several different operating models based on the needs and requirements of the different divisions.
      • Provide autonomy and authority to the different divisions so they can make informed and necessary changes as they see fit without seeking approval from a centralized IT group.
      • Support the different initiatives the enterprise is focused on delivering and ensure the right model is adopted based on those initiatives.

      BENEFITS

      • Allows for the organization to work in ways that best support individual areas; for example, areas that support legacy systems can be supported through traditional operating models while areas that support digital transformations may be supported through more flexible operating models.
      • Enables a specialization of knowledge related to each division.

      RISKS

      • Inconsistency across the organization can lead to confusion on how the organization should operate.
      • Parts of the organization that work in more traditional operating models may feel limited in career growth and innovation.
      • Cross-division initiatives may require greater oversight and a method to enable operations between the different focus areas.

      The image contains an example of the Enterprise Model: Multi-Modal.

      Create enabling teams that bridge your divisions

      The following bridges might be necessary to augment your divisions:

      • Specialized augmentation: There might not be a sufficient number of resources to support each division. These teams will be leveraged across the divisions; this means that the capabilities needed for each division will exist in this bridge team, rather than in the division.
      • Centers of Excellence: Capabilities that exist within divisions can benefit from shared knowledge across the enterprise. Your organization might set up centers of excellence to support best practices in capabilities organization wide. These are Forums in the unfix model, or communities of practice and support capability development rather than deliveries of each division.
      • Facilitation teams might be required to support divisions through coaching. This might include Agile or other coaches who can help teams adopt practices and embed learnings.
      • Holistic teams provide an enterprise view as they work with various divisions. This can include capabilities like user experience, which can benefit from the holistic perspective rather than a siloed one. People with these capabilities augment the divisions on an as-needed basis.
      The image contains a diagram to demonstrate the use of bridges on divisions.

      2.5 Customize the selected sketch to reflect the desired future state

      1-3 hours

      1. Using the baseline operating model sketch, walk through each of the IT capabilities. Based on the outputs from activity 2.1:
        1. Remove any capabilities for which your IT organization is not responsible and/or accountable.
        2. Augment the language of specific capabilities that you feel are not directly reflective of what is being done within your organizational context or that you feel need to be changed to reflect more specifically how work is being done in your organization.
        3. Add any core capabilities from your organization that are missing from the provided IT capability list.
      2. Move capabilities to the right places in the operating model to reflect how each of the core IT processes should interact with one another.
      3. Add bridges as needed to support the divisions in your organization. Identify which capabilities will sit in these bridges and define how they will enable the operating model sketch to deliver.
      InputOutput
      • Selected base operating model sketch
      • Customized list of IT capabilities
      • Understanding of outsourcing and gaps
      • Customized operating model sketch
      MaterialsParticipants
      • Whiteboard/flip charts
      • Operating model sketch examples
      • CIO
      • IT Leadership

      Record the results in the Organizational Design Workbook

      Document the final operating model sketch in the Communications Deck

      Phase 3

      Formalize the Organizational Structure

      This phase will walk you through the following activities:

      3.1 Create work units

      3.2 Create work unit mandates

      3.3 Define roles inside the work units

      3.4 Finalize the organizational chart

      3.5 Identify and mitigate key risks

      This phase involves the following participants:

      • CIO
      • IT Leadership
      • Business Leadership

      Embed change management into the organizational design process

      Enable adoption of the new structure.

      You don’t have to make the change in one big bang. You can adopt alternative transition plans such as increments or pilots. This allows people to see the benefits of why you are undergoing the change, allows the change message to be repeated and applied to the individuals impacted, and provides people with time to understand their role in making the new organizational structure successful.

      “Transformational change can be invigorating for some employees but also highly disruptive and stressful for others.”

      Source: OpenStax, 2019

      Info-Tech Insight

      Without considering the individual impact of the new organizational structure on each of your employees, the change will undoubtedly fail in meeting its intended goals and your organization will likely fall back into old structured habits.

      Use a top-down approach to build your target-state IT organizational sketch

      The organizational sketch is the outline of the organization that encompasses the work units and depicts the relationships among them. It’s important that you create the structure that’s right for your organization, not one that simply fits with your current staff’s skills and knowledge. This is why Info-Tech encourages you to use your operating model as a mode of guidance for structuring your future-state organizational sketch.

      The organizational sketch is made up of unique work units. Work units are the foundational building blocks on which you will define the work that IT needs to get done. The number of work units you require and their names will not match your operating model one to one. Certain functional areas will need to be broken down into smaller work units to ensure appropriate leadership and span of control.

      Use your customized operating model to build your work units

      WHAT ARE WORK UNITS?

      A work unit is a functional group or division that has a discrete set of processes or capabilities that it is responsible for, which don’t overlap with any others. Your customized list of IT capabilities will form the building blocks of your work units. Step one in the process of building your structure is grouping IT capabilities together that are similar or that need to be done in concert in the case of more complex work products. The second step is to iterate on these work units based on the organizational design principles from Phase 1 to ensure that the future-state structure is aligned with enablement of the organization’s objectives.

      Work Unit Examples

      Here is a list of example work units you can use to brainstorm what your organization’s could look like. Some of these overlap in functionality but should provide a strong starting point and hint at some potential alternatives to your current way of organizing.

      • Office of the CIO
      • Strategy and Architecture
      • Architecture and Design
      • Business Relationship Management
      • Projection and Portfolio Management
      • Solution Development
      • Solution Delivery
      • DevOps
      • Infrastructure and Operations
      • Enterprise Information Security
      • Security, Risk & Compliance
      • Data and Analytics

      Example of work units

      The image contains an example of work units.

      3.1 Create functional work units

      1-3 hours

      1. Using a whiteboard or large tabletop, list each capability from your operating model on a sticky note and recreate your operating model. Use one color for centralized activities and a second color for decentralized activities.
      2. With the group of key IT stakeholders, review the operating model and any important definitions and rationale for decisions made.
      3. Starting with your centralized capabilities, review each in turn and begin to form logical groups of compatible capabilities. Review the decentralized capabilities and repeat the process, writing additional sticky notes for capabilities that will be repeated in decentralized units.
      4. Note: Not all capabilities need to be grouped. If you believe that a capability has a high enough priority, has a lot of work, or is significantly divergent from others put this capability by itself.
      5. Define a working title for each new work unit, and discuss the pros and cons of the model. Ensure the work units still align with the operating model and make any changes to the operating model needed.
      6. Review your design principles and ensure that they are aligned with your new work units.
      InputOutput
      • Organizational business objectives
      • Customized operating model
      • Defined work units
      MaterialsParticipants
      • Whiteboard/Flip Charts
      • CIO
      • IT Leadership
      • Business Leadership

      Record the results in the Organizational Design Workbook

      Group formation

      Understand the impact of the functional groups you create.

      A group consists of two or more individuals who are working toward a common goal. Group formation is how those individuals are organized to deliver on that common goal. It should take into consideration the levels of hierarchy in your structure, the level of focus you give to processes, and where power is dispersed within your organizational design.

      Importance: Balance highly important capabilities with lower priority capabilities

      Specialization: The scope of each role will be influenced by specialized knowledge and a dedicated leader

      Effectiveness: Group capabilities that increase their efficacy

      Span of Control: Identify the right number of employees reporting to a single leader

      Choose the degree of specialization required

      Be mindful of the number of hats you’re placing on any one role.

      • Specialization exists when individuals in an organization are dedicated to performing specific tasks associated with a common goal and requiring a particular skill set. Aligning the competencies required to carry out the specific tasks based on the degree of complexity associated with those tasks ensures the right people and number of people can be assigned.
      • When people are organized by their specialties, it reduces the likelihood of task switching, reduces the time spent training or cross-training, and increases the focus employees can provide to their dedicated area of specialty.
      • There are disadvantages associated with aligning teams by their specialization, such as becoming bored and seeing the tasks they are performing as monotonous. Specialization doesn’t come without its problems. Monitor employee motivation

      Info-Tech Insight

      Smaller organizations will require less specialization simply out of necessity. To function and deliver on critical processes, some people might be asked to wear several hats.

      Avoid overloading the cognitive capacity of employees

      Cognitive load refers to the number of responsibilities that one can successfully take on.

      • When employees are assigned an appropriate number of responsibilities this leads to:
        • Engaged employees
        • Less task switching
        • Increased effectiveness on assigned responsibilities
        • Reduced bottlenecks
      • While this cognitive load can differ from employee to employee, when assigning role responsibilities, ensure each role isn’t being overburdened and spreading their focus thin.
      • Moreover, capable does not equal successful. Just because someone has the capability to take on more responsibilities doesn’t mean they will be successful.
      • Leverage the cognitive load being placed on your team to help create boundaries between teams and demonstrate clear role expectations.
      Source: IT Revolution, 2021

      Info-Tech Insight

      When you say you are looking for a team that is a “jack of all trades,” you are likely exceeding appropriate cognitive loads for your staff and losing productivity to task switching.

      Factors to consider for span of control

      Too many and too few direct reports have negative impacts on the organization.

      Complexity: More complex work should have fewer direct reports. This often means the leader will need to provide lots of support, even engaging in the work directly at times.

      Demand: Dynamic shifts in demand require more managerial involvement and therefore should have a smaller span of control. Especially if this demand is to support a 24/7 operation.

      Competency Level: Skilled employees should require less hands-on assistance and will be in a better position to support the business as a member of a larger team than those who are new to the role.

      Purpose: Strategic leaders are less involved in the day-to-day operations of their teams, while operational leaders tend to provide hands-on support, specifically when short-staffed.

      Group formation will influence communication structure

      Pick your poison…

      It’s important to understand the impacts that team design has on your services and products. The solutions that a team is capable of producing is highly dependent on how teams are structured. For example, Conway’s Law tells us that small distributed software delivery teams are more likely to produce modular service architecture, where large collocated teams are better able to create monolithic architecture. This doesn’t just apply to software delivery but also other products and services that IT creates. Note that small distributed teams are not the only way to produce quality products as they can create their own silos.

      Sources: Forbes, 2017

      Create mandates for each of your identified work units

      WHAT ARE WORK UNIT MANDATES?

      The work unit mandate should provide a quick overview of the work unit and be clear enough that any reader can understand why the work unit exists, what it does, and what it is accountable for.

      Each work unit will have a unique mandate. Each mandate should be distinguishable enough from your other work units to make it clear why the work is grouped in this specific way, rather than an alternative option. The mandate will vary by organization based on the agreed upon work units, design archetype, and priorities.

      Don’t just adopt an example mandate from another organization or continue use of the organization’s pre-existing mandate – take the time to ensure it accurately depicts what that group is doing so that its value-added activities are clear to the larger organization.

      Examples of Work Unit Mandates

      The Office of the CIO will be a strategic enabler of the IT organization, driving IT organizational performance through improved IT management and governance. A central priority of the Office of the CIO is to ensure that IT is able to respond to evolving environments and challenges through strategic foresight and a centralized view of what is best for the organization.

      The Project Management Office will provide standardized and effective project management practices across the IT landscape, including an identified project management methodology, tools and resources, project prioritization, and all steps from project initiation through to evaluation, as well as education and development for project managers across IT.

      The Solutions Development Group will be responsible for the high-quality development and delivery of new solutions and improvements and the production of customized business reports. Through this function, IT will have improved agility to respond to new initiatives and will be able to deliver high-quality services and insights in a consistent manner.

      3.2 Create work unit mandates

      1-3 hours

      1. Break into teams of three to four people and assign an equal number of work units to each team.
      2. Have each team create a set of statements that describe the overall purpose of that working group. Each mandate statement should:
      • Be clear enough that any reader can understand.
      • Explain why the work unit exists, what it does, and what it is accountable for.
      • Be distinguishable enough from your other work units to make it clear why the work is grouped in this specific way, rather than an alternative option.
    • Have each group present their work unit mandates and make changes wherever necessary.
    • InputOutput
      • Work units
      • Work unit mandates
      MaterialsParticipants
      • Whiteboard/Flip Charts
      • CIO
      • IT Leadership
      • Business Leadership

      Record the results in the Organizational Design Workbook

      Identify the key roles and responsibilities for the target IT organization

      Now that you have identified the main units of work in the target IT organization, it is time to identify the roles that will perform that work. At the end of this step, the key roles will be identified, the purpose statement will be built, and accountability and responsibility for roles will be clearly defined. Make sure that accountability for each task is assigned to one role only. If there are challenges with a role, change the role to address them (e.g. split roles or shift responsibilities).

      The image contains an example of two work units: Enterprise Architecture and PMO. It then lists the roles of the two work units.

      Info-Tech Insight

      Do not bias your role design by focusing on your existing staff’s competencies. If you begin to focus on your existing team members, you run the risk of artificially narrowing the scope of work or skewing the responsibilities of individuals based on the way it is, rather than the way it should be.

      3.3 Define roles inside the work units

      1-3 hours

      1. Select a work unit from the organizational sketch.
      2. Describe the most senior role in that work unit by asking, “what would the leader of this group be accountable or responsible for?” Define this role and move the capabilities they will be accountable for under that leader. Repeat this activity for the capabilities this leader would be responsible for.
      3. Continue to define each role that will be required in that work unit to deliver or provide oversight related to those capabilities.
      4. Continue until key roles are identified and the capabilities each role will be accountable or responsible for are clarified.
      5. Remember, only one role can have accountability for each capability but several can have responsibility.
      6. For each role, use the list of capabilities that the position will be accountable, responsible, or accountable and responsible for to create a job description. Leverage your own internal job descriptions or visit our Job Descriptions page.
      InputOutput
      • Work units
      • Work unit mandates
      • Responsibilities
      • Accountabilities
      • Roles with clarified responsibilities and accountabilities
      MaterialsParticipants
      • Whiteboard/Flip Charts
      • CIO
      • IT Leadership
      • Business Leadership

      Record the results in the Organizational Design Workbook

      Delivery model for product or solution development

      Can add additional complexity or clarity

      • Certain organizational structures will require a specific type of resourcing model to meet expectations and deliver on the development or sustainment of core products and solutions.
      • There are four common methods that we see in IT organizations:
        • Functional Roles: Completed work is handed off from functional team to functional team sequentially as outlined in the organization’s SDLC.
        • Shared Service & Resource Pools (Matrix): Resources are pulled whenever the work requires specific skills or pushed to areas where product demand is high.
        • Product or System: Work is directly sent to the teams who are directly managing the product or directly supporting the requestor.
        • Skills & Competencies: Work is directly sent to the teams who have the IT and business skills and competencies to complete the work.
      • Each of these will lead to a difference in how the functional team is skilled. They could have a great understanding of their customer, the product, the solution, or their service.

      Info-Tech Insight

      Despite popular belief, there is no such thing as the Spotify model, and organizations that structured themselves based on the original Spotify drawing might be missing out on key opportunities to obtain productivity from employees.

      Sources: Indeed, 2020; Agility Scales

      There can be different patterns to structure and resource your product delivery teams

      The primary goal of any product delivery team is to improve the delivery of value for customers and the business based on your product definition and each product’s demand. Each organization will have different priorities and constraints, so your team structure may take on a combination of patterns or may take on one pattern and then transform into another.

      Delivery Team Structure Patterns

      How Are Resources and Work Allocated?

      Functional Roles

      Teams are divided by functional responsibilities (e.g. developers, testers, business analysts, operations, help desk) and arranged according to their placement in the software development lifecycle (SDLC).

      Completed work is handed off from team to team sequentially as outlined in the organization’s SDLC.

      Shared Service and Resource Pools

      Teams are created by pulling the necessary resources from pools (e.g. developers, testers, business analysts, operations, help desk).

      Resources are pulled whenever the work requires specific skills or pushed to areas where product demand is high.

      Product or System

      Teams are dedicated to the development, support, and management of specific products or systems.

      Work is directly sent to the teams who are directly managing the product or directly supporting the requester.

      Skills and Competencies

      Teams are grouped based on skills and competencies related to technology (e.g. Java, mobile, web) or familiarity with business capabilities (e.g. HR, Finance).

      Work is directly sent to the teams who have the IT and business skills and competencies to complete the work.

      Delivery teams will be structured according to resource and development needs

      Functional Roles

      Shared Service and Resource Pools

      Product or System

      Skills and Competencies

      When your people are specialists versus having cross-functional skills

      Leveraged when specialists such as Security or Operations will not have full-time work on the product

      When you have people with cross-functional skills who can self-organize around a product’s needs

      When you have a significant investment in a specific technology stack

      The image contains a diagram of functional roles.The image contains a diagram of shared service and resource pools.The image contains a diagram of product or system.The image contains a diagram of skills and competencies.

      For more information about delivering in a product operating model, refer to our Deliver Digital Products at Scale blueprint.

      3.4 Finalize the organizational chart

      1-3 hours

      1. Import each of your work units and the target-state roles that were identified for each.
      2. In the place of the name of each work unit in your organizational sketch, replace the work unit name with the prospective role name for the leader of that group.
      3. Under each of the leadership roles, import the names of team members that were part of each respective work unit.
      4. Validate the final structure as a group to ensure each of the work units includes all the necessary roles and responsibilities and that there is clear delineation of accountabilities between the work units.

      Input

      Output

      • Work units
      • Work unit mandates
      • Roles with accountabilities and responsibilities
      • Finalized organizational chart

      Materials

      Participants

      • Whiteboard/Flip Charts
      • CIO
      • IT Leadership
      • Business Leadership

      Record the results in the Organizational Design Workbook & Executive Communications Deck

      Proactively consider and mitigate redesign risks

      Every organizational structure will include certain risks that should have been considered and accepted when choosing the base operating model sketch. Now that the final organizational structure has been created, consider if those risks were mitigated by the final organizational structure that was created. For those risks that weren’t mitigated, have a tactic to control risks that remain present.

      3.5 Identify and mitigate key risks

      1-3 hours

      1. For each of the operating model sketch options, there are specific risks that should have been considered when selecting that model.
      2. Take those risks and transfer them into the correct slide of the Organizational Design Workbook.
      3. Consider if there are additional risks that need to be considered with the new organizational structure based on the customizations made.
      4. For each risk, rank the severity of that risk on a scale of low, medium, or high.
      5. Determine one or more mitigation tactic(s) for each of the risks identified. This tactic should reduce the likelihood or impact of the risk event happening.
      InputOutput
      • Final organizational structure
      • Operating model sketch benefits and risks
      • Redesign risk mitigation plan
      MaterialsParticipants
      • Whiteboard/Flip Charts
      • CIO
      • IT Leadership
      • Business Leadership

      Record the results in the Organizational Design Workbook

      Phase 4

      Plan for Implementation & Change

      This phase will walk you through the following activities:

      4.1 Select a transition plan

      4.2 Establish the change communication messages

      4.3 Be consistent with a standard set of FAQs

      4.4 Define org. redesign resistors

      4.5 Create a sustainment plan

      This phase involves the following participants:

      • CIO
      • IT Leadership
      • Business Leadership
      • HR Business Partners

      All changes require change management

      Change management is:

      Managing a change that requires replanning and reorganizing and that causes people to feel like they have lost control over aspects of their jobs.

      – Padar et al., 2017
      People Process Technology

      Embedding change management into organizational design

      PREPARE A

      Awareness: Establish the need for organizational redesign and ensure this is communicated well.

      This blueprint is mostly focused on the prepare and transition components.

      D

      Desire: Ensure the new structure is something people are seeking and will lead to individual benefits for all.

      TRANSITION K

      Knowledge: Provide stakeholders with the tools and resources to function in their new roles and reporting structure.

      A

      Ability: Support employees through the implementation and into new roles or teams.

      FUTURE R

      Reinforcement: Emphasize and reward positive behaviors and attitudes related to the new organizational structure.

      Implementing the new organizational structure

      Implementing the organizational structure can be the most difficult part of the process.

      • To succeed in the process, consider creating an implementation plan that adequately considers these five components.
      • Each of these are critical to supporting the final organizational structure that was established during the redesign process.

      Implementation Plan

      Transition Plan: Identify the appropriate approach to making the transition, and ensure the transition plan works within the context of the business.

      Communication Strategy: Create a method to ensure consistent, clear, and concise information can be provided to all relevant stakeholders.

      Plan to Address Resistance: Given that not everyone will be happy to move forward with the new organizational changes, ensure you have a method to hear feedback and demonstrate concerns have been heard.

      Employee Development Plan: Provide employees with tools, resources, and the ability to demonstrate these new competencies as they adjust to their new roles.

      Monitor and Sustain the Change: Establish metrics that inform if the implementation of the new organizational structure was successful and reinforce positive behaviors.

      Define the type of change the organizational structure will be

      As a result, your organization must adopt OCM practices to better support the acceptance and longevity of the changes being pursued.

      Incremental Change

      Transformational Change

      Organizational change management is highly recommended and beneficial for projects that require people to:

      • Adopt new tools and workflows.
      • Learn new skills.
      • Comply with new policies and procedures.
      • Stop using old tools and workflows.

      Organizational change management is required for projects that require people to:

      • Move into different roles, reporting structures, and career paths.
      • Embrace new responsibilities, goals, reward systems, and values.
      • Grow out of old habits, ideas, and behaviors.
      • Lose stature in the organization.

      Info-Tech Insight

      How you transition to the new organizational structure can be heavily influenced by HR. This is the time to be including them and leveraging their expertise to support the transition “how.”

      Transition Plan Options

      Description

      Pros

      Cons

      Example

      Big Bang Change

      Change that needs to happen immediately – “ripping the bandage off.”

      • It puts an immediate stop to the current way of operating.
      • Occurs quickly.
      • More risky.
      • People may not buy into the change immediately.
      • May not receive the training needed to adjust to the change.

      A tsunami in Japan stopped all imports and exports. Auto manufacturers were unable to get parts shipped and had to immediately find an alternative supplier.

      Incremental Change

      The change can be rolled out slower, in phases.

      • Can ensure that people are bought in along the way through the change process, allowing time to adjust and align with the change.
      • There is time to ensure training takes place.
      • It can be a timely process.
      • If the change is dragged on for too long (over several years) the environment may change and the rationale and desired outcome for the change may no longer be relevant.

      A change in technology, such as HRIS, might be rolled out one application at a time to ensure that people have time to learn and adjust to the new system.

      Pilot Change

      The change is rolled out for only a select group, to test and determine if it is suitable to roll out to all impacted stakeholders.

      • Able to test the success of the change initiative and the implementation process.
      • Able to make corrections before rolling it out wider, to aid a smooth change.
      • Use the pilot group as an example of successful change.
      • Able to gain buy-in and create change champions from the pilot group who have experienced it and see the benefits.
      • Able to prevent an inappropriate change from impacting the entire organization.
      • Lengthy process.
      • Takes time to ensure the change has been fully worked through.

      A retail store is implementing a new incentive plan to increase product sales. They will pilot the new incentive plan at select stores, before rolling it out broadly.

      4.1 Select a transition plan approach

      1-3 hours

      1. List each of the changes required to move from your current structure to the new structure. Consider:
        1. Changes in reporting structure
        2. Hiring new members
        3. Eliminating positions
        4. Developing key competencies for staff
      2. Once you’ve defined all the changes required, consider the three different transition plan approaches: big bang, incremental, and pilot. Each of the transition plan approaches will have drawbacks and benefits. Use the list of changes to inform the best approach.
      3. If you are proceeding with the incremental or the pilot, determine the order in which you will proceed with the changes or the groups that will pilot the new structure first.
      InputOutput
      • Customized operating model sketch
      • New org. chart
      • Current org. chart
      • List of changes to move from current to future state
      • Transition plan to support changes
      MaterialsParticipants
      • Whiteboard/Flip Charts
      • CIO
      • IT Leadership
      • HR Business Partners

      Record the results in the Organizational Design Workbook

      Make a plan to effectively manage and communicate the change

      Success of your new organizational structure hinges on adequate preparation and effective communication.

      The top challenge facing organizations in completing the organizational redesign is their organizational culture and acceptance of change. Effective planning for the implementation and communication throughout the change is pivotal. Make sure you understand how the change will impact staff and create tailored plans for communication.

      65% of managers believe the organizational change is effective when provided with frequent and clear communication.

      Source: SHRM, 2021

      Communicate reasons for organizational structure changes and how they will be implemented

      Leaders of successful change spend considerable time developing a powerful change message, i.e. a compelling narrative that articulates the desired end state, and that makes the change concrete and meaningful to staff.

      The organizational change message should:

      • Explain why the change is needed.
      • Summarize what will stay the same.
      • Highlight what will be left behind.
      • Emphasize what is being changed.
      • Explain how change will be implemented.
      • Address how change will affect various roles in the organization.
      • Discuss the staff’s role in making the change successful.

      Five elements of communicating change

      • What is the change?
      • Why are we doing it?
      • How are we going to go about it?
      • How long will it take us to do it?
      • What will the role be for each department and individual?
      Source: Cornelius & Associates, 2010

      4.2 Establish the change communication messages

      2 hours

      1. The purpose of this activity is to establish a change communication message you can leverage when talking to stakeholders about the new organizational structure.
      2. Review the questions in the Organizational Design Workbook.
      3. Establish a clear message around the expected changes that will have to take place to help realize the new organizational structure.
      InputOutput
      • Customized operating model sketch
      • New org. chart
      • Current org. chart
      • List of changes
      • Transition plan
      • Change communication message for new organizational structure
      MaterialsParticipants
      • Whiteboard/Flip Charts
      • CIO
      • IT Leadership
      • Business Leadership

      Record the results in the Organizational Design Workbook

      Apply the following communication principles to make your IT organization redesign changes relevant to stakeholders

      Be Clear

      • Say what you mean and mean what you say.
      • Choice of language is important: “Do you think this is a good idea? I think we could really benefit from your insights and experience here.” Or do you mean: “I think we should do this. I need you to do this to make it happen.”
      • Don’t use jargon.

      Be Consistent

      • The core message must be consistent regardless of audience, channel, or medium.
      • Test your communication with your team or colleagues to obtain feedback before delivering to a broader audience.
      • A lack of consistency can be interpreted as an attempt at deception. This can hurt credibility and trust.

      Be Concise

      • Keep communication short and to the point so key messages are not lost in the noise.
      • There is a risk of diluting your key message if you include too many other details.

      Be Relevant

      • Talk about what matters to the stakeholder.
      • Talk about what matters to the initiative.
      • Tailor the details of the message to each stakeholder’s specific concerns.
      • IT thinks in processes but stakeholders only care about results: talk in terms of results.
      • IT wants to be understood but this does not matter to stakeholders. Think: “what’s in it for them?”
      • Communicate truthfully; do not make false promises or hide bad news.

      Frequently asked questions (FAQs) provide a chance to anticipate concerns and address them

      As a starting point for building an IT organizational design implementation, look at implementing an FAQ that will address the following:

      • The what, who, when, why, and where
      • The transition process
      • What discussions should be held with clients in business units
      • HR-centric questions

      Questions to consider answering:

      • What is the objective of the IT organization?
      • What are the primary changes to the IT organization?
      • What does the new organizational structure look like?
      • What are the benefits to our IT staff and to our business partners?
      • How will the IT management team share new information with me?
      • What is my role during the transition?
      • What impact is there to my reporting relationship within my department?
      • What are the key dates I should know about?

      4.3 Be consistent with a standard set of FAQs

      1 hour

      1. Beyond the completed communications plans, brainstorm a list of answers to the key “whats” of your organizational design initiative:
      • What is the objective of the IT organization?
      • What are the primary changes to the IT organization?
      • What does the new organizational structure look like?
      • What are the benefits to our IT staff and to our business partners?
    • Think about any key questions that may rise around the transition:
      • How will the IT management team share new information with me?
      • What is my role during the transition?
      • What impact is there to my reporting relationship within my department?
      • What are the key dates I should know about?
    • Determine the best means of socializing this information. If you have an internal wiki or knowledge-sharing platform, this would be a useful place to host the information.
    • InputOutput
      • Driver(s) for the new organizational structure
      • List of changes to move from current to future state
      • Change communication message
      • FAQs to provide to staff about the organizational design changes
      MaterialsParticipants
      • Whiteboard/Flip Charts
      • CIO
      • IT Leadership
      • Business Leadership

      Record the results in the Organizational Design Workbook

      The change reaction model

      The image contains a picture of the change reaction model. The model includes a double arrow pointing in both directions of left and right. On top of the arrow are 4 circles spread out on the arrow. They are labelled: Active Resistance, Detachment, Questioning, Acceptance.

      (Adapted from Cynthia Wittig)

      Info-Tech Insight

      People resist changes for many reasons. When it comes to organizational redesign changes, some of the most common reasons people resist change include a lack of understanding, a lack of involvement in the process, and fear.

      Include employees in the employee development planning process

      Prioritize

      Assess employee to determine competency levels and interests.

      Draft

      Employee drafts development goals; manager reviews.

      Select

      Manager helps with selection of development activities.

      Check In

      Manager provides ongoing check-ins, coaching, and feedback.

      Consider core and supplementary components that will sustain the new organizational structure

      Supplementary sustainment components:

      • Tools & Resources
      • Structure
      • Skills
      • Work Environment
      • Tasks
      • Disincentives

      Core sustainment components:

      • Empowerment
      • Measurement
      • Leadership
      • Communication
      • Incentives

      Sustainment Plan

      Sustain the change by following through with stakeholders, gathering feedback, and ensuring that the change rationale and impacts are clearly understood. Failure to so increases the potential that the change initiative will fail or be a painful experience and cost the organization in terms of loss of productivity or increase in turnover rates.

      Support sustainment with clear measurements

      • Measurement is one of the most important components of monitoring and sustaining the new organizational structure as it provides insight into where the change is succeeding and where further support should be added.
      • There should be two different types of measurements:
      1. Standard Change Management Metrics
      2. Organizational Redesign Metrics
    • When gathering data around metrics, consider other forms of measurement (qualitative) that can provide insights on opportunities to enhance the success of the organizational redesign change.
      1. Every measurement should be rooted to a goal. Many of the goals related to organizational design will be founded in the driver of this change initiative
      2. Once the goals have been defined, create one or more measurements that determines if the goal was successful.
      3. Use specific key performance indicators (KPIs) that contain a metric that is being measured and the frequency of that measurement.

      Info-Tech Insight

      Obtaining qualitative feedback from employees, customers, and business partners can provide insight into where the new organizational structure is operating optimally versus where there are further adjustments that could be made to support the change.

      4.4 Consider sustainment metrics

      1 hour

      1. Establish metrics that bring the entire process together and that will ensure the new organizational design is a success.
      2. Go back to your driver(s) for the organizational redesign. Use these drivers to help inform a particular measurement that can be used to determine if the new organizational design will be successful. Each measurement should be related to the positive benefits of the organization, an individual, or the change itself.
      3. Once you have a list of measurements, use these to determine the specific KPI that can be qualified through a metric. Often you are looking for an increase or decrease of a particular measurement by a dollar or percentage within a set time frame.
      4. Use the example metrics in the workbook and update them to reflect your organization’s drivers.
      InputOutput
      • Driver(s) for the new organizational structure
      • List of changes to move from current to future state
      • Change communication message
      • Sustainment metrics
      MaterialsParticipants
      • Whiteboard/Flip Charts
      • CIO
      • IT Leadership
      • Business Leadership

      Record the results in the Organizational Design Workbook

      Related Info-Tech Research

      Build a Strategic IT Workforce Plan

      • Continue into the second phase of the organizational redesign process by defining the required workforce to deliver.
      • Leveraging trends, data, and feedback from your employees, define the competencies needed to deliver on the defined roles.

      Implement a New IT Organizational Structure

      • Organizational design implementations can be highly disruptive for IT staff and business partners.
      • Without a structured approach, IT leaders may experience high turnover, decreased productivity, and resistance to the change.

      Define the Role of Project Management in Agile and Product-Centric Delivery

      • There are many voices with different opinions on the role of project management. This causes confusion and unnecessary churn.
      • Project management and product management naturally align to different time horizons. Harmonizing their viewpoints can take significant work.

      Research Contributors and Experts

      The image contains a picture of Jardena London.

      Jardena London

      Transformation Catalyst, Rosetta Technology Group

      The image contains a picture of Jodie Goulden.

      Jodie Goulden

      Consultant | Founder, OrgDesign Works

      The image contains a picture of Shan Pretheshan.

      Shan Pretheshan

      Director, SUPA-IT Consulting

      The image contains a picture of Chris Briley.

      Chris Briley

      CIO, Manning & Napier

      The image contains a picture of Dean Meyer.

      Dean Meyer

      President N. Dean Meyer and Associates Inc.

      The image contains a picture of Jimmy Williams.

      Jimmy Williams

      CIO, Chocktaw Nation of Oklahoma

      Info-Tech Research Group

      Cole Cioran, Managing Partner

      Dana Daher, Research Director

      Hans Eckman, Principal Research Director

      Ugbad Farah, Research Director

      Ari Glaizel, Practice Lead

      Valence Howden, Principal Research Director

      Youssef Kamar, Senior Manager, Consulting

      Carlene McCubbin, Practice Lead

      Baird Miller, Executive Counsellor

      Josh Mori, Research Director

      Rajesh Parab, Research Director

      Gary Rietz, Executive Counsellor

      Bibliography

      “A Cheat Sheet for HR Professionals: The Organizational Development Process.” AIHR, 2021. Web.

      Acharya, Ashwin, Roni Lieber, Lissa Seem, and Tom Welchman. “How to identify the right ‘spans of control’ for your organization.” McKinsey, 21 December 2017. Web.

      Anand. N., and Jean-Louis Barsoux. “What everyone gets wrong about change management. Harvard Business Review, December 2017. Web.

      Atiken, Chris. “Operating model design-first principles.” From Here On, 24 August 2018. Web.

      “Avoid common digital transformation challenges: Address your IT Operating Model Now.” Sofigate, 5 May 2020. Web.

      Baumann, Oliver, and Brian Wu. “The many dimensions of research on designing flat firms.” Journal of Organizational Design, no. 3, vol. 4. 09 May 2022.Web.

      Bertha, Michael. “Cross the project to product chasm.” CIO, 1 May 2020. Web.

      Blenko, Marcia, and James Root. “Design Principles for a Robust Operating Model.” Bain & Company, 8 April 2015. Web.

      Blenko, Marcia, Leslie Mackrell, and Kevin Rosenberg. “Operating models: How non-profits get from strategy to results.” The Bridge Span Group, 15 August 2019. Web.

      Boulton, Clint. “PVH finds perfect fit in hybrid IT operating model amid pandemic.” CIO, 19 July 2021. Web.

      Boulton, Clint. “Why digital disruption leaves no room for bimodal IT.” CIO, 11 May 2017. Web.

      Bright, David, et al. “Chapter 10: Organizational Structure & Change.” Principles of Management, OpenStax, Rice University, 20 March 2019. Book.

      Campbell, Andrew. “Design Principles: How to manage them.” Ashridge Operating Models. 1 January 2022. Web.

      D., Maria. “3 Types of IT Outsourcing Models and How to Choose Between Them.” Cleveroad, 29 April 2022. Web.

      Devaney, Eric. “9 Types of Organizational Structure Every Company Should Consider.” HubSpot, 11 February 2022. Web.

      Devaney, Erik. “The six building blocks of organizational structure.” Hubspot, 3 June 2020. Web.

      Eisenman, M., S. Paruchuri, and P. Puranam. “The design of emergence in organizations.” Journal of Organization Design, vol. 9, 2020. Web.

      Forbes Business Development Council. “15 Clear Signs It’s Time to Restructure the Business.” Forbes, 10 February 2020. Web.

      Freed, Joseph. “Why Cognitive Load Could Be The Most Important Employee Experience Metric In The Next 10 Years.” Forbes, 30 June 2020. Web.

      Galibraith, Jay. “The Star Model.” JayGalbraith.com, n.d. Web.

      Girod, Stéphane, and Samina Karim. “Restructure or reconfigure?” Harvard Business Review, April 2017. Web.

      Goldman, Sharon. “The need for a new IT Operating Model: Why now?” CIO, 27 August 2019. Web.

      Halapeth, Milind. “New age IT Operating Model: Creating harmony between the old and the new.” Wirpo, n.d. Web.

      Harvey, Michelle. “Why a common operating model is efficient for business productivity.” CMC, 10 May 2020. Web.

      Helfand, Heidi. “Dynamic Reteaming.” O’Reilly Media, 7 July 2020. Book.

      JHeller, Martha. “How Microsoft CIO Jim DuBois changed the IT Operating Model.” CIO, 2 February 2016. Web.

      Heller, Martha. “How Stryker IT Shifted to a global operating model.” CIO, 19 May 2021. Web.

      Heller, Michelle. “Inside blue Shields of California’s IT operating model overhaul.” CIO, 24 February 2021. Web.

      Hessing, Ted. “Value Stream Mapping.” Six Sigma Study Guide, 11 April 2014. Web.

      Huber, George, P. “What is Organization Design.” Organizational Design Community, n.d. Web.

      Indeed Editorial Team. “5 Advantages and Disadvantages of the Matrix Organizational Structure.” Indeed, 23 November 2020. Web.

      Indeed Editorial Team. “How to plan an effective organization restructure.” Indeed, 10 June 2021. Web.

      “Insourcing vs Outsourcing vs Co-Sourcing.” YML Group, n.d. Web.

      “Investing in more strategic roles.” CAPS Research, 3 February 2022. Web.

      Jain, Gagan. “Product IT Operating Model: The next-gen model for a digital work.” DevOps, 22 July 2019. Web.

      Kane, Gerald, D. Plamer, and Anh Phillips. “Accelerating Digital Innovation Inside and Out.” Deloitte Insights, 4 June 2019. Web.

      Krush, Alesia. “IT companies with ‘flat’ structures: utopia or innovative approach?” Object Style, 18 October 2018. Web.

      Law, Michael. “Adaptive Design: Increasing Customer Value in Your Organisation.” Business Agility Institute, 5 October 2020. Web.

      LucidContent Team. “How to get buy-in for changes to your organizational structure.” Lucid Chart, n.d. Web.

      Matthews, Paul. “Do you know the difference between competence and capability?” The People Development Magazine, 25 September 2020. Web.

      Meyer, Dean N. “Analysis: Common symptoms of organizational structure problems.” NDMA, n.d. Web.

      Meyer, N. Dean. “Principle-based Organizational Structure.” NDMA Publishing, 2020. Web.

      Morales Pedraza, Jorge. Answer to posting, “What is the relationship between structure and strategy?” ResearchGate.net, 5 March 2014. Web.

      Nanjad, Len. “Five non-negotiables for effective organization design change.” MNP, 01 October 2021. Web.

      Neilson, Gary, Jaime Estupiñán, and Bhushan Sethi. “10 Principles of Organizational Design.” Strategy & Business, 23 March 2015. Web.

      Nicastro, Dom. “Understanding the Foundational Concepts of Organizational Design.” Reworked, 24 September 2020. Web.

      Obwegeser, Nikolaus, Tomoko Yokoi, Michael Wade, and Tom Voskes. “7 Key Principles to Govern Digital Initiatives.” MIT Sloan, 1 April 2020. Web.

      “Operating Models and Tools.” Business Technology Standard, 23 February 2021. Web.

      “Organizational Design Agility: Journey to a combined community.” ODF-BAI How Space, Organizational Design Forum, 2022. Web.

      “Organizational Design: Understanding and getting started.” Ingentis, 20 January 2021. Web.

      Padar, Katalin, et al. “Bringing project and change management roles into sync.” Journal of Change Management, 2017. Web.

      Partridge, Chris. “Evolve your Operating Model- It will drive everything.” CIO, 30 July 2021. Web.

      Pijnacker, Lieke. “HR Analytics: role clarity impacts performance.” Effectory, 25 September 2019. Web.

      Pressgrove, Jed. “Centralized vs. Federated: Breaking down IT Structures.” Government Technology, March 2020. Web.

      Sherman, Fraser. “Differences between Organizational Structure and Design.” Bizfluent, 20 September 2019. Web.

      Skelton, Matthew, and Manual Pais. “Team Cognitive Load.” IT Revolution, 19 January 2021. Web.

      Skelton, Matthew, and Manual Pais. Team Topologies. IT Revolution Press, 19 September 2019. Book

      Spencer, Janet, and Michael Watkins. “Why organizational change fails.” TLNT, 26 November 2019. Web.

      Storbakken, Mandy. “The Cloud Operating Model.” VMware, 27 January 2020. Web.

      "The Qualities of Leadership: Leading Change.” Cornelius & Associates, 2010. Web.

      “Understanding Organizational Structures.” SHRM, 31 August 2021. Web.

      "unfix Pattern: Base.” AgilityScales, n.d. Web.

      Walker, Alex. “Half-Life: Alyx helped change Valve’s Approach to Development.” Kotaku, 10 July 2020. Web.

      "Why Change Management.” Prosci, n.d. Web.

      Wittig, Cynthia. “Employees' Reactions to Organizational Change.” OD Practioner, vol. 44, no. 2, 2012. Web.

      Woods, Dan. “How Platforms are neutralizing Conway’s Law.” Forbes, 15 August 2017. Web.

      Worren, Nicolay, Jeroen van Bree, and William Zybach. “Organization Design Challenges. Results from a practitioner survey.” Journal of Organizational Design, vol. 8, 25 July 2019. Web.

      Appendix

      IT Culture Framework

      This framework leverages McLean & Company’s adaptation of Quinn and Rohrbaugh’s Competing Values Approach.

      The image contains a diagram of the IT Culture Framework. The framework is divided into four sections: Competitive, Innovative, Traditional, and Cooperative, each with their own list of descriptors.

      Legacy Active Directory Environment

      • Buy Link or Shortcode: {j2store}471|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Cloud Strategy
      • Parent Category Link: /cloud-strategy

      You are looking to lose your dependency on Active Directory (AD), and you need to tackle infrastructure technical debt, but there are challenges:

      • Legacy apps that are in maintenance mode cannot shed their AD dependency or have hardware upgrades made.
      • You are unaware of what processes depend on AD and how integrated they are.
      • Departments invest in apps that are integrated with AD without informing you until they ask for Domain details after purchasing.

      Our Advice

      Critical Insight

      • Remove your dependency on AD one application at a time. If you are a cloud-first organization, rethink your AD strategy to ask “why” when you add a new device to your Active Directory.
      • With the advent of hybrid work, AD is now a security risk. You need to shore up your security posture. Think of zero trust architecture.
      • Take inventory of your objects that depend on Kerberos and NTML and plan on removing that barrier through applications that don’t depend on AD.

      Impact and Result

      Don’t allow Active Directory services to dictate your enterprise innovation and modernization strategies. Determine if you can safely remove objects and move them to a cloud service where your Azure AD Domain Services can handle your authentication and manage users and groups.

      Legacy Active Directory Environment Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Legacy Active Directory Environment Deck – Legacy AD was never built for modern infrastructure. Understand the history and future of Active Directory and what alternatives are in the market.

      Build all new systems with cloud integration in mind. Many applications built in the past had built-in AD components for access, using Kerberos and NTLM. This dependency has prevented organizations from migrating away from AD. When assessing new technology and applications, consider SaaS or cloud-native apps rather than a Microsoft-dependent application with AD ingrained in the code.

      • Legacy Active Directory Environment Storyboard
      [infographic]

      Further reading

      Legacy Active Directory Environment

      Kill the technical debt of your legacy Active Directory environment.

      Analyst Perspective

      Understand what Active Directory is and why Azure Active Directory does not replace it.

      It’s about Kerberos and New Technology LAN Manager (NTLM).

      The image contains a picture of John Donovan.

      Many organizations that want to innovate and migrate from on-premises applications to software as a service (SaaS) and cloud services are held hostage by their legacy Active Directory (AD). Microsoft did a good job taking over from Novell back in the late 90s, but its hooks into businesses are so deep that many have become dependent on AD services to manage devices and users, when in fact AD falls far short of needed capabilities, restricting innovation and progress.

      Despite Microsoft’s Azure becoming prominent in the world of cloud services, Azure AD is not a replacement for on-premises AD. While Azure AD is a secure authentication store that can contain users and groups, that is where the similarities end. In fact, Microsoft itself has an architecture to mitigate the shortcomings of Azure AD by recommending organizations migrate to a hybrid model, especially for businesses that have an in-house footprint of servers and applications.

      If you are a greenfield business and intend to take advantage of software, infrastructure, and platform as a service (SaaS, IaaS, and PaaS), as well as Microsoft 365 in Azure, then Azure AD is for you and you don’t have to worry about the need for AD.

      John Donovan
      Principal Director, I&O Practice
      Info-Tech Research Group

      Insight Summary

      Legacy AD was never built for modern infrastructure

      When Microsoft built AD as a free component for the Windows Server environment to replace Windows NT before the demise of Novell Directory Services in 2001, it never meant Active Directory to work outside the corporate network with Microsoft apps and devices. While it began as a central managing system for users and PCs on Microsoft operating systems, with one user per PC, the IT ecosystem has changed dramatically over the last 20 years, with cloud adoption, SaaS, IaaS, PaaS, and everything as a service. To make matters worse, work-from-anywhere has become a serious security challenge.

      Build all new systems with cloud integration in mind

      Many applications built in the past had built-in AD components for access, using Kerberos and NTLM. This dependency has prevented organizations from migrating away from AD. When assessing new technology and applications, consider SaaS or cloud-native apps rather than a Microsoft-dependent application with AD ingrained in the code. Ensure you are engaged when the business is assessing new apps. Stop the practice of the business purchasing apps without IT’s involvement; for example, if your marketing department is asking you for your Domain credentials for a vendor when you were not informed of this purchase.

      Hybrid AD is a solution but not a long-term goal

      Economically, Microsoft has no interest in replacing AD anytime soon. Microsoft wants that revenue and has built components like Azure AD Connect to mitigate the AD dependency issue, which is basically holding your organization hostage. In fact, Microsoft has advised that a hybrid solution will remain because, as we will investigate, Azure AD is not legacy AD.

      Executive Summary

      Your Challenge

      Common Obstacles

      Info-Tech’s Approach

      You are looking to lose your dependency on Active Directory, and you need to tackle infrastructure technical debt, but there are challenges.

      • Legacy apps that are in maintenance mode cannot shed their AD dependency or have hardware upgrades made.
      • You are unaware of what processes depend on AD and how integrated they are.
      • Departments invest in apps that are integrated with AD without informing you until they ask for Domain details after purchasing.
      • Legacy applications can prevent you from upgrading servers or may need to be isolated due to security concerns related to inadequate patching and upgrades.
      • You do not see any return on investment in AD maintenance.
      • Mergers and acquisitions can prevent you from migrating away from AD if one company is dependent on AD and the other is fully in the cloud. This increases technical debt.
      • Remove your dependency on AD one application at a time. If you are a cloud-first organization, rethink your AD strategy to ask “why” when you add a new device to your Active Directory.
      • With the advent of hybrid work, AD is now a security risk. You need to shore up your security posture. Think of zero trust architecture.
      • Take inventory of your objects that depend on Kerberos and NTML and plan on removing that barrier through applications that don’t depend on AD.

      Info-Tech Insight

      Don’t allow Active Directory services to dictate your enterprise innovation and modernization strategies. Determine if you can safely remove objects and move them to a cloud service where your Azure AD Domain Services can handle your authentication and manage users and groups.

      The history of Active Directory

      The evolution of your infrastructure environment

      From NT to the cloud

      AD 2001 Exchange Server 2003 SharePoint 2007 Server 2008 R2 BYOD Security Risk All in Cloud 2015
      • Active Directory replaces NT and takes over from Novell as the enterprise access and control plane.
      • With slow WAN links, no cellphones, no tablets, and very few laptops, security was not a concern in AD.
      • In 2004, email becomes business critical.
      • This puts pressure on links, increases replication and domains, and creates a need for multiple identities.
      • Collaboration becomes pervasive.
      • Cross domain authentication becomes prevalent across the enterprise.
      • SharePoint sites need to be connected to multiple Domain AD accounts. More multiple identities are required.
      • Exchange resource forest rolls out, causing the new forest functional level to be a more complex environment.
      • Fine-grained password policies have impacted multiple forests, forcing them to adhere to the new password policies.
      • There are powerful Domain controllers, strong LAN and WAN connections, and an increase in smartphones and laptops.
      • Audits and compliance become a focus, and mergers and acquisitions add complexity. Security teams are working across the board.
      • Cloud technology doesn’t work well with complicated, messy AD environment. Cloud solutions need simple, flat AD architecture.
      • Technology changes after 15+ years. AD becomes the backbone of enterprise infrastructure. Managers demand to move to cloud, building complexity again.

      Organizations depend on AD

      AD is the backbone of many organizations’ IT infrastructure

      73% of organizations say their infrastructure is built on AD.

      82% say their applications depend on AD data.

      89% say AD enables authenticated access to file servers.

      90% say AD is the main source for authentication.

      Source: Dimensions research: Active Directory Modernization :

      Info-Tech Insight

      Organizations fail to move away from AD for many reasons, including:

      • Lack of time, resources, budget, and tools.
      • Difficulty understanding what has changed.
      • Migrating from AD being a low priority.

      Active Directory components

      Physical and logical structure

      Authentication, authorization, and auditing

      The image contains a screenshot of the active directory components.

      Active Directory has its hooks in!

      AD creates infrastructure technical debt and is difficult to migrate away from.

      The image contains a screenshot of an active directory diagram.

      Info-Tech Insight

      Due to the pervasive nature of Active Directory in the IT ecosystem, IT organizations are reluctant to migrate away from AD to modernize and innovate.

      Migration to Microsoft 365 in Azure has forced IT departments’ hand, and now that they have dipped their toe in the proverbial cloud “lake,” they see a way out of the mounting technical debt.

      AD security

      Security is the biggest concern with Active Directory.

      Neglecting Active Directory security

      98% of data breaches came from external sources.

      Source: Verizon, Data Breach Report 2022

      85% of data breach took weeks or even longer to discover.

      Source: Verizon Data Breach Report, 2012

      The biggest challenge for recovery after an Active Directory security breach is identifying the source of the breach, determining the extent of the breach, and creating a safe and secure environment.

      Info-Tech Insight

      Neglecting legacy Active Directory security will lead to cyberattacks. Malicious users can steal credentials and hijack data or corrupt your systems.

      What are the security risks to legacy AD architecture?

      • It's been 22 years since AD was released by Microsoft, and it has been a foundational technology for most businesses over the years. However, while there have been many innovations over those two decades, like Amazon, Facebook, iPhones, Androids, and more, Active Directory has remained mostly unchanged. There hasn’t been a security update since 2016.
      • This lack of security innovation has led to several cyberattacks over the years, causing businesses to bolt on additional security measures and added complexity. AD is not going away any time soon, but the security dilemma can be addressed with added security features.

      AD event logs

      84% of organizations that had a breach had evidence of that breach in their event logs.

      Source: Verizon Data Breach Report, 2012

      What is the business risk

      How does AD impact innovation in your business?

      It’s widely estimated that Active Directory remains at the backbone of 90% of Global Fortune 1000 companies’ business infrastructure (Lepide, 2021), and with that comes risk. The risks include:

      • Constraints of AD and growth of your digital footprint
      • Difficulty integrating modern technologies
      • Difficulty maintaining consistent security policies
      • Inflexible central domains preventing innovation and modernization
      • Inability to move to a self-service password portal
      • Vulnerability to being hacked
      • BYOD not being AD friendly

      AD is dependent on Windows Server

      1. Even though AD is compliant with LDAP, software vendors often choose optional features of LDAP that are not supported by AD. It is possible to implement Kerberos in a Unix system and establish trust with AD, but this is a difficult process and mistakes are frequent.
      2. Restricting your software selection to Windows-based systems reduces innovation and may hamper your ability to purchase best-in-class applications.

      Azure AD is not a replacement for AD

      AD was designed for an on-premises enterprise

      The image contains a screenshot of a Azure AD diagram.

      • Despite Microsoft’s Azure becoming prominent in the world of cloud services, Azure AD is not a replacement for on-premises AD.
      • In fact, Microsoft itself has an architecture to mitigate the shortcomings of Azure AD by recommending organizations migrate to a hybrid model, especially those businesses that have an in-house footprint of servers and applications.
      • If you are a greenfield business and intend to take advantage of SaaS, IaaS, and PaaS, as well as Microsoft 365 in Azure, then Azure AD is for you and you don’t have to worry about the need for AD.

      "Azure Active Directory is not designed to be the cloud version of Active Directory. It is not a domain controller or a directory in the cloud that will provide the exact same capabilities with AD. It actually provides many more capabilities in a different way.

      That’s why there is no actual ‘migration’ path from Active Directory to Azure Active Directory. You can synchronize your on-premises directories (Active Directory or other) to Azure Active Directory but not migrate your computer accounts, group policies, OU etc."

      – Gregory Hall,
      Brand Representative for Microsoft
      (Source: Spiceworks)

      The hybrid model for AD and Azure AD

      How the model works

      The image contains a screenshot of a hybrid model for AD and Azure AD.

      Note: AD Federated Services (ADFS) is not a replacement for AD. It’s a bolt-on that requires maintenance, support, and it is not a liberating service.

      Many companies are:

      • Moving to SaaS solutions for customer relationship management, HR, collaboration, voice communication, file storage, and more.
      • Managing non-Windows devices.
      • Moving to a hybrid model of work.
      • Enabling BYOD.

      Given these trends, Active Directory is becoming obsolete in terms of identity management and permissions.

      The difference between AD Domain Services and Azure AD DS

      One of the core principles of Azure AD is that the user is the security boundary, not the network.

      Kerberos is the default authentication and authorization protocol for AD. Kerberos is involved in nearly everything from the time you log on to accessing Sysvol, which is used to deliver policy and logon scripts to domain members from the Domain Controller.

      Info-Tech Insight

      If you are struggling to get away from AD, Kerberos and NTML are to blame. Working around them is difficult. Azure AD uses SAML2.0 OpenID Connect and OAuth2.0.

      Feature Azure AD DS Self-managed AD DS
      Managed service
      Secure deployments Administrator secures the deployment
      DNS server ✓ (managed service)
      Domain or Enterprise administrator privileges
      Domain join
      Domain authentication using NTLM and Kerberos
      Kerberos-constrained delegation Resource-based Resource-based and account-based
      Custom OU structure
      Group Policy
      Schema extensions
      AD domain/forest trusts ✓ (one-way outbound forest trusts only)
      Secure LDAP (LDAPS)
      LDAP read
      LDAP write ✓ (within the managed domain)
      Geo-distributed deployments

      Source: “Compare self-managed Active Directory Domain Services...” Azure documentation, 2022

      Impact of work-from-anywhere

      How AD poses issues that impact the user experience

      IT organizations are under pressure to enable work-from-home/work-from-anywhere.

      • IT teams regard legacy infrastructure, namely Active Directory, as inadequate to securely manage remote workloads.
      • While organizations previously used VPNs to access resources through Active Directory, they now have complex webs of applications that do not reside on premises, such as AWS, G-Suite, and SaaS customer relationship management and HR management systems, among others. These resources live outside the Windows ecosystem, complicating user provisioning, management, and security.
      • The work environment has changed since the start of COVID-19, with businesses scrambling to enable work-from-home. This had a huge impact on on-premises identity management tools such as AD, exposing their limitations and challenges. IT admins are all too aware that AD does not meet the needs of work-from-home.
      • As more IT organizations move infrastructure to the cloud, they have the opportunity to move their directory services to the cloud as well.
        • JumpCloud, OneLogin, Okta, Azure AD, G2, and others can be a solution for this new way of working and free up administrators from the overloaded AD environment.
        • Identity and access management (IAM) can be moved to the cloud where the modern infrastructure lives.
        • Alternatives for printers using AD include Google Cloud Print, PrinterOn, and PrinterLogic.

      How AD can impact your migration to Microsoft 365

      The beginning of your hybrid environment

      • Businesses that have a large on-premises footprint have very few choices for setting up a hybrid environment that includes their on-premises AD and Azure AD synchronization.
      • Microsoft 365 uses Azure AD in the background to manage identities.
      • Azure AD Connect will need to be installed, along with IdFix to identify errors such as duplicates and formatting problems in your AD.
      • Password hash should be implemented to synchronize passwords from on-premises AD so users can sign in to Azure without the need for additional single sign-on infrastructure.
      • Azure AD Connect synchronizes accounts every 30 minutes and passwords within two minutes.

      Alternatives to AD

      When considering retiring Active Directory from your environment, look at alternatives that can assist with those legacy application servers, handle Kerberos and NTML, and support LDAP.

      • JumpCloud: Cloud-based directory services. JumpCloud provides LDAP-as-a-Service and RADIUS-as-a-Service. It authenticates, authorizes, and manages employees, their devices, and IT applications. However, domain name changes are not supported.
      • Apache Directory Studio Pro: Written in Java, it supports LDAP v3–certified directory services. It is certified by Eclipse-based database utilities. It also supports Kerberos, which is critical for legacy Microsoft AD apps authentication.
      • Univention Corporate Server (UCS): Open-source Linux-based solution that has a friendly user interface and gets continuous security and feature updates. It supports Kerberos V5 and LDAP, works with AD, and is easy to sync. It also supports DNS server, DHCP, multifactor authentication and single sign-on, and APIs and REST APIs. However, it has a limited English knowledgebase as it is a German tool.

      What to look for

      If you are embedded in Windows systems but looking for an alternative to AD, you need a similar solution but one that is capable of working in the cloud and on premises.

      Aside from protocols and supporting utilities, also consider additional features that can help you retire your Active Directory while maintaining highly secure access control and a strong security posture.

      These are just a few examples of the many alternatives available.

      Market drivers to modernize your infrastructure

      The business is now driving your Active Directory migration

      What IT must deal with in the modern world of work:

      • Leaner footprint for evolving tech trends
      • Disaster recovery readiness
      • Dynamic compliance requirements
      • Increased security needs
      • The need to future-proof
      • Mergers and acquisitions
      • Security extending the network beyond Windows

      Organizations are making decisions that impact Active Directory, from enabling work-from-anywhere to dealing with malicious threats such as ransomware. Mergers and acquisitions also bring complexity with multiple AD domains.
      The business is putting pressure on IT to become creative with security strategies, alternative authentication and authorization, and migration to SaaS and cloud services.

      Activity

      Build a checklist to migrate off Active Directory.

      Discovery

      Assessment

      Proof of Concept

      Migration

      Cloud Operations

      ☐ Catalog your applications.

      ☐ Define your users, groups and usage.

      ☐ Identify network interdependencies and complexity.

      ☐ Know your security and compliance regulations.

      ☐ Document your disaster recovery plan and recovery point and time objectives (RPO/RTO).

      ☐ Build a methodology for migrating apps to IaaS.

      ☐ Develop a migration team using internal resources and/or outsourcing.

      ☐ Use Microsoft resources for specific skill sets.

      ☐ Map on-premises third-party solutions to determine how easily they will migrate.

      ☐ Create a plan to retire and archive legacy data.

      ☐ Test your workload: Start small and prove value with a phased approach.

      ☐ Estimate cloud costs.

      ☐ Determine the amount and size of your compute and storage requirements.

      ☐ Understand security requirements and the need for network and security controls.

      ☐ Assess network performance.

      ☐ Qualify and test the tools and solutions needed for the migration.

      ☐ Create a blueprint of your desired cloud environment.

      ☐ Establish a rollback plan.

      ☐ Identify tools for automating migration and syncing data.

      ☐ Understand the implications of the production-day data move.

      ☐ Keep up with the pace of innovation.

      ☐ Leverage 24/7 support via skilled Azure resources.

      ☐ Stay on top of system maintenance and upgrades.

      ☐ Consider service-level agreement requirements, governance, security, compliance, performance, and uptime.

      Related Info-Tech Research

      Manage the Active Directory in the Service Desk

      • Build and maintain your Active Directory with good data.
      • Actively maintaining the Active Directory is a difficult task that only gets more difficult with issues like stale accounts and privilege creep.

      SoftwareReviews: Microsoft Azure Active Directory

      • The Azure Active Directory (Azure AD) enterprise identity service provides SSO and multifactor authentication to help protect your users from 99.9% of cybersecurity attacks

      Define Your Cloud Vision

      • Don’t think about the cloud as an inevitable next step for all workloads. The cloud is merely another tool in the toolbox, ready to be used when appropriate and put away when it’s not needed. Cloud-first isn’t always the way to go.

      Bibliography

      “2012 Data Breach Investigations Report.” Verizon, 2012. Web.
      “2022 Data Breach Investigations Report.” Verizon, 2012. Web.
      “22 Best Alternatives to Microsoft Active Directory.” The Geek Page, 16 Feb 2022. Accessed 12 Sept. 2022.
      Altieri, Matt. “Infrastructure Technical Debt.” Device 42, 20 May 2019. Accessed Sept 2022.
      “Are You Ready to Make the Move from ADFS to Azure AD?’” Steeves and Associates, 29 April 2021. Accessed 28 Sept. 2022.
      Blanton, Sean. “Can I Replace Active Directory with Azure AD? No, Here’s Why.” JumpCloud, 9 Mar 2021. Accessed Sept. 2022.
      Chai, Wesley, and Alexander S. Gillis. “What is Active Directory and how does it work?” TechTarget, June 2021. Accessed 10 Sept. 2022.
      Cogan, Sam. “Azure Active Directory is not Active Directory!” SamCogan.com, Oct 2020. Accessed Sept. 2022.
      “Compare Active Directory to Azure Active Directory.” Azure documentation, Microsoft Learn, 18 Aug. 2022. Accessed 12 Sept. 2022.
      "Compare self-managed Active Directory Domain Services, Azure Active Directory, and managed Azure Active Directory Domain Services." Azure documentation, Microsoft Learn, 23 Aug. 2022. Accessed Sept. 2022.
      “Dimensional Research, Active Directory Modernization: A Survey of IT Professionals.” Quest, 2017. Accessed Sept 2022.
      Grillenmeier, Guido. “Now’s the Time to Rethink Active Directory Security.“ Semperis, 4 Aug 2021. Accessed Oct. 2013.
      “How does your Active Directory align to today’s business?” Quest Software, 2017, accessed Sept 2022
      Lewis, Jack “On-Premises Active Directory: Can I remove it and go full cloud?” Softcat, Dec.2020. Accessed 15 Sept 2022.
      Loshin, Peter. “What is Kerberos?” TechTarget, Sept 2021. Accessed Sept 2022.
      Mann, Terry. “Why Cybersecurity Must Include Active Directory.” Lepide, 20 Sept. 2021. Accessed Sept. 2022.
      Roberts, Travis. “Azure AD without on-prem Windows Active Directory?” 4sysops, 25 Oct. 2021. Accessed Sept. 2022.
      “Understanding Active Directory® & its architecture.” ActiveReach, Jan 2022. Accessed Sept. 2022.
      “What is Active Directory Migration?” Quest Software Inc, 2022. Accessed Sept 2022.

      Enterprise Storage Solution Considerations

      • Buy Link or Shortcode: {j2store}507|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Storage & Backup Optimization
      • Parent Category Link: /storage-and-backup-optimization
      • Enterprise storage technology and options are challenging to understand.
      • There are so many options. How do you decide what the best solution is for your storage challenge??
      • Where do you start when trying to solve your enterprise storage challenge?

      Our Advice

      Critical Insight

      Take the time to understand the various data storage formats, disk types, and associated technology, as well as the cloud-based and on-premises options. This will help you select the right tool for your needs.

      Impact and Result

      Look to existing use cases based on actual Info-Tech analyst calls to help in your decision-making process.

      Enterprise Storage Solution Considerations Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Enterprise Storage Solution Considerations – Narrow your focus with the right product type and realize efficiencies.

      Explore the building blocks of enterprise storage so you can select the best solution, narrow your focus with the correct product type, explore the features that should be considered when evaluating enterprise storage offerings, and examine use cases based on actual Info-Tech analyst calls to find a storage solution for your situation.

      • Enterprise Storage Solution Considerations Storyboard

      2. Modernize Enterprise Storage Workbook – Understand your data requirements.

      The first step in solving your enterprise storage challenge is identifying your data sources, data volumes, and growth rates. This information will give you insight into what data sources could be stored on premises or in the cloud, how much storage you will require for the coming five to ten years, and what to consider when exploring enterprise storage solutions. This tool can be a valuable asset for determining your current storage drivers and future storage needs, structuring a plan for future storage purchases, and determining timelines and total cost of ownership.

      • Modernize Enterprise Storage Workbook
      [infographic]

      Further reading

      Enterprise Storage Solution Considerations

      Narrow your focus with the right product type and realize efficiencies.

      Analyst Perspective

      The vendor landscape is continually evolving, as are the solutions they offer. The options and features are increasing and appealing.

      The image contains a picture of P.J. Ryan.

      To say that the current enterprise storage landscape looks interesting would be an understatement. The solutions offered by vendors continue to grow and evolve. Flash and NVMe are increasing the speed of storage media and reducing latency. Software-defined storage is finding the most efficient use of media to store data where it is best served while managing a variety of vendor storage and older storage area networks and network-attached storage devices.

      Storage as a service is taking on a new meaning with creative solutions that let you keep the storage appliance on premises or in a colocated data center while administration, management, and support are performed by the vendor for a nominal monthly fee.

      We cannot discuss enterprise storage without mentioning the cloud. Bring a thermometer because you must understand the difference between hot, warm, and cold storage when discussing the cloud options. Very hot and very cold may also come into play.

      Storage hardware can assume a higher total cost of ownership with support options that replace the controllers on a regular basis. The options with this type of service are also varied, but the concept of not having to replace all disks and chassis nor go through a data migration is very appealing to many companies.

      The cloud is growing in popularity when it comes to enterprise storage, but on-premises solutions are still in demand, and whether you choose cloud or on premises, you can be guaranteed an array of features and options to add stability, security, and efficiency to your enterprise storage.

      P.J. Ryan
      Research Director, Infrastructure & Operations
      Info-Tech Research Group

      Executive Summary

      Info-Tech Insight

      The vendor landscape is continually evolving, as are the solutions they offer.

      Storage providers are getting acquired by bigger players, “outside the box” thinking is disrupting the storage support marketplace, “as a service” storage offerings are evolving, and what is a data lake and do I need one? The traditional storage vendors are not alone in the market, and the solutions they offer are no longer traditional either. Explore the landscape and understand your options before you make any enterprise storage solution purchases.

      Understand the building blocks of storage so you can select the best solution.

      There are multiple storage formats for data, along with multiple hardware form factors and disk types to hold those various data formats. Software plays a significant role in many of these storage solutions, and cloud offerings take advantage of all the various formats, form factors, and disks. The challenge is matching your data type with the correct storage format and solution.

      Look to existing use cases to help in your decision-making process.

      Explore previous experiences from others by reading use cases to determine what the best solution is for your challenge. You’re probably not the first to encounter the challenge you’re facing. Another organization may have previously reached out for assistance and found a viable solution that may be just what you also need.

      Enterprise storage has evolved, with more options than ever

      Data is growing, data security will always be a concern, and vendors are providing more and more options for enterprise storage.

      “By 2025, it’s estimated that 463 exabytes of data will be created each day globally – that’s the equivalent of 212,765,957 DVDs per day!” (Visual Capitalist)

      “Modern criminal groups target not only endpoints and servers, but also central storage systems and their backup infrastructure.” (Continuity Software)

      Cloud or on premises? Maybe a hybrid approach with both cloud and on premises is best for you. Do you want to remove the headaches of storage administration, management, and support with a fully managed storage-as-a-service solution? Would you like to upgrade your controllers every three or four years without a major service interruption? The options are increasing and appealing.

      High-Level Considerations

      1. Understand Your Data

      Understand how much data you have and where it is located. This will be crucial when evaluating enterprise storage solutions.

      2. Plan for Growth

      Your enterprise storage considerations should include your data needs now and in the future.

      3. Understand the Mechanics

      Take the time to understand the various data storage formats, disk types, and associated technology, as well as the cloud-based and on-premises options. This will help you select the right tool for your needs.

      Storage formats, disk drives, and technology

      Common data storage formats, technology, and drive types are outlined below. Understanding how data is stored as well as the core building blocks for larger systems will help you decide which solution is best for your storage needs.

      Format

      What it is

      Disk Drives and Technology

      File Storage

      File storage is hierarchical storage that uses files, folders, subfolders, and directories. You enter a specific filename and path to access the file, such as P:\users\johndoe\strategy\cloud.doc. If you ever saved a file on a server, you used file storage. File storage is usually managed by some type of file manager, such as File Explorer in Windows. Network-attached storage (NAS) devices use file storage.

      Hard Disk Drives (HDD)

      HDD use a platter of spinning disks to magnetically store data. The disks are thick enough to make them rigid and are referred to as hard disks.

      HDD is older technology but is still in demand and offered by vendors.

      Object Storage

      Object storage is when data is broken into distinct units, called objects. These objects are stored in a flat, non-hierarchical structure in a single location or repository. Each object is identified by its associated ID and metadata. Objects are accessed by an application programming interface (API).

      Flash

      Flash storage uses flash memory chips to store data. The flash memory chips are written with electricity and contain no moving parts. Flash storage is very fast, which is how the technology got its name (“Flash vs. SSD Storage,” Enterprise Storage Forum, 2018).

      Block Storage

      Block storage is when data is divided up into fixed-size blocks and stored with a unique identifier. Blocks can be stored in different environments, such as Windows or Linux. Storage area networks (SANs) use block storage.

      Solid-State Drive (SSD)

      SSD is a storage mechanism that also does not use any moving parts. Most SSD drives use flash storage, but other options are available for SSD.

      Nonvolatile Memory Express (NVMe)

      NVMe is a communications standard developed specially for SSDs by a consortium of vendors including Intel, Samsung, SanDisk, Dell, and Seagate. It operates across the PCIe bus (hence the “Express” in the name), which allows the drives to act more like the fast memory that they are rather than the hard disks they imitate (PCWorld).

      Narrow your focus with the right product type

      On-premises enterprise storage solutions fit into a few distinct product types.

      Network-Attached Storage

      Storage Area Network

      Software-Defined Storage

      Hyperconverged Infrastructure

      NAS refers to a storage device that is connected directly to your network. Any user or device with access to your network can access the available storage provided by the NAS. NAS storage is easily scalable and can add data redundancy through RAID technology. NAS uses the file storage format.

      NAS storage may or may not be the first choice in terms of enterprise storage, but it does have a solid market appeal as an on-premises primary backup storage solution.

      A SAN is a dedicated network of pooled storage devices. The dedicated network, separate from the regular network, provides high speed and scalability without concern for the regular network traffic. SANs use block storage format and can be divided into logical units that can be shared between servers or segregated from other servers. SANs can be accessed by multiple servers and systems at the same time. SANs are scalable and offer high availability and redundancy through RAID technology.

      SANs can use a variety of disk types and sizes and are quite common among on-premises storage solutions.

      “Software-defined storage (SDS) is a storage architecture that separates storage software from its hardware. Unlike traditional network-attached storage (NAS) or storage area network (SAN) systems, SDS is generally designed to perform on any industry-standard or x86 system, removing the software’s dependence on proprietary hardware.” (RedHat)

      SDS uses software-based policies and rules to grow and protect storage attached to applications.

      SDS allows you to use server-based storage products to add management, protection, and better usage.

      Hyperconverged storage uses virtualization and software-defined storage to combine the storage, compute, and network resources along with a hypervisor into one appliance.

      Hyperconverged storage can scale out by adding more nodes or appliances, but scaling up, or adding more resources to each appliance, can have limitations. There is flexibility as hyperconverged storage can work with most network and compute manufacturers.

      Cloud storage

      • Cloud storage is online storage offered by a cloud provider. Cloud storage is available almost anywhere and is set up with high availability features such as data duplication, redundancy, backup, and power failure protection.
      • Cloud storage is very scalable and typically is offered as object storage, block storage, or file storage. Cloud storage vendors may have their own naming scheme for object, block, or file storage.
      • Cloud-hosted data is marketed according to the frequency of access and length of time in storage. There are typically three main levels of storage: hot, warm, or cold. Vendors may have their own naming convention for hot, warm, and cold storage. Some may also add more layers such as very hot or very cold.
        • Hot storage is for data that is frequently accessed and modified. It is available on demand and is the most costly of the storage levels.
        • Cold storage is for data that will sit for a long period of time and not need to be accessed. Cold storage is usually only available after several hours or days. Cold storage is very low cost and, in some cases, even free, but retrieval or restoration for the free services can be costly.
        • Warm storage sits in between hot and cold storage. It is for data that is infrequently needed. The cost of warm storage is also in between hot and cold storage costs, and access times are measured in terms of minutes or hours.
        • It is not uncommon for data to start in hot storage and, as it ages, move to warm and eventually cold storage.

      “Enterprise cloud storage offers nearly unlimited scalability. Enterprises can add storage quickly and easily as it is needed, eliminating the risk and cost of over-provisioning.”

      – Spectrum Enterprise

      “Hot data will operate on fresh data. Cold data will operate on less frequent data and [is] used mainly for reporting and planning. Warm data is a balance between the two.”

      – TechBlost

      Enterprise storage features

      The features listed below, while not intended to cover all features offered by all vendors, should be considered and could act as a baseline for discussions with storage providers when evaluating enterprise storage offerings.

      • Scalability
        • What are the options to expand, and how easy or difficult it is to expand capacity in the future?
      • Security
        • Does the solution offer data encryption options as well as ransomware protections?
      • Integration options
        • Can the solution support seamless connectivity with other solutions and applications, such as cloud-based storage or backup software?
      • Storage reduction
        • Does the solution offer space-reduction options such as deduplication or data compression?
      • Replication
        • Does the solution offer replication options such as device to device on premises, device to device when geographically separated, device to cloud, or a combination of these scenarios?
      • Performance
        • “Enterprise storage systems have two main ‘speed’ measurements: throughput and IOPS. Throughput is the data transfer rate to and from storage media, measured in bytes per second; IOPS measures the number of reads and writes – input/output (I/O) operations – per second.” (Computer Weekly)
      • Protocol support
        • Does the solution support object-based, block-based, and file-based storage protocols?
      • Storage Efficiency
        • How efficient is the solution? Can they prove it?
        • Storage efficiencies must be available and baselined.
      • Management platform
        • A management/reporting platform should be a component included in the system.
      • Multi-parity
        • Does the solution offer multi-level block “parity” for RAID 6 protection equivalency, which would allow for the simultaneous failure of two disks?
      • Proactive support
        • Features such as call home, dial in, or remote support must be available on the system.
      • Financial considerations
        • The cost is always a concern, but are there subscription-based or “as-a-service” options?
        • Internally, is it better for this expenditure to be a capital expenditure or an ongoing operating expense?

      What’s new in enterprise storage

      • Data warehouses are not a new concept, but the data storage evolution and growth of data means that data lakes and data lakehouses are growing in popularity.
        • “A data lake is a centralized repository that allows you to store all your structured and unstructured data at any scale. You can store your data as-is, without having to first structure the data” (Amazon Web Services).
        • Analytics with a data lake is possible, but manipulation of the data is hindered due to the nature of the data. A data lakehouse adds data management and analytics to a data lake, similar to the data warehouse functionality added to databases.
      • Options for on-premises hardware support is changing.
        • Pure Storage was the first to shake up the SAN support model with its Evergreen support option. Evergreen//Forever support allows for storage controller upgrades without having to migrate data or replace your disks or chassis (Pure Storage).
        • In response to the Pure Storage Evergreen offering, Dell, HPE, NetApp, and others have come out with similar programs that offer controller upgrades while maintaining the data, disks, and chassis.
      • “As a service” is available as a hybrid solution.
        • Storage as a service (STaaS) originally referred to hosted, fully cloud-based offerings without the need for any on-premises hardware.
        • The latest STaaS offerings provide on-premises or colocated hardware with pay-as-you-go subscription pricing for data consumption. Administration, management, and support are included. The vendor will supply support and manage everything on your behalf.
        • Most of the major storage vendors offer a variation of storage as a service.

      “Because data lakes mostly consist of raw unprocessed data, a data scientist with specialized expertise is typically needed to manipulate and translate the data.”

      – DevIQ

      “A Lakehouse is also a type of centralized data repository, integrated from heterogeneous sources. As can be expected from its name, It shares features with both datawarehouses and data lakes.”

      – Cesare

      “Storage as a service (STaaS) eliminates Capex, simplifies management and offers extensive flexibility.”

      – TechTarget

      Major vendors

      The current vendor landscape for enterprise storage solutions represents a range of industry veterans and the brands they’ve aggregated along the way, as well as some relative newcomers who have come to the forefront within the past ten years.

      Vendors like Dell EMC and HPE are longstanding veterans of storage appliances with established offerings and a back catalogue of acquisitions fueling their growth. Others such as Pure Storage offer creative solutions like all-flash arrays, which are becoming more and more appealing as flash storage becomes more commoditized.

      Cloud-based vendors have become popular options in recent years. Cloud storage provides many options and has attracted many other vendors to provide a cloud option in addition to their on-premises solutions. Some software and hardware vendors also partner with cloud vendors to offer a complete solution that includes storage.

      Info-Tech Insight

      Explore your current vendor’s solutions as a starting point, then use that understanding as a reference point to dive into other players in the market

      Key Players

      • Amazon
      • Cisco
      • Dell EMC
      • Google
      • Hewlett Packard Enterprise
      • Hitachi Vantara
      • IBM
      • Microsoft
      • NetApp
      • Nutanix
      • Pure Storage

      Enterprise Storage Use Cases

      Block, object, or file storage? NAS, SAN, SDS, or HCI? Cloud or on prem? Hot, warm, or cold?
      Which one do you choose?
      The following use cases based on actual Info-Tech analyst calls may help you decide.

      1. Offsite backup solution
      2. Infrastructure consolidation
      3. DR/BCP datacenter duplication
      4. Expansion of existing storage
      5. Complete backup solution
      6. Existing storage solution going out of support soon
      7. Video storage
      8. Classify and offload storage

      Offsite backup solution

      “Offsite” may make you think of geographical separation or even cloud-based storage, but what is the best option and why?

      Use Case: How a manufacturing company dealt with retired applications

      • A leading manufacturing company had to preserve older applications no longer in use.
      • The company had completed several acquisitions and ended up with multiple legacy applications that had been merged or migrated into replacement solutions. These legacy applications were very important to the original companies, and although the data they held had been migrated to a replacement solution, executives felt they should hold on to these applications for a period of time, just in case.
      • A modern archiving solution was considered, but a research advisor from Info-Tech Research joined a call with the manufacturing company and helped the client realize that the solution was a modified backup. The application data had already been preserved through the migration, so data could be accessed in the production environment.
      • The data could be exported from the legacy application into a nonsequential database, compressed, and stored in cloud-based cold storage for less than $5 per terabyte per month. The manufacturing company staff realized that they could apply this same approach to several of their legacy applications and save tens of thousands of dollars in the process.
      • Cold storage is inexpensive until you start retrieving that data frequently. The manufacturing company knew they did not have a requirement to retrieve the application and data for a very long time, so cloud-based cold storage was ideal.

      “Data retrieval from cold storage is harder and slower than it is from hot storage. … Because of the longer retrieval time, online cold storage plans are often much cheaper. … The downside is that you’d incur additional costs when retrieving the data.”

      – Ben Stockton, Cloudwards

      Infrastructure consolidation

      Hyperconverged infrastructure combines storage, virtual infrastructure, and associated management into one piece of equipment.

      Use Case: How one company dealt with equipment and storage needs

      • One Info-Tech client had recently started in the role of IT director and realized he had inherited aging infrastructure along with a serious data challenge. The storage appliances were old and out of support. The appliances were performing inadequately, and the client was in need of more data due to ongoing growth, but he also realized that the virtual environment was running on very old servers that were no longer supported. The IT director reached out to Info-Tech to find solutions to the virtualization challenge, but the storage problem also came up throughout the course of the conversation with an analyst.
      • The analyst quickly realized that the IT director was an ideal candidate for a hyperconverged infrastructure (HCI) storage solution, which would also provide the necessary virtual environment.
      • The analyst explained the benefits of having a single appliance that would provide virtualization needs as well as storage needs. The built-in management features would ease the burden of administration, and the software-defined nature of the HCI would allow for the migration of data as well as future expansion options.
      • Hyperconverged infrastructure is offered by many vendors under a variety of names. Most are similar but some may have a better interface or other features. The expansion process is simple, and HCI is a good fit for many organizations looking to consolidate virtual infrastructure and storage.

      “HCI environments use a hypervisor, usually running on a server that uses direct-attached storage (DAS), to create a data center pool of systems and resources.”

      – Samuel Greengard, Datamation

      Datacenter duplication

      SAN providers offer a varied range of options for their products, and those options are constantly evolving.

      Use Case: Independent school district provides better data access using SAN technology

      • An independent school district was expanding by adding a second data center in a new school. This new data center would be approximately 20 miles away from the original data center used by the district. The intent was not to replace the original data center but to use both centers to store data and provide services concurrently. The district’s ideal scenario would be that users would not know or care which data center they were reaching, and there would be no difference in the service received from each data center. The school district reached out to Info-Tech when planning discussions reached the topic of data duplication and replication software.
      • An Info-Tech analyst joined a call with the school district and guided the conversation toward the existing environment to understand what options might be available. The analyst quickly discovered that all the district’s servers were virtual, and all associated data was stored on a single SAN.
      • The analyst informed the school district staff about SAN options, including SAN-to-SAN replication. If the school district had a sufficient link between the two data centers, SAN-to-SAN replication would work for them and provide the two identical copies of data at two locations.
      • The analyst continued to offer explanations of other features that some vendors offer with their SANs, such as the ability to turn on or off deduplication and compression, as well as disk options such as flash or NVMe.
      • The school district was moving to the request for proposal (RFP) stage but hoped to have SAN-to-SAN replication implemented before the next academic year started.

      “SAN-to-SAN replication is a low-cost, highly efficient way to manage mounting quantities of stored data.”

      – Secure Infrastructure & Services

      Expansion of existing storage

      That old storage area network may still have some useful life left in it.

      Use Case: Municipality solves data storage aging and growth challenge

      • A municipality in the United States reached out to Info-Tech for guidance on its storage challenge. The municipality had accumulated multiple SANs from different vendors over the years. These SANs were running out of storage, and more data storage was needed. The municipality’s data was growing at a rapid pace, thanks to municipal growth and expansion of services. The IT team was also concerned with modernizing their storage and not hindering their long-term growth by making the wrong purchase decision for their current storage needs.
      • An analyst from Info-Tech discussed several options with the municipality but in the end advised that software-defined storage may be the best solution.
      • Software-defined storage (SDS) would allow the municipality to gain better visibility into existing storage while making more efficient use of existing and new storage. SDS could take over the management of the existing storage from multiple vendors and add additional storage as required. SDS would also be able to integrate cloud-based storage if that was the direction taken by the municipality in the future.
      • The municipality moved forward with an SDS solution and added some additional storage capacity. They used some of their existing SANs but retired the more troublesome ones. The SDS system managed all the storage instances and data management. The administration of the storage environment was easier for the storage admins, and long-term savings were achieved through better storage management.

      “Often enterprises have added storage on an ad hoc basis as they needed it for various applications. That can result in a mishmash of heterogenous storage hardware from a wide variety of vendors. SDS offers the ability to unify management of these different storage devices, allowing IT to be more efficient.”

      – Cynthia Harvey, Enterprise Storage Forum (“What Is Software Defined Storage?”, 2018)

      Complete backup solution

      Many backup software solutions can provide backups to multiple locations, making two-location backups simple.

      Use Case: How an oil refinery modernized its backup solution

      • A large oil refinery needed a better solution for the storage of backups. The refinery was replacing its backup software solution but also wanted to improve the backup storage situation and move away from tape-based storage. All other infrastructure was reasonably modern and not in need of replacement at this time.
      • A research analyst from Info-Tech helped the client realize that the solution was a modified backup. The general guidance for backups is have a least one copy offsite, so the cloud was the obvious focal point. The analyst also explained that it would be beneficial to have a recent copy of the backup available on site for common restoration requests in addition to having the offsite copy for disaster recovery (DR) purposes.
      • The refinery staff conducted a data analysis to determine how much data was being backed up on a daily basis. The solution proposed by the analyst included network-attached storage (NAS) with adequate storage to hold 30 days' worth of on-premises data. The backup software would also simultaneously copy each backup to a cloud-based storage repository. The backup software was smart enough to only back up and transfer data that had changed since the previous backup, so transfer time and capacity was not a factor.
      • The NAS would allow for the restoration of any local, on-premises data while the cloud storage would provide a safe location offsite for backup data. It could also serve as the backup location for other cloud-based services that required a backup.

      “Data protection demands that enterprises have multiple methods of keeping data safe and replicating it in case of disaster or loss.”

      – Drew Robb, Enterprise Storage Forum, 2021

      Storage going out of support

      SAN solutions have come a long way with improvements in how data is stored and what is used to store the data.

      Use Case: How one organization replaced its old storage with a similar solution

      • A government organization was looking for a solution for its aging storage area network appliances. The SANs were old and would be no longer supported by the manufacturer within four months. The SANs had slower spinning disks and their individual capacity was at its limit through the addition of extra shelves and disks over the years.
      • The organization reached out to Info-Tech for guidance. An analyst arranged a call with them, and they discussed the storage situation in detail, including desired benefits from a storage solution and growth requirements. They also discussed cloud storage, but the government organization was not in a position to move its data to the cloud for a variety of reasons.
      • Although the individual SANs were at their storage capacity limit, the total amount of data was well within the limits of many modern on-premises storage solutions. SSD and flash or NVMe storage can store large amounts of data in small footprints and form factors.
      • The analyst reviewed several vendors with the client and discussed some advantages and disadvantages of each. They explored the features offered as well as scalability options.
      • SANs have been around for a long time but the features and capabilities that come with them has evolved. They are still a very viable solution for many organizations in a variety of scenarios.

      “A rapidly growing portion of SAN deployments leverages all-flash storage to gain its high performance, consistent low latency, and lower total cost when compared to spinning disk.”

      – NetApp

      Video storage

      Cloud storage would not be sufficient if you were using a dial up connection, just as on-premises storage solutions would not suffice if they were using floppy disks.

      Use Case: Body cams and public cameras in municipalities are driving storage growth

      • Municipal law enforcement agencies are wearing body cameras more frequently, for their own protection as well as for the protection of the public. Camera footage can be useful in legal situations as well. Municipalities are also installing more and more public cameras for the purposes of public safety. The recorded video footage from these cameras can result in large data files, which in turn drive data storage requirements.
      • Info-Tech analysts are joining calls about video data storage with increasing frequency. The concerns are repetitive, and the guidance is similar on most of these calls.
      • The “object” storage format is ideal for video and media data. Most cloud-based storage solutions use object storage, but it is also available with on-premises solutions such as NAS or SAN. The challenges clients are expressing are typically related to inadequate bandwidth for cloud-based storage or other storage formats instead of “object” storage. Cloud-based storage can also grow beyond the budgeted numbers, causing an increase in the monthly cloud cost. Older, slower on-premises hardware sometimes reveals itself as the latency culprit.
      • Object storage is well suited for the unstructured data that is video footage. It uses metadata to tag the video file for future retrieval and is easily expandable, which also makes it cost effective.
      • Video data stored in a cloud-based repository will work fine as long as the bandwidth is adequate. On-premises storage of video data is also quite adequate on the right storage format, with fast disks and a reasonably up-to-date network infrastructure.

      “The captured video is stored for days, weeks, months and sometimes years and consumes a lot of space. Data storage plays a new and important role in these systems. Object storage is ideal to store the video data.”

      – Object-Storage.Info

      Classify and offload primary storage

      Some software products have storage options available as a result of agreements with other storage vendors. Several backup and archive software products fall into this category.

      Use Case: Enterprise storage can help reduce data sprawl

      • A large engineering firm was trying to manage its data sprawl. The team sampled a small percentage of their data and quickly realized that when they applied their findings on the 1% of data to their entire data estate, the sheer volume of personal files, older files, and unclassified data was going to be a challenge.
      • They found a solution in archiving software. The archiving software would tag data based on several factors. The software would move older files away from primary storage to an alternate storage platform but still leave a stub of the moved file in place and maintain limited access to those files. This would reduce primary storage requirements and allow the firm to eliminate multiple file servers
      • The engineering firm reached out to Info-Tech and participated in an analyst call. During that call, they laid out their plans, and the analyst made them aware of cloud storage. The positive and negative aspects of cloud storage were discussed, and the firm fully understood that the colder the storage tier, the slower the recovery. The firm's stance was if the files had not been accessed in the past six months, waiting a day or two for retrieval would not be a concern, and the firm was content with cold storage in the cloud.
      • The firm had not purchased the archiving software at the time of the analyst call, and the analyst also explained to them that the archiving software may have an existing agreement with a cloud provider for storage options, which could be more cost effective than purchasing cloud storage separately.
      • Cold cloud-based storage was the preferred solution for this firm, but this use case also highlights the option that some software products carry regarding storage. Several backup and archive products have a cloud storage option that should be investigated, as they may be cost-effective options.

      “Cold storage is perfect for archiving your data. Online backup providers offer low-cost, off-site data backups at the expense of fast speeds and easy access, even though data retrieval often comes at an added cost. If you need to keep your data long-term, but don’t need to access it often, this is the kind of storage you need.”

      – Ben Stockton, Cloudwards

      Understand your data requirements

      Activity

      The first step in solving your enterprise storage challenge is identifying your data sources or drivers, data volume size, and growth rates. This information will give you insight into what data sources could be stored on premises or in the cloud, how much storage you will require for the coming five to ten years, and what to consider when exploring enterprise storage solutions.

      • Info-Tech’s Modernize Enterprise Storage Workbook can be a valuable asset for determining your current storage drivers and future storage needs, structuring a plan for future storage purchases, and determining timelines and total cost of ownership.
      • An example of the Storage Capacity Calculator tab from that workbook is displayed on the right. Using the Storage Capacity Requirements Calculator requires minimal steps.
      1. Enter the current date and planning timeline (horizon) in months
      2. Identify the top sources of data within the business – the current data drivers. Areas of focus could include business applications, file shares, backup, and archives.
      3. For each of these data drivers, include your best estimate of:
      • Current data volume
      • Growth rate
    • Identify the top future data drivers, such as new applications or initiatives that will result from current business plans and priorities, and record the following details:
      • Initial data volumes
      • Projected growth rates
      • Planned implementation date
    • The spreadsheet will automatically calculate the data volume at the planning horizon based on the growth rate.
    • Download the Modernize Enterprise Storage Workbook and take the first step toward understanding your data requirements.

      The image contains a screenshot of the Modernize Enterprise Storage Workbook.

      Download the Modernize Enterprise Storage Workbook

      Related Info-Tech Research

      Modernize Enterprise Storage

      Current and emerging storage technologies are disrupting the status quo – prepare your infrastructure for the exponential rise in data and its storage requirements.

      Modernize Enterprise Storage Workbook

      This workbook will complement the discussions and activities found in the Modernize Enterprise Storage blueprint. Use this workbook in conjunction with the blueprint to develop a strategy for storage modernization.

      Bibliography

      Bakkianathan, Raghunathan. “What is the difference between Hot Warm and Cold data storage?” TechBlost, n.d.. Accessed 14 July 2022.
      Cesare. “Data warehouse vs Data lake vs Lakehouse… and DeltaLake?“ Medium, 14 June 2021. Accessed 26 July 2022.
      Davison, Shawn and Ryan Sappenfield. “Data Lake Vs Lakehouse Vs Data Mesh: The Evolution of Data Transformation.” DevIQ, May 2022. Accessed 23 July 2022.
      Desjardins, Jeff. “Infographic: How Much Data is Generated Each Day?” Visual Capitalist, 15 April 2019. Accessed 26 July 2022.
      Greengard, Samuel. “Top 10 Hyperconverged Infrastructure (HCI) Solutions.” Datamation, 22 December 2020. Accessed 23 July 2022.
      Harvey, Cynthia. “Flash vs. SSD Storage: Is there a Difference?” Enterprise Storage Forum, 10 July 2018. Accessed 23 July 2022.
      Harvey, Cynthia. “What Is Software Defined Storage? Features & Benefits.” Enterprise Storage Forum, 22 February 2018. Accessed 23 July 2022.
      Hecht, Gil. “4 Predictions for storage and backup security in 2022.” Continuity Software, 09 January 2022. Accessed 22 July 2022.
      Jacobi, Jonl. “NVMe SSDs: Everything you need to know about this insanely fast storage.” PCWorld, 10 March 2019. Accessed 22 July 2022
      Pritchard, Stephen. “Briefing: Cloud storage performance metrics.” Computer Weekly, 16 July 2021. Accessed 23 July 2022
      Robb, Drew. “Best Enterprise Backup Software & Solutions 2022.” Enterprise Storage Forum, 09 April 2021. Accessed 23 July 2022.
      Sheldon, Robert. “On-premises STaaS shifts storage buying to Opex model.” TechTarget, 10 August 2020. Accessed 22 July 2022.
      “Simplify Your Storage Ownership, Forever.” PureStorage. Accessed 20 July 2022.
      Stockton, Ben. “Hot Storage vs Cold Storage in 2022: Instant Access vs Long-Term Archives.” Cloudwards, 29 September 2021. Accessed 22 July 2022.
      “The Cost Savings of SAN-to-SAN Replication.” Secure Infrastructure and Services, 31 March 2016. Accessed 16 July 2022.
      “Video Surveillance.” Object-Storage.Info, 18 December 2019. Accessed 25 July 2022.
      “What is a Data Lake?” Amazon Web Services, n.d. Accessed 17 July 2022.
      “What is enterprise cloud storage?” Spectrum Enterprise, n.d. Accessed 28 July 2022.
      “What is SAN (Storage Area Network).” NetApp, n.d. Accessed 25 July 2022.
      “What is software-defined storage?” RedHat, 08 March 2018. Accessed 16 July 2022.

      Identify and Manage Reputational Risk Impacts on Your Organization

      • Buy Link or Shortcode: {j2store}220|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Vendor Management
      • Parent Category Link: /vendor-management

      Access to information about companies is more available to consumers than ever. Organizations must implement mechanisms to monitor and manage how information is perceived to avoid potentially disastrous consequences to their brand reputation.

      A negative event could impact your organization's reputation at any given time. Make sure you understand where such events may come from and have a plan to manage the inevitable consequences.

      Our Advice

      Critical Insight

      • Identifying and managing a vendor’s potential impact on your organization’s reputation requires efforts from multiple people in the organization across several functions. Those people all need coaching on the potential changes in the market and how social media can affect your brand.
      • Organizational leadership is often caught unaware during crises, and their response plans lack the flexibility to adjust to significant market upheavals.

      Impact and Result

      • Vendor management practices educate organizations on the different potential risks to vendors in your market and suggest creative and alternative ways to avoid and help manage them.
      • Prioritize and classify your vendors with quantifiable, standardized rankings.
      • Prioritize focus on your high-risk vendors.
      • Standardize your processes for identifying and monitoring vendor risks to manage potential impacts on your reputation and brand with our Reputational Risk Impact Tool.

      Identify and Manage Reputational Risk Impacts on Your Organization Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Identify and Manage Reputational Risk Impacts on Your Organization Deck – Use the research to better understand the negative impacts of vendor actions on your brand reputation.

      Use this research to identify and quantify the potential reputational impacts caused by vendors. Use Info-Tech's approach to look at the reputational impact from various perspectives to better prepare for issues that may arise.

      • Identify and Manage Reputational Risk Impacts on Your Organization Storyboard

      2. Reputational Risk Impact Tool – Use this tool to help identify and quantify the reputational impacts of negative vendor actions.

      By playing the “what if” game and asking probing questions to draw out – or eliminate - possible negative outcomes, everyone involved adds their insight into parts of the organization to gather a comprehensive picture of potential impacts.

      • Reputational Risk Impact Tool
      [infographic]

      Further reading

      Identify and Manage Reputational Risk Impacts on Your Organization

      Brand reputation is the most valuable asset an organization can protect.

      Analyst Perspective

      Organizations must diligently assess and protect their reputations, both in the market and internally.

      Social media, unprecedented access to good and bad information, and consumer reliance on others’ online opinions force organizations to dedicate more resources to protecting their brand reputation than ever before. Perceptions matter, and you should monitor and protect the perception of your organization with as much rigor as possible to ensure your brand remains recognizable and trusted.

      Photo of Frank Sewell, Research Director, Vendor Management, Info-Tech Research Group.

      Frank Sewell
      Research Director, Vendor Management
      Info-Tech Research Group

      Executive Summary

      Your Challenge

      Access to information about companies is more available to consumers than ever. A negative event could impact your organizational reputation at any time. As a result, organizations must implement mechanisms to monitor and manage how information is perceived to avoid potentially disastrous consequences to their brand reputation.

      Make sure you understand where negative events may come from and have a plan to manage the inevitable consequences.

      Common Obstacles

      Identifying and managing a vendor’s potential impact on your organization’s reputation requires efforts from multiple people in the organization across several functions. Those people all need coaching on the potential changes in the market and how social media can affect your brand.

      Organizational leadership is often caught unaware during crises, and their response plans lack the flexibility to adjust to significant market upheavals.

      Info-Tech’s Approach

      Vendor management practices educate organizations on the different potential risks to vendors in your market and suggest creative and alternative ways to avoid and help manage them.

      Prioritize and classify your vendors with quantifiable, standardized rankings.

      Prioritize focus on your high-risk vendors.

      Standardize your processes for identifying and monitoring vendor risks to manage potential impacts on your reputation and brand with our Reputational Risk Impact Tool.

      Info-Tech Insight

      Organizations must evolve their risk assessments to be more adaptive to respond to rapid changes in online media. Ongoing monitoring of social media and the vendors tied to their company is imperative to achieving success and avoiding reputational disasters.

      Info-Tech’s multi-blueprint series on vendor risk assessment

      There are many individual components of vendor risk beyond cybersecurity.

      Cube with each multiple colors on each face, similar to a Rubix cube, and individual components of vendor risk branching off of it: 'Financial', 'Reputational', 'Operational', 'Strategic', 'Security', and 'Regulatory & Compliance'.

      This series will focus on the individual components of vendor risk and how vendor management practices can facilitate organizations’ understanding of those risks.

      Out of scope:
      This series will not tackle risk governance, determining overall risk tolerance and appetite, or quantifying inherent risk.

      Reputational risk impacts

      Potential losses to the organization due to risks to its reputation and brand

      In this blueprint, we’ll explore reputational risks (risks to the brand reputation of the organization) and their impacts.

      Identify potentially negative events to assess the overall impact on your organization and implement adaptive measures to respond and correct.

      Cube with each multiple colors on each face, similar to a Rubix cube, and the vendor risk component 'Reputational' highlighted.

      Protect your most valuable asset: your brand

      25%

      of a company’s market value is due to reputation (Transmission Private, 2021)

      94%

      of consumers say that a bad review has convinced them to avoid a business (ReviewTrackers, 2022)

      14 hours

      is the average time it takes for a false claim to be corrected on social media (Risk Analysis, 2018)
      Image of an umbrella covering the word 'BRAND' and three arrows approaching from above.

      What is brand recognition?

      And the cost of rebranding

      Brand recognition is the ability of consumers to recognize an identifying characteristic of one company versus a competitor.” (Investopedia)

      Most trademark valuation is based directly on its projected future earning power, based on income history. For a new brand with no history, evaluators must apply experience and common sense to predict the brand's earning potential. They can also use feedback from industry experts, market surveys, and other studies.” (UpCounsel)

      The cost of rebranding for small to medium businesses is about 10 to 20% of the recommended overall marketing budget and can take six to eight months (Ignyte).

      Stock image of a house with a money sign chimney.

      "All we are at our core is our reputation and our brand, and they are intertwined." (Phil Bode, Principal Research Director, Info-Tech Research Group)

      What your vendor associations say about you

      Arrows of multiple colors coalescing in an Earth labelled 'Your Brand', and then a red arrow that reads 'Reputation' points to the terms on the right.

      Bad Customer Reviews

      Breach of Data

      Poor Security Posture

      Negative News Articles

      Public Lawsuits

      Poor Performance

      How a major vendor protects its brand

      An ideal state
      • There is a dedicated brand protection department.
      • All employees are educated annually on brand protection policies and procedures.
      • Brand protection is tied to cybersecurity.
      • The organization actively monitors its brand and reputation through various media formats.
      • The organization has criteria for assessing x-party vendors and holds them accountable through ongoing monitoring and validation of their activities.

      Brand Protection
      Done Right

      Sticker for a '5 Star Rating'.

      Never underestimate the power of local media on your profits

      Info-Tech Insight

      Keep in mind that too much exposure to media can be a negative in that it heightens the awareness of your organization to outside actors. If you do go through a period of increased exposure, make sure to advance your monitoring practices and vigilance.

      Story: Restaurant data breach

      Losing customer faith

      A popular local restaurant’s point of service (POS) machines were breached and the credit card data of their customers over a two-week period was stolen. The restaurant did the right thing: they privately notified the affected people, helped them set up credit monitoring services, and replaced their compromised POS system.

      Unfortunately, the local newspaper got wind of the breach. It published the story, leaving out that the restaurant had already notified affected customers and had replaced their POS machines.

      In response, the restaurant launched a campaign in the local paper and on social media to repair their reputation in the community and reassure people that they could safely transact at their business.

      For at least a month, the restaurant experienced a drastic decrease in revenue as customers either refused to come in to eat or paid only in cash. During this same period the restaurant was spending outside their budget on the advertising.
      Broken trust.

      Story: Monitor your subcontractors

      Trust but verify

      A successful general contractor with a reputation for fairness in their dealings needed a specialist to perform some expert carpentry work for a few of their clients.

      The contractor gave the specialist the clients’ contact information and trusted them to arrange the work.

      Weeks later, the contractor checked in with the clients and received a ton of negative feedback:

      • The specialist called them once and never called back.
      • The specialist refused to do the work as described and wanted to charge extra.
      • The specialist performed work to “fix” the issue but cut corners to lessen their costs.

      As a result, the contractor took extreme measures to regain the clients’ confidence and trust and lost other opportunities in the process.

      Stock image of a sad construction site supervisor.

      You work hard for your reputation. Don’t let others ruin it.

      Don’t forget to look within as well as without

      Stock image of a frustrated desk worker.

      Story: Internal reputation is vital

      Trust works both ways

      An organization’s relatively new IT and InfoSec department leadership have been upgrading the organization's systems and policies as fast as resources allow when the organization encounters a major breach of security.

      Trust in the developing IT and InfoSec departments' leadership wanes throughout the organization as people search for the root cause and blame the systems. This degradation of trust limits the effectiveness of the newly implemented process, procedures, and tools of the departments.

      The new leaders' abilities are called into question, and they must now rigorously defend and justify their decisions and positions to the executives and board.

      It will be some time before the two departments gain their prior trust and respect, and the new leaders face some tough times ahead regaining the organization's confidence.

      How could the new leaders approach the situation to mend their reputations in the wake of this (perhaps unfair) reputational hit?

      It is not enough to identify the potential risks; there must also be adequate controls in place to monitor and manage them

      Stock image of a fingerprint on a computer chip under a blacklight.

      Identify, manage, and monitor reputational risks

      Global markets
      • Organizations need to learn how to assess the likelihood of potential risks in the changing global markets and recognize how their partnerships and subcontracts affect their brand.
      • Now more than ever, organizations need to be mindful of the larger global landscape and how their interactions within various regions can impact their reputation.
      Social media
      • Understanding how to monitor social media activity and online content will give you an edge in the current environment.
      • Changes in social media generally happen faster than companies can recognize them. If you are not actively monitoring those risks, the damage could set in before you even have a chance to respond.
      Global shortages
      • Organizations need to accept that shortages will recur periodically and that preparing for them will significantly increase the success potential of long-term plans.
      • Customers don’t always understand what is happening in the global supply chain and may blame you for poor service if you cannot meet demands as you have in the past.

      Which way is your reputation heading?

      • Do you understand and track items that might affect your reputation?
      • Do you understand the impact they may have on your business?

      Visualization of a Newton's Cradle perpetual motion device, aka clacky balls. The lifted ball is colored green with a smiley face and is labelled 'Your Brand Reputation'. The other four balls are red with a frowny face and are labelled 'Data Breach/ Lawsuit', 'Service Disruption', 'Customer Complaint', and 'Poor Delivery'.

      Identifying and understanding potential risks is essential to adapting to the ever-changing online landscape

      Info-Tech Insight

      Few organizations are good at identifying risks. As a result, almost none realistically plan to monitor, manage, and adapt their plans to mitigate those risks.

      Reputational risks

      Not protecting your brand can have disastrous consequences to your organization

      • Data breaches & lawsuits
      • Poor vendor performance
      • Service disruptions
      • Negative reviews

      Stock image of a smiling person on their phone rating something five stars.

      What to look for in vendors

      Identify potential reputational risk impacts
      • Check online reviews from both customers and employees.
      • Check news sites:
        • Has the vendor been affected by a breach?
        • Is the vendor frequently in the news – good or bad? Greater exposure can cause an uptick in hostile attacks, so make sure the vendor has adequate protections in line with its exposure.
      • Review its financials. Is it prime for an acquisition/bankruptcy or other significant change?
      • Review your contractual protections to ensure that you are made whole in the event something goes wrong. Has anything changed with the vendor that requires you to increase your protections?
      • Has anything changed in the vendor’s market? Is a competitor taking its business, or are its resources stretched on multiple projects due to increased demand?
      Illustration of business people in a city above various icons.

      Assessing Reputational Risk Impacts

      Zigzagging icons and numbers one through 7 alternating sides downward. Review Organizational Strategy
      Understand the organizational strategy to prepare for the “what if” game exercise.
      Identify & Understand Potential Risks
      Play the “what if” game with the right people at the table.
      Create a Risk Profile Packet for Leadership
      Pull all the information together in a presentation document.
      Validate the Risks
      Work with leadership to ensure that the proposed risks are in line with their thoughts.
      Plan to Manage the Risks
      Lower the overall risk potential by putting mitigations in place.
      Communicate the Plan
      It is important not only to have a plan but also to socialize it in the organization for awareness.
      Enact the Plan
      Once the plan is finalized and socialized put it in place with continued monitoring for success.
      (Adapted from Harvard Law School Forum on Corporate Governance)

      Insight Summary

      Reputational risk impacts are often unanticipated, causing catastrophic downstream effects. Continuously monitoring your vendors’ actions in the market can help organizations head off brand disasters before they occur.

      Insight 1

      Understanding how to monitor social media activity and online content will give you an edge in the current environment.

      Do you have dedicated individuals or teams to monitor your organization's online presence? Most organizations review and approve the online content, but many forget the need to have analysts reviewing what others are saying about them.

      Insight 2

      Organizations need to learn how to assess the likelihood of potential risks in the rapidly changing online environments and recognize how their partnerships and subcontractors’ actions can affect their brand.

      For example, do you understand how a simple news article raises your profile for short-term and long-term adverse events?

      Insight 3

      Socialize the risk management process throughout the organization to heighten awareness and enable employees to help protect the company’s reputation.

      Do you include a social media and brand protection policy in your annual education?

      Identify reputational risk

      Who should be included in the discussion?
      • While it is true that executive-level leadership defines the strategy for an organization, it is vital for those making decisions to make INFORMED decisions.
      • Getting input from your organization's marketing experts will enhance your brand's long-term protection.
      • Involving those who directly manage vendors and understand the market will aid in determining the forward path for relationships with your current vendors and identifying new emerging potential partners.
      • Organizations have a wealth of experience in their marketing departments that can help identify real-world negative scenarios.
      • Include vendor relationship managers to help track what is happening in the media for those vendors.
      Keep in mind: (R=L*I)
      Risk = Likelihood x Impact

      Impact tends to remain the same, while likelihood is a very flexible variable.

      Stock image of a flowchart asking 'Risk?', 'Yes', 'No'.

      Manage and monitor reputational risk impacts

      What can we realistically do about the risks?
      • Re-evaluate corporate policies frequently.
      • Ensure proper protections in contracts:
        • Limit the use of your brand name in the publicity and trademark clauses.
        • Make sure to include security protections for your data in the event of a breach; understand that reputation can rarely be made whole again once trust is breached.
      • Introduce continual risk assessment to monitor the relevant vendor markets.
      • Be adaptable and allow for innovations that arise from the current needs.
        • Capture lessons learned from prior incidents to improve over time and adjust your strategy based on the lessons.
      • Monitor your company’s and associated vendors’ online presence.
      • Track similar companies’ brand reputations to see how yours compares in the market.

      Social media is driving the need for perpetual diligence.

      Organizations need to monitor their brand reputation considering the pace of incidents in the modern age.

      Stock image of a person on a phone that is connected to other people.

      The “what if” game

      1-3 hours

      Input: List of identified potential risk scenarios scored by likelihood and financial impact, List of potential management of the scenarios to reduce the risk

      Output: Comprehensive reputational risk profile on the specific vendor solution

      Materials: Whiteboard/flip charts, Reputational Risk Impact Tool to help drive discussion

      Participants: Vendor Management Coordinator, Organizational Leadership, Operations Experts (SMEs), Legal/Compliance/Risk Manager, Marketing

      Vendor management professionals are in an excellent position to help senior leadership identify and pull together resources across the organization to determine potential risks. By playing the "what if" game and asking probing questions to draw out – or eliminate – possible negative outcomes, everyone involved adds their insight into parts of the organization to gather a comprehensive picture of potential impacts.

      1. Break into smaller groups (or if too small, continue as a single group).
      2. Use the Reputational Risk Impact Tool to prompt discussion on potential risks. Keep this discussion flowing organically to explore all potential risk but manage the overall process to keep the discussion on track.
      3. Collect the outputs and ask the subject matter experts for management options for each one in order to present a comprehensive risk strategy. You will use this to educate senior leadership so that they can make an informed decision to accept or reject the solution.

      Download the Reputational Risk Impact Tool

      Example: Low reputational risk

      We can see clearly in this example that the contractor suffered minimal impact from the specialist's behavior. Though they did take a hit to their overall reputation with a few customers, they should be able to course-correct with a minimal outlay of effort and almost no loss of revenue.

      Stock image of construction workers.

      Sample table of 'Sample Questions to Ask to Identify Reputational Impacts'. Column headers are 'Score', 'Weight', 'Question', and 'Comments or Notes'. At the bottom the 'Reputational Score' row has a low average score of '1.3' and '%100' total weight in their respective columns.

      Example: High reputational risk

      Note in the example how the tool can represent different weights for each of the criteria depending on your needs.

      Stock image of an older person looking out a window.

      Sample table of 'Sample Questions to Ask to Identify Reputational Impacts'. Column headers are 'Score', 'Weight', 'Question', and 'Comments or Notes'. At the bottom the 'Reputational Score' row has a high average score of '3.1' and '%100' total weight in their respective columns.

      Summary

      Be vigilant and adaptable to change
      • Organizations need to learn how to assess the likelihood of potential risks in the changing global markets and recognize how their partnerships and subcontracts affect their brand.
      • Understanding how to monitor social media activity and online content will give you an edge in the current environment.
      • Bring the right people to the table to outline potential risks to your organization’s brand reputation.
      • Socialize the risk management process throughout the organization to heighten awareness and enable employees to help protect the company’s reputation.
      • Incorporate lessons learned from incidents into your risk management process to build better plans for future issues.
      Stock image of a person's face overlaid with many different images.

      Organizations must evolve their risk assessments to be more adaptive to respond to global factors in the market.

      Ongoing monitoring of online media and the vendors tied to company visibility is imperative to avoiding disaster.

      Bibliography

      "The CEO Reputation Premium: Gaining Advantage in the Engagement Era." Weber Shandwick, March 2015. Accessed June 2022.

      Glidden, Donna. "Don't Underestimate the Need to Protect Your Brand in Publicity Clauses." Info-Tech Research Group, June 2022.

      Greenaway, Jordan. "Managing Reputation Risk: A start-to-finish guide." Transmission Private, July 2020. Accessed June 2022.

      Jagiello, Robert D., and Thomas T. Hills. “Bad News Has Wings: Dread Risk Mediates Social Amplification in Risk Communication.” Risk Analysis, vol. 38, no. 10, 2018, pp. 2193-2207.

      Kenton, Will. "Brand Recognition.” Investopedia, Aug. 2021. Accessed June 2022.

      Lischer, Brian. "How Much Does it Cost to Rebrand Your Company?" Ignyte, October 2017. Accessed June 2022.

      "Powerful Examples of How to Respond to Negative Reviews." ReviewTrackers, 16 Feb. 2022. Accessed June 2022.

      Tonello, Matteo. “Strategic Risk Management: A Primer for Directors.” Harvard Law School Forum on Corporate Governance, 23 Aug. 2012. Web.

      "Valuation of Trademarks: Everything You Need to Know." UpCounsel, 2022. Accessed June 2022.

      Related Info-Tech Research

      Sample of 'Assessing Financial Risk Management'. Identify and Manage Financial Risk Impacts on Your Organization
      • Identifying and managing a vendor’s potential financial impact requires multiple people in the organization across several functions – and those people all need educating on the potential risks.
      • Organizational leadership is often unaware of decisions on organizational risk appetite and tolerance, and they assume there are more protections in place against risk impact than there truly are.
      Sample of 'How to Assess Strategic Risk'. Identify and Manage Strategic Risk Impacts on Your Organization
      • Identifying and managing a vendor’s potential strategic impact requires multiple people in the organization across several functions – and those people all need coaching on the potential changes in the market and how these changes affect strategic plans.
      • Organizational leadership is often caught unaware during crises, and their plans lack the flexibility needed to adjust to significant market upheavals.
      Research coming soon. Jump Start Your Vendor Management Initiative
      • Vendor management is not “plug and play” – each organization’s vendor management initiative (VMI) needs to fit its culture, environment, and goals. The key is to adapt vendor management principles to fit your needs…not the other way around.
      • All vendors are not of equal importance to an organization. Classifying or segmenting your vendors allows you to focus your efforts on the most important vendors first, allowing your VMI to have the greatest impact possible.

      Research Contributors and Experts

      Frank Sewell

      Research Director
      Info-Tech Research Group

      Donna Glidden

      Research Director
      Info-Tech Research Group

      Steven Jeffery

      Principal Research Director
      Info-Tech Research Group

      Mark Roman

      Managing Partner
      Info-Tech Research Group

      Phil Bode

      Principal Research Director
      Info-Tech Research Group

      Sarah Pletcher

      Executive Advisor
      Info-Tech Research Group

      Scott Bickley

      Practice Lead
      Info-Tech Research Group

      Manage Your Chromebooks and MacBooks

      • Buy Link or Shortcode: {j2store}167|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: End-User Computing Devices
      • Parent Category Link: /end-user-computing-devices

      Windows is no longer the only option. MacBooks and Chromebooks are justified, but now you have to manage them.

      • If you have modernized your end-user computing strategy, you may have Windows 10 devices as well as MacBooks.
      • Virtual desktop infrastructure (VDI) and desktop as a service (DaaS) are becoming popular. Chromebooks may be ideal as a low-cost interface into DaaS for your employees.
      • Managing Chromebooks can be particularly challenging as they grow in popularity in the education sector.

      Our Advice

      Critical Insight

      Managing end-user devices may be accomplished with a variety of solutions, but many of those solutions advocate integration with a Microsoft-friendly solution to take advantage of features such as conditional access, security functionality, and data governance.

      Impact and Result

      • Many solutions are available to manage end-user devices, and they come with a long list of options and features. Clarify your needs and define your requirements before you purchase another endpoint management tool. Don’t purchase capabilities that you may never use.
      • Use the associated Endpoint Management Selection Tool spreadsheet to identify your desired endpoint solution features and compare vendor solution functionality based on your desired features.

      Manage Your Chromebooks and MacBooks Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Manage Your Chromebooks and MacBooks deck – MacBooks and Chromebooks are growing in popularity in enterprise and education environments, and now you have to manage them.

      Explore options, guidance and some best practices related to the management of Chromebooks and MacBooks in the enterprise environment and educational institutions. Our guidance will help you understand features and options available in a variety of solutions. We also provide guidance on selecting the best endpoint management solution for your own environment.

      • Manage Your Chromebooks and MacBooks Storyboard

      2. Endpoint Management Selection Tool – Select the best endpoint management tool for your environment. Build a table to compare endpoint management offerings in relation to the features and options desired by your organization.

      This tool will help you determine the features and options you want or need in an endpoint management solution.

      • Endpoint Management Selection Tool
      [infographic]

      Further reading

      Manage Your Chromebooks and MacBooks

      Financial constraints, strategy, and your user base dictate the need for Chromebooks and MacBooks – now you have to manage them in your environment.

      Analyst Perspective

      Managing MacBooks and Chromebooks is similar to managing Windows devices in many ways and different in others. The tools have many common features, yet they struggle to achieve the same goals.

      Until recently, Windows devices dominated the workplace globally. Computing devices were also rare in many industries such as education. Administrators and administrative staff may have used Windows-based devices, but Chromebooks were not yet in use. Most universities and colleges were Windows-based in offices with some flavor of Unix in other areas, and Apple devices were gaining some popularity in certain circles.

      That is a stark contrast compared to today, where Chromebooks dominate the classrooms and MacBooks and Chromebooks are making significant inroads into the enterprise environment. MacBooks are also a common sight on many university campuses. There is no doubt that while Windows may still be the dominant player, it is far from the only one in town.

      Now that Chromebooks and MacBooks are a notable, if not significant, part of the education and enterprise environments, they must be afforded the same considerations as Windows devices in those environments when it comes to management. The good news is that there is no lack of available solutions for managing these devices, and the endpoint management landscape is continually evolving and improving.

      This is a picture of P.J. Ryan, Research Director, Infrastructure & Operations, Info-Tech Research Group

      P.J. Ryan
      Research Director, Infrastructure & Operations
      Info-Tech Research Group

      Executive Summary

      Your Challenge

      • You modernized your end-user computing strategy and now have Windows 10 devices as well as MacBooks.
      • Virtual desktop infrastructure (VDI) and desktop as a service (DaaS) are becoming popular. Chromebooks would be ideal as a low-cost interface into DaaS for your employees.
      • You are responsible for the management of all the new Chromebooks in your educational district.
      • Windows is no longer the only option. MacBooks and Chromebooks are justified, but now you have to manage them.

      Common Obstacles

      • Endpoint management solutions typically do a great job at managing one category of devices, like Windows or MacBooks, but they struggle to fully manage alternative endpoints.
      • Multiple solutions to manage multiple devices will result in multiple dashboards. A single view would be better.
      • One solution may not fit all, but multiple solutions is not desirable either, especially if you have Windows devices, MacBooks, and Chromebooks.

      Info-Tech's Approach

      • Use the tools at your disposal first – don't needlessly spend money if you don't have to. Many solutions can already manage other types of devices to some degree.
      • Use the integration capabilities of endpoint management tools. Many of them can integrate with each other to give you a single interface to manage multiple types of devices while taking advantage of additional functionality.
      • Don't purchase capabilities you will never use. Using 80% of a less expensive tool is economically smarter than using 10% of a more expensive tool.

      Info-Tech Insight

      Managing end-user devices may be accomplished with a variety of solutions, but many of those solutions advocate integration with a Microsoft-friendly solution to take advantage of features such as conditional access, security functionality, and data governance.

      Insight Summary

      Insight 1

      Google Admin Console is necessary to manage Chromebooks, but it can be paired with other tools. Implementation partnerships provide solutions to track the device lifecycle, track the repair lifecycle, sync with Google Admin Console as well as PowerSchool to provide a more complete picture of the user and device, and facilitate reminders to return the device, pay fees if necessary, pick up a device when a repair is complete, and more.

      Insight 2

      The Google Admin Console allows admins to follow an organizational unit (OU) structure very similar to what they may have used in Microsoft's Active Directory environment. This familiarity makes the task of administering Chromebooks easier for admins.

      Insight 3

      Chromebook management goes beyond securing and manipulating the device. Controls to protect the students while online, such as Safe Search and Safe Browsing, should also be implemented.

      Insight 4

      Most companies choose to use a dedicated MacBook management tool. Many unified endpoint management (UEM) tools can manage MacBooks to some extent, but admins tend to agree that a MacBook-focused endpoint management tool is best for MacBooks while a Windows-based endpoint management tool is best for Windows devices.

      Insight 5

      Some MacBook management solutions advocate integration with Windows UEM solutions to take advantage of Microsoft features such as conditional access, security functionality, and data governance. This approach can also be applied to Chromebooks.

      Chromebooks

      Chromebooks had a respectable share of the education market before 2020, but the COVID-19 pandemic turbocharged the penetration of Chromebooks in the education industry.

      Chromebooks are also catching the attention of some decision makers in the enterprise environment.

      "In 2018, Chromebooks represented an incredible 60 percent of all laptop or tablet devices in K-12 -- up from zero percent when the first Chromebook launched during the summer break in 2011."
      – "Will Chromebooks Rule the Enterprise?" Computerworld

      "Chromebooks were the best performing PC products in Q3 2020, with shipment volume increasing to a record-high 9.4 million units, up a whopping 122% year-on-year."
      – Android Police

      "Until the pandemic, Chrome OS' success was largely limited to U.S. schools. Demand in 2020 appears to have expanded beyond that small but critical part of the U.S. PC market."
      – Geekwire

      "In addition to running a huge number of Chrome Extensions and Apps at once, Chromebooks also run Android, Linux and Windows apps."
      – "Will Chromebooks Rule the Enterprise?" Computerworld

      Managing Chromebooks

      Start with the Google Admin Console (GAC)

      GAC is necessary to initially manage Chrome OS devices.

      GAC gives you a centralized console that will allow you to:

      • Create organizational units
      • Add your Chromebook devices
      • Add users
      • Assign users to devices
      • Create groups
      • Create and assign policies
      • Plus more

      GAC can facilitate device management with features such as:

      • Control admin permissions
      • Encryption and update settings
      • App deployment, screen timeout settings
      • Perform a device wipe if required
      • Audit user activity on a device
      • Plus more

      Device and user addition, group and organizational unit creation and administration, applying policies to devices and users – does all this remind you of your Active Directory environment?

      GAC lets you administer users and devices with a similar approach.

      Managing Chromebooks

      Use Active Directory to manage Chromebooks.

      • Enable Active Directory (AD) management from within GAC and you will be able to integrate your Chromebook devices with your AD environment.
      • Devices will be visible in both the GAC and AD environment.
      • Use Windows Group Policy to manage devices and to push policies to users and devices.
      • Users can use their AD username and password to sign into Chromebook devices.
      • GAC can still be used for devices that are not synced with AD.

      Chromebooks can also be managed through these approved partners:

      • Cisco Meraki
      • Citrix XenMobile
      • IBM MaaS360
      • ManageEngine Mobile Device Manager Plus
      • VMware Workspace ONE

      Source: Google

      You must be running the Chrome Enterprise Upgrade and have any licenses required by the approved partner to take advantage of this management option. The partner admin policies supersede GAC.

      If you stop using the approved partner admin console to manage your devices, the polices and settings in GAC will immediately take over the devices.

      Microsoft still has the market share when it comes to device sales, and many administrators are already familiar with Microsoft's Active Directory. Google took advantage of that familiarity when it designed the Google Admin Console structure for users, groups, and organizational units.

      Chromebook Deployment

      Chromebook deployment becomes a challenge when device quantities grow. The enrollment process can be time consuming, and every device must be enrolled before it can be used by an employee or a student. Many admins enlist their full IT teams to assist in the short term. Some vendor partners may assist with distribution options if staffing levels permit. Recent developments from Google have opened additional options for device enrollment beyond the manual enrollment approach.

      Enrolling Chromebooks comes down to one of two approaches:

      1. Manually enrolling one device at a time
        • Users can assist by entering some identifying details during the enrollment if permitted.
        • Some third-party solutions exist, such as USB drives to reduce repetitive keystrokes or hubs to facilitate manually enrolling multiple Chromebooks simultaneously.
      2. Google's Chrome Enterprise Upgrade or the Chrome Education Upgrade
        • This allows you to let your users enroll devices after they accept the end-user license agreement.
        • You can take advantage of Google's vendor partner program and use a zero-touch deployment method where the Chromebook devices automatically receive the assigned policies, apps, and settings as soon as the device is powered on and an authorized user signs in.
        • The Enterprise Upgrade and the Education Upgrade do come with an annual cost per device, which is currently less than US$50.
        • The Enterprise and Education Upgrades come with other features as well, such as enhanced security.

      Chromebooks are automatically assigned to the top-level organizational unit (OU) when enrolled. Devices can be manually moved to another OU, but admins can also create enrollment policies to place newly enrolled devices in a specific OU or have the device locate itself in the same OU as the user.

      Chromebooks in Education

      GAC is also used with Education-licensed devices

      Most of the settings and features previously mentioned are also available for Education-licensed devices and users. Enterprise-specific features will not be available to Education licenses. (Active Directory integration with Education licenses, for example, is accomplished using a different approach)

      • Groups, policies, administrative controls, app deployment and management, adding devices and users, creating organizational units, and more features are all available to Education Admins to use.

      Education device policies and settings tend to focus more on protecting the students with controls such as:

      • Disable incognito mode
      • Disable location tracking
      • Disable external storage devices
      • Browser based protections such as Safe Search or Safe Browsing
      • URL blocking
      • Video input disable for websites
      • App installation prevention, auto re-install, and app blocking
      • Forced re-enrollment to your domain after a device is wiped
      • Disable Guest Mode
      • Restrict who can sign in
      • Audit user activity on a device

      When a student takes home a Chromebook assigned to them, that Chromebook may be the only computer in the household. Administrative polices and settings must take into account the fact that the device may have multiple users accessing many different sites and applications when the device is outside of the school environment.

      Chromebook Management Extended

      An online search for Chromebook management solutions will reveal several software solutions that augment the capabilities of the Google Admin Console. Many of these solutions are focused on the education sector and classroom and student options, although the features would be beneficial to enterprises and educational organizations alike.

      These solutions assist or augment Chromebook management with features such as:

      • Ability to sync with Google Admin Console
      • Ability to sync with student information systems, such as PowerSchool
      • Financial management, purchase details, and chargeback
      • Asset lifecycle management
      • 1:1 Chromebook distribution management
      • Repair programs and repair process management
      • Check-out/loan program management
      • Device distribution/allocation management, including barcode reader integration
      • Simple learning material distribution to the classroom for teachers
      • Facilitate GAC bulk operations
      • Manage inventory of non-IT assets such as projectors, TVs, and other educational assets
      • Plus more

      "There are many components to managing Chromebooks. Schools need to know which student has which device, which school has which device, and costs relating to repairs. Chromebook Management Software … facilitates these processes."
      – VIZOR

      MacBooks

      • MacBooks are gaining popularity in the Enterprise world.
      • Some admins claim MacBooks are less expensive in the long run over Windows-based PCs.
      • Users claim less issues when using a MacBook, and overall, companies report increased retention rates when users are using MacBooks.

      "Macs now make up 23% of endpoints in enterprises."
      – ComputerWeekly.com

      "When given the choice, no less than 72% of employees choose Macs over PCs."
      – "5 Reasons Mac is a must," Jamf

      "IBM says it is 3X more expensive to manage PCs than Macs."
      – Computerworld

      "74% of those who previously used a PC for work experienced fewer issues now that they use a Mac"
      – "Global Survey: Mac in the Enterprise," Jamf

      "When enterprise moves to Mac, staff retention rates improve by 20%. That's quite a boost! "
      – "5 Reasons Mac is a must," Jamf

      Managing MacBooks

      Can your existing UEM keep up?

      Many Windows unified endpoint management (UEM) tools can manage MacBooks, but most companies choose to use a dedicated MacBook management tool.

      • UEM tools that are primarily Windows focused do not typically go deep enough into the management capabilities of non-Windows devices.
      • Admins have noted limitations when it comes to using Windows UEM tools, and reasons they prefer a dedicated MacBook management solution include:
        • Easier to use
        • Faster response times when deploying settings and policies
        • Better control over notification settings and lock screen settings.
        • Easier Apple Business Manager (ABM) integration and provisioning.
      • Note that not every UEM will have the same limitations or advantages. Functionality is different between vendor products.

      Info-Tech Insight

      Most Windows UEM tools are constantly improving, and it is only a matter of time before they rival many of the dedicated MacBook management tools out there.

      Admins tend to agree that a Windows UEM is best for Windows while an Apple-based UEM is best for Apple devices.

      Managing MacBooks

      The market for "MacBook-first" management solutions includes a variety of players of varying ages such as:

      • Jamf
      • Kandji
      • Mosyle
      • SimpleMDM
      • Others

      MacBook-focused management tools can provide features such as:

      • Encryption and update settings
      • App deployment and lifecycle management
      • Remote device wipe, scan, shutdown, restart, and lock
      • Zero touch deployment and support
      • Location tracking
      • Browser content filtering
      • Enable, hide/block, or disable built-in features
      • Configure Wi-Fi, VPN, and certificate-based settings
      • Centralized dashboard with device and app listings as well as individual details
      • Data restrictions
      • Plus more

      Unified endpoint management (UEM) solutions that can provide MacBook management to some degree include (but are not limited to):

      • Intune
      • Ivanti
      • Endpoint Central
      • WorkspaceOne

      Dedicated solutions advocate integration with UEM solutions to take advantage of conditional access, security functionality, and data governance features.

      Jamf and Microsoft entered into a collaboration several years ago with the intention of making the MacBook management process easier and more secure.

      Microsoft Intune and Jamf Pro: Better together to manage and secure Macs
      Microsoft Conditional Access with Jamf Pro ensures that company data is only accessed by trusted users, on trusted devices, using trusted apps. Jamf extends this Enterprise Mobile + Security (EMS) functionality to Mac, iPhone and iPad.
      – "Microsoft Intune and Jamf Pro," Jamf

      Endpoint Management Selection Tool
      Activity

      There are many solutions available to manage end-user devices, and they come with a long list of options and features. Clarify your needs and define your requirements before you purchase another endpoint management tool. Don't purchase capabilities that you may never use.

      Use the Endpoint Management Selection Tool to identify your desired endpoint solution features and compare vendor solution functionality based on your desired features.

      1. List out the desired features you want in an endpoint solution for your devices and record those features in the first column. Use the features provided, or add your own and edit or delete the existing ones if necessary.
      2. List your selected endpoint management solution vendors in each of the columns in place of "Vendor 1," "Vendor 2," etc.
      3. Fill out the spreadsheet by changing the corresponding desired feature cell under each vendor to a "yes" or "no" based on your findings while investigating each vendor solution.
      4. When you have finished your investigation, review your spreadsheet to compare the various offerings and pros and cons of each vendor.
      5. Select your endpoint management solution.

      Endpoint Management Selection Tool

      In the first column, list out the desired features you want in an endpoint solution for your devices. Use the features provided if desired, or add your own and edit or delete the existing ones if necessary. As you look into various endpoint management solution vendors, list them in the columns in place of "Vendor 1," "Vendor 2," etc. Use the "Desired Feature" list as a checklist and change the values to "yes" or "no" in the corresponding box under the vendors' names. When complete, you will be able to look at all the features and compare vendors in a single table.

      Desired Feature Vendor 1 Vendor 2 Vendor 3
      Organizational unit creation Yes No Yes
      Group creation Yes Yes Yes
      Ability to assign users to devices No Yes Yes
      Control of administrative permissions Yes Yes Yes
      Conditional access No Yes Yes
      Security policies enforced Yes No Yes
      Asset management No Yes No
      Single sign-on Yes Yes Yes
      Auto-deployment No Yes No
      Repair lifecycle tracking No Yes No
      Application deployment Yes Yes No
      Device tracking Yes Yes Yes
      Ability to enable encryption Yes No Yes
      Device wipe Yes No Yes
      Ability to enable/disable device tracking No No Yes
      User activity audit No No No

      Related Info-Tech Research

      this is a screenshot from Info-Tech's Modernize and Transform Your End-User Computing Strategy.

      Modernize and Transform Your End-User Computing Strategy
      This project helps support the workforce of the future by answering the following questions: What types of computing devices, provisioning models, and operating systems should be offered to end users? How will IT support devices? What are the policies and governance surrounding how devices are used? What actions are we taking and when? How do end-user devices support larger corporate priorities and strategies?

      Best Unified Endpoint Management (UEM) Software 2022 | SoftwareReviews
      Compare and evaluate unified endpoint management vendors using the most in-depth and unbiased buyer reports available. Download free comprehensive 40+ page reports to select the best unified endpoint management software for your organization.

      Best Enterprise Mobile Management (EMM) Software 2022 | (softwarereviews.com)
      Compare and evaluate enterprise mobile management vendors using the most in-depth and unbiased buyer reports available. Download free comprehensive 40+ page reports to select the best enterprise mobile management software for your organization.

      Bibliography

      Bridge, Tom. "Macs in the enterprise – what you need to know". Computerweekly.com, TechTarget. 27 May 2022. Accessed 12 Aug. 2022.
      Copley-Woods, Haddayr. "5 reasons Mac is a must in the enterprise". Jamf.com, Jamf. 28 June 2022. Accessed 16 Aug. 2022.
      Duke, Kent. "Chromebook sales skyrocketed in Q3 2020 with online education fueling demand." androidpolice.com, Android Police. 16 Nov 2020. Accessed 10 Aug. 2022.
      Elgin, Mike. "Will Chromebooks Rule the Enterprise? (5 Reasons They May)". Computerworld.com, Computerworld. 30 Aug 2019. Accessed 10 Aug. 2022.
      Evans, Jonny. "IBM says it is 3X more expensive to manage PCs than Macs". Computerworld.com, Computerworld. 19 Oct 2016. Accessed 23 Aug. 2022.
      "Global Survey: Mac in the Enterprise". Jamf.com, Jamf. Accessed 16 Aug. 2022.
      "How to Manage Chromebooks Like a Pro." Vizor.cloud, VIZOR. Accessed 10 Aug. 2022.
      "Manage Chrome OS Devices with EMM Console". support.google.com, Google. Accessed 16 Aug. 2022.
      Protalinski, Emil. "Chromebooks outsold Macs worldwide in 2020, cutting into Windows market share". Geekwire.com, Geekwire. 16 Feb 2021. Accessed 22 Aug. 2022.
      Smith, Sean. "Microsoft Intune and Jamf Pro: Better together to manage and secure Macs". Jamf.com, Jamf. 20 April 2022. Accessed 16 Aug. 2022.

      Automate Work Faster and More Easily With Robotic Process Automation

      • Buy Link or Shortcode: {j2store}237|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Optimization
      • Parent Category Link: /optimization
      • Your organization has many business processes that rely on repetitive, routine manual data collection and processing work, and there is high stakeholder interest in automating them.
      • You’re investigating whether robotic process automation (RPA) is a suitable technological enabler for automating such processes.
      • Being a trending technology, especially with its association with artificial intelligence (AI), there is much marketing fluff, hype, and misunderstanding about RPA.
      • Estimating the potential impact of RPA on business is difficult, as the relevant industry statistics often conflict each other and you aren’t sure how applicable it is to your business.

      Our Advice

      Critical Insight

      • There are no physical robots in RPA. RPA is about software “bots” that interact with applications as if they were human users to perform routine, repetitive work in your place. It’s for any business in any industry, not just for manufacturing.
      • RPA is lightweight IT; it reduces the cost of entry, maintenance, and teardown of automation as well as the technological requirement of resources that maintain it, as it complements existing automation solutions in your toolkit.
      • RPA is rules-based. While AI promises to relax the rigidity of rules, it adds business risks that are poorly understood by both businesses and subject-matter experts. Rules-based “RPA 1.0” is mature and may pose a stronger business case than AI-enabled RPA.
      • RPA’s sweet spot is “swivel chair automation”: processes that require human workers to act as a conduit between several systems, moving between applications, manually keying, re-keying, copying, and pasting information. A bot can take their place.

      Impact and Result

      • Discover RPA and how it differentiates from other automation solutions.
      • Understand the benefits and risks of complementing RPA with AI.
      • Identify existing business processes best suited for automation with RPA.
      • Communicate RPA’s potential business benefits to stakeholders.

      Automate Work Faster and More Easily With Robotic Process Automation Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you should use RPA to automate routine, repetitive data collection and processing work, review Info-Tech’s methodology, and understand the ways we can support you.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Discover robotic process automation

      Learn about RPA, including how it compares to IT-led automation rooted in business process management practices and the role of AI.

      • Automate Work Faster and More Easily With Robotic Process Automation – Phase 1: Discover Robotic Process Automation
      • Robotic Process Automation Communication Template

      2. Identify processes best suited for robotic process automation

      Identify and prioritize candidate processes for RPA.

      • Automate Work Faster and More Easily With Robotic Process Automation – Phase 2: Identify Processes Best Suited for Robotic Process Automation
      • Process Evaluation Tool for Robotic Process Automation
      • Minimum Viable Business Case Document
      [infographic]

      Build a Vendor Security Assessment Service

      • Buy Link or Shortcode: {j2store}318|cart{/j2store}
      • member rating overall impact: 9.0/10 Overall Impact
      • member rating average dollars saved: $17,501 Average $ Saved
      • member rating average days saved: 17 Average Days Saved
      • Parent Category Name: Threat Intelligence & Incident Response
      • Parent Category Link: /threat-intelligence-incident-response
      • Vendor security risk management is a growing concern for many organizations. Whether suppliers or business partners, we often trust them with our most sensitive data and processes.
      • More and more regulations require vendor security risk management, and regulator expectations in this area are growing.
      • However, traditional approaches to vendor security assessments are seen by business partners and vendors as too onerous and are unsustainable for information security departments.

      Our Advice

      Critical Insight

      • An efficient and effective assessment process can only be achieved when all stakeholders are participating.
      • Security assessments are time-consuming for both you and your vendors. Maximize the returns on your effort with a risk-based approach.
      • Effective vendor security risk management is an end-to-end process that includes assessment, risk mitigation, and periodic re-assessments.

      Impact and Result

      • Develop an end-to-end security risk management process that includes assessments, risk treatment through contracts and monitoring, and periodic re-assessments.
      • Base your vendor assessments on the actual risks to your organization to ensure that your vendors are committed to the process and you have the internal resources to fully evaluate assessment results.
      • Understand your stakeholder needs and goals to foster support for vendor security risk management efforts.

      Build a Vendor Security Assessment Service Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you should build a vendor security assessment service, review Info-Tech’s methodology, and understand the three ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Define governance and process

      Determine your business requirements and build your process to meet them.

      • Build a Vendor Security Assessment Service – Phase 1: Define Governance and Process
      • Vendor Security Policy Template
      • Vendor Security Process Template
      • Vendor Security Process Diagram (Visio)
      • Vendor Security Process Diagram (PDF)

      2. Develop assessment methodology

      Develop the specific procedures and tools required to assess vendor risk.

      • Build a Vendor Security Assessment Service – Phase 2: Develop Assessment Methodology
      • Service Risk Assessment Questionnaire
      • Vendor Security Questionnaire
      • Vendor Security Assessment Inventory

      3. Deploy and monitor process

      Implement the process and develop metrics to measure effectiveness.

      • Build a Vendor Security Assessment Service – Phase 3: Deploy and Monitor Process
      • Vendor Security Requirements Template
      [infographic]

      Workshop: Build a Vendor Security Assessment Service

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Define Governance and Process

      The Purpose

      Understand business and compliance requirements.

      Identify roles and responsibilities.

      Define the process.

      Key Benefits Achieved

      Understanding of key goals for process outcomes.

      Documented service that leverages existing processes.

      Activities

      1.1 Review current processes and pain points.

      1.2 Identify key stakeholders.

      1.3 Define policy.

      1.4 Develop process.

      Outputs

      RACI Matrix

      Vendor Security Policy

      Defined process

      2 Define Methodology

      The Purpose

      Determine methodology for assessing procurement risk.

      Develop procedures for performing vendor security assessments.

      Key Benefits Achieved

      Standardized, repeatable methodologies for supply chain security risk assessment.

      Activities

      2.1 Identify organizational security risk tolerance.

      2.2 Develop risk treatment action plans.

      2.3 Define schedule for re-assessments.

      2.4 Develop methodology for assessing service risk.

      Outputs

      Security risk tolerance statement

      Risk treatment matrix

      Service Risk Questionnaire

      3 Continue Methodology

      The Purpose

      Develop procedures for performing vendor security assessments.

      Establish vendor inventory.

      Key Benefits Achieved

      Standardized, repeatable methodologies for supply chain security risk assessment.

      Activities

      3.1 Develop vendor security questionnaire.

      3.2 Define procedures for vendor security assessments.

      3.3 Customize the vendor security inventory.

      Outputs

      Vendor security questionnaire

      Vendor security inventory

      4 Deploy Process

      The Purpose

      Define risk treatment actions.

      Deploy the process.

      Monitor the process.

      Key Benefits Achieved

      Understanding of how to treat different risks according to the risk tolerance.

      Defined implementation strategy.

      Activities

      4.1 Define risk treatment action plans.

      4.2 Develop implementation strategy.

      4.3 Identify process metrics.

      Outputs

      Vendor security requirements

      Understanding of required implementation plans

      Metrics inventory

      Implement Your Negotiation Strategy More Effectively

      • Buy Link or Shortcode: {j2store}225|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Vendor Management
      • Parent Category Link: /vendor-management
      • Forty-eight percent of CIOs believe their budgets are inadequate.
      • CIOs and IT departments are getting more involved with negotiations to reduce costs and risk.
      • Not all negotiators are created equal, and the gap between a skilled negotiator and an average negotiator is not always easy to identify objectively.
      • Skilled negotiators are in short supply.

      Our Advice

      Critical Insight

      • Preparation is critical for the success of your negotiation, but you cannot prepare for every eventuality.
      • Communication is the heart and soul of negotiations, but what is being “said” is only part of the picture.
      • Skilled negotiators separate themselves based on skillsets, and outcomes alone may not provide an accurate assessment of a negotiator.

      Impact and Result

      Addressing and managing critical negotiation elements helps:

      • Improve negotiation skills.
      • Implement your negotiation strategy more effectively.
      • Improve negotiation results.

      Implement Your Negotiation Strategy More Effectively Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you should create and follow a scalable process for preparing to negotiate with vendors, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. During

      Throughout this phase, ten essential negotiation elements are identified and reviewed.

      • Implement Your Negotiation Strategy More Effectively – Phase 1: During
      • During Negotiations Tool
      [infographic]

      Workshop: Implement Your Negotiation Strategy More Effectively

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 12 Steps to Better Negotiation Preparation

      The Purpose

      Improve negotiation skills and outcomes.

      Understand how to use the Info-Tech During Negotiations Tool.

      Key Benefits Achieved

      A better understanding of the subtleties of the negotiation process and an identification of where the negotiation strategy can go awry.

      The During Negotiation Tool will be reviewed and configured for the customer’s environment (as applicable).

      Activities

      1.1 Manage six key items during the negotiation process.

      1.2 Set the right tone and environment for the negotiation.

      1.3 Focus on improving three categories of intangibles.

      1.4 Improve communication skills to improve negotiation skills.

      1.5 Customize your negotiation approach to interact with different personality traits and styles.

      1.6 Maximize the value of your discussions by focusing on seven components.

      1.7 Understand the value of impasses and deadlocks and how to work through them.

      1.8 Use concessions as part of your negotiation strategy.

      1.9 Identify and defeat common vendor negotiation ploys.

      1.10 Review progress and determine next steps.

      Outputs

      Sample negotiation ground rules

      Sample vendor negotiation ploys

      Sample discussion questions and evaluation matrix

      Explore the Secrets of IBM Software Contracts to Optimize Spend and Reduce Compliance Risk

      • Buy Link or Shortcode: {j2store}141|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Licensing
      • Parent Category Link: /licensing
      • IBM customers want to make effective use of their paid-up licenses to avoid overspending and stay compliant with agreements.
      • Each IBM software product is subject to different rules.
      • Clients control and have responsibility for aligning usage and payments. Over time, the usage of the software may be out of sync with what the client has paid for, resulting in either overspending or violation of the licensing agreement.
      • IBM audits software usage in order to generate revenue from non-compliant customers.

      Our Advice

      Critical Insight

      • You have a lot of work to do if you haven’t been paying attention to your IBM software.
      • Focus on needs first. Conduct and document a thorough requirements assessment. Well-documented needs will be your core asset in negotiation.
      • Know what’s in IBM’s terms and conditions. Failure to understand these can lead to major penalties after an audit.
      • Review your agreements and entitlements quarterly. IBM may have changed the rules, and you have almost certainly changed your usage.

      Impact and Result

      • Establish clear licensing requirements.
      • Maintain an effective process for managing your IBM license usage and compliance.
      • Identify any cost-reduction opportunities.
      • Prepare for penalty-free IBM audits.

      Explore the Secrets of IBM Software Contracts to Optimize Spend and Reduce Compliance Risk Research & Tools

      Start here – read the Executive Brief

      Read this Executive Brief to understand why you need to invest effort in managing usage and licensing of your IBM software.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Review terms and conditions for your IT contract

      Use Info-Tech’s licensing best practices to avoid the common mistakes of overspending on IBM licensing or failing an IBM audit.

      • IBM Passport Advantage Software RFQ Template
      • IBM 3-Year Bundled Price Analysis Tool
      [infographic]

      Leverage Web Analytics to Reinforce Your Web Experience Management Strategy

      • Buy Link or Shortcode: {j2store}563|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Marketing Solutions
      • Parent Category Link: /marketing-solutions
      • Organizations are unaware of the capabilities of web analytics tools and unsure how to leverage these new technologies to enhance their web experience.
      • Traditional solutions offer only information and data about the activity on the website. It is difficult for organizations to understand the customer motivations and behavioral patterns using the data.
      • In addition, there is an overwhelming number of vendors offering various solutions. Understanding which solution best fits your business needs is crucial to avoid overspending.

      Our Advice

      Critical Insight

      • Understanding organizational goals and business objectives is essential in effectively leveraging web analytics.
      • It is easy to get lost in a sea of expensive web analytical tools. Choosing tools that align with the business objectives will keep the costs of customer acquisition and retention to a minimum.
      • Beyond selection and implementation, leveraging web analytic tools requires commitment from the organization to continuously monitor key KPIs to ensure good customer web experience.

      Impact and Result

      • Understand what web analytic tools are and some key trends in the market space. Learn about top advanced analytic tools that help understand user behavior.
      • Discover top vendors in the market space and some of the top-level features they offer.
      • Understand how to use the metrics to gather critical insights about the website’s use and key initiatives for successful implementation.

      Leverage Web Analytics to Reinforce Your Web Experience Management Strategy Research & Tools

      Leverage Web Analytics to Reinforce Your Web Experience Management Strategy Storyboard – A deck outlining the importance of web analytic tools and how they can be leveraged to meet your business needs.

      This research offers insight into web analytic tools, key trends in the market space, and an introduction to advanced web analytics techniques. Follow our five-step initiative to successfully select and implement web analytics tools and identify which baseline metrics to measure and continuously monitor for best results.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      • Leverage Web Analytics to Reinforce Your Web Experience Management Strategy Storyboard
      [infographic]

      Further reading

      Leverage Web Analytics to Reinforce Your Web Experience Management Strategy

      Web analytics tools are the gateway to understanding customer behavior.

      EXECUTIVE BRIEF

      Analyst Perspective

      In today’s world, users want to consume concise content and information quickly. Websites have a limited time to prove their usefulness to a new user. Content needs to be as few clicks away from the user as possible. Analyzing user behavior using advanced analytics techniques can help website designers better understand their audience.

      Organizations need to implement sophisticated analytics tools to track user data from their website. However, simply extracting data is not enough to understand the user motivation. A successful implementation of a web analytics tool will comprise both understanding what a customer does on the website and why the customer does what they do.

      This research will introduce some fundamental and advanced analytics tools and provide insight into some of the vendors in the market space.

      Photo of Sai Krishna Rajaramagopalan, Research Specialist, Applications − Enterprise Applications, Info-Tech Research Group. Sai Krishna Rajaramagopalan
      Research Specialist, Applications − Enterprise Applications
      Info-Tech Research Group

      Executive Summary

      Your Challenge
      • Web analytics solutions have emerged as applications that provide extensive information and data about users visiting your webpage. However, many organizations are unaware of the capabilities of these tools and unsure how to leverage these new technologies to enhance user experience.
      Common Obstacles
      • Traditional solutions offer information and data about customers’ activity on the website but no insight into their motivations and behavioral patterns.
      • In addition, an overwhelming number of vendors are offering various solutions. Understanding which solution best fits your business needs is crucial to avoid overspending.
      Info-Tech’s Approach
      • This research is aimed to help you understand what web analytic tools are and some key trends in the market space. Learn about top advanced analytic tools that help you understand user behavior. Discover top vendors in the market space and some of the high-level features offered.
      • This research also explains techniques and metrics to gather critical insights about your website’s use and will aid in understanding users’ motivations and patterns and better predict their behavior on the website.

      Info-Tech Insight

      It is easy to get lost in a sea of expensive web analytics tools. Choose tools that align with your business objectives to keep the costs of customer acquisition and retention to a minimum.

      Ensure the success of your web analytics programs by following five simple steps

      1. ORGANIZATIONAL GOALS

      The first key step in implementing and succeeding with web analytics tools is to set clearly defined organizational goals, e.g. improving product sales.

      3. KPI METRICS

      Define key performance indicators (KPIs) that help track the organization’s performance, e.g. number of page visits, conversion rates, bounce rates.

      5. REVIEW

      Continuous improvement is essential to succeed in understanding customers. The world is a dynamic place, and you must constantly revise your organizational goals, business objectives, and KPIs to remain competitive.

      Centerpiece representing the five surrounding steps.

      2. BUSINESS OBJECTIVES

      The next step is to lay out business objectives that help to achieve the organization’s goals, e.g. to increase customer leads, increase customer transactions, increase web traffic.

      4. APPLICATION SELECTION

      Understand the web analytics tool space and which combination of tools and vendors best fits the organization’s goals.

      Web Analytics Introduction

      Understand traditional and advanced tools and their capabilities.

      Understanding web analytics

      • Web analytics is the branch of analytics that deals with the collection, reporting, and analysis of data generated by users visiting and interacting with a website.
      • The purpose of web analytics is to measure user behavior, optimize the website’s user experience and flow, and gain insights that help meet business objectives like increasing conversions and sales.
      • Web analytics allows you to see how your website is performing and how people are acting while on your website. What’s important is what you can do with this knowledge.
      • Data collected through web analytics may include traffic sources, referring sites, page views, paths taken, and conversion rates. The compiled data often forms a part of customer relationship management analytics to facilitate and streamline better business decisions.
      • Having strong web analytics is important in understanding customer behavior and fine-tuning marketing and product development approaches accordingly.
      Example of a web analytics dashboard.

      Why you should leverage web analytics

      Leveraging web analytics allows organizations to better understand their customers and achieve their business goals.

      The global web analytics market size is projected to reach US$5,156.3 million by 2026, from US$2,564 million in 2019, at a CAGR of 10.4% during 2021-2026. (Source: 360 Research Reports, 2021) Of the top 1 million websites with the highest traffic, there are over 3 million analytics technologies used. Google Analytics has the highest market share, with 50.3%. (Source: “Top 1 Million Sites,” BuiltWith, 2022)
      Of the 200 million active websites, 57.3% employ some form of web analytics tool. This trend is expected to grow as more sophisticated tools are readily available at a cheaper cost. (Source: “On the Entire Internet,” BuiltWith, 2022; Siteefy, 2022) A three-month study by Contentsquare showed a 6.9% increase in traffic, 11.8% increase in page views, 12.4% increase in transactions, and 3.6% increase in conversion rates through leveraging web analytics. (Source: Mordor Intelligence, 2022)

      Case Study

      Logo for Ryanair.
      INDUSTRY
      Aviation
      SOURCE
      AT Internet
      Web analytics

      Ryanair is a low-fare airline in Europe that receives nearly all of its bookings via its website. Unhappy with its current web analytics platform, which was difficult to understand and use, Ryanair was looking for a solution that could adapt to its requirements and provide continuous support and long-term collaboration.

      Ryanair chose AT Internet for its intuitive user interface that could effectively and easily manage all the online activity. AT was the ideal partner to work closely with the airline to strengthen strategic decision making over the long term, increase conversions in an increasingly competitive market, and increase transactions on the website.

      Results

      By using AT Internet Web Analytics to improve email campaigns and understand the behavior of website visitors, Ryanair was able to triple click-through rates, increase visitor traffic by 16%, and decrease bounce rate by 18%.

      Arrows denoting increases or decreases in certain metrics: '3x increase in click-through rates', '16% increase in visitor traffic', '18% decrease in bounce rate'.

      Use traditional web analytics tools to understand your consumer

      What does the customer do?
      • Traditional web analytics allows organizations to understand what is happening on their website and what customers are doing. These tools deliver hard data to measure the performance of a website. Some of the data measured through traditional web analytics are:
      • Visit count: The number of visits received by a webpage.
      • Bounce rate: The percentage of visitors that leave the website after only viewing the first page compared to total visitors.
      • Referrer: The previous website that sent the user traffic to a specific website.
      • CTA clicks: The number of times a user clicks on a call to action (CTA) button.
      • Conversion rate: Proportion of users that reach the final outcome of the website.
      Example of a traditional web analytics dashboard.

      Use advanced web analytics techniques to understand your consumer

      Why does the customer do what they do?
      • Traditional web analytic tools fail to explain the motivation of users. Advanced analytic techniques help organizations understand user behavior and measure user satisfaction. The techniques help answer questions like: Why did a user come to a webpage? Why did they leave? Did they find what they were looking for? Some of the advanced tools include:
      • Heatmapping: A visual representation of where the users click, scroll, and move on a webpage.
      • Recordings: A recording of the mouse movement and clicks for the entire duration of a user’s visit.
      • Feedback forms and surveys: Voice of the customer tools allowing users to give direct feedback about websites.
      • Funnel exploration: The ability to visualize the steps users take to complete tasks on your site or app.
      Example of an advanced web analytics dashboard.

      Apply industry-leading techniques to leverage web analytics

      Heatmapping
      • Heatmaps are used to visualize where users move their mouse, click, and scroll in a webpage.
      • Website heatmaps use a warm-to-cold color scheme to indicate user activity, with the warmest color indicating the highest visitor engagement and the coolest indicating the lowest visitor engagement.
      • Organizations can use this tool to evaluate the elements of the website that attract users and identify which sections require improvement to increase user engagement.
      • Website designers can make changes and compare the difference in user interaction to measure the effectiveness of the changes.
      • Scrollmaps help designers understand what the most popular scroll-depth of your webpage is – and that’s usually a prime spot for an important call to action.
      Example of a website with heatmapping overlaid.
      (Source: An example of a heatmap layered with a scrollmap from Crazy Egg, 2020)

      Apply industry-leading techniques to leverage web analytics

      Funneling

      • Funnels are graphical representations of a customer’s journey while navigating through the website.
      • Funnels help organizations identify which webpage users land on and where users drop off.
      • Organizations can capture every user step to find the unique challenges between entry and completion. Identifying what friction stands between browsing product grids and completing a transaction allows web designers to then eliminate it.
      • Designers can use A/B testing to experiment with different design philosophies to compare conversion statistics.
      • Funneling can be expanded to cross-channel analytics by incorporating referral data, cookies, and social media analytics.
      Example of a bar chart created through funneling.

      Apply industry-leading techniques to leverage web analytics

      Session recordings

      • Session recordings are playbacks of users’ interaction with the website on a single session. User interaction can vary between mouse clicks, keyboard input, and mouse scroll.
      • Recordings help organizations understand user motivation and help identify why users undertake certain tasks or actions on the webpage.
      • Playbacks can also be used to see if users are confused anywhere between the landing page and final transaction phase. This way, playbacks further help ensure visitors complete the funneling seamlessly.
      Example of a session recording featuring a line created by the mouse's journey.

      Apply industry-leading techniques to leverage web analytics

      Feedback and microsurveys

      • Feedback can be received directly from end users to help organizations improve the website.
      • Receiving feedback from users can be difficult, since not every user is willing to spend time to submit constructive and detailed feedback. Microsurveys are an excellent alternative.
      • Users can submit short feedback forms consisting of a single line or emojis or thumbs up or down.
      • Users can directly highlight sections of the page about which to submit feedback. This allows designers to quickly pinpoint areas for improvement. Additionally, web designers can play back recordings when feedback is submitted to get a clear idea about the challenges users face.
      Example of a website with a microsurvey in the corner.

      Market Overview

      Choose vendors and tools that best match your business needs.

      Top-level traditional features

      Feature Name

      Description

      Visitor Count Tracking Counts the number of visits received by a website or webpage.
      Geographic Analytics Uses location information to enable the organization to provide location-based services for various demographics.
      Conversion Tracking Measures the proportion of users that complete a certain task compared to total number of users.
      Device and Browser Analytics Captures and summarizes device and browser information.
      Bounce and Exit Tracking Calculates exit rate and bounce rate on a webpage.
      CTA Tracking Measures the number of times users click on a call to action (CTA) button.
      Audience Demographics Captures, analyzes, and displays customer demographic/firmographic data from different channels.
      Aggregate Traffic Reporting Works backward from a conversion or other key event to analyze the differences, trends, or patterns in the paths users took to get there.
      Social Media Analytics Captures information on social signals from popular services (Twitter, Facebook, LinkedIn, etc.).

      Top-level advanced features

      Feature Name

      Description

      HeatmappingShows where users have clicked on a page and how far they have scrolled down a page or displays the results of eye-tracking tests through the graphical representation of heatmaps.
      Funnel ExplorationVisualizes the steps users take to complete tasks on your site or app.
      A/B TestingEnables you to test the success of various website features.
      Customer Journey ModellingEffectively models and displays customer behaviors or journeys through multiple channels and touchpoints.
      Audience SegmentationCreates and analyzes discrete customer audience segments based on user-defined criteria or variables.
      Feedback and SurveysEnables users to give feedback and share their satisfaction and experience with website designers.
      Paid Search IntegrationIntegrates with popular search advertising services (i.e. AdWords) and can make predictive recommendations around areas like keywords.
      Search Engine OptimizationProvides targeted recommendations for improving and optimizing a page for organic search rankings (i.e. via A/B testing or multivariate testing).
      Session RecordingRecords playbacks of users scrolling, moving, u-turning, and rage clicking on your site.

      Evaluate software category leaders using SoftwareReviews’ vendor rankings and awards

      Logo for SoftwareReviews.
      Sample of SoftwareReviews' The Data Quadrant. The Data Quadrant is a thorough evaluation and ranking of all software in an individual category to compare platforms across multiple dimensions.

      Vendors are ranked by their Composite Score, based on individual feature evaluations, user satisfaction rankings, vendor capability comparisons, and likeliness to recommend the platform.

      Sample of SoftwareReviews' The Emotional Footprint. The Emotional Footprint is a powerful indicator of overall user sentiment toward the relationship with the vendor, capturing data across five dimensions.

      Vendors are ranked by their Customer Experience (CX) Score, which combines the overall Emotional Footprint rating with a measure of the value delivered by the solution.

      Speak with category experts to dive deeper into the vendor landscape

      Logo for SoftwareReviews.
      Fact-based reviews of business software from IT professionals. Top-tier data quality backed by a rigorous quality assurance process. CLICK HERE to ACCESS

      Comprehensive software reviews
      to make better IT decisions

      We collect and analyze the most detailed reviews on enterprise software from real users to give you an unprecedented view into the product and vendor before you buy.

      Product and category reports with state-of-the-art data visualization. User-experience insight that reveals the intangibles of working with a vendor.

      SoftwareReviews is powered by Info-Tech

      Technology coverage is a priority for Info-Tech and SoftwareReviews provides the most comprehensive unbiased data on today’s technology. Combined with the insight of our expert analysts, our members receive unparalleled support in their buying journey.

      Top vendors in the web analytics space

      Logo for Google Analytics. Google Analytics provides comprehensive traditional analytics tools, free of charge, to understand the customer journey and improve marketing ROI. Twenty-four percent of all web analytical tools used on the internet are provided by Google analytics.
      Logo for Hotjar. Hotjar is a behavior analytics and product experience insights service that helps you empathize with and understand your users through their feedback via tools like heatmaps, session recordings, and surveys. Hotjar complements the data and insights you get from traditional web analytics tools like Google Analytics.
      Logo for Crazy Egg. Crazy Egg is a website analytics tool that helps you optimize your site to make it more user-friendly, more engaging, and more conversion-oriented. It does this through heatmaps and A/B testing, which allow you to see how people are interacting with your site.
      Logo for Amplitude Analytics. Amplitude Analytics provides intelligent insight into customer behavior. It offers basic functionalities like measuring conversion rate and engagement metrics and also provides more advanced tools like customer journey maps and predictive analytics capabilities through AI.

      Case Study

      Logo for Miller & Smith.
      INDUSTRY
      Real Estate
      SOURCE
      Crazy Egg

      Heatmaps and playback recordings

      Challenge

      Miller & Smith had just redesigned their website, but the organization wanted to make sure it was user-friendly as well as visually appealing. They needed an analytics platform that could provide information about where visitors were coming from and measure the effectiveness of the marketing campaigns.

      Solution

      Miller & Smith turned to Crazy Egg to obtain visual insights and track user behavior. They used heatmaps and playback recordings to see user activity within webpages and pinpoint any issues with user interface. In just a few weeks, Miller & Smith gained valuable data to work with: the session recordings helped them understand how users were navigating the site, and the heatmaps allowed them to see where users were clicking – and what they were skipping.

      Results

      Detailed reports generated by the solution allowed Miller & Smith team to convince key stakeholders and implement the changes easily. They were able to pinpoint what changes needed to be made and why these changes would improve their experience.

      Within few weeks, the bounce rate improved by 7.5% and goal conversion increased by 8.5% over a similar period the previous year.

      Operationalizing Web Analytics Tools

      Execute initiatives for successful implementation.

      Ensure success of your web analytics programs by following five simple steps

      1. ORGANIZATIONAL GOALS

      The first key step in implementing and succeeding with web analytics tools is to set clearly defined organizational goals, e.g. improving product sales.

      3. KPI METRICS

      Define key performance indicators (KPIs) that help track the organization’s performance, e.g. number of page visits, conversion rates, bounce rates.

      5. REVIEW

      Continuous improvement is essential to succeed in understanding customers. The world is a dynamic place, and you must constantly revise your organizational goals, business objectives, and KPIs to remain competitive.

      Centerpiece representing the five surrounding steps.

      2. BUSINESS OBJECTIVES

      The next step is to lay out business objectives that help to achieve the organization’s goals, e.g. to increase customer leads, increase customer transactions, increase web traffic.

      4. APPLICATION SELECTION

      Understand the web analytics tool space and which combination of tools and vendors best fits the organization’s goals.

      1.1 Understand your organization’s goals

      30 minutes

      Output: Organization’s goal list

      Materials: Whiteboard, Markers

      Participants: Core project team

      1. Identify the key organizational goals for both the short term and the long term.
      2. Arrange the goals in descending order of priority.

      Example table of goals ranked by priority and labeled short or long term.

      1.2 Align business objectives with organizational goals

      30 minutes

      Output: Business objectives

      Materials: Whiteboard, Markers

      Participants: Core project team

      1. Identify the key business objectives that help attain organization goals.
      2. Match each business objective with the corresponding organizational goals it helps achieve.
      3. Arrange the objectives in descending order of priority.

      Example table of business objectives ranked by priority and which organization goal they're linked to.

      Establish baseline metrics

      Baseline metrics will be improved through:

      1. Efficiently using website elements and CTA button placement
      2. Reducing friction between the landing page and end point
      3. Leveraging direct feedback from users to continuously improve customer experience

      1.3 Establish baseline metrics that you intend to improve via your web analytics tools

      30 minutes

      Example table with metrics, each with a current state and goal state.

      Accelerate your software selection project

      Vendor selection projects often demand extensive and unnecessary documentation.

      Software Selection Insight

      Balance the effort-to-information ratio required for a business impact assessment to keep stakeholders engaged. Use documentation that captures the key data points and critical requirements without taking days to complete. Stakeholders are more receptive to formal selection processes that are friction free.

      The Software Selection Workbook

      Work through the straightforward templates that tie to each phase of the Rapid Application Selection Framework, from assessing the business impact to requirements gathering.

      Sample of the Software Selection Workbook deliverable.

      The Vendor Evaluation Workbook

      Consolidate the vendor evaluation process into a single document. Easily compare vendors as you narrow the field to finalists.

      Sample of the Vendor Evaluation Workbook deliverable.

      The Guide to Software Selection: A Business Stakeholder Manual

      Quickly explain the Rapid Application Selection Framework to your team while also highlighting its benefits to stakeholders.

      Sample of the Guide to Software Selection: A Business Stakeholder Manual deliverable.

      Revisit the metrics you identified and revise your goals

      Track the post-deployment results, compare the metrics, and set new targets for the next fiscal year.

      Example table of 'Baseline Website Performance Metrics' with the column 'Revised Target' highlighted.

      Related Info-Tech Research

      Stock image of two people going over a contract. Modernize Your Corporate Website to Drive Business Value

      Drive higher user satisfaction and value through UX-driven websites.

      Stock image of a person using the cloud on their smartphone. Select and Implement a Web Experience Management Solution

      Your website is your company’s face to the world: select a best-of-breed platform to ensure you make a rock-star impression with your prospects and customers!

      Stock image of people studying analytics. Create an Effective Web Redesign Strategy

      Ninety percent of web redesign projects, executed without an effective strategy, fail to accomplish their goals.

      Bibliography

      "11 Essential Website Data Factors and What They Mean." CivicPlus, n.d. Accessed 26 July 2022.

      “Analytics Usage Distribution in the Top 1 Million Sites.” BuiltWith, 1 Nov. 2022. Accessed 26 July 2022.

      "Analytics Usage Distribution on the Entire Internet." BuiltWith, 1 Nov. 2022. Accessed 26 July 2022.

      Bell, Erica. “How Miller and Smith Used Crazy Egg to Create an Actionable Plan to Improve Website Usability.” Crazy Egg, n.d. Accessed 26 July 2022.

      Brannon, Jordan. "User Behavior Analytics | Enhance The Customer Journey." Coalition Technologies, 8 Nov 2021. Accessed 26 July 2022.

      Cardona, Mercedes. "7 Consumer Trends That Will Define The Digital Economy In 2021." Adobe Blog, 7 Dec 2020. Accessed 26 July 2022.

      “The Finer Points.“ Analytics Features. Google Marketing Platform, 2022. Accessed 26 July 2022.

      Fitzgerald, Anna. "A Beginner’s Guide to Web Analytics." HubSpot, 21 Sept 2022. Accessed 26 July 2022.

      "Form Abandonment: How to Avoid It and Increase Your Conversion Rates." Fullstory Blog, 7 April 2022. Accessed 26 July 2022.

      Fries, Dan. "Plug Sales Funnel Gaps by Identifying and Tracking Micro-Conversions." Clicky Blog, 9 Dec 2019. Accessed 7 July 2022.

      "Funnel Metrics in Saas: What to Track and How to Improve Them?" Userpilot Blog, 23 May 2022. Accessed 26 July 2022.

      Garg, Neha. "Digital Experimentation: 3 Key Steps to Building a Culture of Testing." Contentsquare, 21 June 2021. Accessed 26 July 2022.

      “Global Web Analytics Market Size, Status and Forecast 2021-2027.” 360 Research Reports, 25 Jan. 2021. Web.

      Hamilton, Stephanie. "5 Components of Successful Web Analytics." The Daily Egg, 2011. Accessed 26 July 2022.

      "Hammond, Patrick. "Step-by-Step Guide to Cohort Analysis & Reducing Churn Rate." Amplitude, 15 July 2022. Accessed 26 July 2022.

      Hawes, Carry. "What Is Session Replay? Discover User Pain Points With Session Recordings." Dynatrace, 20 Dec 2021. Accessed 26 July 2022.

      Huss, Nick. “How Many Websites Are There in the World?” Siteefy, 8 Oct. 2022. Web.

      Nelson, Hunter. "Establish Web Analytics and Conversion Tracking Foundations Using the Google Marketing Platform.” Tortoise & Hare Software, 29 Oct 2022. Accessed 26 July 2022.

      "Product Analytics Vs Product Experience Insights: What’s the Difference?" Hotjar, 14 Sept 2021. Accessed 26 July 2022.

      “Record and watch everything your visitors do." Inspectlet, n.d. Accessed 26 July 2022.

      “Ryanair: Using Web Analytics to Manage the Site’s Performance More Effectively and Improve Profitability." AT Internet, 1 April 2020. Accessed 26 July 2022.

      Sibor, Vojtech. "Introducing Cross-Platform Analytics.” Smartlook Blog, 5 Nov 2022. Accessed 26 July 2022.

      "Visualize Visitor Journeys Through Funnels.” VWO, n.d. Accessed 26 July 2022.

      "Web Analytics Market Share – Growth, Trends, COVID-19 Impact, and Forecasts (2022-2027)." Mordor Intelligence, 2022. Accessed 26 July 2022.

      “What is the Best Heatmap Tool for Real Results?” Crazy Egg, 27 April 2020. Web.

      "What Is Visitor Behavior Analysis?" VWO, 2022. Accessed 26 July 2022.

      Zheng, Jack G., and Svetlana Peltsverger. “Web Analytics Overview.” IGI Global, 2015. Accessed 26 July 2022.

      Build Your Data Quality Program

      • Buy Link or Shortcode: {j2store}127|cart{/j2store}
      • member rating overall impact: 9.1/10 Overall Impact
      • member rating average dollars saved: $40,241 Average $ Saved
      • member rating average days saved: 33 Average Days Saved
      • Parent Category Name: Data Management
      • Parent Category Link: /data-management
      • Experiencing the pitfalls of poor data quality and failing to benefit from good data quality, including:
        • Unreliable data and unfavorable output.
        • Inefficiencies and costly remedies.
        • Dissatisfied stakeholders.
      • The chances of successful decision-making capabilities are hindered with poor data quality.

      Our Advice

      Critical Insight

      • Address the root causes of your data quality issues and form a viable data quality program.
        • Be familiar with your organization’s data environment and business landscape.
        • Prioritize business use cases for data quality fixes.
        • Fix data quality issues at the root cause to ensure proper foundation for your data to flow.
      • It is important to sustain best practices and grow your data quality program.

      Impact and Result

      • Implement a set of data quality initiatives that are aligned with overall business objectives and aimed at addressing data practices and the data itself.
      • Develop a prioritized data quality improvement project roadmap and long-term improvement strategy.
      • Build related practices such as artificial intelligence and analytics with more confidence and less risk after achieving an appropriate level of data quality.

      Build Your Data Quality Program Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you should establish a data quality program, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Define your organization’s data environment and business landscape

      Learn about what causes data quality issues, how to measure data quality, what makes a good data quality practice in relation to your data and business environments.

      • Business Capability Map Template

      2. Analyze your priorities for data quality fixes

      Determine your business unit priorities to create data quality improvement projects.

      • Data Quality Problem Statement Template
      • Data Quality Practice Assessment and Project Planning Tool

      3. Establish your organization’s data quality program

      Revisit the root causes of data quality issues and identify the relevant root causes to the highest priority business unit, then determine a strategy for fixing those issues.

      • Data Lineage Diagram Template
      • Data Quality Improvement Plan Template

      4. Grow and sustain your data quality practices

      Identify strategies for continuously monitoring and improving data quality at the organization.

      Infographic

      Workshop: Build Your Data Quality Program

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Define Your Organization’s Data Environment and Business Landscape

      The Purpose

      Evaluate the maturity of the existing data quality practice and activities.

      Assess how data quality is embedded into related data management practices.

      Envision a target state for the data quality practice.

      Key Benefits Achieved

      Understanding of the current data quality landscape

      Gaps, inefficiencies, and opportunities in the data quality practice are identified

      Target state for the data quality practice is defined

      Activities

      1.1 Explain approach and value proposition

      1.2 Detail business vision, objectives, and drivers

      1.3 Discuss data quality barriers, needs, and principles

      1.4 Assess current enterprise-wide data quality capabilities

      1.5 Identify data quality practice future state

      1.6 Analyze gaps in data quality practice

      Outputs

      Data Quality Management Primer

      Business Capability Map Template

      Data Culture Diagnostic

      Data Quality Diagnostic

      Data Quality Problem Statement Template

      2 Create a Strategy for Data Quality Project 1

      The Purpose

      Define improvement initiatives

      Define a data quality improvement strategy and roadmap

      Key Benefits Achieved

      Improvement initiatives are defined

      Improvement initiatives are evaluated and prioritized to develop an improvement strategy

      A roadmap is defined to depict when and how to tackle the improvement initiatives

      Activities

      2.1 Create business unit prioritization roadmap

      2.2 Develop subject areas project scope

      2.3 By subject area 1 data lineage analysis, root cause analysis, impact assessment, and business analysis

      Outputs

      Business Unit Prioritization Roadmap

      Subject area scope

      Data Lineage Diagram

      3 Create a Strategy for Data Quality Project 2

      The Purpose

      Define improvement initiatives

      Define a data quality improvement strategy and roadmap

      Key Benefits Achieved

      Improvement initiatives are defined

      Improvement initiatives are evaluated and prioritized to develop an improvement strategy

      A roadmap is defined to depict when and how to tackle the improvement initiatives

      Activities

      3.1 Understand how data quality management fits in with the organization’s data governance and data management programs

      3.2 By subject area 2 data lineage analysis, root cause analysis, impact assessment, and business analysis

      Outputs

      Data Lineage Diagram

      Root Cause Analysis

      Impact Analysis

      4 Create a Strategy for Data Quality Project 3

      The Purpose

      Determine a strategy for fixing data quality issues for the highest priority business unit

      Key Benefits Achieved

      Strategy defined for fixing data quality issues for highest priority business unit

      Activities

      4.1 Formulate strategies and actions to achieve data quality practice future state

      4.2 Formulate a data quality resolution plan for the defined subject area

      4.3 By subject area 3 data lineage analysis, root cause analysis, impact assessment, and business analysis

      Outputs

      Data Quality Improvement Plan

      Data Lineage Diagram

      5 Create a Plan for Sustaining Data Quality

      The Purpose

      Plan for continuous improvement in data quality

      Incorporate data quality management into the organization’s existing data management and governance programs

      Key Benefits Achieved

      Sustained and communicated data quality program

      Activities

      5.1 Formulate metrics for continuous tracking of data quality and monitoring the success of the data quality improvement initiative

      5.2 Workshop Debrief with Project Sponsor

      5.3 Meet with project sponsor/manager to discuss results and action items

      5.4 Wrap up outstanding items from the workshop, deliverables expectations, GIs

      Outputs

      Data Quality Practice Improvement Roadmap

      Data Quality Improvement Plan (for defined subject areas)

      Further reading

      Build Your Data Quality Program

      Quality Data Drives Quality Business Decisions

      Executive Brief

      Analyst Perspective

      Get ahead of the data curve by conquering data quality challenges.

      Regardless of the driving business strategy or focus, organizations are turning to data to leverage key insights and help improve the organization’s ability to realize its vision, key goals, and objectives.

      Poor quality data, however, can negatively affect time-to-insight and can undermine an organization’s customer experience efforts, product or service innovation, operational efficiency, or risk and compliance management. If you are looking to draw insights from your data for decision making, the quality of those insights is only as good as the quality of the data feeding or fueling them.

      Improving data quality means having a data quality management practice that is sustainably successful and appropriate to the use of the data, while evolving to keep pace with or get ahead of changing business and data landscapes. It is not a matter of fixing one data set at a time, which is resource and time intensive, but instead identifying where data quality consistently goes off the rails, and creating a program to improve the data processes at the source.

      Crystal Singh

      Research Director, Data and Analytics

      Info-Tech Research Group

      Executive Summary

      Your Challenge

      Your organization is experiencing the pitfalls of poor data quality, including:

      • Unreliable data and unfavorable output.
      • Inefficiencies and costly remedies.
      • Dissatisfied stakeholders.

      Poor data quality hinders successful decision making.

      Common Obstacles

      Not understanding the purpose and execution of data quality causes some disorientation with your data.

      • Failure to realize the importance/value of data quality.
      • Unsure of where to start with data quality.
      • Lack of investment in data quality.

      Organizations tend to adopt a project mentality when it comes to data quality instead of taking the strategic approach that would be all-around more beneficial in the long term.

      Info-Tech’s Approach

      Address the root causes of your data quality issues by forming a viable data quality program.

      • Be familiar with your organization’s data environment and business landscape.
      • Prioritize business use cases for data quality fixes.
      • Fixing data quality issues at the root cause to ensure a proper foundation for your data to flow.

      It is important to sustain best practices and grow your data quality program.

      Info-Tech Insight

      Fix data quality issues as close as possible to the source of data while understanding that business use cases will each have different requirements and expectations from data quality.

      Data is the foundation of your organization’s knowledge

      Data enables your organization to make decisions.

      Reliable data is needed to facilitate data consumers at all levels of the enterprise.

      Insights, knowledge, and information are needed to inform operational, tactical, and strategic decision-making processes. Data and information are needed to manage the business and empower business processes such as billing, customer touchpoints, and fulfillment.

      Raw Data

      Business Information

      Actionable Insights

      Data should be at the foundation of your organization’s evolution. The transformational insights that executives are constantly seeking can be uncovered with a data quality practice that makes high-quality, trustworthy information readily available to the business users who need it.

      98% of companies use data to improve customer experience. (Experian Data Quality, 2019)

      High-Level Data Architecture

      The image is a graphic, which at the top shows different stages of data, and in the lower part of the graphic shows the data processes.

      Build Your Data Quality Program

      1. Data Quality & Data Culture Diagnostics Business Landscape Exercise
      2. Business Strategy & Use Cases
      3. Prioritize Use Cases With Poor Quality

      Info-Tech Insight

      As data is ingested, integrated, and maintained in the various streams of the organization's system and application architecture, there are multiple points where the quality of the data can degrade.

      1. Understand the organization's data culture and data quality environment across the business landscape.
      2. Prioritize business use cases with poor data quality.
      3. For each use case, identify data quality issues and requirements throughout the data pipeline.
      4. Fix data quality issues at the root cause.
      5. As data flow through quality assurance monitoring checkpoints, monitor data to ensure good quality output.

      Insight:

      Proper application of data quality dimensions throughout the data pipeline will result in superior business decisions.

      Data quality issues can occur at any stage of the data flow.

      The image shows the flow of data through various stages: Data Creation; Data Ingestion; Data Accumulation and Engineering; Data Delivery; and Reporting & Analytics. At the bottom, there are two bars: the left one labelled Fix data quality root causes here...; and the right reads: ...to prevent expensive cures here.

      The image is a legend that accompanies the data flow graphic. It indicates that a white and green square icon indicates Data quality dimensions; a red cube indicates a potential point of data quality degradation; the pink square indicates Root cause of poor data quality; and a green flag indicates Quality Assurance Monitoring.

      Prevent the domino effect of poor data quality

      Data is the foundation of decisions made at data-driven organizations.

      Therefore, if there are problems with the organization’s underlying data, this can have a domino effect on many downstream business functions.

      Let’s use an example to illustrate the domino effect of poor data quality.

      Organization X is looking to migrate their data to a single platform, System Y. After the migration, it has become apparent that reports generated from this platform are inconsistent and often seem wrong. What is the effect of this?

      1. Time must be spent on identifying the data quality issues, and often manual data quality fixes are employed. This will extend the time to deliver the project that depends on system Y by X months.
      2. To repair these issues, the business needs to contract two additional resources to complete the unforeseen work. The new resources cost $X each, as well as additional infrastructure and hardware costs.
      3. Now, the strategic objectives of the business are at risk and there is a feeling of mistrust in the new system Y.

      Three key challenges impacting the ability to deliver excellent customer experience

      30% Poor data quality

      30% Method of interaction changing

      30% Legacy systems or lack of new technology

      95% Of organizations indicated that poor data quality undermines business performance.

      (Source: Experian Data Quality, 2019)

      Maintaining quality data will support more informed decisions and strategic insight

      Improving your organization’s data quality will help the business realize the following benefits:

      Data-Driven Decision Making

      Business decisions should be made with a strong rationale. Data can provide insight into key business questions, such as, “How can I provide better customer satisfaction?”

      89% Of CIOs surveyed say lack of quality data is an obstacle to good decision making. (Larry Dignan, CIOs juggling digital transformation pace, bad data, cloud lock0in and business alignment, 2020)

      Customer Intimacy

      Improve marketing and the customer experience by using the right data from the system of record to analyze complete customer views of transactions, sentiments, and interactions.

      94% Percentage of senior IT leaders who say that poor data quality impinges business outcomes. (Clint Boulton, Disconnect between CIOs and LOB managers weakens data quality, 2016)

      Innovation Leadership

      Gain insights on your products, services, usage trends, industry directions, and competitor results to support decisions on innovations, new products, services, and pricing.

      20% Businesses lose as much as 20% of revenue due to poor data quality. (RingLead Data Management Solutions, 10 Stats About Data Quality I Bet You Didn’t Know)

      Operational Excellence

      Make sure the right solution is delivered rapidly and consistently to the right parties for the right price and cost structure. Automate processes by using the right data to drive process improvements.

      10-20% The implementation of data quality initiatives can lead to reductions in corporate budget of up to 20%. (HaloBI, 2015)

      However, maintaining data quality is difficult

      Avoid these pitfalls to get the true value out of your data.

      1. Data debt drags down ROI – a high degree of data debt will hinder you from attaining the ROI you’re expecting.
      2. Lack of trust means lack of usage – a lack of confidence in data results in a lack of data usage in your organization, which negatively effects strategic planning, KPIs, and business outcomes.
      3. Strategic assets become a liability – bad data puts your business at risk of failing compliance standards, which could result in you paying millions in fines.
      4. Increased costs and inefficiency – time spent fixing bad data means less workload capacity for your important initiatives and the inability to make data-based decisions.
      5. Barrier to adopting data-driven tech – emerging technologies, such as predictive analytics and artificial intelligence, rely on quality data. Inaccurate, incomplete, or irrelevant data will result in delays or a lack of ROI.
      6. Bad customer experience – Running your business on bad data can hinder your ability to deliver to your customers, growing their frustration, which negatively impacts your ability to maintain your customer base.

      Info-Tech Insight

      Data quality suffers most at the point of entry. This is one of the causes of the domino effect of data quality – and can be one of the most costly forms of data quality errors due to the error propagation. In other words, fix data ingestion, whether through improving your application and database design or improving your data ingestion policy, and you will fix a large majority of data quality issues.

      Follow Our Data & Analytics Journey

      Data Quality is laced into Data Strategy, Data Management, and Data Governance.

      • Data Strategy
        • Data Management
          • Data Quality
          • Data Governance
            • Data Architecture
              • MDM
              • Data Integration
              • Enterprise Content Management
              • Information Lifecycle Management
                • Data Warehouse/Lake/Lakehouse
                  • Reporting and Analytics
                  • AI

      Data quality is rooted in data management

      Extract Maximum Benefit Out of Your Data Quality Management.

      • Data management is the planning, execution, and oversight of policies, practices, and projects that acquire, control, protect, deliver, and enhance the value of data and information assets (DAMA, 2009).
      • In other words, getting the right information, to the right people, at the right time.
      • Data quality management exists within each of the data practices, information dimensions, business resources, and subject areas that comprise the data management framework.
      • Within this framework, an effective data quality practice will replace ad hoc processes with standardized practices.
      • An effective data quality practice cannot succeed without proper alignment and collaboration across this framework.
      • Alignment ensures that the data quality practice is fit for purpose to the business.

      The DAMA DMBOK2 Data Management Framework

      • Data Governance
        • Data Quality
        • Data Architecture
        • Data Modeling & Design
        • Data Storage & Operations
        • Data Security
        • Data Integration & Interoperability
        • Documents & Content
        • Reference & Master Data
        • Data Warehousing & Business Intelligence
        • Meta-data

      (Source: DAMA International)

      Related Info-Tech Research

      Build a Robust and Comprehensive Data Strategy

      • People often think that the main problems they need to fix first are related to data quality when the issues transpire at a much larger level. This blueprint is the key to building and fostering a data-driven culture.

      Create a Data Management Roadmap

      • Refer to this blueprint to understand data quality in the context of data disciplines and methods for improving your data management capabilities.

      Establish Data Governance

      • Define an effective data governance strategy and ensure the strategy integrates well with data quality with this blueprint.

      Info-Tech’s methodology for Data Quality

      Phase Steps 1. Define Your Organization’s Data Environment and Business Landscape 2. Analyze Your Priorities for Data Quality Fixes 3. Establish Your Organization’s Data Quality Program 4. Grow and Sustain Your Data Quality Practice
      Phase Outcomes This step identifies the foundational understanding of your data and business landscape, the essential concepts around data quality, as well as the core capabilities and competencies that IT needs to effectively improve data quality. To begin addressing specific, business-driven data quality projects, you must identify and prioritize the data-driven business units. This will ensure that data improvement initiatives are aligned to business goals and priorities. After determining whose data is going to be fixed based on priority, determine the specific problems that they are facing with data quality, and implement an improvement plan to fix it. Now that you have put an improvement plan into action, make sure that the data quality issues don’t keep cropping up. Integrate data quality management with data governance practices into your organization and look to grow your organization’s overall data maturity.

      Info-Tech Insight

      “Data Quality is in the eyes of the beholder.”– Igor Ikonnikov, Research Director

      Data quality means tolerance, not perfection

      Data from Info-Tech’s CIO Business Vision Diagnostic, which represents over 400 business stakeholders, shows that data quality is very important when satisfaction with data quality is low.

      However, when data quality satisfaction hit a threshold, it became less important.

      The image is a line graph, with the X-axis labelled Satisfaction with Data Quality, and the Y axis labelled Rated Importance for Data Quality. The line begins high, and then descends. There is text inside the graph, which is transcribed below.

      Respondents were asked “How satisfied are you with the quality, reliability, and effectiveness of the data you use to manage your group?” as well as to rank how important data quality was to their organization.

      When the business satisfaction of data quality reached a threshold value of 71-80%, the rated importance reached its lowest value.

      Info-Tech Insight

      Data needs to be good, but truly spectacular data may go unnoticed.

      Provide the right level of data quality, with the appropriate effort, for the correct usage. This blueprint will help you to determine what “the right level of data quality” means, as well as create a plan to achieve that goal for the business.

      Data Roles and Responsibilities

      Data quality occurs through three main layers across the data lifecycle

      Data Strategy

      Data Strategy should contain Data Quality as a standard component.

      ← Data Quality issues can occur throughout at any stage of the data flow →

      DQ Dimensions

      Timeliness – Representation – Usability – Consistency – Completeness – Uniqueness – Entry Quality – Validity – Confidence – Importance

      Source System Layer

      • Data Resource Manager/Collector: Enters data into a database and ensures that data collection sources are accurate

      Data Transformation Layer

      • ETL Developer: Designs data storage systems
      • Data Engineer: Oversees data integrations, data warehouses and data lakes, data pipelines
      • Database Administrator: Manages database systems, ensures they meet SLAs, performances, backups
      • Data Quality Engineer: Finds and cleanses bad data in data sources, creates processes to prevent data quality problems

      Consumption Layer

      • Data Scientist: Gathers and analyses data from databases and other sources, runs models, and creates data visualizations for users
      • BI Analyst: Evaluates and mines complex data and transforms it into insights that drive business value. Uses BI software and tools to analyze industry trends and create visualizations for business users
      • Data Analyst: Extracts data from business systems, analyzes it, and creates reports and dashboards for users
      • BI Engineer: Documents business needs on data analysis and reporting and develops BI systems, reports, and dashboards to support them
      Data Creation → [SLA] Data Ingestion [ QA] →Data Accumulation & Engineering → [SLA] Data Delivery [QA] →Reporting & Analytics
      Fix Data Quality root causes here… to prevent expensive cures here.

      Executive Brief Case Study

      Industry: Healthcare

      Source: Primary Info-Tech Research

      Align source systems to maximize business output.

      A healthcare insurance agency faced data quality issues in which a key business use case was impacted negatively. Business rules were not well defined, and default values instead of real value caused a concern. When dealing with multiple addresses, data was coming from different source systems.

      The challenge was to identify the most accurate address, as some were incomplete, and some lacked currency and were not up to date. This especially challenged a key business unit, marketing, to derive business value in performing key activities by being unable to reach out to existing customers to advertise any additional products.

      For this initiative, this insurance agency took an economic approach by addressing those data quality issues using internal resources.

      Results

      Without having any MDM tools or having a master record or any specific technology relating to data quality, this insurance agency used in-house development to tackle those particular issues at the source system. Data quality capabilities such as data profiling were used to uncover those issues and address them.

      “Data quality is subjective; you have to be selective in terms of targeting the data that matters the most. When getting business tools right, most issues will be fixed and lead to achieving the most value.” – Asif Mumtaz, Data & Solution Architect

      Info-Tech offers various levels of support to best suit your needs

      DIY Toolkit

      "Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful."

      Guided Implementation

      "Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track."

      Workshop

      "We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place."

      Consulting

      "Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project."

      Diagnostic and consistent frameworks are used throughout all four options.

      Guided Implementation

      What does a typical GI on this topic look like?

      Phase 1 Phase 2 Phase 3 Phase 4
      • Call #1: Learn about the concepts of data quality and the common root causes of poor data quality.
      • Call #2: Identify the core capabilities of IT for improving data quality on an enterprise scale.
      • Call #3: Determine which business units use data and require data quality remediation.
      • Call #4: Create a plan for addressing business unit data quality issues according to priority of the business units based on value and impact of data.
      • Call #5: Revisit the root causes of data quality issues and identify the relevant root causes to the highest priority business unit.
      • Call #6: Determine a strategy for fixing data quality issues for the highest priority business unit.
      • Call #7: Identify strategies for continuously monitoring and improving data quality at the organization.
      • Call #8: Learn how to incorporate data quality practices in the organization’s larger data management and data governance frameworks.
      • Call #9: Summarize results and plan next steps on how to evolve your data landscape.

      A Guided Implementation (GI) is a series of calls with an Info-Tech analyst to help implement our best practices in your organization.

      A typical GI is between eight to twelve calls over the course of four to six months.

      Workshop Overview

      Contact your account representative for more information. workshops@infotech.com 1-888-670-8889

      Day 1 Day 2 Day 3 Day 4 Day 5
      Define Your Organization’s Data Environment and Business Landscape Create a Strategy for Data Quality Project 1 Create a Strategy for Data Quality Project 2 Create a Strategy for Data Quality Project 3 Create a Plan for Sustaining Data Quality
      Activities
      1. Explain approach and value proposition.
      2. Detail business vision, objectives, and drivers.
      3. Discuss data quality barriers, needs, and principles.
      4. Assess current enterprise-wide data quality capabilities.
      5. Identify data quality practice future state.
      6. Analyze gaps in data quality practice.
      1. Create business unit prioritization roadmap.
      2. Develop subject areas project scope.
      3. By subject area 1:
      • Data lineage analysis
      • Root cause analysis
      • Impact assessment
      • Business analysis
      1. Understand how data quality management fits in with the organization’s data governance and data management programs.
      2. By subject area 2:
      • Data lineage analysis
      • Root cause analysis
      • Impact assessment
      • Business analysis
      1. Formulate strategies and actions to achieve data quality practice future state.
      2. Formulate data quality resolution plan for defined subject area.
      3. By subject area 3:
      • Data lineage analysis
      • Root cause analysis
      • Impact assessment
      • Business analysis
      1. Formulate metrics for continuous tracking of data quality and monitoring the success of the data quality improvement initiative.
      2. Workshop Debrief with Project Sponsor.
      • Meet with project sponsor/manager to discuss results and action items.
      • Wrap up outstanding items from the workshop, deliverables expectations, GIs.
      Deliverables
      1. Data Quality Management Primer
      2. Business Capability Map Template
      3. Data Culture Diagnostic
      4. Data Quality Diagnostic
      5. Data Quality Problem Statement Template
      1. Business Unit Prioritization Roadmap
      2. Subject area scope
      3. Data Lineage Diagram
      1. Data Lineage Diagram
      2. Root Cause Analysis
      3. Impact Analysis
      1. Data Lineage Diagram
      2. Data Quality Improvement Plan
      1. Data Quality Practice Improvement Roadmap
      2. Data Quality Improvement Plan (for defined subject areas)

      Phase 1

      Define Your Organization’s Data Environment and Business Landscape

      Build Your Data Quality Program

      Data quality is a methodology and must be treated as such

      A comprehensive data quality practice includes appropriate business requirements gathering, planning, governance, and oversight capabilities, as well as empowering technologies for properly trained staff, and ongoing development processes.

      Some common examples of appropriate data management methodologies for data quality are:

      • The data quality team has the necessary competencies and resources to perform the outlined workload.
      • There are processes that exist for continuously evaluating data quality performance capabilities.
      • Improvement strategies are designed to increase data quality performance capabilities.
      • Policies and procedures that govern data quality are well-documented, communicated, followed, and updated.
      • Change controls exist for revising policies and procedures, including communication of updates and changes.
      • Self-auditing techniques are used to ensure business-IT alignment when designing or recalibrating strategies.

      Effective data quality practices coordinate with other overarching data disciplines, related data practices, and strategic business objectives.

      “You don’t solve data quality with a Band-Aid; you solve it with a methodology.” – Diraj Goel, Growth Advisor, BC Tech

      Data quality can be defined by four key quality indicators

      Similar to measuring the acidity of a substance with a litmus test, the quality of your data can be measured using a simple indicator test. As you learn about common root causes of data quality problems in the following slides, think about these four quality indicators to assess the quality of your data:

      • Completeness – Closeness to the correct value. Encompasses accuracy, consistency, and comparability to other databases.
      • Usability – The degree to which data meets current user needs. To measure this, you must determine if the user is satisfied with the data they are using to complete their business functions.
      • Timeliness – Length of time between creation and availability of data.
      • Accessibility – How easily a user can access and understand the data (including data definitions and context). Interpretability can also be used to describe this indicator.

      Info-Tech Insight

      Quality is a relative term. Data quality is measured in terms of tolerance. Perfect data quality is both impossible and a waste of time and effort.

      How to get investment for your data quality program

      Follow these steps to convince leadership of the value of data quality:

      “You have to level with people, you cannot just start talking with the language of data and expect them to understand when the other language is money and numbers.” – Izabela Edmunds, Information Architect at Mott MacDonald

      1. Perform Phases 0 & 1 of this blueprint as this will offer value in carrying out the following steps.
      2. Build credibility. Show them your understanding of data and how it aligns to the business.
      3. Provide tangible evidence of how significant business use cases are impacted by poor quality data.
      4. Present the ROI of fixing the data quality issues you have prioritized.
      5. Explain how the data quality program will be established, implemented, and sustained.
      6. Prove the importance of fixing data quality issues at the source and how it is the most efficient, effective, and cost-friendly solution.

      Phase 1 deliverables

      Each of these deliverables serve as inputs to detect key outcomes about your organization and to help complete this blueprint:

      1. Data Culture Diagnostic

      Use this report to understand where your organization lies across areas relating to data culture.

      While the Quality & Trust area of the report might be most prevalent to this blueprint, this diagnostic may point out other areas demanding more attention.

      Please speak to your account manager for access

      2. Business Capability Map Template

      Perform this process to understand the capabilities that enable specific value streams. The output of this deliverable is a high-level view of your organization’s defined business capabilities.

      Download this tool

      Info-Tech Insight

      Understanding your data culture and business capabilities are foundational to starting the journey of data quality improvement.

      Key deliverable:

      3. Data Quality Diagnostic

      The Data Quality Report is designed to help you understand, assess, and improve key organizational data quality issues. This is where respondents across various areas in the organization can assess Data Quality across various dimensions.

      Download this tool

      Data Quality Diagnostic Value

      Prioritize business use cases with our data quality dimensions.

      • Complete this diagnostic for each major business use case. The output from the Data Culture Diagnostic and the Business Capability Map should help you understand which use cases to address.
      • Involve all key stakeholders involved in the business use case. There may be multiple business units involved in a single use case.
      • Prioritize the business use cases that need the most attention pertaining to data quality by comparing the scores of the Importance and Confidence data quality dimensions.

      If there are data elements that are considered of high importance and low confidence, then they must be prioritized.

      Sample Scorecard

      The image shows a screen capture of a scorecard, with sample information filled in.

      The image shows a screen capture of a scorecard, with sample information filled in.

      Poor data quality develops due to multiple root causes

      After you get to know the properties of good quality data, understand the underlying causes of why those indicators can point to poor data quality.

      If you notice that the usability, completeness, timeliness, or accessibility of the organization’s data is suffering, one or more of the following root causes are likely plaguing your data:

      Common root causes of poor data quality, through the lens of Info-Tech’s Five-Tier Data Architecture:

      The image shows a graphic of Info-Tech's Five-Tier Data Architecture, with root causes of poor data quality identified. In the data creation and ingestion stages, the root causes are identified as Poor system/application design, Poor database design, Inadequate enterprise integration. The root causes identified in the latter stages are: Absence of data quality policies, procedures, and standards, and Incomplete/suboptimal business processes

      These root causes of poor data quality are difficult to avoid, not only because they are often generated at an organization’s beginning stages, but also because change can be difficult. This means that the root causes are often propagated through stale or outdated business processes.

      Data quality problems root cause #1:

      Poor system or application design

      Application design plays one of the largest roles in the quality of the organization’s data. The proper design of applications can prevent data quality issues that can snowball into larger issues downstream.

      Proper ingestion is 90% of the battle. An ounce of prevention is worth a pound of cure. This is true in many different topics, and data quality is one of them. Designing an application so that data gets entered properly, whether by internal staff or external customers, is the single most effective way to prevent data quality issues.

      Some common causes of data quality problems at the application/system level include:

      • Too many open fields (free-form text fields that accept a variety of inputs).
      • There are no lookup capabilities present. Reference data should be looked up instead of entered.
      • Mandatory fields are not defined, resulting in blank fields.
      • No validation of data entries before writing to the underlying database.
      • Manual data entry encourages human error. This can be compounded by poor application design that facilitates the incorrect data entry.

      Data quality problems root cause #2:

      Poor database design

      Database design also affects data quality. How a database is designed to handle incoming data, including the schema and key identification, can impact the integrity of the data used for reporting and analytics.

      The most common type of database is the relational database. Therefore, we will focus on this type of database.

      When working with and designing relational databases, there are some important concepts that must be considered.

      Referential integrity is a term that is important for the design of relational database schema, and indicates that table relationships must always be consistent.

      For table relationships to be consistent, primary keys (unique value for each row) must uniquely identify entities in columns of the table. Foreign keys (field that is defined in a second table but refers to the primary key in the first table) must agree with the primary key that is referenced by the foreign key. To maintain referential integrity, any updates must be propagated to the primary parent key.

      Info-Tech Insight

      Other types of databases, including databases with unstructured data, need data quality consideration. However, unstructured data may have different levels of quality tolerance.

      At the database level, some common root causes include:

      1. Lack of referential integrity.
      2. Lack of unique keys.
      3. Don’t have restricted data range.
      4. Incorrect datatype, string fields that can hold too many characters.
      5. Orphaned records.

      Databases and People:

      Even though database design is a technology issue, don’t forget about the people.

      A lack of training employees on database permissions for updating/entering data into the physical databases is a common problem for data quality.

      Data quality problems root cause #3:

      Improper integration and synchronization of enterprise data

      Data ingestion is another category of data-quality-issue root causes. When moving data in Tier 2, whether it is through ETL, ESB, point-to-point integration, etc., the integrity of the data during movement and/or transformation needs to be maintained.

      Tier 2 (the data ingestion layer) serves to move data for one of two main purposes:

      • To move data from originating systems to downstream systems to support integrated business processes.
      • To move data to Tier 3 where data rests for other purposes. This movement of data in its purest form means we move raw data to storage locations in an overall data warehouse environment reflecting any security, compliance and other standards in our choices for how to store. Also, it is where data is transformed for unique business purpose that will also be moved to a place of rest or a place of specific use. Data cleansing and matching and other data-related blending tasks occur at this layer.

      This ensures the data is pristine throughout the process and improves trustworthiness of outcomes and speed to task completion.

      At the integration layer, some common root causes of data quality problems include:

      1. No data mask. For example, zip code should have a mask of five numeric characters.
      2. Questionable aggregation, transformation process, or incorrect logic.
      3. Unsynchronized data refresh process in an integrated environment.
      4. Lack of a data matching tool.
      5. Lack of a data quality tool.
      6. Don’t have data profiling capability.
      7. Errors with data conversion or migration processes – when migrating, decommissioning, or converting systems – movement of data sets.
      8. Incorrect data mapping between data sources and targets.

      Data quality problems root cause #4:

      Insufficient and ineffective data quality policies and procedures

      Data policies and procedures are necessary for establishing standards around data and represent another category of data-quality-issue root causes. This issue spans across all five of the 5 Tier Architecture.

      Data policies are short statements that seek to manage the creation, acquisition, integrity, security, compliance, and quality of data. These policies vary amongst organizations, depending on your specific data needs.

      • Policies describe what to do, while standards and procedures describe how to do something.
      • There should be few data policies, and they should be brief and direct. Policies are living documents and should be continuously updated to respond to the organization’s data needs.
      • The data policies should highlight who is responsible for the data under various scenarios and rules around how to manage it effectively.

      Some common root causes of data quality issues related to policies and procedures include:

      1. Policies are absent or out of date.
      2. Employees are largely unaware of policies in effect.
      3. Policies are unmonitored and unenforced.
      4. Policies are in multiple locations.
      5. Multiple versions of the same policy exist.
      6. Policies are managed inconsistently across different silos.
      7. Policies are written poorly by untrained authors.
      8. Inadequate policy training program.
      9. Draft policies stall and lose momentum.
      10. Weak policy support from senior management.

      Data quality problems root cause #5:

      Inefficient or ineffective business processes

      Some common root causes of data quality issues related to business processes include:

      1. Multiple entries of the same record leads to duplicate records proliferating in the database.
      2. Many business definitions of data.
      3. Failure to document data manipulations when presenting data.
      4. Failure to train people on how to understand data.
      5. Manually intensive processes can result in duplication of effort (creates room for errors).
      6. No clear delineation of dependencies of business processes within or between departments, which leads to a siloed approach to business processes, rather than a coordinated and aligned approach.

      Business processes can impact data quality. How data is entered into systems, as well as employee training and knowledge about the correct data definitions, can impact the quality of your organization’s data.

      These problematic business process root causes can lead to:

      Duplicate records

      Incomplete data

      Improper use of data

      Wrong data entered into fields

      These data quality issues will result in costly and inefficient manual fixes, wasting valuable time and resources.

      Phase 1 Summary

      1. Data Quality Understanding

      • Understanding that data quality is a methodology and should be treated as such.
      • Data quality can be defined by four key indicators which are completeness, usability, timeliness, and accessibility.
      • Explained how to get investment for your data quality program and showcasing its value to leadership.

      2. Phase 0 Deliverables

      Introduced foundational tools to help you throughout this blueprint:

      • Complete the Data Culture Diagnostic and Business Capability Map Template as they are foundational in understanding your data culture and business capabilities to start the journey of data quality improvement.
      • Involve key relevant stakeholders when completing the Data Quality Diagnostic for each major business use case. Use the Importance and Confidence dimensions to help you prioritize which use case to address.

      3. Common Root Causes

      Addressed where multiple root causes can occur throughout the flow of your data.

      Analyzed the following common root causes of data quality:

      1. Poor system or application design
      2. Poor database design
      3. Improper integration and synchronization of enterprise data
      4. Insufficient and ineffective data quality policies and procedures
      5. Inefficient or ineffective business processes

      Phase 2

      Analyze Your Priorities for Data Quality Fixes

      Build Your Data Quality Program

      Business Context & Data Quality

      Establish the business context of data quality improvement projects at the business unit level to find common goals.

      • To ensure the data improvement strategy is business driven, start your data quality project evaluation by understanding the business context. You will then determine which business units use data and create a roadmap for prioritizing business units for data quality repairs.
      • Your business context is represented by your corporate business vision, mission, goals and objectives, differentiators, and drivers. Collectively, they provide essential information on what is important to your organization, and some hints on how to achieve that. In this step, you will gather important information about your business view and interpret the business view to establish a data view.

      Business Vision

      Business Goals

      Business Drivers

      Business Differentiators

      Not every business unit uses data to the same extent

      A data flow diagram can provide value by allowing an organization to adopt a proactive approach to data quality. Save time by knowing where the entry points are and where to look for data flaws.

      Understanding where data lives can be challenging as it is often in motion and rarely resides in one place. There are multiple benefits that come from taking the time to create a data flow diagram.

      • Mapping out the flow of data can help provide clarity on where the data lives and how it moves through the enterprise systems.
      • Having a visual of where and when data moves helps to understand who is using data and how it is being manipulated at different points.
      • A data flow diagram will allow you to elicit how data is used in a different use case.

      Info-Tech’s Four-Column Model of Data will help you to identify the essential aspects of your data:

      Business Use Case →Used by→Business Unit →Housed in→Systems→Used for→Usage of the Data

      Not every business unit requires the same standard of data quality

      To prioritize your business units for data quality improvement projects, you must analyze the relative importance of the data they use to the business. The more important the data is to the business, the higher the priority is of fixing that data. There are two measures for determining the importance of data: business value and business impact.

      Business Value of Data

      Business value of data can be evaluated by thinking about its ties to revenue generation for the organization, as well as how it is used for productivity and operations at the organization.

      The business value of data is assessed by asking what would happen to the following parameters if the data is not usable (due to poor quality, for example):

      • Loss of Revenue
      • Loss of Productivity
      • Increased Operating Costs

      Business Impact of Data

      Business impact of data should take into account the effects of poor data on both internal and external parties.

      The business impact of data is assessed by asking what the impact would be of bad data on the following parameters:

      • Impact on Customers
      • Impact on Internal Staff
      • Impact on Business Partners

      Value + Impact = Data Priority Score

      Ensure that the project starts on the right foot by completing Info-Tech’s Data Quality Problem Statement Template

      Before you can identify a solution, you must identify the problem with the business unit’s data.

      Download this tool

      Use Info-Tech’s Data Quality Problem Statement Template to identify the symptoms of poor data quality and articulate the problem.

      Info-Tech’s Data Quality Problem Statement Template will walk you through a step-by-step approach to identifying and describing the problems that the business unit feels regarding its data quality.

      Before articulating the problem, it helps to identify the symptoms of the problem. The following W’s will help you to describe the symptoms of the data quality issues:

      What

      Define the symptoms and feelings produced by poor data quality in the business unit.

      Where

      Define the location of the data that are causing data quality issues.

      When

      Define how severe the data quality issues are in frequency and duration.

      Who

      Define who is affected by the data quality problems and who works with the data.

      Info-Tech Best Practice

      Symptoms vs. Problems. Often, people will identify a list of symptoms of a problem and mistake those for the problem. Identifying the symptoms helps to define the problem, but symptoms do not help to identify the solution. The problem statement helps you to create solutions.

      Define the project problem to articulate the purpose

      1 hour

      Input

      • Symptoms of data quality issues in the business unit

      Output

      • Refined problem description

      Materials

      • Data Quality Problem Statement Template

      Participants

      • Data Quality Improvement Project team
      • Business line representatives

      A defined problem helps you to create clear goals, as well as lead your thinking to determine solutions to the problem.

      A problem statement consists of one or two sentences that summarize a condition or issue that a quality improvement team is meant to address. For the improvement team to fix the problem, the problem statement therefore has to be specific and concise.

      Instructions

      1. Gather the Data Quality Improvement Project Team in a room and start with an issue that is believed to be related to data quality.
      2. Ask what are the attributes and symptoms of that reality today; do this with the people impacted by the issue. This should be an IT and business collaboration.
      3. Draw your conclusions of what it all means: what have you collectively learned?
      4. Consider the implications of your conclusions and other considerations that must be taken into account such as regulatory needs, compliance, policy, and targets.
      5. Develop solutions – Contain the problem to something that can be solved in a realistic timeframe, such as three months.

      Download the Data Quality Problem Statement Template

      Case Study

      A strategic roadmap rooted in business requirements primes a data quality improvement plan for success.

      MathWorks

      Industry

      Software Development

      Source

      Primary Info-Tech Research

      As part of moving to a formalized data quality practice, MathWorks leveraged an incremental approach that took its time investigating business cases to support improvement actions. Establishing realistic goals for improvement in the form of a roadmap was a central component for gaining executive approval to push the project forward.

      Roadmap Creation

      In constructing a comprehensive roadmap that incorporated findings from business process and data analyses, MathWorks opted to document five-year and three-year overall goals, with one-year objectives that supported each goal. This approach ensured that the tactical actions taken were directed by long-term strategic objectives.

      Results – Business Alignment

      In presenting their roadmap for executive approval, MathWorks placed emphasis on communicating the progression and impact of their initiatives in terms that would engage business users. They focused on maintaining continual lines of communication with business stakeholders to demonstrate the value of the initiatives and also to gradually shift the corporate culture to one that is invested in an effective data quality practice.

      “Don’t jump at the first opportunity, because you may be putting out a fire with a cup of water where a fire truck is needed.” – Executive Advisor, IT Research and Advisory Firm

      Use Info-Tech’s Practice Assessment and Project Planning Tool to create your strategy for improving data quality

      Assess IT’s capabilities and competencies around data quality and plan to build these as the organization’s data quality practice develops. Before you can fix data quality, make sure you have the necessary skills and abilities to fix data quality correctly.

      The following IT capabilities are developed on an ongoing basis and are necessary for standardizing and structuring a data quality practice:

      • Meeting Business Needs
      • Services and Projects
      • Policies, Procedures, and Standards
      • Roles and Organizational Structure
      • Oversight and Communication
      • Data Quality of Different Data Types

      Download this Tool

      Data Handling and Remediation Competencies:

      • Data Standardization: Formatting values into consistent standards based on industry standards and business rules.
      • Data Cleansing: Modification of values to meet domain restrictions, integrity constraints, or other business rules for sufficient data quality for the organization.
      • Data Matching: Identification, linking, and merging related entries in or across sets of data.
      • Data Validation: Checking for correctness of the data.

      After these capabilities and competencies are assessed for a current and desired target state, the Data Quality Practice Assessment and Project Planning Tool will suggest improvement actions that should be followed in order to build your data quality practice. In addition, a roadmap will be generated after target dates are set to create your data quality practice development strategy.

      Benchmark current and identify target capabilities for your data quality practice

      1 hour

      Input

      • Current and desired data quality practices in the organization

      Output

      • Assessment of where the gaps lie in your data quality practice

      Materials

      • Data Quality Practice Assessment and Project Planning Tool

      Participants

      • Data Quality Project Lead
      • Business Line Representatives
      • Business Architects

      Use the Data Quality Practice Assessment and Project Planning Tool to evaluate the baseline and target capabilities of your practice in terms of how data quality is approached and executed.

      Download this Tool

      Instructions

      1. Invite the appropriate stakeholders to participate in this exercise. Examples:
        1. Business executives will have input in Tab 2
        2. Unique stakeholders: communications expert or executive advisors may have input
      2. On Tab 2: Practice Components, assess the current and target states of each capability on a scale of 1–5. Note: “Ad hoc” implies a capability is completed, but randomly, informally, and without a standardized method.

      These results will set the baseline against which you will monitor performance progress and keep track of improvements over time.

      Info-Tech Insight

      Focus on early alignment. Assessing capabilities within specific people’s job functions can naturally result in disagreement or debate, especially between business and IT people. Remind everyone that data quality should ultimately serve business needs wherever possible.

      Visualization improves the holistic understanding of where gaps exist in your data quality practice

      To enable deeper analysis on the results of your practice assessment, Tab 3: Data Quality Practice Scorecard in the Data Quality Practice Assessment and Project Planning Tool creates visualizations of the gaps identified in each of your practice capabilities and related data management practices. These diagrams serve as analysis summaries.

      Gap assessment of “Meeting Business Needs” capabilities

      The image shows a screen capture of the Gap assessment of 
“Meeting Business Needs” capabilities, with sample information filled in.

      Visualization of gap assessment of data quality practice capabilities

      The image shows a bar graph titled Data Quality Capabilities.

      1. Enhance your gap analyses by forming a relative comparison of total gaps in key practice capability areas, which will help in determining priorities.
      • Example: In Tab 2 compare your capabilities within “Policies, Procedures, and Standards.” Then in Tab 3, compare your overall capabilities in “Policies, Procedures, and Standards” versus “Empowering Technologies.”
    • Put these up on display to improve discussion in the gap analyses and prioritization sessions.
    • Improve the clarity and flow of your strategy template, final presentations, and summary documents by copying and pasting the gap assessment diagrams.
    • Before engaging in the data quality improvement project plan, receive signoff from IT regarding feasibility

      The final piece of the puzzle is to gain sign-off from IT.

      Hofstadter's law: It always takes longer than you expect, even when you take into account Hofstadter’s Law.

      This means that before engaging IT in data quality projects to fix the business units’ data in Phase 2, IT must assess feasibility of the data quality improvement plan. A feasibility analysis is typically used to review the strengths and weaknesses of the projects, as well as the availability of required skills and technologies needed to complete them. Use the following workflow to guide you in performing a feasibility analysis:

      Project evaluation process:

      Present capabilities

      • Operational Capabilities
      • System Capabilities
      • Schedule Capabilities
        • Summary of Evaluation Results
          • Recommendations/ modifications to the project plan

      Info-Tech Best Practice

      While the PMO identifies and coordinates projects, IT must determine how long and for how much.

      Conduct gap analysis sessions to review and prioritize the capability gaps

      1 hour

      Input

      • Current and Target State Assessment

      Output

      • Documented initiatives to help you get to the target state

      Materials

      • Data Quality Practice Assessment and Project Planning Tool

      Participants

      • Data Quality team
      • IT representatives

      Instructions

      • Analyze Gap Analysis Results – As a group, discuss the high-level results on Tab 3: Data Quality Practice Score. Discuss the implications of the gaps identified.
      • Do a line-item review of the gaps between current and target levels for each assessed capability by using Tab 2: Practice Components.
      • Brainstorm Alignment Strategies – Brainstorm the effort and activities that will be necessary to support the practice in building its capabilities to the desired target level. Ask the following questions:
        • What activities must occur to enable this capability?
        • What changes/additions to resources, process, technology, business involvement, and communication must occur?
      • Document Data Quality Initiatives – Turn activities into initiatives by documenting them in Tab 4. Data Quality Practice Roadmap. Review the initiatives and estimate the start and end dates of each one.
      • Continue to evaluate the assessment results in order to create a comprehensive set of data quality initiatives that support your practice in building capabilities.

      Download this Tool

      Create the organization’s data quality improvement strategy roadmap

      1 hour

      Input

      • Data quality practice gaps and improvement actions

      Output

      • Data quality practice improvement roadmap

      Materials

      • Data Quality Practice Assessment and Project Planning Tool

      Participants

      • Data Quality Project Lead
      • Business Executives
      • IT Executives
      • Business Architects

      Generating Your Roadmap

      1. Plan the sequence, starting time, and length of each initiative in the Data Quality Practice Assessment and Project Planning Tool.
      2. The tool will generate a Gantt chart based on the start and length of your initiatives.
      3. The Gantt chart is generated in Tab 4: Data Quality Practice Roadmap, and can be used to organize and ensure that all of the essential aspects of data quality are addressed.

      Use the Practice Roadmap to plan and improve data quality capabilities

      Download this Tool

      Info-Tech Best Practice

      To help get you started, Info-Tech has provided an extensive list of data quality improvement initiatives that are commonly undertaken by organizations looking to improve their data quality.

      Establish Baseline Metrics

      Baseline metrics will be improved through:

      2 hours

      Create practice-level metrics to monitor your data quality practice.

      Instructions:

      1. Establish metrics for both the business and IT that will be used to determine if the data quality practice development is effective.
      2. Set targets for each metric.
      3. Collect current data to calculate the metrics and establish a baseline.
      4. Assign an owner for tracking each metric to be accountable for performance.
      Metric Current Goal
      Usage (% of trained users using the data warehouse)
      Performance (response time)
      Performance (response time)
      Resource utilization (memory usage, number of machine cycles)
      User satisfaction (quarterly user surveys)
      Data quality (% values outside valid values, % fields missing, wrong data type, data outside acceptable range, data that violates business rules. Some aspects of data quality can be automatically tracked and reported)
      Costs (initial installation and ongoing, Total Cost of Ownership including servers, software licenses, support staff)
      Security (security violations detected, where violations are coming from, breaches)
      Patterns that are used
      Reduction in time to market for the data
      Completeness of data that is available
      How many "standard" data models are being used
      What is the extra business value from the data governance program?
      How much time is spent for data prep by BI & analytics team?

      Phase 2 summary

      As you improve your data quality practice and move from reactive to stable, don’t rest and assume that you can let data quality keep going by itself. Rapidly changing consumer requirements or other pains will catch up to your organization and you will fall behind again. By moving to the proactive and predictive end of the maturity scale, you can stay ahead of the curve. By following the methodology laid out in Phase 1, the data quality practices at your organization will improve over time, leading to the following results:

      Chaotic

      Before Data Quality Practice Improvements

      • No standards to data quality

      Reactive

      Year 1

      • Processes defined
      • Data cleansing approach to data quality

      Stable

      Year 2

      • Business rules/ stewardship in place
      • Education and training

      Proactive

      Year 3

      • Data quality practices fully in place and embedded in the culture
      • Trusted and intelligent enterprise

      (Global Data Excellence, Data Excellence Maturity Model)

      Phase 3

      Establish Your Organization’s Data Quality Program

      Build Your Data Quality Program

      Create a data lineage diagram to map the data journey and identify the data subject areas to be targeted for fixes

      It is important to understand the various data that exist in the business unit, as well as which data are essential to business function and require the highest degree of quality efforts.

      Visualize your databases and the flow of data. A data lineage diagram can help you and the Data Quality Improvement Team visualize where data issues lie. Keeping the five-tier architecture in mind, build your data lineage diagram.

      Reminder: Five-Tier Architecture

      The image shows the Five-Tier Architecture graphic.

      Use the following icons to represent your various data systems and databases.

      The image shows four icons. They are: the image of a square and a computer monitor, labelled Application; the image of two sheets of paper, labelled Desktop documents; the image of a green circle next to a computer monitor, labelled Web Application; and a blue cylinder labelled Database.

      Use Info-Tech’s Data Lineage Diagram to document the data sources and applications used by the business unit

      2 hours

      Input

      • Data sources and applications used by the business unit

      Output

      • Data lineage diagram

      Materials

      • Data Lineage Diagram Template

      Participants

      • Business Unit Head/Data Owner
      • Business Unit SMEs
      • Data Analysts/Architects

      Map the flow and location of data within a business unit by creating a system context diagram.

      Gain an accurate view of data locations and uses: Engage business users and representatives with a wide breadth of knowledge-related business processes and the use of data by related business operations.

      1. Sit down with key business representatives of the business unit.
      2. Document the sources of data and processes in which they’re involved, and get IT confirmation that the sources of the data are correct.
      3. Map out the sources and processes in a system context diagram.

      Download this Tool

      Sample Data Lineage Diagram

      The image shows a sample data lineage diagram, split into External Applications and Internal Applications, and showing the processes involved in each.

      Leverage Info-Tech’s Data Quality Practice Assessment and Project Planning Tool to document business context

      1 hour

      Input

      • Business vision, goals, and drivers

      Output

      • Business context for the data quality improvement project

      Materials

      • Data Quality Practice Assessment and Project Planning Tool

      Participants

      • Data Quality project lead
      • Business line representatives
      • IT executives

      Develop goals and align them with specific objectives to set the framework for your data quality initiatives.

      In the context of achieving business vision, mission, goals, and objectives and sustaining differentiators and key drivers, think about where and how data quality is a barrier. Then brainstorm data quality improvement objectives that map to these barriers. Document your list of objectives in Tab 5. Prioritize business units of the Data Quality Practice Assessment and Project Planning Tool.

      Establishing Business Context Example

      Healthcare Industry

      Vision To improve member services and make service provider experience more effective through improving data quality and data collection, aggregation, and accessibility for all the members.
      Goals

      Establish meaningful metrics that guide to the improvement of healthcare for member effectiveness of health care providers:

      • Data collection
      • Data harmonization
      • Data accessibility and trust by all constituents.
      Differentiator Connect service consumers with service providers, that comply with established regulations by delivering data that is accurate, trusted, timely, and easy to understand to connect service providers and eliminate bureaucracy and save money and time.
      Key Driver Seamlessly provide a healthcare for members.

      Download this Tool

      Document the identified business units and their associated data

      30 minutes

      Input

      • Business units

      Output

      • Documented business units to begin prioritization

      Materials

      • Data Quality Practice Assessment and Project Planning Tool

      Participants

      • Project Manager

      Instructions

      1. Using Tab 5: Prioritize Business Units of the Data Quality Practice Assessment and Project Planning Tool, document the business units that use data in the organization. This will likely be all business units in the organization.
      2. Next, document the primary data used by those business units.
      3. These inputs will then be used to assess business unit priority to generate a data quality improvement project roadmap.

      The image shows a screen capture of Tab 5: Prioritize Business Units, with sample information inputted.

      Reminder – Not every business unit requires the same standard of data quality

      To prioritize your business units for data quality improvement projects, you must analyze the relative importance of the data they use to the business. The more important the data is to the business, the higher the priority is of fixing that data. There are two measures for determining the importance of data: business value and business impact.

      Business Value of Data

      Business value of data can be evaluated by thinking about its ties to revenue generation for the organization, as well as how it is used for productivity and operations at the organization.

      The business value of data is assessed by asking what would happen to the following parameters if the data is not usable (due to poor quality, for example):

      • Loss of Revenue
      • Loss of Productivity
      • Increased Operating Costs

      Business Impact of Data

      Business impact of data should take into account the effects of poor data on both internal and external parties.

      The business impact of data is assessed by asking what the impact would be of bad data on the following parameters:

      • Impact on Customers
      • Impact on Internal Staff
      • Impact on Business Partners

      Value + Impact = Data Priority Score

      Assess the business unit priority order for data quality improvements

      2 hours

      Input

      • Assessment of value and impact of business unit data

      Output

      • Prioritization list for data quality improvement projects

      Materials

      • Data Quality Practice Assessment and Project Planning Tool

      Participants

      • Project Manager
      • Data owners

      Instructions

      Instructions In Tab 5: Prioritize Business Units of the Data Quality Practice Assessment and Project Planning Tool, assess business value and business impact of the data within each documented business unit.

      Use the ratings High, Medium, and Low to measure the financial, productivity, and efficiency value and impact of each business unit’s data.

      In addition to these ratings, assess the number of help desk tickets that are submitted to IT regarding data quality issues. This parameter is an indicator that the business unit’s data is high priority for data quality fixes.

      Download this Tool

      Create a business unit order roadmap for your data quality improvement projects

      1 hour

      Input

      • Rating of importance of data for each business unit

      Output

      • Roadmap for data quality improvement projects

      Materials

      • Data Quality Practice Assessment and Project Planning Tool

      Participants

      • Project Manager
      • Product Manager
      • Business line representatives

      Instructions

      After assessing the business units for the business value and business impact of their data, the Data Quality Practice Assessment and Project Planning Tool automatically assesses the prioritization of the business units based on your ratings. These prioritizations are then summarized in a roadmap on Tab 6: Data Quality Project Roadmap. The following is an example of a project roadmap:

      The image shows an example of a project roadmap, with three business units listed vertically along the left hand side, and a Gantt chart showing the time periods in which each Business Unit would work. At the bottom, a table shows the Length of the Project in days (100), and the start date for the first project.

      On Tab 6, insert the timeline for your data quality improvement projects, as well as the starting date of your first data quality project. The roadmap will automatically update with the chosen timing and dates.

      Download this Tool

      Identify metrics at the business unit level to track data quality improvements

      As you improve the data quality for specific business units, measuring the benefits of data quality improvements will help you demonstrate the value of the projects to the business.

      Use the following table to guide you in creating business-aligned metrics:

      Business Unit Driver Metrics Goal
      Sales Customer Intimacy Accuracy of customer data. Percent of missing or incomplete records. 10% decrease in customer record errors.

      Marketing

      Customer Intimacy Accuracy of customer data. Percent of missing or incomplete records. 10% decrease in customer record errors.
      Finance Operational Excellence Relevance of financial reports. Decrease in report inaccuracy complaints.
      HR Risk Management Accuracy of employee data. 10% decrease in employee record errors.
      Shipping Operational Excellence Timeliness of invoice data. 10% decrease in time to report.

      Info-Tech Insight

      Relating data governance success metrics to overall business benefits keeps executive management and executive sponsors engaged because they are seeing actionable results. Review metrics on an ongoing basis with those data owners/stewards who are accountable, the data governance steering committee, and the executive sponsors.

      Case Study

      Address data quality with the right approach to maximize the ROI

      EDC

      Industry: Government

      Source: Environment Development of Canada (EDC)

      Challenge

      Environment Development Canada (EDC) would initially identify data elements that are important to the business purely based on their business instinct.

      Leadership attempted to tackle the enterprise’s data issues by bringing a set of different tools into the organization.

      It didn’t work out because the fundamental foundational layer, which is the data and infrastructure, was not right – they didn't have the foundational capabilities to enable those tools.

      Solution

      Leadership listened to the need for one single team to be responsible for the data persistence.

      Therefore, the data platform team was granted that mandate to extensively execute the data quality program across the enterprise.

      A data quality team was formed under the Data & Analytics COE. They had the mandate to profile the data and to understand what quality of data needed to be achieved. They worked constantly with the business to build the data quality rules.

      Results

      EDC tackled the source of their data quality issues through initially performing a data quality management assessment with business stakeholders.

      From then on, EDC was able to establish their data quality program and carry out other key initiatives that prove the ROI on data quality.

      Begin your data quality improvement project starting with the highest priority business unit

      Now that you have a prioritized list for your data quality improvement projects, identify the highest priority business unit. This is the business unit you will work through Phase 3 with to fix their data quality issues.

      Once you have initiated and identified solutions for the first business unit, tackle data quality for the next business unit in the prioritized list.

      The image is a graphic labelled as Phase 2. On the left, there is a vertical arrow pointing upward labelled Priority of Business Units. Next to it, there are three boxes, with downward pointing arrows between them, each box labelled as each Business Unit's Data Quality Improvement Project. From there an arrow points right to a circle. Inside the circle are the steps necessary to complete the data quality improvement project.

      Create and document your data quality improvement team

      1 hour

      Input

      • Individuals who fit the data quality improvement plan team roles

      Output

      • Project team

      Materials

      • Data Quality Improvement Plan Template

      Participants

      • Data owner
      • Project Manager
      • Product Manager

      The Data Quality Improvement Plan is a concise document that should be created for each data quality project (i.e. for each business unit) to keep track of the project.

      Instructions

      1. Meet with the data owner of the business unit identified for the data quality improvement project.
      2. Identify individuals who fit the data quality improvement plan team roles.
      3. Using the Data Quality Improvement Plan Template to document the roles and individuals who will fit those roles.
      4. Have an introductory meeting with the Improvement team to clarify roles and responsibilities for the project.

      Download this Tool

      Team role Assigned to
      Data Owner [Name]
      Project Manager [Name]
      Business Analyst/BRM [Name]
      Data Steward [Name]
      Data Analyst [Name]

      Document the business context of the Data Quality Improvement Plan

      1 hour

      Input

      • Project team
      • Identified data attributes

      Output

      • Business context for the data quality improvement plan

      Materials

      • Data Quality Improvement Plan Template

      Participants

      • Data owner
      • Project Sponsor
      • Product owner

      Data quality initiatives have to be relevant to the business, and the business context will be used to provide inputs to the data improvement strategy. The context can then be used to determine exactly where the root causes of data quality issues are, which will inform your solutions.

      Instructions

      The business context of the data quality improvement plan includes documenting from previous activities:

      1. The Data Quality Improvement Team.
      2. Your Data Lineage Diagram.
      3. Your Data Quality Problem Statement.

      Info-Tech Best Practice

      While many organizations adopt data quality principles, not all organizations express them along the same terms. Have multiple perspectives within your organization outline principles that fit your unique data quality agenda. Anyone interested in resolving the day-to-day data quality issues that they face can be helpful for creating the context around the project.

      Download this tool

      Now that you have a defined problem, revisit the root causes of poor data quality

      You previously fleshed out the problem with data quality present in the business unit chosen as highest priority. Now it is time to figure out what is causing those problems.

      In the table below, you will find some of the common categories of causes of data quality issues, as well as some specific root causes.

      Category Description
      1. System/Application Design Ineffective, insufficient, or even incorrect system/application design accepts incorrect and missing data elements to the source applications and databases. The data records in those source systems may propagate into systems in tiers 2, 3, 4, and 5 of the 5-tier architecture, creating domino and ripple effects.
      2. Database design Database is created and modeled in an incorrect manner so that the management of the data records is incorrect, resulting in duplicated and orphaned records, and records that are missing data elements or records that contain incorrect data elements. Poor operational data in databases often leads to issues in tiers 2, 3, 4, and 5.
      3. Enterprise Integration Data or information is improperly integrated, transformed, masked, and aggregated in tier 2. In addition, some data integration tasks might not be timely, resulting in out-of-date data or even data that contradicts with other data. Enterprise integration is a precursor of loading a data warehouse and data marts. Issues in this layer affect tier 3, 4 and 5 on the 5-tier architecture.
      4. Policies and Procedures Policies and procedures are not effectively used to reinforce data quality. In some situations, policy gaps are found. In others, policies are overlapped and duplicated. Policies may also be out-of-date or too complex, affecting the users’ ability to interpret the policy objectives. Policies affect all tiers in the 5-tier architecture.
      5. Business Processes Improper business process design introduces poor data into the data systems. Failure to create processes around approving data changes, failure to document key data elements, and failure to train employees on the proper uses of data make data quality a burning problem.

      Leverage a root cause analysis approach to pinpoint the origins of your data issues

      A root cause analysis is a systematic approach to decompose a problem into its components. Use fishbone diagrams to help reveal the root causes of data issues.

      The image shows a fishbone diagram on the left, which starts with Process on the left, and then leads to Application and Integration, and then Database and Policies. This section is titled Root causes. The right hand section is titled Lead to problems with data... and includes 4 circles with the word or in between each. The circles are labelled: Completeness; Usability; Timeliness; Accessibility.

      Info-Tech recommends five root cause categories for assessing data quality issues:

      Application Design. Is the issue caused by human error at the application level? Consider internal employees, external partners/suppliers, and customers.

      Database Design. Is the issue caused by a particular database and stems from inadequacies in its design?

      Integration. Data integration tools may not be fully leveraged, or data matching rules may be poorly designed.

      Policies and Procedures. Do the issues take place because of lack of governance?

      Business Processes. Do the issues take place due to insufficient processes?

      For Example:

      When performing a deeper analysis of your data issues related to the accuracy of the business unit’s data, you would perform a root cause analysis by assessing the contribution of each of the five categories of data quality problem root causes:

      The image shows another fishbone diagram, with example information filled in. The first section on the left is titled Application Design, and includes the text: Data entry problems lead to incorrect accounting entries. The second is Integration, and includes the text: Data integration tools are not fully leveraged. The third section is Policies, and includes the text: No policy on standardizing name and address. The last section is Database design, with text that reads: Databases do not contain unique keys. The diagram ends with an arrow pointing right to a blue circle with Accuracy in it.

      Leverage a combination of data analysis techniques to identify and quantify root causes

      Info-Tech Insight

      Including all attributes of the key subject area in your data profiling activities may produce too much information to make sense of. Conduct data profiling primarily at the table level and undergo attribute profiling only if you are able to narrow down your scope sufficiently.

      Data Profiling Tool

      Data profiling extracts a sample of the target data set and runs it through multiple levels of analysis. The end result is a detailed report of statistics about a variety of data quality criteria (duplicate data, incomplete data, stale data, etc.).

      Many data profiling tools have built-in templates and reports to help you uncover data issues. In addition, they quantify the occurrences of the data issues.

      E-Discovery Tool

      This supplements a profiling tool. For Example, use a BI tool to create a custom grouping of all the invalid states (e.g. “CAL,” “AZN,” etc.) and visualize the percentage of invalid states compared to all states.

      SQL Queries

      This supplements a profiling tool. For example, use a SQL statement to group the customer data by customer segment and then by state to identify which segment–state combinations contain poor data.

      Identify the data issues for the particular business unit under consideration

      2 hours

      Input

      • Issues with data quality felt by the business unit
      • Data lineage diagram

      Output

      • Categorized data quality issues

      Materials

      • Whiteboard, markers, sticky notes
      • Data Quality Improvement Plan Template

      Participants

      • Data quality improvement project team
      • Business line representatives

      Instructions

      1. Gather the data quality improvement project team in a room, along with sticky notes and a whiteboard.
      2. Display your previously created data lineage diagram on the whiteboard.
      3. Using color-coded sticky notes, attach issues to each component of the data lineage diagram that team members can identify. Use different colors for the four quality attributes: Completeness, Usability, Timeliness, and Accessibility.

      Example:

      The image shows the data lineage diagram that has been shown in previous sections. In addition, the image shows 4 post-its arranges around the diagram, labelled: Usability; Completeness; Timeliness; and Accessibility.

      Map the data issues on fishbone diagrams to identify root causes

      1 hour

      Input

      • Categorized data quality issues

      Output

      • Completed fishbone diagrams

      Materials

      • Whiteboard, markers, sticky notes
      • Data Quality Improvement Plan Template

      Participants

      • Data quality improvement project team

      Now that you have data quality issues classified according to the data quality attributes, map these issues onto four fishbone diagrams.

      The image shows a fishbone diagram, which is titled Example: Root cause analysis diagram for data accuracy.

      Download this Tool

      Get to know the root causes behind system/application design mistakes

      Suboptimal system/application design provides entry points for bad data.

      Business Process
      Usually found in → Tier 1 Tier 2 Tier 3 Tier 4 Tier 5
      Issue Root Causes Usability Completeness Timeliness Accessibility
      Insufficient data mask No data mask is defined for a free-form text field in a user interface. E.g. North American phone number should have 4 masks – country code (1-digit), area code (3-digit), and local number (7-digit). X X
      Too many free-form text fields Incorrect use of free-form text fields (fields that accept a variety of inputs). E.g. Use a free-form text field for zip code instead of a backend look up. X X
      Lack of value lookup Reference data is not looked up from a reference list. E.g. State abbreviation is entered instead of being looked up from a standard list of states. X X
      Lack of mandatory field definitions Mandatory fields are not identified and reinforced. Resulting data records with many missing data elements. E.g. Some users may fill up 2 or 3 fields in a UI that has 20 non-mandatory fields. X

      The image shows a fishbone diagram, with the following sections, from left to right: Application Design; Integration; Processes; Policies; Database Design; Data Quality Measure. The Application Design section is highlighted.

      Get to know the root causes behind common database design mistakes

      Improper database design allows incorrect data to be stored and propagated.

      Business Process
      Usually found in → Tier 1 Tier 2 Tier 3 Tier 4 Tier 5
      Issue Root Causes Usability Completeness Timeliness Accessibility
      Incorrect referential integrity Referential integrity constraints are absent or incorrectly implemented, resulting in child records without parent records, or related records are updated or deleted in a cascading manner. E.g. An invoice line item is created before an invoice is created. X X
      Lack of unique keys Lack of unique keys creating scenarios where record uniqueness cannot be guaranteed. E.g. Customer records with the same customer_ID. X X
      Data range Fail to define a data range for incoming data, resulting in data values that are out of range. E.g. The age field is able to store an age of 999. X X
      Incorrect data type Incorrect data types are used to store data fields. E.g. A string field is used to store zip codes. Some users use that to store phone numbers, birthdays, etc. X X

      The image shows a fishbone diagram, with the following sections, from left to right: Application Design; Integration; Processes; Policies; Database Design; Data Quality Measure. The Database Design section is highlighted

      Get to know the root causes behind enterprise integration mistakes

      Improper data integration or synchronization may create poor analytical data.

      Business Process
      Usually found in → Tier 1 Tier 2 Tier 3 Tier 4 Tier 5
      Issue Root Causes Usability Completeness Timeliness Accessibility
      Incorrect transformation Transformation is done incorrectly. A wrong formula may have been used, transformation is done at the wrong data granularity, or aggregation logic is incorrect. E.g. Aggregation is done for all customers instead of just active customers. X X
      Data refresh is out of sync Data is synchronized at different intervals, resulting in a data warehouse where data domains are out of sync. E.g. Customer transactions are refreshed to reflect the latest activities but the account balance is not yet refreshed. X X
      Data is matched incorrectly Fail to match records from disparate systems, resulting in duplications and unmatched records. E.g. Unable to match customers from different systems because they have different cust_ID. X X
      Incorrect data mapping Fields from source systems are not properly matched with data warehouse fields. E.g. Status fields from different systems are mixed into one field. X X

      The image shows a fishbone diagram, with the following sections, from left to right: Application Design; Integration; Processes; Policies; Database Design; Data Quality Measure. The Integration section is highlighted

      Get to know the root causes behind policy and procedure mistakes

      Suboptimal policies and procedures undermine the effect of best practices.

      Business Process
      Usually found in → Tier 1 Tier 2 Tier 3 Tier 4 Tier 5
      Issue Root Causes Usability Completeness Timeliness Accessibility
      Policy Gaps There are gaps in the policy landscape in terms of some missing key policies or policies that are not refreshed to reflect the latest changes. E.g. A data entry policy is absent, leading to inconsistent data entry practices. X X
      Policy Communications Policies are in place but the policies are not communicated effectively to the organization, resulting in misinterpretation of policies and under-enforcement of policies. E.g. The data standard is created but very few developers are aware of its existence. X X
      Policy Enforcement Policies are in place but not proactively re-enforced and that leads to inconsistent application of policies and policy adoption. E.g. Policy adoption is dropping over time due to lack of reinforcement. X X
      Policy Quality Policies are written by untrained authors and they do not communicate the messages. E.g. A non-technical data user may find a policy that is loaded with technical terms confusing. X X

      The image shows a fishbone diagram, with the following sections, from left to right: Application Design; Integration; Processes; Policies; Database Design; Data Quality Measure. The Policies section is highlighted

      Get to know the root causes behind common business process mistakes

      Ineffective and inefficient business processes create entry points for poor data.

      Business Process
      Usually found in → Tier 1 Tier 2 Tier 3 Tier 4 Tier 5
      Issue Root Causes Usability Completeness Timeliness Accessibility
      Lack of training Key data personnel and business analysts are not trained in data quality and data governance, leading to lack of accountability. E.g. A data steward is not aware of downstream impact of a duplicated financial statement. X X
      Ineffective business process The same piece of information is entered into data systems two or more times. Or a piece of data is stalled in a data system for too long. E.g. A paper form is scanned multiple times to extract data into different data systems. X X
      Lack of documentation Fail to document the work flows of the key business processes. A lack of work flow results in sub-optimal use of data. E.g. Data is modeled incorrectly due to undocumented business logic. X X
      Lack of integration between business silos Business silos hold on to their own datasets resulting in data silos in which data is not shared and/or data is transferred with errors. E.g. Data from a unit is extracted as a data file and stored in a shared drive with little access. X X

      The image shows a fishbone diagram, with the following sections, from left to right: Application Design; Integration; Processes; Policies; Database Design; Data Quality Measure. The Processes section is highlighted

      Phase 3 Summary

      1. Data Lineage Diagram
      • Creating the data lineage diagram is recommended to help visualize the flow of your data and to map the data journey and identify the data subject areas to be targeted for fixes.
      • The data lineage diagram was leveraged multiple times throughout this Phase. For example, the data lineage diagram was used to document the data sources and applications used by the business unit
    • Business Context
      • Business context was documented through the Data Quality Practice Assessment and Project Planning Tool.
      • The same tool was used to document identified business units and their associated data.
      • Metrics were also identified at the business unit level to track data quality improvements.
    • Common Root Causes
      • Leverage a root cause analysis approach to pinpoint the origins of your data quality issues.
      • Analyzed and got to know the root causes behind the following:
        1. System/application design mistakes
        2. Common database design mistakes
        3. Enterprise integration mistakes
        4. Policies and procedures mistakes
        5. Common business processes mistakes
    • Phase 4

      Grow and Sustain Your Data Quality Program

      Build Your Data Quality Program

      For the identified root causes, determine the solutions for the problem

      As you worked through the previous step, you identified the root causes of your data quality problems within the business unit. Now, it is time to identify solutions.

      The following slides provide an overview of the solutions to common data quality issues. As you identify solutions that apply to the business unit being addressed, insert the solution tables in Section 4: Proposed Solutions of the Data Quality Improvement Plan Template.

      All data quality solutions have two components to them:

      • Technology
      • People

      For the next five data quality solution slides, look for the slider for the contributions of each category to the solution. Use this scale to guide you in creating solutions.

      When designing solutions, keep in mind that solutions to data quality problems are not mutually exclusive. In other words, an identified root cause may have multiple solutions that apply to it.

      For example, if an application is plagued with inaccurate data, the application design may be suboptimal, but also the process that leads to data being entered may need fixing.

      Data quality improvement strategy #1:

      Fix data quality issues by improving system/application design.

      Technology

      Application Interface Design

      Restrict field length – Capture only the characters you need for your application.

      Leverage data masks – Use data masks in standardized fields like zip code and phone number.

      Restrict the use of open text fields and use reference tables – Only present open text fields when there is a need. Use reference tables to limit data values.

      Provide options – Use radio buttons, drop-down lists, and multi-select instead of using open text fields.

      Data Validation at the Application Level

      Validate data before committing – Use simple validation to ensure the data entered is not random numbers and letters.

      Track history – Keep track of who entered what fields.

      Cannot submit twice – Only design for one-time submission.

      People

      Training

      Data-entry training – Training that is related to data entry, creating, or updating data records.

      Data resolution training – Training data stewards or other dedicated data personnel on how to resolve data records that are not entered properly.

      Continuous Improvement

      Standards – Develop application design principles and standards.

      Field testing – Field data entry with a few people to look for abnormalities and discrepancies.

      Detection and resolution – Abnormal data records should be isolated and resolved ASAP.

      Application Testing

      Thorough testing – Application design is your first line of defence against poor data. Test to ensure bad data is kept out of the systems.

      Case Study

      HMS

      Industry: Healthcare

      Source: Informatica

      Improve your data quality ingestion procedures to provide better customer intimacy for your users

      Healthcare Management Systems (HMS) provides cost containment services for healthcare sponsors and payers, and coordinates benefits services. This is to ensure that healthcare claims are paid correctly to both government agencies and individuals. To do so, HMS relies on data, and this data needs to be of high quality to ensure the correct decisions are made, the right people get the correct claims, and the appropriate parties pay out.

      To improve the integrity of HMS’s customer data, HMS put in place a framework that helped to standardize the collection of high volume and highly variable data.

      Results

      Working with a data quality platform vendor to establish a framework for data standardization, HMS was able to streamline data analysis and reduce new customer implementations from months to weeks.

      HMS data was plagued with a lack of standardization of data ingestion procedures.

      Before improving data quality processes After improving data quality processes
      Data Ingestion Data Ingestion
      Many standards of ingestion. Standardized data ingestion
      Data Storage Data Storage
      Lack of ability to match data, creating data quality errors.
      Data Analysis Data Analysis
      = =
      Slow Customer Implementation Time 50% Reduction in Customer Implementation Time

      Data quality improvement strategy #2:

      Fix data quality issues using proper database design.

      Technology

      Database Design Best Practices

      Referential integrity – Ensure parent/child relationships are maintained in terms of cascade creation, update, and deletion.

      Primary key definition – Ensure there is at least one key to guarantee the uniqueness of the data records, and primary key should not allow null.

      Validate data domain – Create triggers to check the data values entered in the database fields.

      Field type and length – Define the most suitable data type and length to hold field values.

      One-Time Data Fix (more on the next slide)

      Explore solutions – Where to fix the data issues? Is there a case to fix the issues?

      Running profiling tools to catch errors – Run scans on the database with defined criteria to identify occurrences of questionable data.

      Fix a sample before fixing all records – Use a proof-of-concept approach to explore fix options and evaluate impacts before fixing the full set.

      People

      The DBA Team

      Perform key tasks in pairs – Take a pair approach to perform key tasks so that validation and cross-check can happen.

      Skilled DBAs – DBAs should be certified and accredited.

      Competence – Assess DBA competency on an ongoing basis.

      Preparedness – Develop drills to stimulate data issues and train DBAs.

      Cross train – Cross train team members so that one DBA can cover another DBA.

      Data quality improvement strategy #3:

      Improve integration and synchronization of enterprise data.

      Technology

      Integration Architecture

      Info-Tech’s 5-Tier Architecture – When doing transformations, it is good practice to persist the integration results in tier 3 before the data is further refined and presented in tier 4.

      Timing, timing, and timing – Think of the sequence of events. You may need to perform some ETL tasks before other tasks to achieve synchronization and consistence.

      Historical changes – Ensure your tier 3 is robust enough to include historical data. You need to enable type 2 slowly, changing dimension to recreate the data at a point in time.

      Data Cleansing

      Standardize – Leverage data standardization to standardize name and address fields to improve matching and integration.

      Fuzzy matching – When there are no common keys between datasets. The datasets can only be matched by fuzzy matching. Fuzzy matching is not hard science; define a confidence level and think about a mechanism to deal with the unmatched.

      People

      Reporting and Documentations

      Business data glossary and data lineage – Define a business data glossary to enhance findability of key data elements. Document data mappings and ETL logics.

      Create data quality reports – Many ETL platforms provide canned data quality reports. Leverage those quality reports to monitor the data health.

      Code Review

      Create data quality reports – Many ETL platforms provide canned data quality reports. Leverage those quality reports to monitor the data health.

      ARB (architectural review board) – All ETL codes should be approved by the architectural review board to ensure alignment with the overall integration strategy.

      Data quality improvement strategy #4:

      Improve data quality policies and procedures.

      Technology

      Policy Reporting

      Data quality reports – Leverage canned data quality reports from the ETL platforms to monitor data quality on an on-going basis. When abnormalities are found, provoke the right policies to deal with the issues.

      Store policies in a central location that is well known and easy to find and access. A key way that technology can help communicate policies is by having them published on a centralized website.

      Make the repository searchable and easily navigable. myPolicies helps you do all this and more.

      myPolicies helps you do all this and more.

      Go to this link

      People

      Policy Review and Training

      Policy review – Create a schedule for reviewing policies on a regular basis – invite professional writers to ensure polices are understandable.

      Policy training – Policies are often unread and misread. Training users and stakeholders on policies is an effective way to make sure those users and stakeholders understand the rationale of the policies. It is also a good practice to include a few scenarios that are handled by the policies.

      Policy hotline/mailbox – To avoid misinterpretation of the policies, a policy hotline/mailbox should be set up to answer any data policy questions from the end users/stakeholders.

      Policy Communications

      Simplified communications – Create handy one-pagers and infographic posters to communicate the key messages of the polices.

      Policy briefing – Whenever a new data project is initiated, a briefing of data policies should be given to ensure the project team follows the policies from the very beginning.

      Data quality improvement strategy #5:

      Streamline and optimize business processes.

      Technology

      Requirements Gathering

      Data Lineage – Leverage a metadata management tool to construct and document data lineage for future reference.

      Documentations Repository – It is a best practice to document key project information and share that knowledge across the project team and with the stakeholder. An improvement understanding of the project helps to identify data quality issues early on in the project.

      “Automating creation of data would help data quality most. You have to look at existing processes and create data signatures. You can then derive data off those data codes.” – Patrick Bossey, Manager of Business Intelligence, Crawford and Company

      People

      Requirements Gathering

      Info-Tech’s 4-Column Model – The datasets may exist but the business units do not have an effective way of communicating the quality needs. Use our four-column model and the eleven supporting questions to better understand the quality needs. See subsequent slides.

      I don’t know what the data means so I think the quality is poor – It is not uncommon to see that the right data presented to the business but the business does not trust the data. They also do not understand the business logic done on the data. See our Business Data Glossary in subsequent slides.

      Understand the business workflow – Know the business workflow to understand the manual steps associated with the workflow. You may find steps in which data is entered, manipulated, or consumed inappropriately.

      “Do a shadow data exercise where you identify the human workflows of how data gets entered, and then you can identify where data entry can be automated.” – Diraj Goel, Growth Advisor, BC Tech

      Brainstorm solutions to your data quality issues

      4 hours

      Input

      • Data profiling results
      • Preliminary root cause analyses

      Output

      • Proposals for data fix
      • Fixed issues

      Materials

      • Data Quality Improvement Plan Template

      Participants

      • Business and Data Analysts
      • Data experts and stewards

      After walking through the best-practice solutions to data quality issues, propose solutions to fix your identified issues.

      Instructions

      1. Review Root Cause Analyses: Revisit the root cause analysis and data lineage diagram you have generated in Step 3.2. to understand the issues in greater details.
      2. Characterize Each Issue: You may need to generate a data profiling report to characterize the issue. The report can be generated by using data quality suites, BI platforms, or even SQL statements.
      3. Brainstorm the Solutions: As a group, discuss potential ways to fix the issue. You can tackle the issues by approaching from these areas:
      Solution Approaches
      Technology Approach
      People Approach

      X crossover with

      Problematic Areas
      Application/System Design
      Database Design
      Data Integration and Synchronization
      Policies and Procedures
      Business Processes
      1. Document and Communicate: Document the solutions to your data issues. You may need to reuse or refer to the solutions. Also brainstorm some ideas on how to communicate the results back to the business.

      Download this Tool

      Sustaining your data quality requires continuous oversight through a data governance practice

      Quality data is the ultimate outcome of data governance and data quality management. Data governance enables data quality by providing the necessary oversight and controls for business processes in order to maintain data quality. There are three primary groups (at right) that are involved in a mature governance practice. Data quality should be tightly integrated with all of them.

      Define an effective data governance strategy and ensure the strategy integrates well with data quality with Info-Tech’s Establish Data Governance blueprint.

      Visit this link

      Data Governance Council

      This council establishes data management practices that span across the organization. This should be comprised of senior management or C-suite executives that can represent the various departments and lines of business within the organization. The data governance council can help to promote the value of data governance, facilitate a culture that nurtures data quality, and ensure that the goals of the data governance program are well aligned with business objectives.

      Data Owners

      Identifying the data owner role within an organization helps to create a greater degree of accountability for data issues. They often oversee how the data is being generated as well as how it is being consumed. Data owners come from the business side and have legal rights and defined control over a data set. They ensure data is available to the right people within the organization.

      Data Stewards

      Conflict can occur within an organization’s data governance program when a data steward’s role is confused with that of the steering committee’s role. Data stewards exist to enforce decisions made about data governance and data management. Data stewards are often business analysts or power users of a particular system/dataset. Where a data owner is primarily responsible for access, a data steward is responsible for the quality of a dataset.

      Integrate the data quality management strategy with existing data governance committees

      Ongoing and regular data quality management is the responsibility of the data governance bodies of the organization.

      The oversight of ongoing data quality activities rests on the shoulders of the data governance committees that exist in the organization.

      There is no one-size-fits-all data governance structure. However, most organizations follow a similar pattern when establishing committees, councils, and cross-functional groups. They strive to identify roles and responsibilities at a strategic, tactical, and operational level:

      The image shows a pyramid, with Executive Sponsors at the top, with the following roles in descending order: DG Council; Steering Committee; Working Groups; Data Owners and Data Stewards; and Data Users. Along the left side of the pyramid, there are three labels, in ascending order: Operational, Tactical, and Strategic.

      The image is a flow chart showing project roles, in two sections: the top section is labelled Governing Bodies, and the lower section is labelled Data Quality Improvement Team. There is a note indicating that the Data Owner reports to and provides updates regarding the state of data quality and data quality initiatives.

      Create and update the organization’s Business Data Glossary to keep up with current data definitions

      2 hours

      Input

      • Metrics and goals for data quality

      Output

      • Regularly scheduled data quality checkups

      Materials

      • Business Data Glossary Template
      • Data Quality Dashboard

      Participants

      • Data steward

      A crucial aspect of data quality and governance is the Business Data Glossary. The Business Data Glossary helps to align the terminology of the business with the organization’s data assets. It allows the people who interact with the data to quickly identify the applications, processes, and stewardship associated with it, which will enhance the accuracy and efficiency of searches for organization data definitions and attributes, enabling better access to the data. This will, in turn, enhance the quality of the organization’s data because it will be more accurate, relevant, and accessible.

      Use the Business Data Glossary Template to document key aspects of the data, such as:

      • Definition
      • Source System
      • Possible Values
      • Data Steward
      • Data Sensitivity
      • Data Availability
      • Batch or Live
      • Retention

      Data Element

      • Mkt-Product
      • Fin-Product

      Info-Tech Insight

      The Business Data Glossary ensures that the crucial data that has key business use by key business systems and users is appropriately owned and defined. It also establishes rules that lead to proper data management and quality to be enforced by the data owners.

      Download this Tool

      Data Steward(s): Use the Data Quality Improvement Plan of the business unit for ongoing quality monitoring

      Integrating your data quality strategy into the organization’s data governance program requires passing the strategy over to members of the data governance program. The data steward role is responsible for data quality at the business unit level, and should have been involved with the creation and implementation of the data quality improvement project. After the data quality repairs have been made, it is the responsibility of the data steward to regularly monitor the quality of the business unit’s data.

      Create Improvement Plan ↓
      • Data Quality Improvement Team identifies root cause issues.
      • Brainstorm solutions.
      Implement Improvement Plan ↓
      • Data Quality Improvement Team works with IT.
      Sustain Improvement Plan
      • Data Steward should regularly monitor data quality.

      Download this tool

      See Info-Tech’s Data Steward Job Description Template for a detailed understanding of the roles and responsibilities of the data steward.

      Responsible for sustaining

      The image shows a screen capture of a document entitled Business Context & Subject Area Selection.

      Develop a business-facing data quality dashboard to show improvements or a sudden dip in data quality

      One tool that the data steward can take advantage of is the data quality dashboard. Initiatives that are implemented to address data quality must have metrics defined by business objectives in order to demonstrate the value of the data quality improvement projects. In addition, the data steward should have tools for tracking data quality in the business unit to report issues to the data owner and data governance steering committee.

      • Example 1: Marketing uses data for direct mail and e-marketing campaigns. They care about customer data in particular. Specifically, they require high data quality in attributes such as customer name, address, and product profile.
      • Example 2: Alternatively, Finance places emphasis on financial data, focusing on attributes like account balance, latency in payment, credit score, and billing date.

      The image is Business dashboard on Data Quality for Marketing. It features Data Quality metrics, listed in the left column, and numbers for each quarter over the course of one year, on the right.

      Notes on chart:

      General improvement in billing address quality

      Sudden drop in touchpoint accuracy may prompt business to ask for explanations

      Approach to creating a business-facing data quality dashboard:

      1. Schedule a meeting with the functional unit to discuss what key data quality metrics are essential to their business operations. You should consider the business context, functional area, and subject area analyses you completed in Phase 1 as a starting point.
      2. Discuss how to gather data for the key metrics and their associated calculations.
      3. Discuss and decide the reporting intervals.
      4. Discuss and decide the unit of measurement.
      5. Generate a dashboard similar to the example. Consider using a BI or analytics tool to develop the dashboard.

      Data quality management must be sustained for ongoing improvements to the organization’s data

      • Data quality is never truly complete; it is a set of ongoing processes and disciplines that requires a permanent plan for monitoring practices, reviewing processes, and maintaining consistent data standards.
      • Setting the expectation to stakeholders that a long-term commitment is required to maintain quality data within the organization is critical to the success of the program.
      • A data quality maintenance program will continually revise and fine-tune ongoing practices, processes, and procedures employed for organizational data management.

      Data quality is a program that requires continual care:

      →Maintain→Good Data →

      Data quality management is a long-term commitment that shifts how an organization views, manages, and utilizes its corporate data assets. Long-term buy-in from all involved is critical.

      “Data quality is a process. We are trying to constantly improve the quality over time. It is not a one-time fix.” – Akin Akinwumi, Manager of Data Governance, Startech.com

      Define a data quality review agenda for data quality sustainment

      2 hours

      Input

      • Metrics and goals for data quality

      Output

      • Regularly scheduled data quality checkups

      Materials

      • Data Quality Diagnostic
      • Data Quality Dashboard

      Participants

      • Data Steward

      As a data steward, you are responsible for ongoing data quality checks of the business unit’s data. Define an improvement agenda to organize the improvement activities. Organize the activities yearly and quarterly to ensure improvement is done year-round.

      Quarterly

      • Measure data quality metrics against milestones. Perform a regular data quality health check with Info-Tech’s Data Quality Diagnostic.
      • Review the business unit’s Business Data Glossary to ensure that it is up to date and comprehensive.
      • Assess progress of practice area initiatives (time, milestones, budget, benefits delivered).
      • Analyze overall data quality and report progress on key improvement projects and corrective actions in the executive dashboard.
      • Communicate overall status of data quality to oversight body.

      Annually

      • Calculate your current baseline and measure progress by comparing it to previous years.
      • Set/revise quality objectives for each practice area and inter-practice hand-off processes.
      • Re-evaluate/re-establish data quality objectives.
      • Set/review data quality metrics and tracking mechanisms.
      • Set data quality review milestones and timelines.
      • Revisit data quality training from an end-user perspective and from a practitioner perspective.

      Info-Tech Insight

      Do data quality diagnostic at the beginning of any improvement plan, then recheck health with the diagnostic at regular intervals to see if symptoms are coming back. This should be a monitoring activity, not a data quality fixing activity. If symptoms are bad enough, repeat the improvement plan process.

      Take the next step in your Data & Analytics Journey

      After establishing your data quality program, look to increase your data & analytics maturity.

      • Artificial Intelligence (AI) is a concept that many organizations strive to implement. AI can really help in areas such as data preparation. However, implementing AI solutions requires a level of maturity that many organizations are not at.
      • While a solid data quality foundation is essential for AI initiatives being successful, AI can also ensure high data quality.
      • An AI analytics solution can address data integrity issues at the earliest point of data processing, rapidly transforming these vast volumes of data into trusted business information. This can be done through Anomaly detection, which flags “bad” data, identifying suspicious anomalies that can impact data quality. By tracking and evaluating data, anomaly detection gives critical insights into data quality as data is processed. (Ira Cohen, The End to a Never-Ending Story? Improve Data Quality with AI Analytics, anodot, 2020)

      Consider… “Garbage in, garbage out.”

      Lay a solid foundation by addressing your data quality issues prior to investing heavily in an AI solution.

      Related Info-Tech Research

      Are You Ready for AI?

      • Use AI as a compelling event to expedite funding, resources, and project plans for your data-related initiatives. Check out this note to understand what it takes to be ready to implement AI solutions.

      Get Started With Artificial Intelligence

      • Current AI technology is data-enabled, automated, adaptive decision support. Once you believe you are ready for AI, check out this blueprint on how to get started.

      Build a Data Architecture Roadmap

      • The data lineage diagram was a key tool used in establishing your data quality program. Check out this blueprint and learn how to optimize your data architecture to provide greatest value from data.

      Create an Architecture for AI

      • Build your target state architecture from predefined best practice building blocks. This blueprint assists members first to assess if they have the maturity to embrace AI in their organization, and if so, which AI acquisition model fits them best.

      Phase 4 Summary

      1. Data Quality Improvement Strategy
      • Brainstorm solutions to your data quality issues using the following data quality improvement strategies as a guide:
        1. Fix data quality issues by improving system/application design
        2. Fix data quality issues using proper database design
        3. Improve integration and synchronization of enterprise data
        4. Improve data quality policies and procedures
        5. Streamline and optimize business processes
    • Sustain Your Data Quality Program
      • Quality data is the ultimate outcome of data governance and data quality management.
      • Sustaining your data quality requires continuous oversight through a data governance practice.
      • There are three primary groups (Data Governance Council, Data Owners, and Data Stewards) that are involved in a mature governance practice.
    • Grow Your Data & Analytics Maturity
      • After establishing your data quality program, take the next step in increasing your data & analytics maturity.
      • Good data quality is the foundation of pursuing different ways of maximizing the value of your data such as implementing AI solutions.
      • Continue your data & analytics journey by referring to Info-Tech’s quality research.
    • Research Contributors and Experts

      Izabela Edmunds

      Information Architect Mott MacDonald

      Akin Akinwumi

      Manager of Data Governance Startech.com

      Diraj Goel

      Growth Advisor BC Tech

      Sujay Deb

      Director of Data Analytics Technology and Platforms Export Development Canada

      Asif Mumtaz

      Data & Solution Architect Blue Cross Blue Shield Association

      Patrick Bossey

      Manager of Business Intelligence Crawford and Company

      Anonymous Contributors

      Ibrahim Abdel-Kader

      Research Specialist Info-Tech Research Group

      Ibrahim is a Research Specialist at Info-Tech Research Group. In his career to date he has assisted many clients using his knowledge in process design, knowledge management, SharePoint for ECM, and more. He is expanding his familiarity in many areas such as data and analytics, enterprise architecture, and CIO-related topics.

      Reddy Doddipalli

      Senior Workshop Director Info-Tech Research Group

      Reddy is a Senior Workshop Director at Info-Tech Research Group, focused on data management and specialized analytics applications. He has over 25 years of strong industry experience in IT leading and managing analytics suite of solutions, enterprise data management, enterprise architecture, and artificial intelligence–based complex expert systems.

      Andy Neill

      Practice Lead, Data & Analytics and Enterprise Architecture Info-Tech Research Group

      Andy leads the data and analytics and enterprise architecture practices at ITRG. He has over 15 years of experience in managing technical teams, information architecture, data modeling, and enterprise data strategy. He is an expert in enterprise data architecture, data integration, data standards, data strategy, big data, and development of industry standard data models.

      Crystal Singh

      Research Director, Data & Analytics Info-Tech Research Group

      Crystal is a Research Director at Info-Tech Research Group. She brings a diverse and global perspective to her role, drawing from her professional experiences in various industries and locations. Prior to joining Info-Tech, Crystal led the Enterprise Data Services function at Rogers Communications, one of Canada’s leading telecommunications companies.

      Igor Ikonnikov

      Research Director, Data & Analytics Info-Tech Research Group

      Igor is a Research Director at Info-Tech Research Group. He has extensive experience in strategy formation and execution in the information management domain, including master data management, data governance, knowledge management, enterprise content management, big data, and analytics.

      Andrea Malick

      Research Director, Data & Analytics Info-Tech Research Group

      Andrea Malick is a Research Director at Info-Tech Research Group, focused on building best practices knowledge in the enterprise information management domain, with corporate and consulting leadership in enterprise architecture and content management (ECM).

      Natalia Modjeska

      Research Director, Data & Analytics Info-Tech Research Group

      Natalia Modjeska is a Research Director at Info-Tech Research Group. She advises members on topics related to AI, machine learning, advanced analytics, and data science, including ethics and governance. Natalia has over 15 years of experience in developing, selling, and implementing analytical solutions.

      Rajesh Parab

      Research Director, Data & Analytics Info-Tech Research Group

      Rajesh Parab is a Research Director at Info-Tech Research Group. He has over 20 years of global experience and brings a unique mix of technology and business acumen. He has worked on many data-driven business applications. In his previous architecture roles, Rajesh created a number of product roadmaps, technology strategies, and models.

      Bibliography

      Amidon, Kirk. "Case Study: How Data Quality Has Evolved at MathWorks." The Fifth MIT Information Quality Industry Symposium. 13 July 2011. Web. 19 Aug. 2015.

      Boulton, Clint. “Disconnect between CIOs and LOB managers weakens data quality.” CIO. 05 February 2016. Accessed June 2020.

      COBIT 5: Enabling Information. Rolling Meadows, IL: ISACA, 2013. Web.

      Cohen, Ira. “The End to a Never-Ending Story? Improve Data Quality with AI Analytics.” anodot. 2020.

      “DAMA Guide to the Data Management Body of Knowledge (DAMA-DMBOK Guide).” First Edition. DAMA International. 2009. Digital. April 2014.

      "Data Profiling: Underpinning Data Quality Management." Pitney Bowes. Pitney Bowes - Group 1 Software, 2007. Web. 18 Aug. 2015.

      Data.com. “Data.com Clean.” Salesforce. 2016. Web. 18 Aug. 2015.

      “Dawn of the CDO." Experian Data Quality. 2015. Web. 18 Aug. 2015.

      Demirkan, Haluk, and Bulent Dal. "Why Do So Many Analytics Projects Fail?" The Data Economy: Why Do so Many Analytics Projects Fail? Analytics Magazine. July-Aug. 2014. Web.

      Dignan, Larry. “CIOs juggling digital transformation pace, bad data, cloud lock-in and business alignment.” ZDNet. 11 March 2020. Accessed July.

      Dumbleton, Janani, and Derek Munro. "Global Data Quality Research - Discussion Paper 2015." Experian Data Quality. 2015. Web. 18 Aug. 2015.

      Eckerson, Wayne W. "Data Quality and the Bottom Line - Achieving Business Success through a Commitment to High Quality Data." The Data Warehouse Institute. 2002. Web. 18 Aug. 2015.

      “Infographic: Data Quality in BI the Costs and Benefits.” HaloBI. 2015 Web.

      Lee, Y.W. and Strong, D.M. “Knowing-Why About Data Processes and Data Quality.” Journal of Management Information Systems. 2004.

      “Making Data Quality a Way of Life.” Cognizant. 2014. Web. 18 Aug. 2015.

      "Merck Serono Achieves Single Source of Truth with Comprehensive RIM Solutions." www.productlifegroup.com. ProductLife Group. 15 Apr. 2015. Web. 23 Nov. 2015.

      Myers, Dan. “List of Conformed Dimensions of Data Quality.” Conformed Dimensions of Data Quality (CDDQ). 2019. Web.

      Redman, Thomas C. “Make the Case for Better Data Quality.” Harvard Business Review. 24 Aug. 2012. Web. 19 Aug. 2015.

      RingLead Data Management Solutions. “10 Stats About Data Quality I Bet You Didn’t Know.” RingLead. Accessed 7 July 2020.

      Schwartzrock, Todd. "Chrysler's Data Quality Management Case Study." Online video clip. YouTube. 21 April. 2011. Web. 18 Aug. 2015

      “Taking control in the digital age.” Experian Data Quality. Jan 2019. Web.

      “The data-driven organization, a transformation in progress.” Experian Data Quality. 2020. Web.

      "The Data Quality Benchmark Report." Experian Data Quality. Jan. 2015. Web. 18 Aug. 2015.

      “The state of data quality.” Experian Data Quality. Sept. 2013. Web. 17 Aug. 2015.

      Vincent, Lanny. “Differentiating Competence, Capability and Capacity.” Innovation Management Services. Web. June 2008.

      “7 ways poor data quality is costing your business.” Experian Data Quality. July 2020. Web.

      Make the Case for Enterprise Business Analysis

      • Buy Link or Shortcode: {j2store}509|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Requirements & Design
      • Parent Category Link: /requirements-and-design
      • It can be difficult to secure alignment between the many lines of business, IT included, in your organization.
      • Historically, we have drawn a dividing line between IT and "the business.”
      • The reality of organizational politics and stakeholder bias means that, with selection and prioritization, sometimes the highest value option is dismissed to make way for the loudest voice’s option.

      Our Advice

      Critical Insight

      • Enterprise business analysis can help you stop the debate between IT and “the business,” as it sees everyone as part of the business. It can effectively break down silos, support the development of holistic strategies to address internal and external risks, and remove the bias and politics in decision making all too common in organizations.
      • The business analyst is the only role that can connect the strategic with the tactical, the systems, and the operations and do so objectively. It is the one source to show how people, process, and technology connect and relate, and the most skilled can remove bias and politics from their lens of view.
      • Maturity can’t be rushed. Build your enterprise business analysis program on a solid foundation of leading and consistent business analysis practices to secure buy-in and have a program that is sustainable in the long term.

      Impact and Result

      Let’s make the case for enterprise business analysis!

      • Organizations that have higher business analysis maturity and deploy enterprise analysis deliver better quality outcomes, with higher value, lower cost, and higher user satisfaction.
      • Business analysts should be contributing at the strategic level, as they need to understand multiple horizons simultaneously and be able to zoom in and out as the context calls for it. Business analysts aren’t only for projects.

      Make the Case for Enterprise Business Analysis Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Make the Case for Enterprise Business Analysis Storyboard – Take your business analysis from tactics to strategy.

      • Make the Case for Enterprise Business Analysis Storyboard

      2. Communicate the Case for Enterprise Business Analysis Template – Make the case for enterprise business analysis.

      • Communicate the Case for Enterprise Business Analysis
      [infographic]

      Further reading

      Make the Case for Enterprise Business Analysis

      Putting the strategic and tactical puzzle together.

      Analyst Perspective

      We commonly recognize the value of effective business analysis at a project or tactical level. A good business analysis professional can support the business by identifying its needs and recommending solutions to address them.
      Now, wouldn't it be great if we could do the same thing at a higher level?
      Enterprise (or strategic) business analysis is all about seeing that bigger picture, an approach that makes any business analysis professional a highly valuable contributor to their organization. It focuses on the enterprise, not a specific project or line of business.
      Leading the business analysis effort at an enterprise level ensures that your business is not only doing things right, but also doing the right things; aligned with the strategic vision of your organization to improve the way decisions are made, options are analyzed, and successful results are realized.

      Vincent Mirabelli

      Vincent Mirabelli
      Principal Research Director, Applications Delivery and Management
      Info-Tech Research Group

      Executive Summary

      Your Challenge

      • Difficulty properly aligning between the many lines of business in your organization.
      • Historically, we have drawn a dividing line between IT and the business.
      • The reality of organizational politics and stakeholder bias means that, with selection and prioritization, sometimes the highest value option is dismissed in favor of the loudest voice.

      Common Obstacles

      • Difficulty aligning an ever-changing backlog of projects, products, and services while simultaneously managing risks, external threats, and stakeholder expectations.
      • Many organizations have never heard of enterprise business analysis and only see the importance of business analysts at the project and delivery level.
      • Business analysis professionals rarely do enough to advocate for a seat at the strategic tables in their organizations.

      Info-Tech's Approach

      Let's make the case for enterprise business analysis!

      • Organizations that have higher business analysis maturity and deploy enterprise business analysis deliver better quality outcomes with higher value, lower cost, and higher user satisfaction.
      • Business analysts aren't only for projects. They should contribute at the strategic level, since they need to understand multiple horizons simultaneously and be able to zoom in and out as the context requires.

      Info-Tech Insight

      Enterprise business analysis can help you reframe the debate between IT and the business, since it sees everyone as part of the business. It can effectively break down silos, support the development of holistic strategies to address internal and external risks, and remove bias and politics from decision making.

      Phase 1

      Build the case for enterprise business analysis

      Phase 1

      Phase 2

      1.1 Define enterprise business analysis

      1.2 Identify your pains and opportunities

      2.1 Set your vision

      2.2 Define your roadmap and next steps

      2.3 Complete your executive communications deck

      This phase will walk you through the following activities:

      • 1.1.1 Discuss how business analysis is used in our organization
      • 1.1.2 Discuss your disconnects between strategy and tactics
      • 1.2.1 Identify your pains and opportunities

      This phase involves the following participants:

      • Business analyst(s)
      • Organizational business leaders
      • Any other relevant stakeholders

      How business analysis supports our success today

      Delivering value at the tactical level

      Effective business analysis helps guide an organization through improvements to processes, products, and services. Business analysts "straddle the line between IT and the business to help bridge the gap and improve efficiency" in an organization (CIO, 2019).
      They are most heavily involved in:

      • Defining needs
      • Modeling concepts, processes, and solutions
      • Conducting analysis
      • Maintaining and managing requirements
      • Managing stakeholders
      • Monitoring progress
      • Doing business analysis planning
      • Conducting elicitation

      In a survey, business analysts indicated that of their total working time, they spend 31% performing business analysis planning and 41% performing elicitation and analysis (PMI, 2017).

      By including a business analyst in a project, organizations benefit by:
      (IAG, 2009)

      87%

      Reduced time overspending

      75%

      Prevented budget overspending

      78%

      Reduction in missed functionality

      1.1.1 Discuss how business analysis is used in your organization

      15-30 minutes

      1. Gather the appropriate stakeholders to discuss their knowledge, experience, and perspectives on business analysis. This should relate to their experience and not a future or aspirational usage.
      2. Have a team member facilitate the session.
      3. Brainstorm and document all shared thoughts and perspectives.
      4. Synthesize those thoughts and perspectives and record the results for the group to review and discuss.
      5. Transfer the results to the Communicate the Case for Enterprise Business Analysis template

      Input

      • Stakeholder knowledge and experience

      Output

      • A shared understanding of how your organization leverages its business analysis function

      Materials

      • Whiteboard/Flip charts
      • Collaborative whiteboard
      • Communicate the Case for Enterprise Business Analysis template

      Participants

      • Business analyst(s)
      • Organizational business leaders
      • Any other relevant stakeholders

      Download the Communicate the Case for Enterprise Business Analysis template

      Executives and leadership are satisfied with IT when there is alignment between tactics and goals

      Info-Tech's CIO Business Vision Survey data highlights the importance of IT projects in supporting the business to achieve its strategic goals.

      However, Info-Tech's CEO-CIO Alignment Survey (N=124) data indicates that CEOs perceive IT as poorly aligned with the business' strategic goals.

      Info-Tech's CIO-CEO Alignment Diagnostics

      43%

      of CEOs believe that business goals are going unsupported by IT.

      60%

      of CEOs believe that IT must improve understanding of business goals.

      80%

      of CIOs/CEOs are misaligned on the target role of IT.

      30%

      of business stakeholders support their IT departments.

      Addressing problems solely with tactics does not always have the desired effect

      94%

      Source: "Out of the Crisis", Deming (via Harvard Business Review)

      According to famed management and quality thought leader and pioneer W. Edwards Deming, 94% of issues in the workplace are systemic cause significant organizational pain.

      Yet we continue to address them on the surface, rather than acknowledge how ingrained they are in our culture, systems, and processes.

      For example, we:

      • Create workarounds to address process and solution constraints
      • Expect that poor (or lack of ) leadership can be addressed in a course or seminar
      • Expect that "going Agile" will resolve our problems, and that decision making, governance, and organizational alignment will happen organically.

      Band-aid solutions rarely have the desired effect, particularly in the long-term.

      Our solutions should likewise focus on the systemic/macro environment. We can do this via projects, products and services, but those don't always address the larger issues.

      If we take the work our business analysis currently does in defining needs and solutions, and elevate this to the strategic level, the results can be impactful.

      Many organizations would benefit from enhancing their business analysis maturity

      The often-overlooked strategic value of the role comes with maturing your practices.

      Only 18% of organizations have mature (optimized or established) business analysis practices.

      With that higher level of maturity comes increased levels of capability, efficiency, and effectiveness in delivering value to people, processes, and technology. Through such efforts, they're better equipped and able to connect the strategy of their organization to the projects, processes, and products they deliver.

      They shift focus from "figuring business analysis out" to truly unleashing its potential, with business analysts contributing in strategic and tactical ways.

      an image showing the following data: Optimized- 5; Established- 13; Improving- 37; Starting- 25; Ad hoc- 21

      (Adapted from PMI, 2017)

      Info-Tech Insight

      Business analysts are best suited to connect the strategic with the tactical, the systems, and the operations. They maintain the most objective lens regarding how people, process, and technology connect and relate, and the most skilled of them can remove bias and politics from their perspective.

      1.1.2 Discuss your disconnects between strategy and tactics

      30-60 minutes

        1. Gather the appropriate stakeholders to discuss their knowledge, experience, and perspectives regarding failures that resulted from disconnects between strategy and tactics.
        2. Have a team member facilitate the session.
        3. Brainstorm and document all shared thoughts and perspectives.
        4. Synthesize those thoughts and perspectives and record the results.
        5. Transfer the results to the Communicate the Case for Enterprise Business Analysis template.

      Input

      • Stakeholder knowledge and experience

      Output

      • A shared understanding and list of failures due to disconnects between strategy and tactics

      Materials

      • Whiteboard/Flip charts
      • Collaborative whiteboard
      • Communicate the Case for Enterprise Business Analysis template

      Participants

      • Business analyst(s)
      • Organizational business leaders
      • Any other relevant stakeholders

      Download the Communicate the Case for Enterprise Business Analysis template

      Defining enterprise business analysis

      Terms may change, but the function remains the same.

      Enterprise business analysis (sometimes referred to as strategy analysis) "…focuses on defining the future and transition states needed to address the business need, and the work required is defined both by that need and the scope of the solution space. It covers strategic thinking in business analysis, as well as the discovery or imagining of possible solutions that will enable the enterprise to create greater value for stakeholders and/or capture more value for itself."
      (Source: "Business Analysis Body of Knowledge," v3)

      Define the function of enterprise business analysis

      This is a competitive advantage for mature organizations.

      Organizations with high-performing business analysis programs experience an enhanced alignment between strategy and operations. This contributes to improved organizational performance. We see this in financial (69% vs. 45%) and strategic performance (66% vs. 21%), also organizational agility (40% vs. 14%) and management of operational projects (62% vs. 29%). (PMI, 2017)

      When comparing enterprise with traditional business analysis, we see stark differences in the size and scope of their view, where they operate, and the role they play in organizational decision making.

      Enterprise Traditional
      Decision making Guides and influences Executes
      Time horizon 2-10 years 0-2 years
      Focus Strategy, connecting the strategic to the operational Operational, optimizing how business is done, and keeping the lights on
      Domain

      Whole organization

      Broader marketplace

      Only stakeholder lines of business relevant to the current project, product or service
      Organizational Level Executive/Leadership Project

      (Adapted from Schulich School of Business)

      Info-Tech Insight

      Maturity can't be rushed. Build your enterprise business analysis program on a solid foundation of leading and consistent business analysis practices to secure buy-in and have a program that is sustainable in the long term.

      An image showing the percentages of high- and low- maturity organizations, for the following categories: Financial performance; Strategy implementation; Organizational agility; Management of projects.

      (Adapted from PMI, 2017)

      How enterprise business analysis is used to improve organizations

      The biggest sources of project failure include:

      • Wrong (or poor) requirements
      • Unrealistic (or incomplete) business case
      • Lack of appropriate governance and oversight
      • Poor implementation
      • Poor benefits management
      • Environmental changes

      Source: MindTools.com, 2023.

      Enterprise business analysis addresses these sources and more.

      It brings a holistic view of the organization, improving collaboration and decision making across the many lines of business, effectively breaking down silos.

      In addition to ensuring we're doing the right things, not just doing things right in the form of improved requirements and more accurate business cases, or ensuring return on investment (ROI) and monitoring the broader landscape, enterprise business analysis also supports:

      • Reduced rework and waste
      • Understanding and improving operations
      • Making well-informed decisions through improved objectivity/reduced bias
      • Identifying new opportunities for growth and expansion
      • Identifying and mitigating risk
      • Eliminating projects and initiatives that do not support organizational goals or objectives
      • A career-pathing option for business analysts

      Identify your pains and opportunities

      There are many considerations in enterprise business analysis.

      Pains, gains, threats, and opportunities can come at your organization from anywhere. Be it a new product launch, an international expansion, or a new competitor, it can be challenging to keep up.

      This is where an enterprise business analyst can be the most helpful.

      By keeping a pulse on the external and internal environments, they can support growth, manage risks, and view your organization through multiple lenses and perspectives to get a single, complete picture.

      External

      Internal

      Identifying competitive forces

      In the global environment

      Organizational strengths and weaknesses

      • Monitoring and maintaining your competitive advantage.
      • Understanding trends, risks and threats in your business domain, and how they affect your organization.
      • Benchmarking performance against like and unlike organizations, to realize where you stand and set a baseline for continuous improvement and business development.
      • Leveraging tools and techniques to scan the broader landscape on an ongoing basis. Using PESTLE analysis, they can monitor the political, economic, social, technological, legal, and environmental factors that impact when, where, how, and with who you conduct your business and IT operations.
      • Supporting alignment between a portfolio or program of projects and initiatives.
      • Improving alignment between the various lines of business, who often lack full visibility outside of their silo, and can find themselves clashing over time, resources, and attention from leaders.
      • Improving solutions and outcomes through objective option selection.

      1.2.1 Identify your pains and opportunities

      30-60 minutes

      1. As a group, generate a list of the current pains and opportunities facing your organization. You can focus on a particular type (competitive, market, or internal) or leave it open. You can also focus on pains or opportunities separately, or simultaneously.
      2. Have a team member facilitate the session.
      3. Record the results for the group to review, discuss, and prioritize.
        1. Discuss the impact and likelihood of each item. This can be formally ranked and quantified if there is data to support the item or leveraging the wisdom of the group.
        2. Prioritize the top three to five items of each type, as agreed by the group, and document the results.
      4. Transfer the results to the Communicate the Case for Enterprise Business Analysis template.

      Download the Communicate the Case for Enterprise Business Analysis template

      Input

      • Attendee knowledge
      • Supporting data, if available

      Output

      • A list of identified organizational pains and opportunities that has been prioritized by the group

      Materials

      • Whiteboard/Flip charts
      • Collaborative whiteboard
      • Communicate the Case for Enterprise Business Analysis template

      Participants

      • Business analyst(s)
      • Organizational business leaders
      • Any other relevant stakeholders

      Phase 2

      Prepare the foundations for your enterprise business analysis program

      Phase 1

      Phase 2

      1.1 Define enterprise business analysis

      1.2 Identify your pains and opportunities

      2.1 Set your vision

      2.2 Define your roadmap and next steps

      2.3 Complete your executive communications deck

      This phase will walk you through the following activities:

      • 2.1.1 Define your vision and goals
      • 2.1.2 Identify your enterprise business analysis inventory
      • 2.2.1 Now, Next, Later

      This phase involves the following participants:

      • Business analyst(s)
      • Organizational business leaders
      • Any other relevant stakeholders

      Set your vision

      Your vision becomes your "north star," guiding your journey and decisions.

      When thinking about a vision statement for enterprise business analysis, think about:

      • Who are we doing this for? Who will benefit?
      • What do our business partners need? What do our customers need?
      • What value do we provide them? How can we best support them?
      • Why is this special/different from how we usually do business?

      Always remember: Your goal is not your vision!

      Not knowing the difference will prevent you from both dreaming big and achieving your dream.

      Your vision represents where you want to go. It's what you want to do.

      Your goals represent how you want to achieve your vision.

      • They are a key element of operationalizing your vision.
      • Your strategy, initiatives, and features will align with one or more goals.

      Info-Tech Best Practice

      Your vision shouldn't be so far out that it doesn't feel real, nor so short term that it gets bogged down in details. Finding balance will take some trial and error and will be different depending on your organization.

      2.1.1 Define your vision and goals

      1-2 hours

      1. Gather the appropriate stakeholders to discuss their vision for enterprise business analysis. It should address the questions used in framing your vision statement.
      2. Have a team member facilitate the session.
      3. Review your current organizational vision and goals.
      4. Discuss and document all shared thoughts and perspectives on how enterprise business analysis can align with the organizational vision.
      5. Synthesize those thoughts and perspectives to create a vision statement.
      6. Transfer the results to the Communicate the Case for Enterprise Business Analysis template.

      Download the Communicate the Case for Enterprise Business Analysis template

      Input

      • Stakeholder vision, knowledge, and experience
      • Current organizational vision and goals

      Output

      • A documented vision and goals for your enterprise business analysis program

      Materials

      • Whiteboard/Flip charts
      • Collaborative whiteboard
      • Communicate the Case for Enterprise Business Analysis template

      Participants

      • Business analyst(s)
      • Organizational business leaders
      • Any other relevant stakeholders

      Components of successful enterprise business analysis programs

      Ensure you're off to the best start by examining where you are and where you want to go.

      Training

      • Do the current team members have the right level of training?
      • Can we easily obtain training to close any gaps?

      Competencies and capabilities

      • Do our business analysts have the right skills, attributes, and behaviors to be successful?

      Structure and alignment

      • Would the organizational culture support enterprise business analysis (EBA)?
      • How might we structure the EBA unit to maximize effectiveness?
      • How can we best support the organization's goals and objectives?

      Methods and processes

      • How do we plan on managing the work to be done?
      • Can we define our processes and workflows?

      Tools, techniques, and templates

      • Do we have the most effective tools, techniques, and templates?

      Governance

      • How will we make decisions?
      • How will the program be managed?

      2.1.2 Identify your enterprise business analysis inventory

      30-60 minutes

      1. Gather the appropriate stakeholders to discuss the current business analysis assets, which could be leveraged for enterprise business analysis. This includes people, processes, and technologies which cover skills, knowledge, resources, experience, knowledge, and competencies. Focus on what the organization currently has, and not what it needs.
      2. Have a team member facilitate the session.
      3. Record the results for the group to review and discuss.
      4. Transfer the results to the Communicate the Case for Enterprise Business Analysis template.

      Download the Communicate the Case for Enterprise Business Analysis template

      Input

      • Your current business analysis assets and resources Stakeholder knowledge and experience

      Output

      • A list of assets and resources to enable enterprise business analysis

      Materials

      • Whiteboard/Flip charts
      • Collaborative whiteboard
      • Communicate the Case for Enterprise Business Analysis template

      Participants

      • Business analyst(s)
      • Organizational business leaders
      • Any other relevant stakeholders

      Define your roadmap and next steps

      What do we have? What do we need?

      From completing the enterprise business analysis inventory, you will have a comprehensive list of all available assets.

      The next question is, how can this be leveraged to start building for the future?

      To operationalize enterprise business analysis, consider:

      • What do we still need to do?
      • How important are the identified gaps? Can we still operate?
      • What decisions do we need to make?
      • What stakeholders do we need to involve? Have we engaged them all?

      Lay out your roadmap

      Taking steps to mature your enterprise business analysis practice.

      The Now, Next, Later technique is a method for prioritizing and planning improvements or tasks. This involves breaking down a list of tasks or improvements into three categories:

      • Now tasks are those that must be completed immediately. These tasks are usually urgent or critical, and they must be completed to keep the project or organization running smoothly.
      • Next tasks are those that should be completed soon. These tasks are not as critical as Now tasks, but they are still important and should be tackled relatively soon.
      • Later tasks are those that can be completed later. These tasks are less critical and can be deferred without causing major problems.

      By using this technique, you can prioritize and plan the most important tasks, while allowing the flexibility to adjust as necessary.

      This technique also helps clarify what must be done first vs. what can wait. This prioritizes the most important things while keeping track of what must be done next, maintaining a smooth development/improvement process.

      An image of the now - next - later roadmap technique.

      2.2.1 Now, Next, Later

      1-2 hours

      1. Use the list of items created in 2.1.2 (Identify your enterprise business analysis inventory). Add any you feel are missing during this exercise.
      2. Have a team member facilitate the session.
      3. In the Communicate the Case for Enterprise Business Analysis template, categorize these items according to Now, Next and Later, where:
        1. Now = Critically important items that may require little effort to complete. These must be done within the next six months.
        2. Next = Important items that may require more effort or depend on other factors. These must be done in six to twelve months.
        3. Later = Less important items that may require significant effort to complete. These must be done at some point within twelve months.

      Ultimately, the choice of priority and timing is yours. Recognize that items may change categories as new information arises.

      Download the Communicate the Case for Enterprise Business Analysis template

      Input

      • Your enterprise business analysis inventory and gaps
      • Stakeholder knowledge and experience

      Output

      • A prioritized list of items to enable enterprise business analysis

      Materials

      • Whiteboard/Flip charts
      • Collaborative whiteboard
      • Communicate the Case for Enterprise Business Analysis template

      Participants

      • Business analyst(s)
      • Organizational business leaders
      • Any other relevant stakeholders

      2.3 Complete your executive communication deck

      Use the results of your completed exercises to build your executive communication slide deck, to make the case for enterprise business analysis

      Slide Header Associated Exercise Rationale
      Pains and opportunities

      1.1.2 Discuss your disconnects between strategy and tactics

      1.2.1 Identify your pains and opportunities

      This helps build the case for enterprise business analysis (EBA), leveraging the existing pains felt in the organization. This will draw the connection for your stakeholders.
      Our vision and goals 2.1.1 Define your vision and goals Defines where you want to go and what effort will be required.
      What is enterprise business analysis

      1.1.1 How is BA being used in our organization today?
      Pre-populated supporting content

      Defines the discipline of EBA and how it can support and mature your organization.
      Expected benefits Pre-populated supporting content What's in it for us? This section helps answer that question. What benefits can we expect, and is this worth the investment of time and effort?
      Making this a reality 2.1.2 Identify your EBA inventory Identifies what the organization presently has that makes the effort easier. It doesn't feel as daunting if there are existing people, processes, and technologies in place and in use today.
      Next steps 2.2.1 Now, Next, Later A prioritized list of action items. This will demonstrate the work involved, but broken down over time, into smaller, more manageable pieces.

      Track metrics

      Track metrics throughout the project to keep stakeholders informed.

      As the project nears completion:

      1. You will have better-aligned and more satisfied stakeholders.
      2. You will see fewer projects and initiatives that don't align with the organizational goals and objectives.
      3. There will be a reduction in costs attributed to misaligned projects and initiatives (as mentioned in #2) and the opportunity to allocate valuable time and resources to other, higher-value work.
      Metric Description Target Improvement/Reduction
      Improved stakeholder satisfaction Lines of business and previously siloed departments/divisions will be more satisfied with time spent on solution involvement and outcomes. 10% year 1, 20% year 2
      Reduction in misaligned/non-priority project work Reduction in projects, products, and services with no clear alignment to organizational goals. With that, resource costs can be allocated to other, higher-value solutions. 10% year 1, 25% year 2
      Improved delivery agility/lead time With improved alignment comes reduced conflict and political infighting. As a result, the velocity of solution delivery will increase. 10%

      Bibliography

      Bossert, Oliver and Björn Münstermann. "Business's 'It's not my problem' IT problem." McKinsey Digital. 30 March, 2023.
      Brule, Glenn R. "The Lay of the Land: Enterprise Analysis." Modern Analyst.
      "Business Analysis: Leading Organizations to Better Outcomes." Project Management Institute (PMI), 2017
      Corporate Finance Institute. "Strategic Analysis." Updated 14 March 2023
      IAG Consulting. Business Analysis Benchmark Report, 2009.
      International Institute of Business Analysis. "A Guide to the Business Analysis Body of Knowledge" (BABOK Guide) version 3.
      Mirabelli, Vincent. "Business Analysis Foundations: Enterprise" LinkedIn Learning, February 2022.
      - - "Essential Techniques in Enterprise Analysis" LinkedIn Learning, September 2022.
      - - "The Essentials of Enterprise Analysis" Love the Process Academy. May 2020.
      - - "The Value of Enterprise Analysis." VincentMirabelli.com
      Praslova, Ludmila N. "Today's Most Critical Workplace Challenges Are About Systems." Harvard Business Review. 10 January 2023.
      Pratt, Mary K. and Sarah K. White. "What is a business analyst? A key role for business-IT efficiency." CIO. 17 April, 2019.
      Project Management Institute. "Business Analysis: Leading Organizations to Better Outcomes." October 2017.
      Sali, Sema. "The Importance of Strategic Business Analysis in Successful Project Outcomes." International Institute of Business Analysis. 26 May 2022.
      - - "What Does Enterprise Analysis Look Like? Objectives and Key Results." International Institute of Business Analysis. 02 June 2022.
      Shaker, Kareem. "Why do projects really fail?" Project Management Institute, PM Network. July 2010.
      "Strategic Analysis: Definition, Types and Benefits" Voxco. 25 February 2022.
      "The Difference Between Enterprise Analysis and Business Analysis." Schulich School of Business, Executive Education Center. 24 September 2018 (Updated June 2022)
      "Why Do Projects Fail: Learning How to Avoid Project Failure." MindTools.com. Accessed 24 April 2023.

      Perform an Agile Skills Assessment

      • Buy Link or Shortcode: {j2store}153|cart{/j2store}
      • member rating overall impact: 10.0/10 Overall Impact
      • member rating average dollars saved: $32,166 Average $ Saved
      • member rating average days saved: 15 Average Days Saved
      • Parent Category Name: Development
      • Parent Category Link: /development
      • Your organization is trying to address the key delivery challenges you are facing. Early experiments with Agile are starting to bear fruit.
      • As part of maturing your Agile practice, you want to evaluate if you have the right skills and capabilities in place.

      Our Advice

      Critical Insight

      • Focusing on the non-technical skills can yield significant returns for your products, your team, and your organization. These skills are what should be considered as the real Agile skills.

      Impact and Result

      • Define the skills and values that are important to your organization to be successful at being Agile.
      • Put together a standard criterion for measurement of the attainment of given skills.
      • Define the roadmap and communication plan around your agile assessment.

      Perform an Agile Skills Assessment Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you should perform an agile skills assessment. review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Take stock of the Agile skills and values important to you

      Confirm the list of Agile skills that you wish to measure.

      • Perform an Agile Skills Assessment – Phase 1: Take Stock of the Agile Skills and Values Important to You
      • Agile Skills Assessment Tool
      • Agile Skills Assessment Tool Example

      2. Define an assessment method that works for you

      Define what it means to attain specific agile skills through a defined ascension path of proficiency levels, and standardized skill expectations.

      • Perform an Agile Skills Assessment – Phase 2: Define an Assessment Method That Works for You

      3. Plan to assess your team

      Determine the roll-out and communication plan that suits your organization.

      • Perform an Agile Skills Assessment – Phase 3: Plan to Assess Your Team
      • Agile Skills Assessment Communication and Roadmap Plan
      • Agile Skills Assessment Communication and Roadmap Plan Example
      [infographic]

      Workshop: Perform an Agile Skills Assessment

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Define Agile Skills and Maturity Levels

      The Purpose

      Learn about and define the Agile skills that are important to your organization.

      Define the different levels of attainment when it comes to your Agile skills.

      Define the standards on a per-role basis.

      Key Benefits Achieved

      Get a clear view of the Agile skills important into meet your Agile transformation goals in alignment with organizational objectives.

      Set a clear standard for what it means to meet your organizational standards for Agile skills.

      Activities

      1.1 Review and update the Agile skills relevant to your organization.

      1.2 Define your Agile proficiency levels to evaluate attainment of each skill.

      1.3 Define your Agile team roles.

      1.4 Define common experience levels for your Agile roles.

      1.5 Define the skill expectations for each Agile role.

      Outputs

      A list of Agile skills that are consistent with your Agile transformation

      A list of proficiency levels to be used during your Agile skills assessment

      A confirmed list of roles that you wish to measure on your Agile teams

      A list of experience levels common to Agile team roles (example: Junior, Intermediate, Senior)

      Define the skill expectations for each Agile role

      The Small Enterprise Guide to People and Resource Management

      • Buy Link or Shortcode: {j2store}602|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Train & Develop
      • Parent Category Link: /train-and-develop
      • 52% of small business owners agree that labor quality is their most important problem, and 76% of executives expect the talent market to get even more challenging.
      • The problem? You can't compete on salary, training budgets are slim, you need people skilled in all areas, and even one resignation represents a large part of your workforce.

      Our Advice

      Critical Insight

      • The usual, reactive approach to workforce management is risky:
        • Optimizing tactics helps you hire faster, train more, and negotiate better contracts.
        • But fulfilling needs as they arise costs more, has greater risk of failure, and leaves you unprepared for future needs.
      • In a small enterprise where every resource counts, in which one hire represents 10% of your workforce, it is essential to get it right.

      Impact and Result

      • Workforce planning helps you anticipate future needs.
      • More lead time means better decisions at lower cost.
      • Small Enterprises benefit most, since every resource counts.

      The Small Enterprise Guide to People and Resource Management Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. The Small Enterprise Guide to People and Resource Management Deck – Find out why workforce planning is critical for small enterprises.

      Use this storyboard to lay the foundation of people and resources management practices in your small enterprise IT department.

      • The Small Enterprise Guide to People and Resource Management – Phases 1-3

      2. Workforce Planning Workbook – Use the tool to successfully complete all of the activities required to define and estimate your workforce needs for the future.

      Use these concise exercises to analyze your department’s talent current and future needs and create a skill sourcing strategy to fill the gaps.

      • Workforce Planning Workbook for Small Enterprises

      3. Knowledge Transfer Tools – Use these templates to identify knowledge to be transferred.

      Work through an activity to discover key knowledge held by an employee and create a plan to transfer that knowledge to a successor.

      • IT Knowledge Identification Interview Guide Template
      • IT Knowledge Transfer Plan Template

      4. Development Planning Tools – Use these tools to determine priority development competencies.

      Assess employees’ development needs and draft a development plan that fits with key organizational priorities.

      • IT Competency Library
      • Leadership Competencies Workbook
      • IT Employee Career Development Workbook
      • Individual Competency Development Plan
      • Learning Methods Catalog for IT Employees

      Infographic

      Workshop: The Small Enterprise Guide to People and Resource Management

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Lay Your Foundations

      The Purpose

      Set project direction and analyze workforce needs.

      Key Benefits Achieved

      Planful needs analysis ensures future workforce supports organizational goals.

      Activities

      1.1 Set workforce planning goals and success metrics.

      1.2 Identify key roles and competency gaps.

      1.3 Conduct a risk analysis to identify future needs.

      1.4 Determine readiness of internal successors.

      Outputs

      Work with the leadership team to:

      Extract key business priorities.

      Set your goals.

      Assess workforce needs.

      2 Create Your Workforce Plan

      The Purpose

      Conduct a skill sourcing analysis, and determine competencies to develop internally.

      Key Benefits Achieved

      A careful analysis ensures skills are being sourced in the most efficient way, and internal development is highly aligned with organizational objectives.

      Activities

      2.1 Determine your skill sourcing route.

      2.2 Determine priority competencies for development.

      Outputs

      Create a workforce plan.

      2.Determine guidelines for employee development.

      3 Plan Knowledge Transfer

      The Purpose

      Discover knowledge to be transferred, and build a transfer plan.

      Key Benefits Achieved

      Ensure key knowledge is not lost in the event of a departure.

      Activities

      3.1 Discover knowledge to be transferred.

      3.2 Identify the optimal knowledge transfer methods.

      3.3 Create a knowledge transfer plan.

      Outputs

      Discover tacit and explicit knowledge.

      Create a knowledge transfer roadmap.

      4 Plan Employee Development

      The Purpose

      Create a development plan for all staff.

      Key Benefits Achieved

      A well-structured development plan helps engage and retain employees while driving organizational objectives.

      Activities

      4.1 Identify target competencies & draft development goals

      4.2 Select development activities and schedule check-ins.

      4.3 Build manager coaching skills.

      Outputs

      Assess employees.

      Prioritize development objectives.

      Plan development activities.

      Build management skills.

      Further reading

      The Small Enterprise Guide to People and Resource Management

      Quickly start getting the right people, with the right skills, at the right time

      Is this research right for you?

      Research Navigation

      Managing the people in your department is essential, whether you have three employees or 300. Depending on your available time, resources, and current workforce management maturity, you may choose to focus on the overall essentials, or dive deep into particular areas of talent management. Use the questions below to help guide you to the right Info-Tech resources that best align with your current needs.

      Question If you answered "no" If you answered "yes"

      Does your IT department have fewer than 15 employees, and is your organization's revenue less than $25 million (USD)?

      Review Info-Tech's archive of research for mid-sized and large enterprise clients.

      Follow the guidance in this blueprint.

      Does your organization require a more rigorous and customizable approach to workforce management?

      Follow the guidance in this blueprint.

      Review Info-Tech's archive of research for mid-sized and large enterprise clients.

      Analyst Perspective

      Workforce planning is even more important for small enterprises than large organizations.

      It can be tempting to think of workforce planning as a bureaucratic exercise reserved for the largest and most formal of organizations. But workforce planning is never more important than in small enterprises, where every individual accounts for a significant portion of your overall productivity.

      Without workforce planning, organizations find themselves in reactive mode, hiring new staff as the need arises. They often pay a premium for having to fill a position quickly or suffer productivity losses when a critical role goes unexpectedly vacant.

      A workforce plan helps you anticipate these challenges, come up with solutions to mitigate them, and allocate resources for the most impact, which means a greater return on your workforce investment in the long run.

      This blueprint will help you accomplish this quickly and efficiently. It will also provide you with the essential development and knowledge transfer tools to put your plan into action.

      This is a picture of Jane Kouptsova

      Jane Kouptsova
      Senior Research Analyst, CIO Advisory
      Info-Tech Research Group

      Executive Summary

      Your Challenge

      52% of small business owners agree that labor quality is their most important problem.1

      Almost half of all small businesses face difficulty due to staff turnover.

      76% of executives expect the talent market to get even more challenging.2

      Common Obstacles

      76% of executives expect workforce planning to become a top strategic priority for their organization.2

      But…

      30% of small businesses do not have a formal HR function.3

      Small business leaders are often left at a disadvantage for hiring and retaining the best talent, and they face even more difficulty due to a lack of support from HR.

      Small enterprises must solve the strategic workforce planning problem, but they cannot invest the same time or resources that large enterprises have at their disposal.

      Info-Tech's Approach

      A modular, lightweight approach to workforce planning and talent management, tailored to small enterprises

      Clear activities that guide your team to decisive action

      Founded on your IT strategy, ensuring you have not just good people, but the right people

      Concise yet comprehensive, covering the entire workforce lifecycle from competency planning to development to succession planning and reskilling

      Info-Tech Insight

      Every resource counts. When one hire represents 10% of your workforce, it is essential to get it right.

      1CNBC & SurveyMonkey. 2ADP. 3Clutch.

      Labor quality is small enterprise's biggest challenge

      The key to solving it is strategic workforce planning

      Strategic workforce planning (SWP) is a systematic process designed to identify and address gaps in today's workforce, including pinpointing the human capital needs of the future.

      Linking workforce planning with strategic planning ensures that you have the right people in the right positions, in the right places, at the right time, with the knowledge, skills, and attributes to deliver on strategic business goals.

      SWP helps you understand the makeup of your current workforce and how well prepared it is or isn't (as the case may be) to meet future IT requirements. By identifying capability gaps early, CIOs can prepare to train or develop current staff and minimize the need for severance payouts and hiring costs, while providing clear career paths to retain high performers.

      52%

      of small business owners agree that labor quality is their most important problem.1

      30%

      30% of small businesses have no formal HR function.2

      76%

      of senior leaders expect workforce planning to become the top strategic challenge for their organization.3

      1CNBC & SurveyMonkey. 2Clutch. 3ADP.

      Workforce planning matters more for small enterprises

      You know that staffing mistakes can cost your department dearly. But did you know the costs are greater for small enterprises?

      The price of losing an individual goes beyond the cost of hiring a replacement, which can range from 0.5 to 2 times that employee's salary (Gallup, 2019). Additional costs include loss of productivity, business knowledge, and team morale.

      This is a major challenge for large organizations, but the threat is even greater for small enterprises, where a single individual accounts for a large proportion of IT's productivity. Losing one of a team of 10 means 10% of your total output. If that individual was solely responsible for a critical function, your department now faces a significant gap in its capabilities. And the effect on morale is much greater when everyone is on the same close-knit team.

      And the threat continues when the staffing error causes you not to lose a valuable employee, but to hire the wrong one instead. When a single individual makes up a large percentage of your workforce, as happens on small teams, the effects of talent management errors are magnified.

      A group of 100 triangles is shown above a group of 10 triangles. In each group, one triangle is colored orange, and the rest are colored blue.

      Info-Tech Insight

      One bad hire on a team of 100 is a problem. One bad hire on a team of 10 is a disaster.

      This is an image of Info-Tech's small enterprise guide o people and resource management.

      Blueprint pre-step: Determine your starting point

      People and Resource management is essential for any organization. But depending on your needs, you may want to start at different stages of the process. Use this slide as a quick reference for how the activities in this blueprint fit together, how they relate to other workforce management resources, and the best starting point for you.

      Your IT strategy is an essential input to your workforce plan. It defines your destination, while your workforce is the vessel that carries you there. Ensure you have at least an informal strategy for your department before making major workforce changes, or review Info-Tech's guidance on IT strategy.

      This blueprint covers the parts of workforce management that occur to some extent in every organization:

      • Workforce planning
      • Knowledge transfer
      • Development planning

      You may additionally want to seek guidance on contract and vendor management, if you outsource some part of your workload outside your core IT staff.

      Track metrics

      Consider these example metrics for tracking people and resource management success

      Project Outcome Metric Baseline Target
      Reduced training costs Average cost of training (including facilitation, materials, facilities, equipment, etc.) per IT employee
      Reduced number of overtime hours worked Average hours billed at overtime rate per IT employee
      Reduced length of hiring period Average number of days between job ad posting and new hire start date
      Reduced number of project cancellations due to lack of capacity Total of number of projects cancelled per year
      Increased number of projects completed per year (project throughput) Total number of project completions per year
      Greater net recruitment rate Number of new recruits/Number of terminations and departures
      Reduced turnover and replacement costs Total costs associated with replacing an employee, including position coverage cost, training costs, and productivity loss
      Reduced voluntary turnover rate Number of voluntary departures/Total number of employees
      Reduced productivity loss following a departure or termination Team or role performance metrics (varies by role) vs. one year ago

      Info-Tech offers various levels of support to best suit your needs

      DIY Toolkit

      “Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful.”

      Guided Implementation

      “Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track.”

      Workshop

      “We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place.”

      Consulting

      “Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project.”

      Diagnostics and consistent frameworks used throughout all four options

      Guided Implementation

      What does a typical GI on this topic look like?

      Phase 1 Phase 2 Phase 3

      Call #1:

      Scope requirements, objectives, and your specific challenges.

      Call #2: Assess current workforce needs.

      Call #4: Determine skill sourcing route.

      Call #6:

      Identify knowledge to be transferred.

      Call #8: Draft development goals and select activities.

      Call #3: Explore internal successor readiness.

      Call #5:Set priority development competencies.

      Call #7: Create a knowledge transfer plan.

      Call #9: Build managers' coaching & feedback skills.

      A Guided Implementation (GI) is a series of calls with an Info-Tech analyst to help implement our best practices in your organization.

      A typical GI is between 4 to 6 calls over the course of 3 to 4 months.

      Workshop Overview

      Contact your account representative for more information.
      workshops@infotech.com 1-888-670-8889

      Day 1

      Day 2

      Day 3

      Day 4

      Day 5

      1.Lay Your Foundations 2. Create Your Workforce Plan 3. Plan Knowledge Transfer 3. Plan Employee Development Next Steps and Wrap-Up (offsite)
      Activities

      1.1 Set workforce planning goals and success metrics

      1.2 Identify key roles and competency gaps

      1.3 Conduct a risk analysis to identify future needs

      1.4 Determine readiness of internal successors

      1.5 Determine your skill sourcing route

      1.6 Determine priority competencies for development

      3.1 Discover knowledge to be transferred

      3.2 Identify the optimal knowledge transfer methods

      3.3 Create a knowledge transfer plan

      4.1 Identify target competencies & draft development goals

      4.2 Select development activities and schedule check-ins

      4.3 Build manager coaching skills

      Outcomes

      Work with the leadership team to:

      1. Extract key business priorities
      2. Set your goals
      3. Assess workforce needs

      Work with the leadership team to:

      1. Create a workforce plan
      2. Determine guidelines for employee development

      Work with staff and managers to:

      1. Discover tacit and explicit knowledge
      2. Create a knowledge transfer roadmap

      Work with staff and managers to:

      1. Assess employees
      2. Prioritize development objectives
      3. Plan development activities
      4. Build management skills

      Info-Tech analysts complete:

      1. Workshop report
      2. Workforce plan record
      3. Action plan

      Workshop Overview

      Contact your account representative for more information.
      workshops@infotech.com 1-888-670-8889

      Each onsite day is structured with group working sessions from 9-11 a.m. and 1:30-3:30 p.m. and includes Open Analyst Timeslots, where our facilitators are available to expand on scheduled activities, capture and compile workshop results, or review additional components from our comprehensive approach.

      This is a calendar showing days 1-4, and times from 8am-5pm

      Phase 1

      Workforce Planning

      Workforce Planning

      Knowledge Transfer

      Development Planning

      Identify needs, goals, metrics, and skill gaps.

      Select a skill sourcing strategy.

      Discover critical knowledge.

      Select knowledge transfer methods.

      Identify priority competencies.

      Assess employees.

      Draft development goals.

      Provide coaching & feedback.

      The Small Enterprise Guide to People and Resource Management

      Phase Participants

      • Leadership team
      • Managers
      • Human resource partner (if applicable)

      Additional Resources

      Workforce Planning Workbook for Small Enterprises

      Phase pre-step: Gather resources and participants

      1. Ensure you have an up-to-date IT strategy. If you don't have a formal strategy in place, ensure you are aware of the main organizational objectives for the next 3-5 years. Connect with executive stakeholders if necessary to confirm this information.
        If you are not sure of the organizational direction for this time frame, we recommend you consult Info-Tech's material on IT strategy first, to ensure your workforce plan is fully positioned to deliver value to the organization.
      2. Consult with your IT team and gather any documentation pertaining to current roles and skills. Examples include an org chart, job descriptions, a list of current tasks performed/required, a list of company competencies, and a list of outsourced projects.
      3. Gather the right participants. Most of the decisions in this section will be made by senior leadership, but you will also need input from front-line managers. Ensure they are available on an as-needed basis. If your organization has an HR partner, it can also be helpful to involve them in your workforce planning process.

      Formal workforce planning benefits even small teams

      Strategic workforce planning (SWP) is a systematic process designed to identify and address gaps in your workforce today and plan for the human capital needs of the future.

      Your workforce plan is an extension of your IT strategy, ensuring that you have the right people in the right positions, in the right places, at the right time, with the knowledge, skills, and attributes to deliver on strategic business goals.

      SWP helps you understand the makeup of your current workforce and how well prepared it is or isn't (as the case may be) to meet future IT requirements. By identifying capability gaps early, CIOs can prepare to train or develop current staff and minimize the need for severance payouts and hiring costs, while providing clear career paths to retain high performers.

      The smaller the business, the more impact each individual's performance has on the overall success of the organization. When a given role is occupied by a single individual, the organization's performance in that function is determined wholly by one employee. Creating a workforce plan for a small team may seem excessive, but it ensures your organization is not unexpectedly hit with a critical competency gap.

      Right-size your workforce planning process to the size of your enterprise

      Small organizations are 2.2 times more likely to have effective workforce planning processes.1 Be mindful of the opportunities and risks for organizations of your size as you execute the project. How you build your workforce plan will not change drastically based on the size of your organization; however, the scope of your initiative, the size of your team, and the tactics you employ may vary.

      Small Organization

      Medium Organization

      Large Organization

      Project Opportunities

      • Project scope is much more manageable.
      • Communication and planning can be more manageable.
      • Fewer roles can clarify prioritization needs and promotability.
      • Project scope is more manageable.
      • Moderate budget for workforce planning initiatives is needed.
      • Communication and enforcement is easier.
      • Larger candidate pool to pull from.
      • Greater career path options for staff.
      • In-house expertise may be available

      Project Risks

      • Limited resources and time to execute the project.
      • In-house expertise is unlikely.
      • Competencies may be informal and not documented.
      • Limited overlap in responsibilities, resulting in fewer redundancies.
      • Limited staff with experience for the project.
      • Workforce planning may be a lower priority and difficult to generate buy-in for.
      • Requires more staff to manage workforce plan and execute initiatives.
      • Less collective knowledge on staff strengths may make career planning difficult.
      • Geographically dispersed business units make collaboration and communication difficult.

      1 McLean & Company Trends Report 2014

      1.1 Set project outcomes and success metrics

      1-3 hours

      1. As a group, brainstorm key pain points that the IT department experiences due to the lack of a workforce plan. Ask them to consider turnover, retention, training, and talent acquisition.
      2. Discuss any key themes that arise and brainstorm your desired project outcomes. Keep a record of these for future reference and to aid in stakeholder communication.
      3. Break into smaller groups (or if too small, continue as a single group):
        1. For each desired outcome, consider what metrics you could use to track progress. Keep your initial list of pain points in mind as you brainstorm metrics.
        2. Write each of the metric suggestions on a whiteboard and agree to track 3-5 metrics. Set targets for each metric. Consider the effort required to obtain and track the metric, as well as its reliability.
        3. Assign one individual for tracking the selected metrics. Following the meeting, that individual will be responsible for identifying the baseline and targets, and reporting on metrics progress.

      Input

      Output

      • List of workforce data available
      • List of workforce metrics to track the workforce plan's impact

      Materials

      Participants

      • Whiteboard/flip charts
      • Leadership team
      • Human resource partner (if applicable)

      1.2 Identify key roles and competency gaps

      1-3 hours

      1. As a group, identify all strategic, core, and supporting roles by reviewing the organizational chart:
        1. Strategic: What are the roles that must be filled by top performers and cannot be left vacant in order to meet strategic objectives?
        2. Core: What roles are important to drive operational excellence?
        3. Supporting: What roles are required for day-to-day work, but are low risk if the role is vacant for a period of time?
      2. Working individually or in small groups, have managers for each identified role define the level of competence required for the job. Consider factors such as:
        1. The difficulty or criticality of the tasks being performed
        2. The impact on job outcomes
        3. The impact on the performance of other employees
        4. The consequence of errors if the competency is not present
        5. How frequently the competency is used on the job
        6. Whether the competency is required when the job starts or can be learned or acquired on the job within the first six months
      3. Continue working individually and rate the level of proficiency of the current incumbent.
      4. As a group, review the assessment and make any adjustments.

      Record this information in the Workforce Planning Workbook for Small Enterprises.

      Download the Workforce Planning Workbook for Small Enterprises

      1.2 Identify key roles and competency gaps

      Input Output
      • Org chart, job descriptions, list of current tasks performed/required, list of company competencies
      • List of competency gaps for key roles
      Materials Participants
      • Leadership team
      • Managers

      Conduct a risk-of-departure analysis

      A risk-of-departure analysis helps you plan for future talent needs by identifying which employees are most likely to leave the organization (or their current role).

      A risk analysis takes into account two factors: an employee's risk for departure and the impact of departure:

      Employees are high risk for departure if they:

      • Have specialized or in-demand skills (tenured employees are more likely to have this than recent hires)
      • Are nearing retirement
      • Have expressed career aspirations that extend outside your organization
      • Have hit a career development ceiling at your organization
      • Are disengaged
      • Are actively job searching
      • Are facing performance issues or dismissal OR promotion into a new role

      Employees are low risk for departure if they:

      • Are a new hire or new to their role
      • Are highly engaged
      • Have high potential
      • Are 5-10 years out from retirement

      If you are not sure where an employee stands with respect to leaving the organization, consider having a development conversation with them. In the meantime, consider them at medium risk for departure.

      To estimate the impact of departure, consider:

      • The effect of losing the employee in the near- and medium-term, including:
        • Impact on the organization, department, unit/team and projects
        • The cost (in time, resources, and productivity loss) to replace the individual
        • The readiness of internal successors for the role

      1.3 Conduct a risk analysis to identify future needs

      1-3 hours

      Preparation: Your estimation of whether key employees are at risk of leaving the organization will depend on what you know of them objectively (skills, age), as well as what you learn from development conversations. Ensure you collect all relevant information prior to conducting this activity. You may need to speak with employees' direct managers beforehand or include them in the discussion.

      • As a group, list all your current employees, and using the previous slide for guidance, rank them on two parameters: risk of departure and impact of departure, on a scale of low to high. Record your conclusions in a chart like the one on the right. (For a more in-depth risk assessment, use the "Risk Assessment Results" tab of the Key Roles Succession Planning Tool.)
      • Employees that fall in the "Mitigate" quadrant represent key at-risk roles with at least moderate risk and moderate impact. These are your succession planning priorities. Add these roles to your list of key roles and competency gaps, and include them in your workforce planning analysis.
      • Employees that fall in the "Manage" quadrants represent secondary priorities, which should be looked at if there is capacity after considering the "Mitigate" roles.

      Record this information in the Workforce Planning Workbook for Small Enterprises.

      This is an image of the Risk analysis for risk of departure to importance of departure.

      Info-Tech Insight

      Don't be afraid to rank most or all your staff as "high impact of departure." In a small enterprise, every player counts, and you must plan accordingly.

      1.3 Conduct a risk analysis to identify future needs

      Input Output
      • Employee data on competencies, skills, certifications, and performance. Input from managers from informal development conversations.
      • A list of first- and second-priority at-risk roles to carry forward into a succession planning analysis
      Materials Participants
      • Leadership team
      • Managers

      Determine your skill sourcing route

      The characteristics of need steer hiring managers to a preferred choice, while the marketplace analysis will tell you the feasibility of each option.

      Sourcing Options

      Preferred Options

      Final Choice

      four blue circles

      A right facing arrow

      Two blue circles A right facing arrow One blue circle
      State of the Marketplace

      State of the Marketplace

      Urgency: How soon do we need this skill? What is the required time-to-value?

      Criticality: How critical, i.e. core to business goals, are the services or systems that this skill will support?

      Novelty: Is this skill brand new to our workforce?

      Availability: How often, and at what hours, will the skill be needed?

      Durability: For how long will this skill be needed? Just once, or indefinitely for regular operations?

      Scarcity: How popular or desirable is this skill? Do we have a large enough talent pool to draw from? What competition are we facing for top talent?

      Cost: How much will it cost to hire vs. contract vs. outsource vs. train this skill?

      Preparedness: Do we have internal resources available to cultivate this skill in house?

      1.4 Determine your skill sourcing route

      1-3 hours

      1. Identify the preferred sourcing method as a group, starting with the most critical or urgent skill need on your list. Use the characteristics of need to guide your discussion. If more than one option seems adequate, carry several over to the next step.
      2. Consider the marketplace factors applicable to the skill in question and use these to narrow down to one final sourcing decision.
        1. If it is not clear whether a suitable internal candidate is available or ready, refer to the next activity for a readiness assessment.
      3. Be sure to document the rationale supporting your decision. This will ensure the decision can be clearly communicated to any stakeholders, and that you can review on your decision-making process down the line.

      Record this information in the Workforce Planning Workbook for Small Enterprises.

      Info-Tech Insight

      Consider developing a pool of successors instead of pinning your hopes on just one person. A single pool of successors can be developed for either one key role that has specialized requirements or even multiple key roles that have generic requirements.

      Input

      Output

      • List of current and upcoming skill gaps
      • A sourcing decision for each skill

      Materials

      Participants

      • Leadership team
      • Human resource partner (if applicable)

      1.5 Determine readiness of internal successors

      1-3 hours

      1. As a group, and ensuring you include the candidates' direct managers, identify potential successors for the first role on your list.
      2. Ask how effectively the potential successor would serve in the role today. Review the competencies for the key role in terms of:
        1. Relationship-building skills
        2. Business skills
        3. Technical skills
        4. Industry-specific skills or knowledge
      3. Determine what competencies the succession candidate currently has and what must be learned. Be sure you know whether the candidate is open to a career change. Don't assume – if this is not clear, have a development conversation to ensure everyone is on the same page.
      4. Finally, determine how difficult it will be for the successor to acquire missing skills or knowledge, whether the resources are available to provide the required development, and how long it will take to provide it.
      5. As a group, decide whether training an internal successor is a viable option for the role in question, considering the successor's readiness and the characteristics of need for the role. If a clear successor is not readily apparent, consider:
        1. If the development of the successor can be fast-tracked, or if some requirements can be deprioritized and the successor provided with temporary support from other employees.
        2. If the role in question is being discussed because the current incumbent is preparing to leave, consider negotiating an arrangement that extends the incumbent's employment tenure.
      6. Record the decision and repeat for the next role on your list.

      Info-Tech Insight

      A readiness assessment helps to define not just development needs, but also any risks around the organization's ability to fill a key role.

      Input

      Output

      • List of roles for which you are considering training internally
      • Job descriptions and competency requirements for the roles
      • List of roles for which internal successors are a viable option

      Materials

      Participants

      • Leadership team
      • Candidates' direct managers, if applicable

      Use alternative work arrangements to gain time to prepare successors

      Alternative work arrangements are critical tools that employers can use to achieve a mutually beneficial solution that mitigates the risk of loss associated with key roles.

      Alternative work arrangements not only support employees who want to keep working, but more importantly, they allow the business to retain employees that are needed in key roles who are departure risks due to retirement.

      Viewing retirement as a gradual process can help you slow down skill loss in your organization and ensure you have sufficient time to train successors. Retiring workers are becoming increasingly open to alternative work arrangements. Among employed workers aged 50-75, more than half planned to continue working part-time after retirement.
      Source: Statistics Canada.

      Flexible work options are the most used form of alternative work arrangement

      A bar graph showing the percent of organizations who implemented alternate work arrangement, for Flexible work options; Contract based work; Part time roles; Graduated retirement programs; Part year jobs or job sharing; Increased PTO for employees over a certain age.

      Source: McLean & Company, N=44

      Choose the alternative work arrangement that works best for you and the employee

      Alternative Work Arrangement Description Ideal Use Caveats
      Flexible work options Employees work the same number of hours but have flexibility in when and where they work (e.g. from home, evenings). Employees who work fairly independently with no or few direct reports. Employee may become isolated or disconnected, impeding knowledge transfer methods that require interaction or one-on-one time.
      Contract-based work Working for a defined period of time on a specific project on a non-salaried or non-wage basis. Project-oriented work that requires specialized knowledge or skills. Available work may be sporadic or specific projects more intensive than the employee wants. Knowledge transfer must be built into the contractual arrangement.
      Part-time roles Half days or a certain number of days per week; indefinite with no end date in mind. Employees whose roles can be readily narrowed and upon whom people and critical processes are not dependent. It may be difficult to break a traditionally full-time job down into a part-time role given the size and nature of associated tasks.
      Graduated retirement Retiring employee has a set retirement date, gradually reducing hours worked per week over time. Roles where a successor has been identified and is available to work alongside the incumbent in an overlapping capacity while he or she learns. The role may only require a single FTE, and the organization may not be able to afford the amount of redundancy inherent in this arrangement.

      Choose the alternative work arrangement that works best for you and the employee

      Alternative Work Arrangement Description Ideal Use Caveats
      Part-year jobs or job sharing Working part of the year and having the rest of the year off, unpaid. Project-oriented work where ongoing external relationships do not need to be maintained. The employee is unavailable for knowledge transfer activities for a large portion of the year. Another risk is that the employee may opt not to return at the end of the extended time off with little notice.
      Increased paid time off Additional vacation days upon reaching a certain age. Best used as recognition or reward for long-term service. This may be a particularly useful retention incentive in organizations that do not offer pension plans. The company may not be able to financially afford to pay for such extensive time off. If the role incumbent is the only one in the role, this may mean crucial work is not being done.
      Altered roles Concentration of a job description on fewer tasks that allows the employee to focus on his or her specific expertise. Roles where a successor has been identified and is available to work alongside the incumbent, with the incumbent's new role highly focused on mentoring. The role may only require a single FTE, and the organization may not be able to afford the amount of redundancy inherent in this arrangement.

      Phase 2

      Knowledge Transfer

      Workforce Planning

      Knowledge Transfer

      Development Planning

      Identify needs, goals, metrics, and skill gaps.

      Select a skill sourcing strategy.

      Discover critical knowledge.

      Select knowledge transfer methods.

      Identify priority competencies.

      Assess employees.

      Draft development goals.

      Provide coaching & feedback.

      The Small Enterprise Guide to People and Resource Management

      Phase Participants

      • Leadership/management team
      • Incumbent & successor

      Additional Resources

      IT Knowledge Identification Interview Guide Template

      Knowledge Transfer Plan Template

      Determine your skill sourcing route

      Knowledge transfer plans have three key components that you need to complete for each knowledge source:

      Define what knowledge needs to be transferred

      Each knowledge source has unique information which needs to be transferred. Chances are you don't know what you don't know. The first step is therefore to interview knowledge sources to find out.

      Identify the knowledge receiver

      Depending on who the information is going to, the knowledge transfer tactic you employ will differ. Before deciding on the knowledge receiver and tactic, consider three key factors:

      • How will this knowledge be used in the future?
      • What is the next career step for the knowledge receiver?
      • Are the receiver and the source going to be in the same location?

      Identify which knowledge transfer tactics you will use for each knowledge asset

      Not all tactics are good in every situation. Always keep the "knowledge type" (information, process, skills, and expertise), knowledge sources' engagement level, and the knowledge receiver in mind as you select tactics.

      Don't miss tacit knowledge

      There are two basic types of knowledge: "explicit" and "tacit." Ensure you capture both to get a well-rounded overview of the role.

      Explicit Tacit
      • "What knowledge" – knowledge can be articulated, codified, and easily communicated.
      • Easily explained and captured – documents, memos, speeches, books, manuals, process diagrams, facts, etc.
      • Learn through reading or being told.
      • "How knowledge" – intangible knowledge from an individual's experience that is more from the process of learning, understanding, and applying information (insights, judgments, and intuition).
      • Hard to verbalize, and difficult to capture and quantify.
      • Learn through observation, imitation, and practice.

      Types of explicit knowledge

      Types of tacit knowledge

      Information Process Skills Expertise

      Specialized technical knowledge.

      Unique design capabilities/methods/models.

      Legacy systems, details, passwords.

      Special formulas/algorithms/ techniques/contacts.

      • Specialized research & development processes.
      • Proprietary production processes.
      • Decision-making processes.
      • Legacy systems.
      • Variations from documented processes.
      • Techniques for executing on processes.
      • Relationship management.
      • Competencies built through deliberate practice enabling someone to act effectively.
      • Company history and values.
      • Relationships with key stakeholders.
      • Tips and tricks.
      • Competitor history and differentiators.

      e.g. Knowing the lyrics to a song, building a bike, knowing the alphabet, watching a YouTube video on karate.

      e.g. Playing the piano, riding a bike, reading or speaking a language, earning a black belt in karate.

      Embed your knowledge transfer methods into day-to-day practice

      Multiple methods should be used to transfer as much of a person's knowledge as possible, and mentoring should always be one of them. Select your method according to the following criteria:

      Info-Tech Insight

      The more integrated knowledge transfer is in day-to-day activities, the more likely it is to be successful, and the lower the time cost. This is because real learning is happening at the same time real work is being accomplished.

      Type of Knowledge

      • Tacit knowledge transfer methods are often informal and interactive:
        • Mentoring
        • Multi-generational work teams
        • Networks and communities
        • Job shadowing
      • Explicit knowledge transfer methods tend to be more formal and one way:
        • Formal documentation of processes and best practices
        • Self-published knowledge bases
        • Formal training sessions
        • Formal interviews

      Incumbent's Preference/Successor's Preference

      Ensure you consult the employees, and their direct manager, on the way they are best prepared to teach and learn. Some examples of preferences include:

      1. Prefer traditional classroom learning, augmented with participation, critical reflection, and feedback.
      2. May get bored during formal training sessions and retain more during job shadowing.
      3. Prefer to be self-directed or self-paced, and highly receptive to e-learning and media.
      4. Prefer informal, incidental learning, tend to go immediately to technology or direct access to people. May have a short attention span and be motivated by instant results.
      5. May be uncomfortable with blogs and wikis, but comfortable with SharePoint.

      Cost

      Consider costs beyond the monetary. Some methods require an investment in time (e.g. mentoring), while others require an investment in technology (e.g. knowledge bases).

      The good news is that many supporting technologies may already exist in your organization or can be acquired for free.

      Methods that cost time may be difficult to get underway since employees may feel they don't have the time or must change the way they work.

      2.1 Create a knowledge transfer plan

      1-3 hours

      1. Working together with the current incumbent, brainstorm the key information pertaining to the role that you want to pass on to the successor. Use the IT Knowledge Identification Interview Guide Template to ensure you don't miss anything.
        • Consider key knowledge areas, including:
          • Specialized technical knowledge.
          • Specialized research and development processes.
          • Unique design capabilities/methods/models.
          • Special formulas/algorithms/techniques.
          • Proprietary production processes.
          • Decision-making criteria.
          • Innovative sales methods.
          • Knowledge about key customers.
          • Relationships with key stakeholders.
          • Company history and values.
        • Ask questions of both sources and receivers of knowledge to help determine the best knowledge transfer methods to use.
          • What is the nature of the knowledge? Explicit or tacit?
          • Why is it important to transfer?
          • How will the knowledge be used?
          • What knowledge is critical for success?
          • How will the users find and access it?
          • How will it be maintained and remain relevant and usable?
          • What are the existing knowledge pathways or networks connecting sources to recipients?
      2. Once the knowledge has been identified, use the information on the following slides to decide on the most appropriate methods. Be sure to consult the incumbent and successor on their preferences.
      3. Prioritize your list of knowledge transfer activities. It's important not to try to do too much too quickly. Focus on some quick wins and leverage the success of these initiatives to drive the project forward. Follow these steps as a guide:
        1. Take an inventory of all the tactics and techniques which you plan to employ. Eliminate redundancies where possible.
        2. Start your implementation with your highest risk role or knowledge item, using explicit knowledge transfer tactics. Interviews, use cases, and process mapping will give you some quick wins and will help gain momentum for the project.
        3. Then move forward to other tactics, the majority of which will require training and process design. Pick 1-2 other key tactics you would like to employ and build those out. For tactics that require resources or monetary investment, start with those that can be reused for multiple roles.

      Record your plan in the IT Knowledge Transfer Plan Template.

      Download the IT Knowledge Identification Interview Guide Template

      Download the Knowledge Transfer Plan Template

      Info-Tech Insight

      Wherever possible, ask employees about their personal learning styles. It's likely that a collaborative compromise will have to be struck for knowledge transfer to work well.

      2.1 Create a knowledge transfer plan

      Input

      Output

      • List of roles for which you need to transfer knowledge
      • Prioritized list of knowledge items and chosen transfer method

      Materials

      Participants

      • Leadership team
      • Incumbent
      • Successor

      Not every transfer method is effective for every type of knowledge

      Knowledge Type
      Tactic Explicit Tacit
      Information Process Skills Expertise
      Interviews Very Strong Strong Strong Strong
      Process Mapping Medium Very Strong Very Weak Very Weak
      Use Cases Medium Very Strong Very Weak Very Weak
      Job Shadow Very Weak Medium Very Strong Very Strong
      Peer Assist Strong Medium Very Strong Very Strong
      Action Review Medium Medium Strong Strong
      Mentoring Weak Weak Strong Very Strong
      Transition Workshop Strong Strong Strong Weak
      Storytelling Weak Weak Strong Very Strong
      Job Share Weak Weak Very Strong Very Strong
      Communities of Practice Strong Weak Very Strong Very Strong

      This table shows the relative strengths and weaknesses of each knowledge transfer tactic compared against four different knowledge types.

      Not all techniques are effective for all types of knowledge; it is important to use a healthy mixture of techniques to optimize effectiveness.

      Employees' engagement can impact knowledge transfer effectiveness

      Level of Engagement
      Tactic Disengaged/ Indifferent Almost Engaged - Engaged
      Interviews Yes Yes
      Process Mapping Yes Yes
      Use Cases Yes Yes
      Job Shadow No Yes
      Peer Assist Yes Yes
      Action Review Yes Yes
      Mentoring No Yes
      Transition Workshop Yes Yes
      Storytelling No Yes
      Job Share Maybe Yes
      Communities of Practice Maybe Yes

      When considering which tactics to employ, it's important to consider the knowledge holder's level of engagement. Employees who you would identify as being disengaged may not make good candidates for job shadowing, mentoring, or other tactics where they are required to do additional work or are asked to influence others.

      Knowledge transfer can be controversial for all employees as it can cause feelings of job insecurity. It's essential that motivations for knowledge transfer are communicated effectively.

      Pay particular attention to your communication style with disengaged and indifferent employees, communicate frequently, and tie communication back to what's in it for them.

      Putting disengaged employees in a position where they are mentoring others can be a risk, as their negativity could influence others not to participate, or it could negate the work you're doing to create a positive knowledge sharing culture.

      Employees' engagement can impact knowledge transfer effectiveness

      Effort by Stakeholder

      Tactic

      Business Analyst

      IT Manager

      Knowledge Holder

      Knowledge Receiver

      Interviews

      These tactics require the least amount of effort, especially for organizations that are already using these tactics for a traditional requirements gathering process.

      Medium

      N/A

      Low

      Low

      Process Mapping

      Medium

      N/A

      Low

      Low

      Use Cases

      Medium

      N/A

      Low

      Low

      Job Shadow

      Medium

      Medium

      Medium

      Medium

      Peer Assist

      Medium

      Medium

      Medium

      Medium

      Action Review

      These tactics generally require more involvement from IT management and the BA in tandem for preparation. They will also require ongoing effort for all stakeholders. It's important to gain stakeholder buy-in as it is key for success.

      Low

      Medium

      Medium

      Low

      Mentoring

      Medium

      High

      High

      Medium

      Transition Workshop

      Medium

      Low

      Medium

      Low

      Storytelling

      Medium

      Medium

      Low

      Low

      Job Share

      Medium

      High

      Medium

      Medium

      Communities of Practice

      High

      Medium

      Medium

      Medium

      Phase 3

      Development Planning

      Workforce Planning

      Knowledge Transfer

      Development Planning

      Identify needs, goals, metrics, and skill gaps.

      Select a skill sourcing strategy.

      Discover critical knowledge.

      Select knowledge transfer methods.

      Identify priority competencies.

      Assess employees.

      Draft development goals.

      Provide coaching & feedback.

      The Small Enterprise Guide to People and Resource Management

      Phase Participants

      • Leadership team
      • Managers
      • Employees

      Additional Resources

      Effective development planning hinges on robust performance management

      Your performance management framework is rooted in organizational goals and defines what it means to do any given role well.

      Your organization's priority competencies are the knowledge, skills and attributes that enable an employee to do the job well.

      Each individual's development goals are then aimed at building these priority competencies.

      Mission Statement

      To be the world's leading manufacturer and distributor of widgets.

      Business Goal

      To increase annual revenue by 10%.

      IT Department Objective

      To ensure reliable communications infrastructure and efficient support for our sales and development teams.

      Individual Role Objective

      To decrease time to resolution of support requests by 10% while maintaining quality.

      Info-Tech Insight

      Without a performance management framework, your employees cannot align their development with the organization's goals. For detailed guidance, see Info-Tech's blueprint Setting Meaningful Employee Performance Measures.

      What is a competency?

      The term "competency" refers to the collection of knowledge, skills, and attributes an employee requires to do a job well.

      Often organizations have competency frameworks that consist of core, leadership, and functional competencies.

      Core competencies apply to every role in the organization. Typically, they are tied to organizational values and business mission and/or vision.

      Functional competencies are at the department, work group, or job role levels. They are a direct reflection of the function or type of work carried out.

      Leadership competencies generally apply only to people managers in the organization. Typically, they are tied to strategic goals in the short to medium term

      Generic Functional
      • Core
      • Leadership
      • IT
      • Finance
      • Sales
      • HR

      Use the SMART model to make sure goals are reasonable and attainable

      S

      Specific: Be specific about what you want to accomplish. Think about who needs to be involved, what you're trying to accomplish, and when the goal should be met.

      M

      Measurable: Set metrics that will help to determine whether the goal has been reached.

      A

      Achievable: Ensure that you have both the organizational resources and employee capability to accomplish the goal.

      R

      Relevant: Goals must align with broader business, department, and development goals in order to be meaningful.

      T

      Time-bound: Provide a target date to ensure the goal is achievable and provide motivation.

      Example goal:

      "Learn Excel this summer."

      Problems:

      Not specific enough, not measurable enough, nor time bound.

      Alternate SMART goal:

      "Consult with our Excel expert and take the lead on creating an Excel tool in August."

      3.2 Identify target competencies & draft development goals

      1 hour

      Pre-work: Employees should come to the career conversation having done some self-reflection. Use Info-Tech's IT Employee Career Development Workbook to help employees identify their career goals.

      1. Pre-work: Managers should gather any data they have on the employee's current proficiency at key competencies. Potential sources include task-based assessments, performance ratings, supervisor or peer feedback, and informal conversation.

        Prioritize competencies. Using your list of priority organizational competencies, work with your employees to help them identify two to four competencies to focus on developing now and in the future. Use the Individual Competency Development Plan template to document your assessment and prioritize competencies for development. Consider the following questions for guidance:
        1. Which competencies are needed in my current role that I do not have full proficiency in?
        2. Which competencies are related to both my career interests and the organization's priorities?
        3. Which competencies are related to each other and could be developed together or simultaneously?
      2. Draft goals. Ask your employee to create a list of multiple simple goals to develop the competencies they have selected to work on developing over the next year. Identifying multiple goals helps to break development down into manageable chunks. Ensure goals are concrete, for example, if the competency is "communication skills," your development goals could be "presentation skills" and "business writing."
      3. Review goals:
        1. Ask why these areas are important to the employee.
        2. Share your ideas and why it is important that the employee develop in the areas identified.
        3. Ensure that the goals are realistic. They should be stretch goals, but they must be achievable. Use the SMART framework on the previous slide for guidance.

      Info-Tech Insight

      Lack of career development is the top reason employees leave organizations. Development activities need to work for both the organization and the employee's own development, and clearly link to advancing employees' careers either at the organization or beyond.

      Download the IT Employee Career Development Workbook

      Download the Individual Competency Development Plan

      3.2 Identify target competencies & draft development goals

      Input

      Output

      • Employee's career aspirations
      • List of priority organizational competencies
      • Assessment of employee's current proficiency
      • A list of concrete development goals

      Materials

      Participants

      • Employee
      • Direct manager

      Apply a blend of learning methods

      • Info-Tech recommends the 70-20-10 principle for learning and development, which places the greatest emphasis on learning by doing. This experiential learning is then supported by feedback from mentoring, training, and self-reflection.
      • Use the 70-20-10 principle as a guideline – the actual breakdown of your learning methods will need to be tailored to best suit your organization and the employee's goals.

      Spend development time and effort wisely:

      70%

      On providing challenging on-the-job opportunities

      20%

      On establishing opportunities for people to develop learning relationships with others, such as coaching and mentoring

      10%

      On formal learning and training programs

      Internal initiatives are a cost-effective development aid

      Internal Initiative

      What Is It?

      When to Use It

      Special Project

      Assignment outside of the scope of the day-to-day job (e.g. work with another team on a short-term initiative).

      As an opportunity to increase exposure and to expand skills beyond those required for the current job.

      Stretch Assignment

      The same projects that would normally be assigned, but in a shorter time frame or with a more challenging component.

      Employee is consistently meeting targets and you need to see what they're capable of.

      Training Others

      Training new or more junior employees on their position or a specific process.

      Employee wants to expand their role and responsibility and is proficient and positive.

      Team Lead On an Assignment

      Team lead for part of a project or new initiative.

      To prepare an employee for future leadership roles by increasing responsibility and developing basic managerial skills.

      Job Rotation

      A planned placement of employees across various roles in a department or organization for a set period of time.

      Employee is successfully meeting and/or exceeding job expectations in their current role.

      Incorporating a development objective into daily tasks

      What do we mean by incorporating into daily tasks?

      The next time you assign a project to an employee, you should also ask the employee to think about a development goal for the project. Try to link it back to their existing goals or have them document a new goal in their development plan.

      For example: A team of employees always divides their work in the same way. Their goal for their next project could be to change up the division of responsibility so they can learn each other's roles.

      Another example:

      "I'd like you to develop your ability to explain technical terms to a non-technical audience. I'd like you to sit down with the new employee who starts tomorrow and explain how to use all our software, getting them up and running."

      Info-Tech Insight

      Employees often don't realize that they are being developed. They either think they are being recognized for good work or they are resentful of the additional workload.

      You need to tell your employees that the activity you are asking them to do is intended to further their development.

      However, be careful not to sell mundane tasks as development opportunities – this is offensive and detrimental to engagement.

      Establish manager and employee accountability for following up

      Ensure that the employee makes progress in developing prioritized competencies by defining accountabilities:

      Tracking Progress

      Checking In

      Development Meetings

      Coaching & Feedback

      Employee accountability:

      • Employees need to keep track of what they learn.
      • Employees should take the time to reflect on their progress.

      Manager accountability:

      • Managers need to make the time for employees to reflect.

      Employee accountability:

      • Employees need to provide managers with updates and ask for help.

      Manager accountability:

      • Managers need to check in with employees to see if they need additional resources.

      Employee accountability:

      • Employees need to complete assessments again to determine whether they have made progress.

      Manager accountability:

      • Managers should schedule monthly meetings to discuss progress and identify next steps.

      Employee accountability:

      • Employees should ask their manager and colleagues for feedback after development activities.

      Manager accountability:

      • Managers can use both scheduled meetings and informal conversations to provide coaching and feedback to employees.

      3.3 Select development activities and schedule check-ins

      1-3 hours

      Pre-work: Employees should research potential development activities and come prepared with a range of suggestions.

      Pre-work: Managers should investigate options for employee development, such as internal training/practice opportunities for the employee's selected competencies and availability of training budget.

      1. Communicate your findings about internal opportunities and external training allowance to the employee. This can also be done prior to the meeting, to help guide the employee's own research. Address any questions or concerns.
      2. Review the employee's proposed list of activities, and identify priority ones based on:
        1. How effectively they support the development of priority competencies.
        2. How closely they match the employee's original goals.
        3. The learning methods they employ, and whether the chosen activities support a mix of different methods.
        4. The degree to which the employee will have a chance to practice new skills hands-on.
        5. The amount of time the activities require, balanced against the employee's work obligations.
      3. Guide the employee in selecting activities for the short and medium term. Establish an understanding that this list is tentative and subject to ongoing revision during future check-ins.
        1. If in doubt about whether the employee is over-committing, err on the side of fewer activities to start.
      4. Schedule a check-in for one month out to review progress and roadblocks, and to reaffirm priorities.
      5. Check-ins should be repeated regularly, typically once a month.

      Download the Learning Methods Catalog

      Info-Tech Insight

      Adopt a blended learning approach using a variety of techniques to effectively develop competencies. This will reinforce learning and accommodate different learning styles. See Info-Tech's Learning Methods Catalog for a description of popular experiential, relational, and formal learning methods.

      3.3 Select development activities and schedule check-ins

      Input

      Output

      • List of potential development activities (from employee)
      • List of organizational resources (from manager)
      • A selection of feasible development activities
      • Next check-in scheduled

      Materials

      Participants

      • Employee
      • Direct manager

      Tips for tricky conversations about development

      What to do if…

      Employees aren't interested in development:

      • They may have low aspiration for advancement.
      • Remind them about the importance of staying current in their role given increasing job requirements.
      • Explain that skill development will make their job easier and make them more successful at it; sell development as a quick and effective way to learn the skill.
      • Indicate your support and respond to concerns.

      Employees have greater aspiration than capability:

      • Explain that there are a number of skills and capabilities that they need to improve in order to move to the next level. If the specific skills were not discussed during the performance appraisal, do not hesitate to explain the improvements that you require.
      • Inform the employee that you want them to succeed and that by pushing too far and too fast they risk failure, which would not be beneficial to anyone.
      • Reinforce that they need to do their current job well before they can be considered for promotion.

      Employees are offended by your suggestions:

      • Try to understand why they are offended. Before moving forward, clarify whether they disagree with the need for development or the method by which you are recommending they be developed.
      • If it is because you told them they had development needs, then reiterate that this is about helping them to become better and that everyone has areas to develop.
      • If it is about the development method, discuss the different options, including the pros and cons of each.

      Coaching and feedback skills help managers guide employee development

      Coaching and providing feedback are often confused. Managers often believe they are coaching when they are just giving feedback. Learn the difference and apply the right approach for the right situation.

      What is coaching?

      A conversation in which a manager asks questions to guide employees to solve problems themselves.

      Coaching is:

      • Future-focused
      • Collaborative
      • Geared toward growth and development

      What is feedback?

      Information conveyed from the manager to the employee about their performance.

      Feedback is:

      • Past-focused
      • Prescriptive
      • Geared toward behavior and performance

      Info-Tech Insight

      Don't forget to develop your managers! Ensure coaching, feedback, and management skills are part of your management team's development plan.

      Understand the foundations of coaching to provide effective development coaching:

      Knowledge Mindset Relationship
      • Understand what coaching is and how to apply it:
      • Identify when to use coaching, feedback, or other people management practices, and how to switch between them.
      • Know what coaching can and cannot accomplish.
      • When focusing on performance, guide an employee to solve problems related to their work. When focusing on development, guide an employee to reach their own development goals.
      • Adopt a coaching mindset by subscribing to the following beliefs:
      • Employees want to achieve higher performance and have the potential to do so.
      • Employees have a unique and valuable perspective to share of the challenges they face as well as the possible solutions.
      • Employees should be empowered to realize solutions themselves to motivate them in achieving goals.
      • Develop a relationship of trust between managers and employees:
      • Create an environment of psychological safety where employees feel safe to be open and honest.
      • Involve employees in decision making and inform employees often.
      • Invest in employees' success.
      • Give and expect candor.
      • Embrace failure.

      Apply the "4A" behavior-focused coaching model

      Using a model allows every manager, even those with little experience, to apply coaching best practices effectively.

      Actively Listen

      Ask

      Action Plan

      Adapt

      Engage with employees and their message, rather than just hearing their message.

      Key active listening behaviors:

      • Provide your undivided attention.
      • Observe both spoken words and body language.
      • Genuinely try to understand what the employee is saying.
      • Listen to what is being said, then paraphrase back what you heard.

      Ask thoughtful, powerful questions to learn more information and guide employees to uncover opportunities and/or solutions.

      Key asking behaviors:

      • Ask open-ended questions.
      • Ask questions to learn something you didn't already know.
      • Ask for reasoning (the why).
      • Ask "what else?"

      Hold employees and managers accountable for progress and results.

      During check-ins, review each development goal to ensure employees are meeting their targets.

      Key action planning behaviors:

      Adapt to individual employees and situations.

      Key adapting behaviors:

      • Recognize employees' unique characteristics.
      • Appreciate the situation at hand and change your behavior and communication in order to best support the individual employee.

      Use the following questions to have meaningful coaching conversations

      Opening Questions

      • What's on your mind?
      • Do you feel you've had a good week/month?
      • What is the ideal situation?
      • What else?

      Problem-Identifying Questions

      • What is most important here?
      • What is the challenge here for you?
      • What is the real challenge here for you?
      • What is getting in the way of you achieving your goal?

      Problem-Solving Questions

      • What are some of the options available?
      • What have you already tried to solve this problem? What worked? What didn't work?
      • Have you considered all the possibilities?
      • How can I help?

      Next-Steps Questions

      • What do you need to do, and when, to achieve your goal?
      • What resources are there to help you achieve your goal? This includes people, tools, or even resources outside our organization.
      • How will you know when you have achieved your goal? What does success look like?

      The purpose of asking questions is to guide the conversation and learn something you didn't already know. Choose the questions you ask based on the flow of the conversation and on what information you would like to uncover. Approach the answers you get with an open mind.

      Info-Tech Insight

      Avoid the trap of "hidden agenda" questions, whose real purpose is to offer your own advice.

      Use the following approach to give effective feedback

      Provide the feedback in a timely manner

      • Plan the message you want to convey.
      • Provide feedback "just-in-time."
      • Ensure recipient is not preoccupied.
      • Try to balance the feedback; refer to successful as well as unsuccessful behavior.

      Communicate clearly, using specific examples and alternative behaviors

      • Feedback must be honest and helpful.
      • Be specific and give a recent example.
      • Be descriptive, not evaluative.
      • Relate feedback to behaviors that can be changed.
      • Give an alternative positive behavior.

      Confirm their agreement and understanding

      • Solicit their thoughts on the feedback.
      • Clarify if not understood; try another example.
      • Confirm recipient understands and accepts the feedback.

      Manager skill is crucial to employee development

      Development is a two-way street. This means that while employees are responsible for putting in the work, managers must enable their development with support and guidance. The latter is a skill, which managers must consciously cultivate.

      For more in-depth management skills development, see the Info-Tech "Build a Better Manager" training resources:

      Bibliography

      Anderson, Kelsie. "Is Your IT Department Prepared for the 4 Biggest Challenges of 2017?" 14 June 2017.
      Atkinson, Carol, and Peter Sandiford. "An Exploration of Older Worker Flexible Working Arrangements in Smaller Firms." Human Resource Management Journal, vol. 26, no. 1, 2016, pp. 12–28. Wiley Online Library.
      BasuMallick, Chiradeep. "Top 8 Best Practices for Employee Cross-Training." Spiceworks, 15 June 2020.
      Birol, Andy. "4 Ways You Can Succeed With a Staff That 'Wears Multiple Hats.'" The Business Journals, 26 Nov. 2013.
      Bleich, Corey. "6 Major Benefits To Cross-Training Employees." EdgePoint Learning, 5 Dec. 2018.
      Cancialosi, Chris. "Cross-Training: Your Best Defense Against Indispensable Employees." Forbes, 15 Sept. 2014.
      Cappelli, Peter, and Anna Tavis. "HR Goes Agile." Harvard Business Review, Mar. 2018.
      Chung, Kai Li, and Norma D'Annunzio-Green. "Talent Management Practices of SMEs in the Hospitality Sector: An Entrepreneurial Owner-Manager Perspective." Worldwide Hospitality and Tourism Themes, vol. 10, no. 4, Jan. 2018.
      Clarkson, Mary. Developing IT Staff: A Practical Approach. Springer Science & Business Media, 2012.
      "CNBC and SurveyMonkey Release Latest Small Business Survey Results." Momentive, 2019. Press Release. Accessed 6 Aug. 2020.
      Cselényi, Noémi. "Why Is It Important for Small Business Owners to Focus on Talent Management?" Jumpstart:HR | HR Outsourcing and Consulting for Small Businesses and Startups, 25 Mar. 2013.
      dsparks. "Top 10 IT Concerns for Small Businesses." Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support, 16 May 2017.
      Duff, Jimi. "Why Small to Mid-Sized Businesses Need a System for Talent Management | Talent Management Blog | Saba Software." Saba, 17 Dec. 2018.
      Employment and Social Development Canada. "Age-Friendly Workplaces: Promoting Older Worker Participation." Government of Canada, 3 Oct. 2016.
      Exploring Workforce Planning. Accenture, 23 May 2017.
      "Five Major IT Challenges Facing Small and Medium-Sized Businesses." Advanced Network Systems. Accessed 25 June 2020.
      Harris, Evan. "IT Problems That Small Businesses Face." InhouseIT, 17 Aug. 2016.
      Heathfield, Susan. "What Every Manager Needs to Know About Succession Planning." Liveabout, 8 June 2020.
      ---. "Why Talent Management Is an Important Business Strategy." Liveabout, 29 Dec. 2019.
      Herbert, Chris. "The Top 5 Challenges Facing IT Departments in Mid-Sized Companies." ExpertIP, 25 June 2012.
      How Smaller Organizations Can Use Talent Management to Accelerate Growth. Avilar. Accessed 25 June 2020.
      Krishnan, TN, and Hugh Scullion. "Talent Management and Dynamic View of Talent in Small and Medium Enterprises." Human Resource Management Review, vol. 27, no. 3, Sept. 2017, pp. 431–41.
      Mann Jackson, Nancy. "Strategic Workforce Planning for Midsized Businesses." ADP, 6 Feb. 2017.
      McCandless, Karen. "A Beginner's Guide to Strategic Talent Management (2020)." The Blueprint, 26 Feb. 2020.
      McFeely, Shane, and Ben Wigert. "This Fixable Problem Costs U.S. Businesses $1 Trillion." Gallup.com, 13 Mar. 2019.
      Mihelič, Katarina Katja. Global Talent Management Best Practices for SMEs. Jan. 2020.
      Mohsin, Maryam. 10 Small Business Statistics You Need to Know in 2020 [May 2020]. 4 May 2020.
      Ramadan, Wael H., and B. Eng. The Influence of Talent Management on Sustainable Competitive Advantage of Small and Medium Sized Establishments. 2012, p. 15.
      Ready, Douglas A., et al. "Building a Game-Changing Talent Strategy." Harvard Business Review, no. January–February 2014, Jan. 2014.
      Reh, John. "Cross-Training Employees Strengthens Engagement and Performance." Liveabout, May 2019.
      Rennie, Michael, et al. McKinsey on Organization: Agility and Organization Design. McKinsey, May 2016.
      Roddy, Seamus. "The State of Small Business Employee Benefits in 2019." Clutch, 18 Apr. 2019.
      SHRM. "Developing Employee Career Paths and Ladders." SHRM, 28 Feb. 2020.
      Strandberg, Coro. Sustainability Talent Management: The New Business Imperative. Strandberg Consulting, Apr. 2015.
      Talent Management for Small & Medium-Size Businesses. Success Factors. Accessed 25 June 2020.
      "Top 10 IT Challenges Facing Small Business in 2019." Your IT Department, 8 Jan. 2019.
      "Why You Need Workforce Planning." Workforce.com, 24 Oct. 2022.

      Develop a Security Awareness and Training Program That Empowers End Users

      • Buy Link or Shortcode: {j2store}370|cart{/j2store}
      • member rating overall impact: 9.4/10 Overall Impact
      • member rating average dollars saved: $12,075 Average $ Saved
      • member rating average days saved: 11 Average Days Saved
      • Parent Category Name: Security Strategy & Budgeting
      • Parent Category Link: /security-strategy-and-budgeting
      • The fast evolution of the cybersecurity landscape requires security training and awareness programs that are frequently updated and improved.
      • Security and awareness training programs often fail to engage end users. Lack of engagement can lead to low levels of knowledge retention.
      • Irrelevant or outdated training content does not properly prepare your end users to effectively defend the organization against security threats.

      Our Advice

      Critical Insight

      • One-time, annual training is no longer sufficient for creating an effective security awareness and training program.
      • By presenting security as a personal and individualized issue, you can make this new personal focus a driver for your organizational security awareness and training program.

      Impact and Result

      • Create a training program that delivers smaller amounts of information on a more frequent basis to minimize effort, reduce end-user training fatigue, and improve content relevance.
      • Evaluate and improve your security awareness and training program continuously to keep its content up-to-date. Leverage end-user feedback to ensure content remains relevant to those who receive it.

      Develop a Security Awareness and Training Program That Empowers End Users Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you should develop a security awareness and training program that empowers end users, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Develop your training program

      Create or mature a security awareness and training program that is tailored to your organization.

      • Develop a Security Awareness and Training Program That Empowers End Users – Phase 1: Develop Your Training Program
      • Security Awareness and Training Program Development Tool
      • End-User Security Job Description Template
      • Training Materials – Physical Computer Security
      • Training Materials – Cyber Attacks
      • Training Materials – Incident Response
      • Training Materials – Mobile Security
      • Training Materials – Passwords
      • Training Materials – Phishing
      • Training Materials – Social Engineering
      • Training Materials – Web Usage
      • Security Awareness and Training Vendor Evaluation Tool
      • Security Awareness and Training Metrics Tool
      • End-User Security Knowledge Test Template
      • Security Training Campaign Development Tool

      2. Design an effective training delivery plan

      Explore methods of training delivery and select the most effective solutions.

      • Develop a Security Awareness and Training Program That Empowers End Users – Phase 2: Design an Effective Training Delivery Plan
      • Information Security Awareness and Training Policy
      • Security Awareness and Training Gamification Guide
      • Mock Spear Phishing Email Examples
      • Security Training Email Templates
      • Security Awareness and Training Module Builder and Training Schedule
      • Security Training Campaign Development Tool
      • Security Training Program Manual
      • Security Awareness and Training Feedback Template
      • Security Awareness Month Week 1: Staying in Touch
      • Security Awareness Month Week 2: Sharing Special Moments
      • Security Awareness Month Week 3: Working and Networking
      • Security Awareness Month Week 4: Families and Businesses
      [infographic]

      Workshop: Develop a Security Awareness and Training Program That Empowers End Users

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Outline the Plan for Long-term Program Improvement

      The Purpose

      Identify the maturity level of the existing security awareness and training program and set development goals.

      Establish program milestones and outline key initiatives for program development.

      Identify metrics to measure program effectiveness.

      Key Benefits Achieved

      Identified the gaps between the current maturity level of the security awareness and training program and future target states.

      Activities

      1.1 Create a program development plan.

      1.2 Investigate and select metrics to measure program effectiveness.

      1.3 Execute some low-hanging fruit initiatives for collecting metrics: e.g. create a knowledge test, feedback survey, or gamification guide.

      Outputs

      Customized development plan for program.

      Tool for tracking metrics.

      Customized knowledge quiz ready for distribution.

      Customized feedback survey for training.

      Gamification program outline.

      2 Identify and Assess Audience Groups and Security Training Topics

      The Purpose

      Determine the unique audience groups within your organization and evaluate their risks and vulnerabilities.

      Prioritize training topics and audience groups to effectively streamline program development.

      Key Benefits Achieved

      Created a comprehensive list of unique audience groups and the corresponding security training that each group should receive.

      Determined priority ratings for both audience groups and the security topics to be delivered.

      Activities

      2.1 Identify the unique audience groups within your organization and the threats they face.

      2.2 Determine the priority levels of the current security topics.

      2.3 Review audience groups and determine which topics need to be delivered to each group.

      Outputs

      Risk profile for each identified audience group.

      Priority scores for all training topics.

      List of relevant security topics for each identified audience group.

      3 Plan the Training Delivery

      The Purpose

      Identify all feasible delivery channels for security training within your organization.

      Build a vendor evaluation tool and shortlist or harvest materials for in-house content creation.

      Key Benefits Achieved

      List of all potential delivery mechanisms for security awareness and training.

      Built a vendor evaluation tool and discussed a vendor shortlist.

      Harvested a collection of free online materials for in-house training development.

      Activities

      3.1 Discuss potential delivery mechanisms for training, including the purchase and use of a vendor.

      3.2 If selecting a vendor, review vendor selection criteria and discuss potential vendor options.

      3.3 If creating content in-house, review and select available resources on the web.

      Outputs

      List of available delivery mechanisms for training.

      Vendor assessment tool and shortlist.

      Customized security training presentations.

      4 Create a Training Schedule for Content Deployment

      The Purpose

      Create a plan for deploying a pilot program to gather valuable feedback.

      Create an ongoing training schedule.

      Define the end users’ responsibilities towards security within the organization.

      Key Benefits Achieved

      Created a plan to deploy a pilot program.

      Created a schedule for training deployment.

      Defined role of end users in helping protect the organization against security threats.

      Activities

      4.1 Build training modules.

      4.2 Create an ongoing training schedule.

      4.3 Define and document your end users’ responsibilities towards their security.

      Outputs

      Documented modular structure to training content.

      Training schedule.

      Security job description template.

      End-user training policy.

      Define Requirements for Outsourcing the Service Desk

      • Buy Link or Shortcode: {j2store}493|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Service Desk
      • Parent Category Link: /service-desk
      • In organizations where technical support is viewed as non-strategic, many see outsourcing as a cost-effective way to provide this support. However, outsourced projects often fall short of their goals in terms of cost savings and the quality of support. 
      • Significant administrative work and up-front costs are required to outsource the service desk, and poor planning often results in project failure and a decrease of end-user satisfaction.
      • A complete turnover of the service desk can result in lost knowledge and control over processes, and organizations without an exit strategy can struggle to bring their service desk back in house and return the confidence of end users.

      Our Advice

      Critical Insight

      • Outsourcing is easy. Realizing the expected cost, quality, and focus benefits is hard. Successful outsourcing without being directly involved in service desk management is almost impossible.
      • You don’t need to standardize before you outsource, but you still need to conduct your due diligence. If you outsource without thinking about how you want the future to work, you will likely be unsatisfied with the result.
      • If cost is your only driver for outsourcing, understand that it comes at a cost. Customer service quality will likely be less, and your outsourcer may not add on frills such as Continual Improvement. Be careful that your specialists don’t end up spending more time working on incidents and service requests.

      Impact and Result

      • First decide if outsourcing is the correct step; there may be more preliminary work to do beforehand.
      • Assess requirements and make necessary adjustments before developing an outsource RFP.
      • Clearly define the project and produce an RFP to provide to vendors.
      • Plan for long-term success, not short-term gain.
      • Prepare to retain some of the higher-level service desk work.

      Define Requirements for Outsourcing the Service Desk Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Define Requirements for Outsourcing the Service Desk Deck – A step-by-step document to walk you through building a strategy for efficient service desk outsourcing.

      This storyboard will help you craft a project charter, create an RFP, and outline strategies to build a long-term relationship with the vendor.

      • Define Requirements for Outsourcing the Service Desk – Storyboard
      • Service Desk Outsourcing Requirements Database Library

      2. Service Desk Outsourcing Project Charter Template and Requirements Library – Best-of-breed templates to help you determine processes and build a strategy to outsource them.

      These templates will help you determine your service desk requirements and document your proposed service desk outsourcing strategy.

      • Service Desk Outsourcing Project Charter Template

      3. Service Desk Outsourcing RFP Template – A structured document to help you outline expectations and communicate requirements to managed service providers.

      This template will allow you to create a detailed RFP for your outsourcing agreement, document the statement of work, provide service overview, record exit conditions, and document licensing model and estimated pricing.

      • Service Desk Outsourcing RFP Template

      4. Service Desk Outsourcing Reference Interview Template and Scoring Tool – Materials to help you conduct efficient briefings and select the best vendor to fulfill your service desk requirements.

      Use the Reference Interview Template to outline a list of questions for interviewing current/previous customers of your candidate vendors. These interviews will help you with unbiased vendor scoring. The RFP Vendor Scoring Tool will help you facilitate vendor briefings with your list of questions and score candidate vendors efficiently through quantifying evaluations.

      • Service Desk Outsourcing Reference Interview Template
      • Service Desk Outsourcing RFP Scoring Tool

      Infographic

      Further reading

      Define Requirements for Outsourcing the Service Desk

      Prepare your RFP for long-term success, not short-term gains

      Define Requirements for Outsourcing the Service Desk

      Prepare your RFP for long-term success, not short-term gains

      EXECUTIVE BRIEF

      Analyst Perspective

      Outsource services with your eyes wide open.

      Cost reduction has traditionally been an incentive for outsourcing the service desk. This is especially the case for organizations that don't have minimal processes in place and those that need resources and skills to fill gaps.

      Although cost reduction is usually the main reason to outsource the service desk, in most cases service desk outsourcing increases the cost in a short run. But without a proper model, you will only outsource your problems rather than solving them. A successful outsourcing strategy follows a comprehensive plan that defines objectives, assigns accountabilities, and sets expectations for service delivery prior to vendor outreach.

      For outsourcing the service desk, you should plan ahead, work as a group, define requirements, prepare a strong RFP, and contemplate tension metrics to ensure continual improvement. As you build a project charter to outline your strategy for outsourcing your IT services, ensure you focus on better customer service instead of cost optimization. Ensure that the outsourcer can support your demands, considering your long-term achievement.

      Think about outsourcing like a marriage deed. Take into account building a good relationship before beginning the contract, ensure to include expectations in the agreement, and make it possible to exit the agreement if expectations are not satisfied or service improvement is not achieved.

      This is a picture of Mahmoud Ramin, PhD, Senior Research Analyst, Infrastructure and Operations, Info-Tech Research Group

      Mahmoud Ramin, PhD
      Senior Research Analyst
      Infrastructure and Operations
      Info-Tech Research Group

      Executive Summary

      Your Challenge

      In organizations where technical support is viewed as non-strategic, many see outsourcing as a cost-effective way to provide this support. However, outsourcing projects often fall short of their goals in terms of cost savings and quality of support.

      Common Obstacles

      Significant administrative work and up-front costs are required to outsource the service desk, and poor planning often results in project failure and the decrease of end-user satisfaction.

      A complete turnover of the service desk can result in lost knowledge and control over processes, and organizations without an exit strategy can struggle to bring their service desk back in house and reestablish the confidence of end users.

      Info-Tech's Approach

      • First decide if outsourcing is the correct step; there may be more preliminary work to do beforehand.
      • Assess requirements and make necessary adjustments before developing an outsource RFP.
      • Clearly define the project and produce an RFP to provide to vendors.
      • Plan for long-term success, not short-term gains.
      • Prepare to retain some of the higher-level service desk work.

      Info-Tech Insight

      Outsourcing is easy. Realizing all of the expected cost, quality, and focus benefits is hard. Successful outsourcing without being directly involved in service desk management is almost impossible.

      Your challenge

      This research is designed to help organizations that need to:

      • Outsource the service desk or portions of service management to improve service delivery.
      • Improve and repatriate existing outsourcing outcomes by becoming more engaged in the management of the function. Regular reviews of performance metrics, staffing, escalation, knowledge base content, and customer satisfaction are critical.
      • Understand the impact that outsourcing would have on the service desk.
      • Understand the potential benefits that outsourcing can bring to the organization.

      This image contains a donut chart with the following information: Salaries and Benefits - 68.50%; Technology - 9.30%; Office Space and Facilities Expense - 14.90%; Travel, Training, and Office Supplies - 7.30%

      Source: HDI 2017

      About 68.5% of the service desk fund is allocated to agent salaries, while only 9.3% of the service desk fund is spent on technology. The high ratio of salaries and expenses over other expense drives organizations to outsource their service desk without taking other considerations into account.

      Info-Tech Insight

      The outsourcing contract must preserve your control, possession, and ownership of the intellectual property involved in the service desk operation. From the beginning of the process, repatriation should be viewed as a possibility and preserved as a capability.

      Your challenge

      This research helps organizations who would like to achieve these goals:

      • Determine objectives and requirements to outsource the service desk.
      • Develop a project charter and build an outsourcing strategy to efficiently define processes to reduce risk of failure.
      • Build an outsourcing RFP and conduct interviews to identify the best candidate for service delivery.
      • Build a long-term relationship with an outsourcing vendor, making sure the vendor is able to satisfy all requirements.
      • Include a continual improvement plan in the outsourcing strategy and contain the option upon service delivery dissatisfaction.

      New hires require between 10 and 80 hours of training (Forward Bpo Inc., 2019).

      A benchmark study by Zendesk from 45,000 companies reveals that timely resolution of issues and 24/7 service are the biggest factors in customer service experience.

      This image contains a bar graph with the following data: Timely issue resolution; 24/7 support; Friendly agent; Desired contact method; Not to repeat info; Proactive support; Self-serve; Call back; Rewards & freebies

      These factors push many businesses to consider service desk outsourcing to vendors that have capabilities to fulfill such requirements.

      Common obstacles

      These barriers make this challenge difficult to address for many organizations:

      • In most cases, organizations must perform significant administrative work before they can make a move. Those that fail to properly prepare impede a smooth transition, the success of the vendor, and the ability to repatriate.
      • Successful outsourcing comes from the recognition that an organization is experiencing complete turnover of its service desk staff. These organizations engage the vendor to transition knowledge and process to ensure continuity of quality.
      • IT realizes the most profound hidden costs of outsourcing when the rate of ticket escalation increases, diminishing the capacity of senior technical staff for strategic project work.

      Many organizations may not get the value they expect from outsourcing in their first year.

      Common Reasons:

      • Overall lack of due diligence in the outsourcing process
      • Unsuitable or unclear service transition plan
      • Poor service provider selection and management

      Poor transition planning results in delayed benefits and a poor relationship with your outsourcing service provider. A poor relationship with your service provider results in poor communication and knowledge transfer.

      Key components of a successful plan:

      1. Determine goals and identify requirements before developing an RFP.
      2. Finalize your outsourcing project charter and get ready for vendor evaluation.
      3. Assess and select the most appropriate provider; manage the transition and vendor relationship.

      Outsource the service desk properly, and you could see a wide range of benefits

      Service Desk Outsourcing: Ability to scale up/down; Reduce fixed costs; Refocus IT efforts on core activities; Access to up-to-date technology; Adhere to  ITSM best practices; Increased process optimization; Focus IT efforts on advanced expertise; Reframe to shift-left;

      Info-Tech Insight

      In your service desk outsourcing strategy, rethink downsizing first-level IT service staff. This can be an opportunity to reassign resources to more valuable roles, such as asset management, development or project backlog. Your current service desk staff are most likely familiar with the current technology, processes, and regulations within IT. Consider the ways to better use your existing resources before reducing headcount.

      Info-Tech's Approach

      Determine Goals

      Conduct activities in the blueprint to pinpoint your current challenges with the service desk and find out objectives to outsource customer service.

      Define Requirements

      You need to be clear about the processes that will be outsourced. Considering your objectives, we'll help you discover the processes to outsource, to help you achieve your goals.

      Develop RFP

      Your expectations should be documented in a formal proposal to help vendors provide solid information about how they will satisfy your requirements and what their plan is.

      Build Long-Term Relationship

      Make sure to plan for continual improvement by setting expectations, tracking the services with proper metrics, and using efficient communication with the provider. Think about the rainy day and include exit conditions for ending the relationship if needed.

      Info-Tech's methodology

      1. Define the Goal

      2. Design an Outsourcing Strategy

      3. Develop an RFP and Make a Long-Term Relationship

      Phase Steps

      1.1 Identify goals and objectives

      1.2 Assess outsourcing feasibility

      2.1 Identify project stakeholders

      2.2 Outline potential risks and constraints

      3.1 Prepare service overview and responsibility matrix

      3.2 Define approach to vendor relationship management

      3.3 Manage the outsource relationship

      Phase Outcomes

      Service Desk Outsourcing Vision and Goals

      Service Desk Processes to Outsource

      Outsourcing Roles and Responsibilities

      Outsourcing Risks and Constraints

      Service Desk Outsourcing Project Charter

      Service Desk Outsourcing RFP

      Continual Improvement Plan

      Exit Strategy

      This is an image of the strategy which you will use to build your requirements for outsourcing the service desk.  it includes: 1. Define the Goal; 2. Design an Outsourcing Strategy; 3. Develop RFP and long-term relationship.

      Insight summary

      Focus on value

      Outsourcing is easy. Realizing all of the expected cost, quality, and focus benefits is hard. Successful outsourcing without being directly involved in service desk management is almost impossible.

      Define outsourcing requirements

      You don't need to standardize before you outsource, but you still need to conduct your due diligence. If you outsource without thinking about how you want the future to work, you will likely be unsatisfied with the result.

      Don't focus on cost

      If cost is your only driver for outsourcing, understand that there will be other challenges. Customer service quality will likely be less, and your outsourcer may not add on frills such as Continual Improvement. Be careful that your specialists don't end up spending more time working on incidents and service requests.

      Emphasize on customer service

      A bad outsourcer relationship will result in low business satisfaction with IT overall. The service desk is the face of IT, and if users are dissatisfied with the service desk, then they are much likelier to be dissatisfied with IT overall.

      Vendors are not magicians

      They have standards in place to help them succeed. Determine ITSM best practices, define your requirements, and adjust process workflows accordingly. Your staff and end users will have a much easier transition once outsourcing proceeds.

      Plan ahead to guarantee success

      Identify outsourcing goals, plan for service and system integrations, document standard incidents and requests, and track tension metrics to make sure the vendor does the work efficiently. Aim for building a long-term relationship but contemplate potential exit strategy.

      Blueprint deliverables

      Each step of this blueprint is accompanied by supporting deliverables to help you accomplish your goals:

      This is a screenshot from the Service Desk Outsourcing Requirements Database Library

      Service Desk Outsourcing Requirements Database Library

      Use this library to guide you through processes to outsource

      This is a screenshot from the Service Desk Outsourcing RFP Template

      Service Desk Outsourcing RFP Template

      Use this template to craft a proposal for outsourcing your service desk

      This is a screenshot from the Service Desk Outsourcing Reference Interview Template

      Service Desk Outsourcing Reference Interview Template

      Use this template to verify vendor claims on service delivery with pervious or current customers

      This is a screenshot from the Service Desk Outsourcing Vendor Proposal Scoring Tool

      Service Desk Outsourcing Vendor Proposal Scoring Tool

      Use this tool to evaluate RFP submissions

      Key deliverable:

      This is a screenshot from the key deliverable, Service Desk Outsourcing Project Charter

      Service Desk Outsourcing Project Charter

      Document your project scope and outsourcing strategy in this template to organize the project for efficient resource and requirement allocation

      Blueprint benefits

      IT Benefits

      Business Benefits

      • Determine current challenges with the service desk and identify services to outsource.
      • Make the project charter for an efficient outsourcing strategy that will lead to higher satisfaction from IT.
      • Select the best outsource vendor that will satisfy most of the identified requirements.
      • Reduce the risk of project failure with efficient planning.
      • Understand potential feasibility of service desk outsourcing and its possible impact on business satisfaction.
      • Improve end-user satisfaction through a better service delivery.
      • Conduct more efficient resource allocation with outsourcing customer service.
      • Develop a long-term relationship between the enterprise and vendor through a continual improvement plan.

      Info-Tech offers various levels of support to best suit your needs

      DIY Toolkit

      "Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful."

      Guided Implementation

      "Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track."

      Workshop

      "We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place."

      Consulting

      "Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project."

      Diagnostics and consistent frameworks used throughout all four options

      Guided Implementation

      What does a typical GI on this topic look like?

      Phase 1Phase 2Phase 3

      Call #1: Scope your specific challenges and objectives

      Call #3: Identify project stakeholders, and potential risks and constraints

      Call #5: Create a detailed RFP

      Call #6: Identify strategy risks.

      Call #2: Assess outsourcing feasibility and processes to outsourceCall #4: Create a list of metrics to ensure efficient reporting

      Call #7: Prepare for vendor briefing and scoring each vendor

      Call #8: Build a communication plan

      A Guided Implementation (GI) is series of calls with an Info-Tech analyst to help implement our best practices in your organization.

      A typical GI is between 8 to 10 calls over the course of 4 to 6 months.

      Phase 1

      Define the goal

      Define the goal

      Design an outsourcing strategy

      Develop an RFP and make a long-term relationship

      1.1 Identify goals and objectives

      1.2 Assess outsourcing feasibility

      2.1 Identify project stakeholders

      2.2 Outline potential risks and constraints

      3.1 Prepare a service overview and responsibility matrix

      3.2 Define your approach to vendor relationship management

      3.3 Manage the outsource relationship

      This phase will walk you through the following activities:

      • Analysis outsourcing objectives
      • Assess outsourcing feasibility
      • Identify services and processes to outsource

      This phase involves the following participants:

      • Service Desk Team
      • IT Leadership

      Define requirements for outsourcing service desk support

      Step 1.1

      Identify goals and objectives

      Activities

      1.1.1 Find out why you want to outsource your service desk

      1.1.2 Document the benefits of outsourcing your service desk

      1.1.3 Identify your outsourcing vision and goals

      1.1.4 Prioritize service desk outsourcing goals to help structure your mission statement

      1.1.5 Craft a mission statement that demonstrates your decision to reach your outsourcing objectives

      Define the goal

      This step requires the following inputs:

      • List of strengths and weaknesses of the service desk
      • Challenges with the service desk

      This step involves the following participants:

      • CIO
      • IT Leadership
      • Service Desk Manager
      • IT Managers

      Outcomes of this step

      • Service desk outsourcing vision and goals
      • Benefits of outsourcing the service desk
      • Mission statement

      What is your rationale to outsource the service desk?

      Potential benefits of outsourcing the service desk:

      • Bring in the expertise and knowledge to manage tickets according to best-practice guidelines
      • Reduce the timeline to response and resolution
      • Improve IT productivity
      • Enhance IT services and improve performance
      • Augment relationship between IT and business through service-level improvement
      • Free up the internal team and focus IT on complex projects and higher priority tasks
      • Speed up service desk optimization
      • Improve end-user satisfaction through efficient IT services
      • Reduce impact of incidents through effective incident management
      • Increase service consistency via turnover reduction
      • Expand coverage hour and access points
      • Expand languages to service different geographical areas

      1.1.1 Find out why you want to outsource your service desk

      1 hour

      Service desk is the face of IT. Service desk improvement increases IT efficiency, lowers operation costs, and enhances business satisfaction.

      Common challenges that result in deciding to outsource the service desk are:

      Participants: IT Director, Service Desk Manager, Service Desk Team

      ChallengeExample
      Lack of tier 1 supportStartup does not have a dedicated service desk to handle incidents and provide services to end users.
      Inefficient ticket handlingMTTR is very high and end users are frustrated with their issues not getting solved quickly. Even if they call service desk, they are put on hold for a long time. Due to these inefficiencies, their daily work is greatly impacted.
      Restricted service hoursCompany headquartered in Texas does not have resources to provide 24/7 IT service. When users in the East Asia branch have a laptop issue, they must wait until the next day to get response from IT. This has diminished their satisfaction.
      Restricted languagesCompany X is headquartered in New York. An end user not fluent in English from Madrid calls in for support. It takes five minutes for the agent to understand the issue and log a ticket.
      Ticket backlogIT is in firefighting mode, very busy with taking care of critical incidents and requests from upper management. Almost no one is committed to the SLA because of their limited availability.

      Brainstorm your challenges with the service desk. Why have you decided to outsource your service desk? Use the above table as a sample.

      1.1.2 Document benefits of outsourcing your service desk

      1 hour

      1. Review the challenges with your current service desk identified in activity 1.1.1.
      2. Discuss possible ways to tackle these challenges. Be specific and determine ways to resolve these issues if you were to do it internally.
      3. Determine potential benefits of outsourcing the service desk to IT, business, and end users.
      4. For each benefit, describe dependencies. For instance, to reduce the number of direct calls (benefit), users should have access to service desk as a single point of contact (dependency).
      5. Document this activity in the Service Desk Outsourcing Project Charter Template.

      Download the Project Charter Template

      Input

      • List of challenges with the current service desk from activity 1.1.1

      Output

      • Benefits of outsourcing the service desk

      Materials

      • Whiteboard/flip charts
      • Markers
      • Sticky notes
      • Laptops

      Participants

      • IT Director/CIO
      • Service Desk Manager
      • Service Desk Team
      • IT Managers

      Why should you not consider cost reduction as a primary incentive to outsourcing the service desk?

      Assume that some of the costs will not go away with outsourcing

      When you outsource, the vendor's staff tend to gradually become less effective as:

      • They are managed by metrics to reduce costs by escalating sooner, reducing talk time, and proposing questionable solutions.
      • Turnover results in new employees that get insufficient training.

      You must actively manage the vendor to identify and resolve these issues. Many organizations find that service desk management takes more time after they outsource.

      You need to keep spending on service desk management, and you may not get away from technology infrastructure spending.

      Info-Tech Insight

      In their first year, almost 42% of Info-Tech's clients do not get the real value of outsourcing services as expected. This iss primarily because of misalignment of organizational goals with outcomes of the outsourced services.

      Consider the hidden costs of outsourcing

      Expected Costs

      Unexpected Costs

      Example

      Transition CostsSeverance and staff retention
      • Cost to adapt to vendor standards
      • Training cost of vendor staff
      • Lost productivity
      • Format for requirements
      • Training report developers to work with vendor systems
      FeesPrice of the engagement
      • Extra fees for additional services
      • Extra charges for uploading data to cloud storage
      • Portal access
      Management CostsTime directing account
      • Time directly managing vendor staff
      • Checking deliverables for errors
      • Disputing penalty amounts
      Rework CostsDowntime, defect rate, etc. (quality metrics measured in SLAs)
      • Time spent adapting deliverables for unanticipated requirements
      • Time spent assuring the quality and usefulness of deliverables
      • Completing quality assurance and updating knowledgebase articles
      • Adapting reporting for presentation to stakeholders

      Determine strategies to avoid each hidden cost

      Costs related to transitioning into the engagementAdapting to standards and training costs

      Adapting to standards: Define the process improvements you will need to work with each potential vendor.

      Training costs for vendor staff: Reduce training costs by keeping the same vendor staff on all of your projects.

      Fee-related costs

      Fees for additional services (that you thought were included)

      Carefully review each proposed statement of work to identify and reduce extra fees. Understand why extra fees occur in the SLA, the contract, and the proposed statement of work, and take steps to protect yourself and the vendor.

      Management-related costs

      Direct management of vendor staff and dispute resolution

      Direct management of vendor staff: Avoid excessive management costs by defining a two-tier management structure on both sides of the engagement.

      Time spent resolving disputes: Avoid prolonged resolution costs by defining terms of divorce for the engagement up front.

      Rework costs

      Unanticipated requirements and integration with existing systems

      Unanticipated requirements: Use a two-stage process to define requirements, starting with business people and then with review by technical staff.

      Integration with existing systems: Obtain a commitment from vendors that deliverables will conform to standards at points of integration with your systems.

      Your outsourcing strategy should address the reasons you decided to outsource

      A clear vision of strategic objectives prior to entering an outsourcing agreement will allow you to clearly communicate these objectives to the Managed Service Provider (MSP) and use them as a contracted basis for the relationship.

      • Define the business' overall approach to outsourcing along with the priorities, rules, and principles that will drive the outsourcing strategy and every subsequent outsourcing decision and activity.
      • Define specific business, service, and technical goals for the outsourcing project and relevant measures of success.

      "People often don't have a clear direction around what they're trying to accomplish. The strategic goals should be documented. Is this a cost-savings exercise? Is it because you're deficient in one area? Is it because you don't have the tools or expertise to run the service desk yourself? Figure out what problem you're trying to solve by outsourcing, then build your strategy around that.
      – Jeremy Gagne, Application Support Delivery Manager, Allegis Group

      Most organizations are driven to consider outsourcing their service desk hoping to improve the following:

      • Ability to scale (train people and acquire skills)
      • Focus on core competencies
      • Decrease capital costs
      • Access latest technology without large investment
      • Resolve labor force constraints
      • Gain access to special expertise without paying a full salary
      • Save money overall

      Info-Tech Insight

      Use your goals and objectives as a management tool. Clearly outline your desired project outcomes to both your in-house team and the vendor during implementation and monitoring. It will allow a common ground to unite both parties as the project progresses.

      Mitigate pitfalls that lay in the way of desired outcomes of outsourcing

      Desired outcomePitfalls to overcome
      IT can focus on core competencies and strategic initiatives rather than break-fix tasks.Escalation to second- and third-level support usually increases when the first level has been outsourced. Outsourcers will have less experience with your typical incidents and will give up on trying to solve some issues more quickly than your internal level-one staff.
      Low outsourcing costs compared to the costs needed to employ internal employees in the same role. Due to lack of incentive to decrease ticket volume, costs are likely to increase. As a result, organizations often find themselves paying more overall for an outsourced service desk than if they had a few dedicated IT service desk employees in-house.
      Improved employee morale as a result of being able to focus on more interesting tasks.Management often expects existing employee morale to increase as a result of shifting their focus to core and strategic tasks, but the fear of diminished job security often spreads to the remaining non-level-one employees.

      1.1.3 Identify outsourcing vision and goals

      Identify the goals and objectives of outsourcing to inform your strategy.

      Participants: IT Director, Service Desk Manager, Service Desk Team

      1-2 hours

      1. Meet with key business stakeholders and the service desk staff who were involved in the decision to outsource.
      2. As a group, review the results from activity 1.1.1 (challenges with current service desk operations) and identify the goals and objectives of the outsourcing initiative.
      3. Determine the key performance indicator (KPI) for each goal.
      4. Identify the impacted stakeholder/s for each goal.
      5. Discuss checkpoint schedule for each goal to make sure the list stays updated.

      Use the sample table as a starting point:

      1. Document your table in the Service Desk Outsourcing Project Charter Template.
      IDGoal DescriptionKPIImpacted StakeholdersCheckpoint Schedule
      1Provide capacity to take calls outside of current service desk work hours
      • Decreased in time to response
      • Decreased time to resolve
      • IT Entire organization
      • Every month
      2Take calls in different languages
      • Improved service delivery in different geographical regions
      • Improved end-user satisfaction
      • End users
      • Every month
      3Provide field support at remote sites with no IT presence without having to fly out an employee
      • 40% faster incident resolution and request fulfillment
      • Entire organization
      • Every month
      4Improve ease of management by vendor helping with managing and optimizing service desk tasks
      • Improved service management efficiency
      • Entire organization
      • Every 3 months

      Download the Project Charter Template

      Evaluate organizational demographics to assess outsourcing rationale

      The size, complexity, and maturity of your organization are good indicators of service desk direction with regards to outsourcing.

      Organization Size

      • As more devices, applications, systems, and users are added to the mix, vendor costs will increase but their ability to meet business needs will decrease.
      • Small organizations are often either rejected by vendors for being too small or locked into a contract that is overkill for their actual needs (and budget).

      Complexity

      • Highly customized environments and organizations with specialized applications or stringent regulatory requirements are very difficult to outsource for a reasonable cost and acceptable quality.
      • In these cases, the vendor is required to train skilled support or ends up escalating more tickets back to second- and third-level support.

      Requirements

      • Organizations looking to outsource must have defined outsourcing requirements before looking at vendors.
      • Without a requirement assessment, the vendor won't have guidelines to follow and you won't be able to measure their adherence.

      Info-Tech Insight

      Although less adherence to service desk best practices can be one of the main incentives to outsourcing the service desk, IT should have minimal processes in place to be able to set expectations with targeting vendors.

      1.1.4 Prioritize service desk outsourcing goals to help structure mission statement

      0.5-1 hour

      The evaluation process for outsourcing the service desk should be done very carefully. Project leaders should make sure they won't panic internal resources and impact their performance through the transition period.

      If the outsourcing process is rushed, it will result in poor evaluation, inefficient decision making, and project failure.

      1. Refer to results in activity 1.1.3. Discuss the service desk outsourcing goals once again.
      2. Brainstorm the most important objectives. Use sticky notes to prioritize the items from the most important to the least important.
      3. Edit the order accordingly.

      Input

      • Project goals from activity 1.1.3

      Output

      • Prioritized list of outsourcing goals

      Materials

      • Whiteboard/flip charts
      • Markers
      • Sticky notes
      • Laptops

      Participants

      • IT Director/CIO
      • Service Desk Manager
      • Service Desk Team
      • IT Managers

      Download the Project Charter Template

      1.1.5 Craft a mission statement that demonstrates your decision to reach outsourcing objectives

      Participants: IT Director, Service Desk Manager

      0.5-1 hour

      The IT mission statement specifies the function's purpose or reason for being. The mission should guide each day's activities and decisions. The mission statement should use simple and concise terminology and speak loudly and clearly, generating enthusiasm for the organization.

      Strong IT mission statements:

      • Articulate the IT function's purpose and reason for existence
      • Describe what the IT function does to achieve its vision
      • Define the customers of the IT function
      • Can be described as:
        • Compelling
        • Easy to grasp
        • Sharply focused
        • Inspirational
        • Memorable
        • Concise

      Sample mission statements:

      • To help fulfill organizational goals, IT has decided to empower business stakeholders with outsourcing the service desk.
      • To support efficient IT service provision, better collaboration, and effective communication, [Company Name] has decided to outsource the service desk.
      • [Company Name] plans to outsource the service desk so it can identify bottlenecks and inefficiencies with current service desk processes and enable [Company Name] to innovate and support business growth.
      • Considering the goals and benefits determined in the previous activities, outline a mission statement.
      • Document your outsourcing mission statement in the "Project Overview" section of the Project Charter Template.

      Download the Project Charter Template

      Step 1.2

      Assess outsourcing feasibility

      Activities

      1.2.1 Create a baseline of customer experience

      1.2.2 Identify service desk processes to outsource

      1.2.3 Design an outsourcing decision matrix for service desk processes and services

      1.2.4 Discuss if you need to outsource only service desk or if additional services would benefit from outsourcing too

      Define the goal

      This step requires the following inputs:

      • List of service desk tasks and responsibilities

      This step involves the following participants:

      • CIO
      • IT Leadership
      • Service Desk Manager
      • Infrastructure Manager

      Outcomes of this step

      • End-user satisfaction with the service desk
      • List of processes and services to outsource

      1.2.1 Create a baseline of customer experience

      Solicit targeted department feedback on IT's core service capabilities, communications, and business enablement from end users. Use this feedback to assess end-user satisfaction with each service, broken down by department and seniority level.

      1. Complete an end-user satisfaction survey to define the current state of your IT services, including service desk (timeliness and effectiveness). With Info-Tech's end-user satisfaction program, an analyst will help you set up the diagnostic and will go through the report with you.
      2. Evaluate survey results.
      3. Communicate survey results with team leads and discuss the satisfaction rates and comments of the end users.
      4. Schedule to launch another survey one year after outsourcing the service desk.
      5. Your results will be compared to the following year's results to analyze the overall success/failure of your outsourcing project.

      A decrease of business and end-user satisfaction is a big drive to outsourcing the service desk. Conduct a customer service survey to discover your end-user experience prior to and after outsourcing the service desk.

      Don't get caught believing common misconceptions: outsourcing doesn't mean sending away all the work

      First-time outsourcers often assume they are transferring most of the operations over to the vendor, but this is often not the case.

      1. Management of performance, SLAs, and customer satisfaction remain the responsibility of your organization.
      2. Service desk outsource vendors provide first-line response. This includes answering the phones, troubleshooting simple problems, and redirecting requests that are more complex.
      3. The vendor is often able to provide specialized support for standard applications (and for customized applications if you'll pay for it). However, the desktop support still needs someone onsite, and that service is very expensive to outsource.
      4. Tickets that are focused on custom applications and require specialized or advanced support are escalated back to your organization's second- and third-level support teams.

      Switching to a vendor won't necessarily improve your service desk maturity

      You should have minimal requirements before moving.

      Whether managing in-house or outsourcing, it is your job to ensure core issues have been clarified, processes defined, and standards maintained. If your processes are ad-hoc or non-existent right now, outsourcing won't fix them.

      You must have the following in place before looking to outsource:

      • Defined reporting needs and plans
      • Formalized skill-set requirements
      • Problem management and escalation guidelines
      • Ticket templates and classification rules
      • Workflow details
      • Knowledge base standards

      Info-Tech Insight

      If you expect your problems to disappear with outsourcing, they might just get worse.

      Define long-term requirements

      Anticipate growth throughout the lifecycle of your outsourcing contract and build that into the RFP

      • Most outsourcing agreements typically last three to five years. In that time, you risk outgrowing your service provider by neglecting to define your long-term service desk requirements.
      • Outgrowing your vendor before your contract ends can be expensive due to high switching costs. Managing multiple vendors can also be problematic.
      • It is crucial to define your service desk requirements before developing a request for proposal to make sure the service you select can meet your organization's needs.
      • Make sure that the business is involved in this planning stage, as the goals of IT need to scale with the growth strategy of the business. You may select a vendor with no additional capacity despite the fact that your organization has a major expansion planned to begin two years from now. Assessing future requirements also allows you to culture match with the vendor. If your outlooks and practices are similar, the match will likely click.

      Info-Tech Insight

      Don't select a vendor for what your company is today – select a vendor for what your company will be years from now. Define your future service desk requirements in addition to your current requirements and leave room for growth and development.

      You can't outsource everything

      Manage the things that stay in-house well or suffer the consequences.

      "You can't outsource management; you can only outsource supervision." Barry Cousins, Practice Lead, Info-Tech Research Group

      What can be the vendor in charge of?

      What stays in-house?

      • Call and email answering
      • Ongoing daily ticket creation and tracking
      • Tier 1 support
      • Internal escalation to Level 2 support
      • External escalation to specialized Level 2 and Level 3 support
      • Knowledge base article creation
      • Service desk-related hardware acquisition and maintenance
      • Service desk software acquisition and maintenance
      • Security and access management
      • Disaster recovery
      • Staff acquisition
      • Facilities
      • The role of the Service Desk Manager
      • Skills and training standards
      • Document standardization
      • Knowledge base quality assurance and documentation standardization
      • Self-service maintenance, promotion, and ownership
      • Short and long-term tracking of vendor performance

      Info-Tech Insight

      The need for a Service Desk Manager does not go away when you outsource. In fact, the need becomes even stronger and never diminishes.

      Assess current service desk processes before outsourcing

      Process standards with areas such as documentation, workflow, and ticket escalation should be in place before the decision to outsource has been made.

      Every effective service desk has a clear definition of the services that they are performing for the end user. You can't provide a service without knowing what the services are.

      MSPs typically have their own set of standards and processes in play. If your service desk is not at a similar level of maturity, outsourcing will not be pleasant.

      Make sure that your metrics are reported consistently and that they tell a story.

      "Establish baseline before outsourcing. Those organizations that don't have enough service desk maturity before outsourcing should work with the outsourcer to establish the baseline."
      – Yev Khobrenkov, Enterprise Consultant, Solvera Solutions

      Info-Tech Insight

      Outsourcing vendors are not service desk builders; they're service desk refiners. Switching to a vendor won't improve your maturity; you must have a certain degree of process maturity and standardization before moving.

      Case Study

      INDUSTRY: Cleaning Supplies

      SOURCE: PicNet

      Challenge

      • Reckitt Benckiser of Australia determined that its core service desk needed to be outsourced.
      • It would retain its higher level service desk staff to work on strategic projects.
      • The MSP needed to fulfill key requirements outlined by Reckitt Benckiser.

      Solution

      • Reckitt Benckiser recognized that its rapidly evolving IT needs required a service desk that could fulfill the following tasks:
      • Free up internal IT staff.
      • Provide in-depth understanding of business apps.
      • Offer efficient, cost-effective support onsite.
      • Focus on continual service improvement (CSI).

      Results

      • An RFP was developed to support the outsourcing strategy.
      • With the project structure outlined and the requirements of the vendor for the business identified, Reckitt Benckiser could now focus on selecting a vendor that met its needs.

      1.2.1 Identify service desk processes to outsource

      2-3 hours

      Review your prioritized project goals from activity 1.1.4.

      Brainstorm requirements and use cases for each goal and describe each use case. For example: To improve service desk timeliness, IT should improve incident management, to resolve incidents according to the defined SLA and based on ticket priority levels.

      Discuss if you're outsourcing just incident management or both incident management and request fulfillment. If both, determine what level of service requests will be outsourced? Will you ask the vendor to provide a service catalog? Will you outsource self-serve and automation?

      Document your findings in the service desk outsourcing requirements database library.

      Input

      • Outsourcing project goals from activity 1.1.4

      Output

      • List of processes to outsource

      Materials

      • Sticky notes
      • Markers
      • Whiteboard/flip charts
      • Laptops

      Participants

      • IT Director/CIO
      • Service Desk Manager
      • Service Desk Team

      Download the Requirements Database Library

      1.2.2 Design an outsourcing decision matrix for service desk processes and services

      Participants: IT Director, Service Desk Manager, Infrastructure manager

      2-3 hours

      Most successful service desk outsourcing engagements have a primary goal of freeing up their internal resources to work on complex tasks and projects. The key outsourcing success factor is to find out internal services and processes that are standardized or should be standardized, and then determine if they can be outsourced.

      1. Review the list of identified service desk processes from activity 1.2.1.
      2. Discuss the maturity level of each process (low, medium, high) and document under the maturity column of the Outsource the Service Desk Requirements Database Library.
      3. Use the following decision matrix for each process. Discuss which tasks are important to strategic objectives, which ones provide competitive advantage, and which ones require specialized in-house knowledge.
      4. Identify processes that receive high vendor's performance advantage. For instance, access to talent, lower cost at scale, and access to technology.
      5. In your outsourcing assessment, consider a narrow scope of engagement and a broad view of what is important to business outcome.
      6. Based on your findings, determine the priority of each process to be outsourced. Document results in the service desk outsourcing requirements database library, and section 4.1 of the service desk outsourcing project charter.
      • Important to strategic objectives
      • Provides competitive advantage
      • Specialized in-house knowledge required

      This is an image of a quadrant analysis, where the X axis is labeled Vendor's Performance Advantage, and the Y axis is labeled Importance to Business Outcomes.

      • Talent/access to skills
      • Economies of scale/lower cost at scale
      • Access to technology

      Download the Requirements Database Library

      Download the Project Charter Template

      Maintain staff and training: you need to know who is being hired, how, and why

      Define documentation rules to retain knowledge

      • Establish a standard knowledge article template and list of required information.
      • Train staff on the requirements of knowledge base creation and management. Help them understand the value of the time spent recording their work.
      • It is your responsibility to assure the quality of each knowledge article. Outline accountabilities for internal staff and track for performance evaluations.

      For information on better knowledge management, refer to Info-Tech's blueprint Optimize the Service Desk With a Shift-Left Strategy.

      Expect to manage stringent skills and training standards

      • Plan on being more formal about a Service Manager position and spending more time than you allocated previously.
      • Complete a thorough assessment of the skills you need to keep the service desk running smoothly.
      • Don't forget to account for any customized or proprietary systems. How will you train vendor staff to accommodate your needs? What does their turnaround look like: would it be more likely that you acquire a dependable employee in-house?
      • Staffing requirements need to be actively monitored to ensure the outsourcer doesn't have degradation of quality or hiring standards. Don't assume that things run well – complete regular checks and ask for access to audit results.
      • Are the systems and data being accessed by the vendor highly sensitive or subject to regulatory requirements? If so, it is your job to ensure that vendor staff are being screened appropriately.

      Does your service desk need to integrate to other IT services?

      A common challenge when outsourcing multiple services to more than one vendor is a lack of collaboration and communication between vendors.

      • Leverage SIAM capabilities to integrate service desk tasks to other IT services, if needed.
      • "Service Integration and Management (SIAM) is a management methodology that can be applied in an environment that includes services sourced from a number of service providers" (Scopism Limited, 2020).
      • SIAM supports cross-functional integrations. Organizations that look for a single provider will be less likely to get maximum benefits from SIAM.

      There are three layers of entities in SIAM:

      • Customer Organization: The customer who receives services, who defines the relationship with service providers.
      • Service Integrator: End-to-end service governance and integration is done at this layer, making sure all service providers are committed to their services.
      • Service Provider: Responsible party for service delivery according to contract. It can be combination of internal provider, managed by internal agreements, and external provider, managed by SLAs between providers and customer organization.

      Use SIAM to obtain better results from multiple service providers

      In the SIAM model, the customer organization keeps strategic, governance, and business activities, while integrating other services (either internally or externally).

      This is an image of the SIAM model

      SIAM Layers. Source: SIAM Foundation BoK

      Utilize SIAM to obtain better results from multiple service providers

      SIAM reduces service duplication and improves service delivery via managing internal and external service providers.

      To utilize the SIAM model, determine the following components:

      • Service providers
      • Service consumers
      • Service outcomes
      • Service obstacles and boundaries
      • Service dependencies
      • Technical requirements and interactions for each service
      • Service data and information including service levels

      To learn more about adopting SIAM, visit Scopism.

      1.2.3 Discuss if you need to outsource only service desk or if additional services would benefit from outsourcing too

      1-2 hours

      • Discuss principles and goals of SIAM and how integrating other services can apply within your processes.
      • Review the list of service desk processes and tasks to be outsourced from activities 1.2.1 and 1.2.2.
      • Brainstorm a list of other services that are outsourced/need to be outsourced.
      • Determine providers of each service (both internal and external). Document the other services to be integrated in the project charter template and requirements database library.

      Input

      • SIAM objectives
      • List of service desk processes to outsource

      Output

      • List of other services to outsource and integrate in the project

      Materials

      • Sticky notes
      • Markers
      • Whiteboard/flip charts
      • Laptops

      Participants

      • IT Director/CIO
      • Service Desk Manager
      • Service Desk Team

      Download the Requirements Database Library

      Download the Project Charter Template

      Establish requirements for problem management in the outsourcing plan

      Your MSP should not just fulfill SLAs – they should be a proactive source of value.

      Problem management is a group effort. Make sure your internal team is assisted with sufficient and efficient data by the outsourcer to conduct a better problem management.

      Clearly state your organization's expectations for enabling problem management. MSPs may not necessarily need, and cannot do, problem management; however, they should provide metrics to help you discover trends, define recurring issues, and enable root cause analysis.

      For more information on problem management, refer to Info-Tech's blueprint Improve Incident and Problem Management.

      PROBLEM MANAGEMENT

      INCIDENT MANAGEMENT

      INTAKE: Ticket data from incident management is needed for incident matching to identify problems. Critical Incidents are also a main input to problem management.

      EVENT MANAGEMENT

      INTAKE: SMEs and operations teams monitoring system health events can identify indicators of potential future issues before they become incidents.

      APPLICATION, INFRASTRUCTURE, and SECURITY TEAMS

      ACTION: Problem tickets require investigation from relevant SMEs across different IT teams to identify potential solutions or workarounds.

      CHANGE MANAGEMENT

      OUTPUT: Problem resolution may need to go through Change Management for proper authorization and risk management.

      Outline problem management protocols to gain value from your service provider

      • For example, with a deep dive into ticket trend analysis, your MSP should be able to tell you that you've had a large number of tickets on a particular issue in the past month, allowing you to look into means to resolve the issue and prevent it from reoccurring.
      • A proactive MSP should be able to help your service levels improve over time. This should be built into the KPIs and metrics you ask for from the outsourcer.

      Sample Scenario

      Your MSP tracks ticket volume by platform.

      There are 100 network tickets/month, 200 systems tickets/month, and 5,000 end-user tickets/month.

      Tracking these numbers is a good start, but the real value is in the analysis. Why are there 5,000 end-user tickets? What are the trends?

      Your MSP should be providing a monthly root-cause analysis to help improve service quality.

      Outcomes:

      1. Meeting basic SLAs tells a small part of the story. The MSP is performing well in a functional sense, but this doesn't shed any insight on what kind of knowledge or value is being added.
      2. The MSP should provide routine updates on ticket trends and other insights gained through data analysis.
      3. A commitment to continual improvement will provide your organization with value throughout the duration of the outsourcing agreement.

      Phase 2

      Design an Outsourcing Strategy

      Define the goal

      Design an outsourcing strategy

      Develop an RFP and make a long-term relationship

      1.1 Identify goals and objectives

      1.2 Assess outsourcing feasibility

      2.1 Identify project stakeholders

      2.2 Outline potential risks and constraints

      3.1 Prepare a service overview and responsibility matrix

      3.2 Define your approach to vendor relationship management

      3.3 Manage the outsource relationship

      This phase will walk you through the following activities:

      • Identify roles and responsibilities
      • Determine potential risks of outsourcing the service desk
      • Build a list of metrics

      This phase involves the following participants:

      • Service Desk Team
      • IT Leadership

      Define requirements for outsourcing service desk support

      Step 2.1

      Identify project stakeholders

      Activity

      2.1.1 Identify internal outsourcing roles and responsibilities

      Design an Outsourcing Strategy

      This step requires the following inputs:

      • List of service desk roles
      • Service desk outsourcing goals

      This step involves the following participants:

      • IT Managers
      • Project Team
      • Service Desk Manager

      Outcome of this step

      • Outsourcing roles and responsibilities

      Design an outsourcing strategy to capture the vision of your service desk

      An outsourcing strategy is crucial to the proper accomplishment of an outsourcing project. By taking the time to think through your strategy beforehand, you will have a clear idea of your desired outcomes. This will make your RFP of higher quality and will result in a much easier negotiation process.

      Most MSPs are prepared to offer a standard proposal to clients who do not know what they want. These are agreements that are doomed to fail. A clearly defined set of goals (discussed in Phase 1), risks, and KPIs and metrics (covered in this phase) makes the agreement more beneficial for both parties in the long run.

      1. Identify goals and objectives
      2. Determine mission statement
      3. Define roles and responsibilities
      4. Identify risks and constraints
      5. Define KPIs and metrics
      6. Complete outsourcing strategy

      A successful outsourcing initiative depends on rigorous preparation

      Outsourcing is a garbage in, garbage out initiative. You need to give your service provider the information they need to provide an effective product.

      • Data quality is critical to your outsourcing initiative's success.
      • Your vendor will be much better equipped to help you and to better price its services if it has a thorough understanding of your IT environment.
      • This means more than just building a catalog of your hardware and software. You will need to make available documented policies and processes so you and your vendor can understand where they fit in.
      • Failure to completely document your environment can lead to a much longer time to value as your provider will have to spend much more time (and thus much more money) getting their service up and running.

      "You should fill the gap before outsourcing. You should make sure how to measure tickets, how to categorize, and what the cost of outsourcing will be. Then you'll be able to outsource the execution of the service. Start your own processes and then outsource their execution."
      – Kris Krishan, Head of IT and business systems, Waymo

      Case Study

      Digital media company built an outsourcing strategy to improve customer satisfaction

      INDUSTRY: Digital Media

      SOURCE: Auxis

      Challenge

      A Canadian multi-business company with over 13,000 employees would like to maintain a growing volume of digital content with their endpoint management.

      The client operated a tiered model service desk. Tier 1 was outsourced, and tier 2 tasks were done internally, for more complex tasks and projects.

      As a result of poor planning and defining goals, the company had issues with:

      • Low-quality ticket handling
      • High volume of tickets escalated to tier 2, restraining them from working on complex tickets
      • High turn over and a challenge with talent retention
      • Insufficient documentation to train external tier 1 team
      • Long resolution time and low end-user satisfaction

      Solution

      The company structured a strategy for outsourcing service desk and defined their expectations and requirements.

      They engaged with another outsourcer that would fulfill their requirements as planned.

      With the help of the outsourcer's consulting team, the client was able to define the gaps in their existing processes and system to:

      • Implement a better ticketing system that could follow best-practices guidelines
      • Restructure the team so they would be able to handle processes efficiently

      Results

      The proactive planning led to:

      • Significant improvement in first call resolution (82%).
      • MTTR improvement freed tier 2 to focus on business strategic objectives and allowed them to work on higher-value activities.
      • With a better strategy around outsourcing planning, the company saved 20% of cost compared to the previous outsourcer.
      • As a result of this partnership, the company is providing a 24/7 structure in multiple languages, which is aligned with the company's growth.
      • Due to having a clear strategy built for the project, the client now has better visibility into metrics that support long-term continual improvement plans.

      Define roles and responsibilities for the outsourcing transition to form the base of your outsourcing strategy

      There is no "I" in outsource; make sure the whole team is involved

      Outsourcing is a complete top-to-bottom process that involves multiple levels of engagement:

      • Management must make high-level decisions about staffing and negotiate contract details with the vendor.
      • Service desk employees must execute on the documentation and standardization of processes in an effort to increase maturity.
      • Roles and responsibilities need to be clearly defined to ensure that all aspects of the transition are completed on time.
      • Implement a full-scale effort that involves all relevant staff. The most common mistake is to have the project design follow the same top-down pattern as the decision-making process.

      Info-Tech Insight

      The service desk doesn't operate in isolation. The service desk interfaces with many other parts of the organization (such as finance, purchasing, field support, etc.), so it's important to ensure you engage stakeholders from other departments as well. If you only engage the service desk staff in your discussions around outsourcing strategy and RFP development, you may miss requirements that will come up when it's too late.

      2.1.1 Identify internal outsourcing roles and responsibilities

      2 hours

      1. The sample RACI chart in section 5 of the Project Charter Template outlines which positions are responsible, accountable, consulted, and informed for each major task within the outsourcing project.
      2. Responsible, is the group that is responsible for the execution and oversight of activities for the project. Accountable is the owner of the task/process, who is accountable for the results and outcomes. Consulted is the subject matter expert (SME) who is actively involved in the task/process and consulted on decisions. Informed is not actively involved with the task/process and is updated about decisions around the task/process.
      3. Make sure that you assign only one person as accountable per process. There can be multiple people responsible for each task. Consulted and Informed are optional for each task.
      4. Complete the RACI chart with recommended participants, and document in your service desk outsourcing project charter, under section 5.

      Input

      • RACI template
      • Org chart

      Output

      • List of roles and responsibilities for outsource project

      Materials

      • Whiteboard/flip charts
      • Markers
      • Laptops

      Participants

      • IT Director/CIO
      • Service Desk Manager
      • Service Desk Team

      Download the Project Charter Template

      Step 2.2

      Outline potential risks and constraints

      Activities

      2.2.1 Identify potential risks and constraints that may impact achievement of objectives

      2.2.2 Arrange groups of tension metrics to balance your reporting

      Design an Outsourcing Strategy

      This step will walk you through the following activities:

      • Outsourcing objectives
      • Potential risks

      This step involves the following participants:

      • IT Managers
      • Project Team
      • Service Desk Manager

      Outcomes of this step

      • Mitigation strategy for each risk
      • Service desk metrics

      Know your constraints to reduce surprises during project implementation

      No service desk is perfect; know your limits and plan accordingly

      Define your constraints to outsourcing the service desk.

      Consider all types of constraints and opportunities, including:

      • Business forces
      • Economic cycles
      • Disruptive tech
      • Regulation and compliance issues
      • Internal organizational issues

      Within the scope of a scouring decision, define your needs and objectives, measure those as much as possible, and compare them with the "as-is" situation.

      Start determining what alternative approaches/scenarios the organization could use to fill the gaps. Start a comparison of scenarios against drivers, goals, and risks.

      Constraints

      Goals and objectives

      • Budget
      • Maturity
      • Compliance
      • Regulations
      • Outsourcing Strategy

      Plan ahead for potential risks that may impede your strategy

      Risk assessment must go hand-in-hand with goal and objective planning

      Risk is inherent with any outsourcing project. Common outsourcing risks include:

      • Lack of commitment to the customer's goals from the vendor.
      • The distraction of managing the relationship with the vendor.
      • A perceived loss of control and a feeling of over-dependence on your vendor.
      • Managers may feel they have less influence on the development of strategy.
      • Retained staff may feel they have become less skilled in their specialist field.
      • Unanticipated expenses that were assumed to be offered by the vendor.
      • Savings only result from high capital investment in new projects on the part of the customer.

      Analyze the risks associated with a specific scenario. This analysis should identify and understand the most common sourcing and vendor risks using a risk-reward analysis for selected scenarios. Use tools and guidelines to assess and manage vendor risk and tailor risk evaluation criteria to the types of vendors and products.

      Info-Tech Insight

      Plan for the worst to prevent it from happening. Evaluating risk should cover a wide variety of scenarios including the worst possible cases. This type of thinking will be crucial when developing your exit strategy in a later exercise.

      2.2.1 Identify potential risks and constraints that may impact achievement of objectives

      1-3 hours

      1. Brainstorm any potential risks that may arise through the outsourcing project. Describe each risk and categorize both its probability of occurring and impact on the organization as high (H), medium (M), or low (L), using the table below:
      Risk Description

      Probability(H/M/L)

      Impact(H/M/L)Planned Mitigation
      Lack of documentationMMUse cloud-based solution to share documents.
      Knowledge transferLMDetailed knowledge-sharing agreement in place in the RFP.
      Processes not followedLHClear outline and definition of current processes.
      1. Identify any constraints for your outsourcing strategy that may restrict, limit, or place certain conditions on the outsourcing project.
        • This may include budget restrictions or staffing limitations.
        • Identifying constraints will help you be prepared for risks and will lessen their impact.
      2. Document risks and constraints in section 6 of the Service Desk Outsourcing Project Charter Template.

      Input

      • RACI template
      • Org chart

      Output

      • List of roles and responsibilities for outsource project

      Materials

      • Whiteboard/flip charts
      • Markers

      Participants

      • IT Director/CIO
      • Service Desk Manager
      • Service Desk Team

      Download the Project Charter Template

      Define service tiers and roles to develop clear vendor SLAs

      Management of performance, SLAs, and customer satisfaction remain the responsibility of your organization.

      Define the tiers and/or services that will be the responsibility of the MSP, as well as escalations and workflows across tiers. A sample outsourced structure is displayed here:

      External Vendor

      Tickets beyond the scope of the service desk staff need to be escalated back to the vendor responsible for the affected system.

      Tier 3

      Tickets that are focused on custom applications and require specialized or advanced support are escalated back to your organization's second- and third-level support teams.

      Tier 2

      The vendor is often able to provide specialized support for standard applications. However, the desktop support still needs someone onsite as that service is very expensive to outsource.

      Tier 1

      Service desk outsource vendors provide first-line response. This includes answering the phones, troubleshooting simple problems, and redirecting requests that are more complex.

      Info-Tech Insight

      If you outsource everything, you'll be at the mercy of consultancy or professional services shops later on. You won't have anyone in-house to help you deploy anything; you're at the mercy of a consultant to come in and tell you what to do and how much to spend. Keep your highly skilled people in-house to offset what you'd have to pay for consultancy. If you need to repatriate your service desk later on, you will need skills in-house to do so.

      Don't become obsessed with managing by short-term metrics – look at the big picture

      "Good" metric results may simply indicate proficient reactive fixing; long-term thinking involves implementing proactive, balanced solutions.

      KPIs demonstrate that you are running an effective service desk because:

      • You close an average of 300 tickets per week
      • Your first call resolution is above 90%
      • Your talk time is less than five minutes
      • Surveys reveal clients are satisfied

      While these results may appear great on the surface, metrics don't tell the whole story.

      The effort from any support team seeks to balance three elements:

      FCR: Time; Resources; Quality

      First-Contact Resolution (FCR) Rate

      Percentage of tickets resolved during first contact with user (e.g. before they hang up or within an hour of submitting ticket). Could be measured as first-contact, first-tier, or first-day resolution.

      End-User Satisfaction

      Perceived value of the service desk measured by a robust annual satisfaction survey of end users and/or transactional satisfaction surveys sent with a percentage of tickets.

      Ticket Volume and Cost Per Ticket

      Monthly operating expenses divided by average ticket volume per month. Report ticket volume by department or ticket category, and look at trends for context.

      Average Time to Resolve (incidents) or Fulfill (service requests)

      Time elapsed from when a ticket is "open" to "resolved." Distinguish between ticket resolution vs. closure, and measure time for incidents and service requests separately.

      Focus on tension metrics to achieve long-term success

      Tension metrics help create a balance by preventing teams from focusing on a single element.

      For example, an MSP built incentives around ticket volume for their staff, but not the quality of tickets. As a result, the MSP staff rushed through tickets and gamed the system while service quality suffered.

      Use metrics to establish baselines and benchmarking data:

      • If you know when spikes in ticket volumes occur, you can prepare to resource more appropriately for these time periods
      • Create KB articles to tackle recurring issues and assist tier 1 technicians and end users.
        • Employ a root cause analysis to eliminate recurring tickets.

      "We had an average talk time of 15 minutes per call and I wanted to ensure they could handle those calls in 15 minutes. But the behavior was opposite, [the vendor] would wrap up the call, transfer prematurely, or tell the client they'd call them back. Service levels drive behavior so make sure they are aligned with your strategic goals with no unintended consequences."
      – IT Services Manager, Banking

      Info-Tech Insight

      Make sure your metrics work cooperatively. Metrics should be chosen that cause tension on one another. It's not enough to rely on a fast service desk that doesn't have a high end-user satisfaction rate or runs at too high a cost; there needs to be balance.

      2.2.2 Arrange groups of tension metrics to balance your reporting

      1-3 hours

      1. Define KPIs and metrics that will be critical to service desk success.
      2. Distribute sticky notes of different colors to participants around the table.
      3. Select a space to place the sticky notes – a table, whiteboard, flip chart, etc. – and divide it into three zones.
      4. Refer to your defined list of goals and KPIs from activity 1.1.3 and discuss metrics to fulfill each KPI. Note that each goal (critical success factor, CSF) may have more than one KPI. For instance:
        1. Goal 1: Increase end-user satisfaction; KPI 1: Improve average transactional survey score. KPI 2: Improve annual relationship survey score.
        2. Goal 2: Improve service delivery; KPI 1: Reduce time to resolve incidents. KPI 2: Reduce time to fulfill service requests.
      5. Recall that tension metrics must form a balance between:
        1. Time
        2. Resources
        3. Quality
      6. Record the results in section 7 of the Service Desk Outsourcing Project Charter Template.

      Input

      • Service desk outsourcing goals
      • Service desk outsourcing KPIs

      Output

      • List of service desk metrics

      Materials

      • Whiteboard/flip charts
      • Sticky notes
      • Markers
      • Laptops

      Participants

      • Project Team
      • Service Desk Manager

      Download the Project Charter Template

      Phase 3

      Develop an RFP and make a long-term relationship

      Define the goal

      Design an outsourcing strategy

      Develop an RFP and make a long-term relationship

      1.1 Identify goals and objectives

      1.2 Assess outsourcing feasibility

      2.1 Identify project stakeholders

      2.2 Outline potential risks and constraints

      3.1 Prepare a service overview and responsibility matrix

      3.2 Define your approach to vendor relationship management

      3.3 Manage the outsource relationship

      This phase will walk you through the following activities:

      • Build your outsourcing RFP
      • Set expectations with candidate vendors
      • Score and select your vendor
      • Manage your relationship with the vendor

      This phase involves the following participants:

      • CIO
      • Service Desk Manager
      • IT Managers
      • Project Managers

      Define requirements for outsourcing service desk support

      Step 3.1

      Prepare a service overview and responsibility matrix

      Activities

      3.1.1 Evaluate your technology, people, and process requirements

      3.1.2 Outline which party will be responsible for which service desk processes

      This step requires the following inputs:

      • Service desk processes and requirements

      This step involves the following participants:

      • CIO
      • Service Desk Manager
      • IT Managers
      • Project Managers

      Outcomes of this step

      • Knowledge management and technology requirements
      • Self-service requirements

      Develop an RFP and make a long-term relationship

      Create a detailed RFP to ensure your candidate vendor will fulfill all your requirements

      At its core, your RFP should detail the outcomes of your outsourcing strategy and communicate your needs to the vendor.

      The RFP must cover business needs and the more detailed service desk functions required. Many enterprises only consider the functionality they need, while ignoring operational and selection requirements.

      Negotiate a supply agreement with the preferred outsourcer for delivery of the required services. Ensure your RFP covers:

      1. Service specification
      2. Service levels
      3. Roles and responsibilities
      4. Transition period and acceptance
      5. Prices, payment, and duration
      6. Agreement administration
      7. Outsourcing issues

      In addition to defining your standard requirements, don't forget to take into consideration the following factors when developing your RFP:

      • Employee onboarding and hardware imaging for new users
      • Applications you need current and future support for
      • Reporting requirements
      • Self-service options
      • Remote support needs and locations

      Although it may be tempting, don't throw everything over the wall at your vendor in the RFP. Evaluate your service desk functions in terms of quality, cost effectiveness, and the value provided from the vendor. Organizations should only outsource functions that the vendor can operate better, faster, or cheaper.

      Info-Tech Insight

      Involve the right stakeholders in developing your RFP, not just service desk. If only service desk is involved in RFP discussion, the connection between tier 1 and specialists will be broken, as some processes are not considered from IT's point of view.

      Identify ITSM solution requirements

      Your vendor probably uses a different tool to manage their processes; make sure its capabilities align with the vision of your service desk.

      Your service desk and outsourcing strategy were both designed with your current ITSM solution in mind. Before you hand the reins to an MSP, it is crucial that you outline how your current ITSM solution is being used in terms of functionality.

      Find out if it's better to have the MSP use their own ITSM tools or your ITSM solution.

      Benefits of operating within your own ITSM while outsourcing the service desk:

      Disadvantages of using your own ITSM while outsourcing the service desk:

      • If you provide the service catalog, it's easier to control your ITSM tool yourself.
      • Using your own ITSM and giving access to the outsourcer will allow you to build your dashboard and access your operational metrics rather than relying on the MSP to provide you with metrics.
      • Usage of the current tool may be extended across multiple departments, so it may be in the best interest of your business to have the vendor adopt usage of the current tool.
      • While many ITSM solutions have similar functions, innate differences do exist between them. Outsourcers mostly want to operate in their own ticketing solution. As other departments besides IT may be using the service management tool, you will need to have the same tool across the organization. This makes purchasing the new ITSM license very expensive, unless you operate in the same ITSM as the outsourcer.
      • You need your vendor to be able to use the system you have in order to meet your requirements, which will limit your options in the market.
      • If the outsourcer is using your ITSM, you should provide training to them.

      Info-Tech Insight

      Defining your tool requirements can be a great opportunity to get the tool functionality you always wanted. Many MSPs offer enterprise-level ITSM tools and highly mature processes that may tempt you to operate within their ITSM environment. However, first define your goals for such a move, as well as pros and cons of operating in their service management tool to weigh if its benefits overweigh its downfalls.

      Case Study

      Lone Star College learned that it's important to select a vendor whose tool will work with your service desk

      INDUSTRY: Education

      SOURCE: ServiceNow

      Challenge

      Lone Star College has an end-user base of over 100,000 staff and students.

      The college has six campuses across the state of Texas, and each campus was using its own service desk and ITSM solution.

      Initially, the decision was to implement a single ITSM solution, but organizational complexity prevented that initiative from succeeding.

      A decision was made to outsource and consolidate the service desks of each of the campuses to provide more uniform service to end users.

      Solution

      Lone Star College selected a vendor that implemented FrontRange.

      Unfortunately, the tool was not the right fit for Lone Star's service and reporting needs.

      After some discussion, the outsourcing vendor made the switch to ServiceNow.

      Some time later, a hybrid outsourced model was implemented, with Lone Star and the vendor combining to provide 24/7 support.

      Results

      The consolidated, standardized approach used by Lone Star College and its vendor has created numerous benefits:

      • Standardized reporting
      • High end-user satisfaction
      • All SLAs are being met
      • Improved ticket resolution times
      • Automated change management.

      Lone Star outsourced in order to consolidate its service desks quickly, but the tools didn't quite match.

      It's important to choose a tool that works well with your vendor's, otherwise the same standardization issues can persist.

      Design your RFP to help you understand what the vendor's standard offerings are and what it is capable of delivering

      Your RFP should be worded in a way that helps you understand what your vendor's standard offerings are because that's what they're most capable of delivering. Rather than laying out all your requirements in a high level of detail, carefully craft your questions in a probing way. Then, understand what your current baseline is, what your target requirements are, and assess the gap.

      Design the RFP so that responses can easily be compared against one another.

      It is common to receive responses that are very different – RFPs don't provide a response framework. Comparing vastly different responses can be like comparing apples to oranges. Not only are they immensely time consuming to score, their scores also don't end up accurately reflecting the provider's capabilities or suitability as a vendor.

      If your RFP is causing a ten minute printer backlog, you're doing something wrong.

      Your RFP should not be hundreds of pages long. If it is, there is too much detail.

      Providing too much detail can box your responses in and be overly limiting on your responses. It can deter potentially suitable provider candidates from sending a proposal.

      Request
      For
      Proposal

      "From bitter experience, if you're too descriptive, you box yourself in. If you're not descriptive enough, you'll be inundated with questions or end up with too few bidders. We needed to find the best way to get the message across without putting too much detail around it."
      – Procurement Manager, Utilities

      Info-Tech's Service Desk Outsourcing RFP Template contains nine sections

      1. Statement of work
        • Purpose, coverage, and participation ààInsert the purpose and goals of outsourcing your service desk, using steps 1.1 findings in this blueprint as reference.
      2. General information
        • Information about the document, enterprise, and schedule of events ààInsert the timeline you developed for the RFP issue and award process in this section.
      3. Proposal preparation instructions
        • The vendor's understanding of the RFP, good faith statement, points of contact, proposal submission, method of award, selection and notification.
      4. Service overview
        • Information about organizational perspective, service desk responsibility matrix, vendor requirements, and service level agreements (SLAs).
      5. Scope of work, specifications and requirements
        • Technical and functional requirements à Insert the requirements gathered in Phase 1 in this section of the RFP. Remember to include both current and future requirements.
      6. Exit conditions
        • Overview of exit strategy and transition process.
      7. Vendor qualifications and references
      8. Account management and estimated pricing
      9. Vendor certification
      This is a screenshot of the Service Desk Outsourcing RFP Template.

      The main point of focus in this document is defining your requirements (discussed in Phase 1) and developing proposal preparation instructions.

      The rest of the RFP consists mostly of standard legal language. Review the rest of the RFP template and adapt the language to suit your organization's standards. Check with your legal departments to make sure the RFP adheres to company policies.

      3.1.1 Evaluate your technology, people, and process requirements

      1-2 hours

      1. Review the outsourcing goals you identified in Phase 1 (activity 1.1.3).
      2. For each goal, divide the defined requirements from your requirements database library (activity 1.2.1) into three areas:
        1. People Requirements
        2. Process Requirements
        3. Technical Requirements
      3. Group your requirements based on characteristics (e.g. recovery capabilities, engagement methodology, personnel, etc.).
      4. Validate these requirements with the relevant stakeholders.
      5. Document your results in section 4 of the Service Desk Outsourcing RFP Template.

      Input

      • Identified key requirements

      Output

      • Refined requirements to input into the RFP

      Materials

      • Whiteboard/flip charts
      • Markers
      • Laptops

      Participants

      • IT Director/CIO
      • Service Desk Manager
      • IT Managers

      Download the Service Desk Outsourcing RFP Template

      Assess knowledge management and technology requirements to enable the outsourcer with higher quality work

      Retain ownership of the knowledgebase to foster long-term growth of organizational intelligence

      With end users becoming more and more tech savvy, organizational intelligence is becoming an increasingly important aspect of IT support. Modern employees are able and willing to troubleshoot on their own before calling into the service desk. The knowledgebase and FAQs largely facilitate self-serve trouble shooting, both of which are not core concerns for the outsource vendor.

      Why would the vendor help you empower end users and decrease ticket volume when it will lead to less revenue in the future? Ticket avoidance is not simply about saving money by removing support. It's about the end-user community developing organizational intelligence so that it doesn't need as much technical support.

      Organizational intelligence occurs when shared knowledge and insight is used to make faster, better decisions.

      When you outsource, the flow of technical insight to your end-user community slows down or stops altogether unless you proactively drive it. Retain ownership of the knowledgebase and ensure that the content is:

      1. Validated to ensure it accurately describes the best solution.
      2. Actionable to ensure it prescribes repeatable, verifiable steps.
      3. Contextual to ensure the reader knows when NOT to apply the knowledge.
      4. Maintained to ensure the solution remains current.
      5. Applied, since knowledge is a cost with no benefit unless you apply it and turn it into organizational intelligence.

      Info-Tech Insight

      Include knowledge management process in your ticket handling workflows to make sure knowledge is transferred to the MSP and end users. For more information on knowledge management, refer to Info-Tech's Standardize the Service Desk and Optimize the Service Desk With a Shift-Left Strategy blueprints.

      Assess self-service requirements in your outsourcing plan

      When outsourcing the service desk, determine who will take ownership of the self-service portal.

      Nowadays, outsourcers provide innovative services such as self-serve options. However, bear in mind that the quality of such services is a differentiating factor. A well-maintained portal makes it easy to:

      • Report incidents efficiently via use-case-based forms
      • Place requests via a business-oriented service catalog
      • Automate request processes
      • Give visibility on ticket status
      • Access knowledgebase articles
      • Provide status on critical systems
      • Look for services by both clicking service lists and searching them
      • Provide 24/7 service via interactive communication with live agent and AI-powered machine
      • Streamline business process in multiple departments rather than only IT

      In the outsourcing process, determine your expectations from your vendor on self-serve options and discuss how they will fulfill these requirements. Similar to other processes, work internally to define a list of services your organization is providing that you can pass over to the outsourcer to convert to a service catalog.

      Use Info-Tech's Sample Enterprise Services document to start determining your business's services.

      Assess admin rights in your outsourcing plan to give access to the outsourcer while you keep ownership

      Provide accessibility to account management to improve self-service, which enables:

      • Group owners to be named who can add or remove people from their operating units
      • Users to update attributes such as photos, address, phone number
      • Synchronization with HRIS (Human Resource Information Systems) to enable two-way communication on attribute updates
      • Password reset self-service

      Ensure the vendor has access rights to execute regular clean up to help:

      • Find stale and inactive user and computer accounts (inactive, expired, stale, never logged in)
      • Bulk move and disable capabilities
      • Find empty groups and remove
      • Find and assess NTFS permissions
      • Automated tasks to search and remediate

      Give admin rights to outsourcer to enable reporting and auditing capabilities, such as:

      • Change tracking and notifications
      • Password reset attempts, account unlocks, permission and account changes
      • Anomaly detection and remediation
      • Privilege abuse, such as password sharing

      Info-Tech Insight

      Provide your MSP with access rights to enable the service desk to have account management without giving too much authentication. This way you'll enable moving tickets to the outsourcer while you keep ownership and supervision.

      3.1.2 Outline which party will be responsible for which service desk processes

      1-2 hours

      This activity is an expansion to the outcomes of activity 1.2.1, where you determined the outsourcing requirements and the party to deliver each requirement.

      1. Add your identified tasks from the requirements database library to the service desk responsibility matrix (section 4.2 of the Service Desk Outsourcing RFP Template).
      2. Break each task down into more details. For instance, incident management may include tier 1, tier 2/3, KB creation and update, reporting, and auditing.
      3. Refer to section 4.1 of your Project Charter to review the responsible party for each use case.
      4. Considering the use cases, assess whether your organization, the MSP, or both parties will be responsible for the task.
      5. Document the results in section 4.2 of the RFP.

      Input

      • Identified key requirements

      Output

      • Responsible party to deliver each task

      Materials

      • Whiteboard/flip charts
      • Markers
      • Laptops

      Participants

      • IT Director/CIO
      • Service Desk Manager
      • IT Managers

      Download the Service Desk Outsourcing RFP Template

      Step 3.2

      Define your approach to vendor relationship management

      Activities

      3.2.1 Define your SLA requirements

      3.2.2 Score each vendor to mitigate the risk of failure

      3.2.3 Score RFP responses

      3.2.4 Get referrals, conduct reference interviews and evaluate responses for each vendor

      Develop an RFP and make a long-term relationship

      This step requires the following inputs:

      • Service desk outsourcing RFP
      • List of service desk outsourcing requirements

      This step involves the following participants:

      • CIO
      • Service Desk Manager
      • IT Managers
      • Project Managers

      Outcomes of this step

      • Service desk SLA
      • RFP scores

      Don't rush to judgment; apply due diligence when selecting your vendor

      The most common mistake in vendor evaluation is moving too quickly. The process leading to an RFP evaluation can be exhausting, and many organizations simply want to be done with the whole process and begin outsourcing.

      The most common mistake in vendor evaluation is moving too quickly. The process leading to an RFP evaluation can be exhausting, and many organizations simply want to be done with the whole process and begin outsourcing.

      1. Call around to get referrals for each vendor
      2. Create a shortlist
      3. Review SLAs and contract terms
      4. Select your vendor

      Recognize warning signs in the MSP's proposal to ensure a successful negotiation

      Vendors often include certain conditions in their proposals that masquerade as appealing but may spell disaster. Watch for these red flags:

      1. Discounted Price
        • Vendors know the market value of their competitors' services. Price is not what sets them apart; it's the type of services offered as well as the culture present.
        • A noticeably low price is often indicative of a desperate organization that is not focused on quality managed services.
      2. No Pushback
        • Vendors should work to customize their proposal to suit both their capabilities and your needs. No pushback means they are not invested in your project as deeply as they should be.
        • You should be prepared for and welcome negotiations; they're a sign that both sides are reaching a mutually beneficial agreement.
      3. Continual SLA Improvement
        • Continual improvement is a good quality that your vendor should have, but it needs to have some strategic direction.
        • Throwing continual SLA improvement into the deal may seem great, but make sure that you'll benefit from the value-added service. Otherwise, you'll be paying for services that you don't actually need.

      Clearly define core vendor qualities before looking at any options

      Vendor sales and marketing people know just what to say to sway you: don't talk to them until you know what you're looking for.

      Geography

      Do you prefer global or local data centers? Do you need multiple locations for redundancy in case of disaster? Will language barriers be a concern?

      Contract Length

      Ensure you can terminate a poor arrangement by having shorter terms with optional renewals. It's better to renew and renegotiate if one side is losing in the deal in order to keep things fair. Don't assume that proposed long-term cost savings will provide a satisfactory service.

      Target Market

      Vendors are aiming at different business segments, from startups to large enterprises. Some will accept existing virtual machines, and others enforce compliance to appeal to government and health agencies.

      SLA

      A robust SLA strengthens a vendor's reliability and accountability. Agencies with special needs should have room in negotiations for customization. Providers should also account for regular SLA reviews and updates. Vendors should be tracking call volume and making projections that should translate directly to SLAs.

      Support

      Even if you don't need a vendor with 24/7 availability, vendors who cannot support this timing should be eliminated. You may want to upgrade later and will want to avoid the hassle of switching.

      Maturity

      Vendors must have the willingness and ability to improve processes and efficiencies over time. Maintaining the status-quo isn't acceptable in the constantly evolving IT world.

      Cost

      Consider which model makes the most sense: will you go with per call or per user pricing? Which model will generate vendor motivation to continually improve and meet your long-term goals? Watch out for variable pricing models.

      Define your SLA requirements so your MSP can create a solution that fits

      SLAs ensure accountability from the service provider and determine service price

      SLAs define the performance of the service desk and clarify what the provider and customer can expect in their outsourcing relationship.

      • Service categories
      • The acceptable range of end-user satisfaction
      • The scope of what functions of the service desk are being measured (availability, time to resolve, time to respond, etc.)
      • Credits and penalties for achieving or missing targets
      • Frequency of measurement/reporting
      • Provisions and penalties for ending the contractual relationship early
      • Management and communication structure
      • Escalation protocol for incidents relating to tiers 2 or 3

      Each MSP's RFP response will help you understand their basic SLA terms and enhanced service offerings. You need to understand the MSP's basic SLA terms to make sure they are adequate enough for your requirements. A well-negotiated SLA will balance the requirements of the customer and limit the liability of the provider in a win/win scenario.

      For more information on defining service level requirements, refer to Info-Tech's blueprint Reduce Risk With Rock-Solid Service-Level Agreements.

      3.2.1 Define your SLA requirements

      2-3 hours

      • As a team, review your current service desk SLA for the following items:
        • Response time
        • Resolution time
        • Escalation time
        • End-user satisfaction
        • Service availability
      • Use the sample table as a starting point to determine your current incident management SLA:
      • Determine your SLA expectations from the outsourcer.
      • Document your SLA expectations in section 4.4 of the RFP template.

      Participants: IT Managers, Service Desk Manager, Project Team

      Response
      PriorityResponse SLOResolution SLOEscalation Time
      T1
      Severity 1CriticalWithin 10 minutes4 hours to resolveImmediate
      Severity 2HighWithin 1 business hour8 business hours to resolve20 minutes
      Severity 3MediumWithin 4 business hours24 business hours to resolveAfter 20 minutes without progress
      Severity 4LowSame day (8 hours)72 business hours to resolve After 1 hour without progress
      SLO ResponseTime it takes for service desk to respond to service request or incident. Target response is 80% of SLO
      SLO ResolutionTime it takes to resolve incident and return business services to normal. Target resolution is 80% of SLO

      Download the Service Desk Outsourcing RFP Template

      Get a detailed plan from your selected vendor before signing a contract

      Build a standard process to evaluate candidate vendors

      Use section 5 of Info-Tech's Service Desk Outsourcing RFP Template for commonly used questions and requirements for outsourcing the service desk. Ask the right questions to secure an agreement that meets your needs. If you are already in a contract with an MSP, tale the opportunity of contract renewal to improve the contract and service.

      This is a screenshot of the Service Desk Outsourcing RFP Template.

      Download the Service Desk Outsourcing RFP Template

      Add your finalized assessment questions into Info-Tech's Service Desk Outsourcing RFP Scoring Tool to aggregate responses in one repository for comparison. Since the vendors are asked to respond in a standard format, it is easier to bring together all the responses to create a complete view of your options.

      This is an image of the Service Desk Vendor Proposal Scoring Tool

      Download the Service Desk Vendor Proposal Scoring Tool

      3.2.2 Score each vendor to mitigate the risk of failure

      1-2 hours

      Include the right requirements for your organization and analyze candidate vendors on their capability to satisfy them.

      1. Use section 5 of the RFP template to convert your determined requirements into questions to address in vendor briefings.
      2. Review the questions in the context of near- and long-term service desk outsourcing needs. In the template, we have separated requirements into 7 categories:
        • Vendor Requirements (VR)
        • Vendor Qualifications/Engagement/Administration Capabilities (VQ)
        • Service Operations (SO)
        • Service Support (SS)
        • Service Level Agreement (SLA)
        • Transition Processes (TP)
        • Account Management (AM)
      3. Define the priority for each question:
        • Required
        • Desired
        • Optional
      4. Leave the compliance and comments to when you brief with vendors.

      Input

      • Technical and functional requirements

      Output

      • Priority level for each requirement
      • Completed list of requirement questions

      Materials

      • Whiteboard/flip charts
      • Markers
      • Laptops

      Participants

      • IT Director/CIO
      • Service Desk Manager
      • IT Managers

      Download the Service Desk Outsourcing RFP Template

      3.2.3 Score RFP responses

      2-3 hours

      1. Enter the requirements questions into the RFP Scoring Tool and use it during vendor briefings.
      2. Copy the Required and Desired priority requirements from the previous activity into the RFP Questions column.
      3. Evaluate each RFP response against the RFP criteria based on the scoring scale.
      4. The Results section in the tool shows the vendor ranking based on their overall scores.
      5. Compare potential outsourcing partners considering scores on individual requirements categories and based on overall scores.

      Input

      • Completed list of requirement questions
      • Priority level for each requirement

      Output

      • List of top vendors for outsourcing the service desk

      Materials

      • Service Desk Vendor Proposal Scoring Tool

      Participants

      • Service Desk Manager
      • IT Managers
      • Project Managers
      • IT Director/CIO

      Download the Service Desk Vendor Proposal Scoring Tool

      3.2.3 Get referrals, conduct reference interviews, and evaluate responses for each vendor

      1. Outline a list of questions to conduct reference interviews with past/present clients of your candidate vendors.
      2. Use the reference interview template as a starting point. As a group review the questions and edit them to a list that will fulfill your requirements.
      3. Ask your candidate vendors to provide you with a list of three to five clients that have/had used their services. Make sure that vendors enforce the interview will be kept anonymous and names and results won't be disclosed.
      4. Ask vendors to book a 20-30 minute call with you and their client.
      5. Document your interview comments in your updated reference interview template.
      6. Update the RFP scoring tool accordingly.

      Input

      • List of top vendors for outsourcing the service desk

      Output

      • Updated list of top vendors for outsourcing the service desk

      Materials

      • Service Desk Outsourcing Reference Interview Template
      • Service Desk Vendor Proposal Scoring Tool

      Participants

      • Service Desk Manager
      • IT Managers
      • Project Managers

      Download the Service Desk Vendor Proposal Scoring Tool

      Compare pricing models of outsourcing services

      It's a common sales tactic to use a low price as an easy solution. Carefully evaluate the vendors on your short-list and ensure that SLAs, culture, and price all match to your organization.

      Research different pricing models and accurately assess which model fits your organization. Consider the following pricing models:

      Pay per technician

      In this model, a flat rate is allocated to agents tackling your service desk tickets. This is a good option for building long-term relationship with outsourcer's agents and efficient knowledge transfer to the external team; however, it's not ideal for small organizations that deal with few tickets. This is potentially an expensive model for small teams.

      Pay per ticket

      This model considers the number of tickets handled by the outsourcer. This model is ideal if you only want to pay for your requirement. Although the internal team needs to have a close monitoring strategy to make sure the outsourcer's efficiency in ticket resolution.

      Pay per call

      This is based on outbound and inbound calls. This model is proper for call centers and can be less expensive than the other models; however, tracking is not easy, as you should ensure service desk calls result in efficient resolution rather than unnecessary follow-up.

      Pay per time (minutes or hours)

      The time spent on tickets is considered in this model. With this model, you pay for the work done by agents, so that it may be a good and relatively cheap option. As quicker resolution SLA is usually set by the organization, customer satisfaction may drop, as agents will be driven to faster resolution, not necessarily quality of work.

      Pay per user

      This model is based on number of all users, or number of users for particular applications. In this model, correlation between number of users and number of tickets should be taken into account. This is an ideal model if you want to deal with impact of staffing changes on service price. Although you should first track metrics such as mean time to resolve and average number of tickets so you can prevent unnecessary payment based on number of users when most users are not submitting tickets.

      Step 3.3

      Manage the outsource relationship

      Activities

      3.3.1 Analyze your outsourced service desk for continual improvement

      3.3.2 Make a case to either rehabilitate your outsourcing agreement or exit

      3.3.3 Develop an exit strategy in case you need to end your contract early

      Develop an RFP and make a long-term relationship

      This step requires the following inputs:

      • Service desk SLA
      • List of impacted stakeholder groups
      • List of impacts and benefits of the outsourced service desk

      This step involves the following participants:

      • CIO
      • Service Desk Manager
      • IT Managers
      • Project Managers

      Outcomes of this step

      • Communication plan
      • Vendor management strategy

      Ensure formality of your vendor management practice

      A service desk outsourcing project is an ongoing initiative. Build a relationship plan to make sure the outsourcer complies with the agreement.

      This is an iamge of the cycle of relationship management and pre-contract management.

      Monitor Vendor Performance

      Key Activity:

      Measure performance levels with an agreed upon standard scorecard.

      Manage Vendor Risk

      Key Activity:

      Periodical assessment of the vendors to ensure they are meeting compliance standards.

      Manage Vendor Contracts and Relationships

      Key Activity:
      Manage the contracts and renewal dates, the level of demand for the services/products provided, and the costs accrued.

      COMPLETE Identify and Evaluate Vendors

      Key Activity:
      Develop a plan with procurement and key internal stakeholders to define clear, consistent, and stable requirements.

      COMPLETE Select a Vendor

      Key Activity:
      Develop a consistent and effective process for selecting the most appropriate vendor.

      Manage Vendor Contracts and Relationships

      Key Activity:
      Contracts are consistently negotiated to ensure the vendor and the client have a documented and consistent understanding of mutual expectations.

      Expect the vendor to manage processes according to your standards

      You need this level of visibility into the service desk process, whether in-house or outsourced

      Each of these steps requires documentation – either through standard operating procedures, SLAs, logs, or workflow diagrams.

      • Define key operating procedures and workflows
      • Record, classify, and prioritize tickets
      • Verify, approve, and fulfill tickets
      • Investigate, diagnose, and allocate tickets
      • Resolve, recover, and close tickets
      • Track and report

      "Make sure what they've presented to you is exactly what's happening."
      – Service Desk Manager, Financial Services

      Manage the vendor relationship through regular communication

      Regular contact with your MSP provides opportunities to address issues that emerge

      Designate a relationship manager to act as a liaison at the business to be a conduit between the business and the MSP.

      • The relationship manager will take feedback from the MSP and relate it back to you to bridge the technical and business gap between the two.

      Who should be involved

      • Routine review meetings should involve the MSP and your relationship manager.
      • Technical knowledge may be needed to address specific issues, but business knowledge and relationship management skills are absolutely required.
      • Other stakeholders and people who are deeply invested in the vendor relationship should be invited or at least asked to contribute questions and concerns.

      What is involved

      • Full review of the service desk statistics, escalations, staffing changes, process changes, and drivers of extra billing or cost.
      • Updates to key documentation for the issues listed above and changes to the knowledgebase.
      • Significant drivers of customer satisfaction and dissatisfaction.
      • Changes that have/are being proposed that can impact any of the above.

      Communicate changes to end users to avoid push back and get buy-in

      Top-down processes for outsourcing will leave end users in the dark

      • Your service desk staff has been involved in the outsourcing process the entire time, but end users are affected all the same.
      • The service desk is the face of IT. A radical shift in service processes and points of contact can be detrimental to not only the service desk, but all of IT.
      • Communicating the changes early to end users will both help them cope with the change and help the MSP achieve better results.
        • An internal communication plan should be rolled out in order to inform and educate end users about the changes associated with outsourcing the service desk.
      • Your relationship manager should be tasked with communicating the changes to end users. The focus should be on addressing questions or concerns about the transition while highlighting the value gained through outsourcing to an MSP.
      • Service quality is a two-way street; the end user needs to be informed of proper protocols and points of contact so that the service desk technicians can fulfill their duties to the best of their ability.

      "When my company decided to outsource, I performed the same role but for a different company. There was a huge disruption to the business flow and a lack of communication to manage the change. The transition took weeks before any end users figured out what the new processes were for submitting a ticket and who to ask for help, and from a personal side, it became difficult to maintain relationships with colleagues."
      – IT Specialist for a financial institution

      Info-Tech Insight

      Educate the enterprise on expectations and processes that are handled by the MSP. Identify stakeholder groups affected by the outsourced processes then build a communication plan on what's been changed, what the benefits are, and how they will be impacted. Determine a timeline for communicating these initiatives and how these announcements will be made. Use InfoTech's Sample Communication Plan as a starting point.

      Build a continual improvement plan to make sure your MSP is efficiently delivering services according to expectations

      Ensure that your quality assurance program is repeatable and applicable to the outsourced services

      1. Design a QA scorecard that can help you assess steps the outsourcer agents should follow. Keep the questionnaire high level but specific to your environment. The scorecard should include questions that follow the steps to take considering your intake channels. For instance, if end users can reach the service desk via phone, chat, and email, build your QA around assessing customer service for call, chat, and ticket quality.
      2. Build a training program for agents: Develop an internal monitoring plan to relay detailed feedback to your MSP. Assess performance and utilize KBs as training materials for coaching agents on challenging transactions.
      3. Everything that goes to your service desk has to be documented; there will be no organic transfer of knowledge and experience.
      4. You need to let your MSP know how their efforts are impacting the performance of your organization. Measure your internal performance against the external performance of your service desk.
      5. Constant internal check-ins ensure that your MSP is meeting the SLAs outlined in the RFP.
      6. Routine reporting of metrics and ticket trends allow you to enact problem management. Otherwise, you risk your MSP operating your service desk with no internal feedback from its owner.
      7. Use metrics to determine the service desk functionality.

      Consider the success story of your outsourced service desk

      Build a feedback program for your outsourced services. Utilize transactional surveys to discover and tell outsourcing success to the impacted stakeholders.

      Ensure you apply steps for providing feedback to make sure processes are handled as expected. Service desk is the face of IT. Customer satisfaction on ticket transactions reflects satisfaction with IT and the organization.

      Build customer satisfaction surveys and conduct them for every transaction to get a better sense of outsourced service desk functionality. Collaborate with the vendor to make sure you build a proper strategy.

      • Build a right list of questions. Multiple and lengthy questions may lead to survey taking fatigue. Make sure you ask the right questions and give an option to the customer to comment any additional notes.
      • Give the option to users to rate the transaction. Make the whole process very seamless and doable in a few seconds.
      • Ensure to follow-up on negative feedback. This will help you find gaps in services and provide training to improve customer service.

      3.3.1 Analyze your outsourced service desk for continual improvement

      1 hour

      1. In this project, you determined the KPIs based on your service desk objectives (activity 2.2.2).
      2. Refer to your list of metrics in section 7 of the Service Desk Outsourcing Project Charter.
      3. Think about what story you want to tell and determine what factors will help move the narrative.
      4. Discuss how often you would like to track these metrics. Determine the audience for each metric.
      5. Provide the list to the MSP to create reports with auto-distribution.

      Input

      • Determined CSFs and KPIs

      Output

      • List of metrics to track, including frequency to report and audience to report to

      Materials

      • Service Desk Outsourcing Project Charter

      Participants

      • Service Desk Manager
      • IT Managers
      • Project Managers

      Download the Project Charter Template

      Reward the MSP for performance instead of "punishing" them for service failure

      Turn your vendor into a true partner by including an "earn back" condition in the contract

      MSPs often offer clients credit requests (service credits) for their service failures, which are applied to the previous month's monthly recurring charge. They are applied to the last month's MRC (monthly reoccurring charges) at the end of term and then the vendor pays out the residual.

      However, while common, service credits are not always perceived to be a strong incentive for the provider to continually focus on improvement of mean-time-to-respond/mean-time-to-resolve.

      • Engage the vendor as a true partner within a relationship only based upon Service Credits.
      • Suggest the vendor include a minor change to the non-performance processes within the final agreement: the vendor implements an "earn back" condition in the agreement.
      • Where a bank of service credits exists because of non-performance, if the provider exceeds the SLA performance metrics for a number of consecutive months (two is common), then an amount of any prior credits received by client is returned to the provider as an earn back for improved performance.
      • This can be a useful mechanism to drive improved performance.

      Measure the outsourced service desk ROI constantly to drive efficient decisions for continual improvement or an exit plan

      Efficient outsourced service desk causes positive impacts on business satisfaction. To address the true value of the services outsourced, you should evaluate the return on investment (ROI) in these areas: Emotional ROI, Time ROI, Financial ROI

      Emotional ROI

      Service desk's main purpose should be to provide topnotch services to end users. Build a customer experience program and leverage transactional surveys and relationship surveys to constantly analyze customer feedback on service quality.

      Ask yourself:

      • How have the outsourced services improved customer satisfaction?
      • How has the service desk impacted the business brand?
      • Have these services improved agents' job satisfaction?
      • What is the NPS score of the service desk?
      • What should we do to reduce the detractor rate and improve satisfaction leveraging the outsourced service desk?

      Time ROI

      Besides customer satisfaction, SLA commitment is a big factor to consider when conducting ROI analysis.

      Ask these questions:

      • Have we had improvement in FCR?
      • What are the mean time to resolve incidents and mean time to fulfill requests?
      • Is the cost incurred to outsourced services worth improvement in such metrics?

      Financial ROI

      As already mentioned in Phase 1, the main motivation for outsourcing the service desk should not be around cost reduction, but to improve performance. Regardless, it's still important to understand the financial implications of your decision.

      To evaluate the financial impact of your outsourced service desk, ask these questions:

      • How much have the outsourced services impacted our business financially?
      • How much are we paying compared to when it was done internally?
      • Considering the emotional, time, and effort factors, is it worth bringing the services in house or changing the vendor?

      3.3.2 Make a case to either rehabilitate your outsourcing agreement or exit

      3-4 hours

      1. Refer to the results of activity 2.2.2. for the list of metrics and the metrics dashboard over the past quarter.
      2. Consider emotional and time ROI, assess end-user satisfaction and SLA, and run a report comparison with the baseline that you built prior to outsourcing the service desk.
      3. Estimate the organization's IT operating expenses over the next five years if you stay with the vendor.
      4. Estimate the organization's IT operating expenses over the next five years if you switch the vendor.
      5. Estimate the organization's IT operating expenses over the next five years if you repatriate the service desk.
      6. Estimate the non-recurring costs associated with the move, such as the penalty for early contract termination, data center moving costs, and cost of potential business downtime during the move. Sum them to determine the investment.
      7. Calculate the return on investment. Discuss and decide whether the organization should consider rehabilitating the vendor agreement or ending the partnership.

      Input

      • Outsourced service desk metrics
      • Operating expenses

      Output

      • Return on investment

      Materials

      • List of metrics
      • Laptop
      • Markers
      • Flip chart/whiteboard

      Participants

      • IT Director/CIO
      • Service Desk Manager
      • IT Managers

      For more information on conducting this activity, refer to InfoTech's blueprint Terminate the IT Infrastructure Outsourcing Relationship

      Define exit conditions to complete your contract with your MSP

      The end of outsourcing is difficult. Your organization needs to maintain continuity of service during the transition. Your MSP needs to ensure that its resources can be effectively transitioned to the next deployment with minimal downtime. It is crucial to define your exit conditions so that both sides can prepare accordingly.

      • Your exit conditions must be clearly laid out in the contract. Create a list of service desk functions and metrics that are important to your organization's success. If your MSP is not meeting those needs or performance levels, you should terminate your services.
      • Most organizations accomplish this through a clear definition of hard and measurable KPIs and metrics that must be achieved and what will happen in the case these metrics are not being regularly met. If your vendor doesn't meet these requirements as defined in your contract, you then have a valid reason and the ability to leave the agreement.

      Examples of exit conditions:

      • Your MSP did not meet their SLAs on priority 1 or 2 tickets two times within a month.
      • If they didn't meet the SLA twice in that 30 days, you could terminate the contract penalty-free.

      Info-Tech Insight

      If things start going south with your MSP, negotiate a "get well plan." Outline your problems to the MSP and have them come back to you with a list of how they're going to fix these problems to get well before you move forward with the contract.

      Try to rehabilitate before you repatriate

      Switching service providers or ending the contract can be expensive and may not solve your problems. Try to rehabilitate your vendor relationship before immediately ending it.

      You may consider terminating your outsourcing agreement if you are dissatisfied with the current agreement or there has been a change in circumstances (either the vendor has changed, or your organization has changed).

      Before doing so, consider the challenges:

      1. It can be very expensive to switch providers or end a contract.
      2. Switching vendors can be a large project involving transfer of knowledge, documentation, and data.
      3. It can be difficult to maintain service desk availability, functionality, and reliability during the transition.

      Diagnose the cause of the problem before assuming it's the MSP's fault. The issue may lie with poorly defined requirements and processes, lack of communication, poor vendor management, or inappropriate SLAs. Re-assess your strategy and re-negotiate your contract if necessary.

      Info-Tech Insight

      There are many reasons why outsourcing relationships fail, but it's not always the vendor's fault.

      Clients often think their MSP isn't doing a great job, but a lot of the time the reason comes back to the client. They may not have provided sufficient documentation on processes, were not communicating well, didn't have a regular point of contact, and weren't doing regular service reviews. Before exiting the relationship, evaluate why it's not working and try to fix things first.

      Don't stop with an exit strategy, you also need to develop a transition plan

      Plan out your transition timeline, taking into account current contract terms and key steps required. Be prepared to handle tickets immediately upon giving notice.

      • Review your outsourcing contract with legal counsel to identify areas of concern for lock-in or breech.
      • Complete a cost/benefit analysis.
      • Bring intellectual property (including ticket data, knowledge base articles, and reports) back in-house (if you'd like to repatriate the service desk) or transfer to the next service desk vendor (if you're outsourcing to another MSP).
      • Review and update service desk standard processes (escalation, service levels, ticket templates, etc.).
      • Procure service desk software, licenses, and necessary hardware as needed.
      • Train the staff (internal for repatriating the service desk, or external for the prospective MSP).
      • Communicate the transition plan and be prepared to start responding to tickets immediately.

      Info-Tech Insight

      Develop a transition plan about six months before the contract notice date. Be proactive by constantly tracking the MSP, running ROI analyses and training staff before moving the services to the internal team or the next MSP. This will help you manage the transition smoothly and handle intake channels so that upon potential exit, users won't be disrupted.

      3.3.3 Develop an exit strategy in case you need to end your contract early

      3-4 hours

      Create a plan to be prepared in case you need to end your contract with the MSP early.

      Your exit strategy should encompass both the conditions under which you would need to end your contract with the MSP and the next steps you will take to transition your services.

      1. Define the exit conditions you plan to negotiate into your contract with the MSP:
        • Identify the performance levels you will require your MSP to meet.
        • Identify the actions you expect the MSP to take if they fail to meet these performance levels.
        • Identify the conditions under which you would leave the contract early.
      2. Develop a strategy for transitioning services in the event you need to leave your contract with the MSP:
        • Will you hand the responsibility to a new MSP or repatriate the service desk back in-house?
        • How will you maintain services through the transition?
      3. Document your exit strategy in section 6 of the Service Desk Outsourcing RFP Template.

      Input

      • Outsourced service desk metrics
      • Operating expenses

      Output

      • Return on investment

      Materials

      • List of metrics
      • Laptop
      • Markers
      • Flip chart/whiteboard

      Participants

      • IT Director/CIO
      • Service Desk Manager
      • IT Managers

      Download the Service Desk Outsourcing RFP Template

      Summary of Accomplishment

      Problem Solved

      You have now re-envisioned your service desk by building a solid strategy for outsourcing it to a vendor. You first analyzed your challenges with the current service desk and evaluated the benefits of outsourcing services. Then you went through requirements assessment to find out which processes should be outsourced. Thereafter, you developed an RFP to communicate your proposal and evaluate the best candidates.

      You have also developed a continual improvement plan to ensure the outsourcer provides services according to your expectations. Through this plan, you're making sure to build a good relationship through incentivizing the vendor for accomplishments rather than punishing for service failures. However, you've also contemplated an exit plan in the RFP for potential consistent service failures.

      Ideally, this blueprint has helped you go beyond requirements identification and served as a means to change your mindset and strategy for outsourcing the service desk efficiently to gain long-term benefits.

      if you would like additional support, have our analysts guide you through other phases as part of an Info-Tech Workshop

      Contact your account representative for more information

      workshops@infotech.com

      1-888-670-8889

      Additional Support

      If you would like additional support, have our analysts guide you through other phases as part of an Info-Tech Workshop

      To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team.

      Info-Tech analysts will join you and your team at your location or welcome you to Info-Tech's historic Toronto office to participate in an innovative onsite workshop.

      This is a picture of Info-Tech analyst Mahmoud Ramin

      Contact your account representative for more information.
      workshops@infotech.com 1-888-670-8889

      The following are sample activities that will be conducted by Info-Tech analysts with your team:

      This is a screenshot of activity 1.2.1 found in this blueprint

      Identify Processes to Outsource
      Identify service desk tasks that will provide the most value upon outsourcing.

      This is a screenshot of activity 3.2.2 found in this blueprint

      Score Candidate Vendors
      Evaluate vendors on their capabilities for satisfying your service desk requirements.

      Related Info-Tech Research

      Standardize the Service Desk

      • Improve customer service by driving consistency in your support approach and meeting SLAs.

      Outsource IT Infrastructure to Improve System Availability, Reliability, and Recovery

      • There are very few IT infrastructure components you should be housing internally – outsource everything else.

      Terminate the IT Infrastructure Outsourcing Relationship

      • There must be 50 ways to leave your vendor.

      Research Contributors and Experts

      Yev Khovrenkov; Enterprise Consultant, Solvera Solutions

      Kamil Salagan; I&O Manager, Bartek Ingredients

      Satish Mekerira; VP of IT, Coherus BioSciences

      Kris Krishan; Head of IT and Business Systems, Waymo

      Kris Arthur; Infra & Security Director, SEKO Logistics

      Valance Howden; Principal Research Advisor, Info-Tech Research Group

      Sandi Conrad; Principal Research Director, Info-Tech Research Group

      Graham Price; Senior Director of Executive Services, Info-Tech Research Group

      Barry Cousins; Practice Lead, Info-Tech Research Group

      Mark Tauschek; VP of I&O Research, Info-Tech Research Group

      Darin Stahl; Principal Research Advisor, Info-Tech Research Group

      Scott Yong; Principal Research Advisor, Info-Tech Research Group

      A special thank-you to five anonymous contributors

      Bibliography

      Allnutt, Charles. "The Ultimate List of Outsourcing Statistics." MicroSourcing, 2022. Accessed July 2022.
      "Considerations for outsourcing the service desk. A guide to improving your service desk and service delivery performance through outsourcing." Giva. Accessed May 2022.
      Hurley, Allison. "Service Desk Outsourcing | Statistics, Challenges, & Benefits." Forward BPO Inc., 2019. Accessed June 2022.
      Mtsweni, Patricia, et al. "The impact of outsourcing information technology services on business operations." South African Journal of Information Management, 2021, Accessed May 2022.
      "Offshore, Onshore or Hybrid–Choosing the Best IT Outsourcing Model." Calance, 2021. Accessed June 2022. Web.
      "Service Integration and Management (SIAM) Foundation Body of Knowledge." Scopism, 2020. Accessed May 2022.
      Shultz, Aaron. "IT Help Desk Outsourcing Pricing Models Comparison." Global Help Desk Services. Accessed June 2022. Web.
      Shultz, Aaron. "4 Steps to Accurately Measure the ROI of Outsourced Help Desk Services" Global Help Desk Services, Accessed June 2022. Web.
      Sunberg, John. "Great Expectations: What to Look for from Outsourced Service Providers Today." HDI. Accessed June 2022. Web.
      Walters, Grover. "Pivotal Decisions in outsourcing." Muma Case Review, 2019. Accessed May 2022.
      Wetherell, Steve. "Outsourced IT Support Services: 10 Steps to Better QA" Global Held Desk Services. Accessed May 2022. Web.

      Enter Into Mobile Development Without Confusion and Frustration

      • Buy Link or Shortcode: {j2store}282|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Mobile Development
      • Parent Category Link: /mobile-development
      • IT managers don’t know where to start when initiating a mobile program.
      • IT has tried mobile development in the past but didn't achieve success.
      • IT must initiate a mobile program quickly based on business priorities and needs a roadmap based on best practices.

      Our Advice

      Critical Insight

      • Form factors and mobile devices won't drive success – business alignment and user experience will. Don't get caught up with the latest features in mobile devices.
      • Software emulation testing is not true testing. Get on the device and run your tests.
      • Cross form-factor testing cannot be optimized to run in parallel. Therefore, anticipate longer testing cycles for cross form-factor testing.

      Impact and Result

      • Prepare your development, testing, and deployment teams for mobile development.
      • Get a realistic assessment of ROI for the launch of a mobile program.

      Enter Into Mobile Development Without Confusion and Frustration Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Make the Case for a Mobile Program

      Understand the current mobile ecosystem. Use this toolkit to help you initiate a mobile development program.

      • Storyboard: Enter Into Mobile Development Without Confusion and Frustration

      2. Assess Your Dev Process for Readiness

      Review and evaluate your current application development process.

      3. Prepare to Execute Your Mobile Program

      Prioritize your mobile program based on your organization’s prioritization profile.

      • Mobile Program Tool

      4. Communicate with Stakeholders

      Summarize the execution of the mobile program.

      • Project Status Communication Worksheet
      [infographic]

      Workshop: Enter Into Mobile Development Without Confusion and Frustration

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Build your Future Mobile Development State

      The Purpose

      Understand the alignment of stakeholder objectives and priorities to mobile dev IT drivers.

      Assess readiness of your organization for mobile dev.

      Understand how to build your ideal mobile dev process.

      Key Benefits Achieved

      Identify and address the gaps in your existing app dev process.

      Build your future mobile dev state.

      Activities

      1.1 Getting started

      1.2 Assess your current state

      1.3 Establish your future state

      Outputs

      List of key stakeholders

      Stakeholder and IT driver mapping and assessment of current app dev process

      List of practices to accommodate mobile dev

      2 Prepare and Execute your Mobile Program

      The Purpose

      Assess the impact of mobile dev on your existing app dev process.

      Prioritize your mobile program.

      Understand the dev practice metrics to gauge success.

      Key Benefits Achieved

      Properly prepare for the execution of your mobile program.

      Calculate the ROI of your mobile program.

      Prioritize your mobile program with dependencies in mind.

      Build a communication plan with stakeholders.

      Activities

      2.1 Conduct an impact analysis

      2.2 Prepare to execute

      2.3 Communicate with stakeholders

      Outputs

      Impact analysis of your mobile program and expected ROI

      Mobile program order of execution and project dependencies mapping

      List of dev practice metrics

      Data and Analytics Trends 2023

      • Buy Link or Shortcode: {j2store}208|cart{/j2store}
      • member rating overall impact: 9.0/10 Overall Impact
      • member rating average dollars saved: After each Info-Tech experience, we ask our members to quantify the real-time savings, monetary impact, and project improvements our research helped them achieve.
      • member rating average days saved: Read what our members are saying
      • Parent Category Name: Business Intelligence Strategy
      • Parent Category Link: /business-intelligence-strategy

      Data is a unique resource that keeps growing, presenting opportunities along the way. CIOs and IT leaders can use rapidly evolving technologies and capabilities to harness this data and its value for the organization.

      IT leaders must prepare their teams and operations with the right knowledge, capabilities, and strategies to make sure they remain competitive in 2023 and beyond. Nine trends that expand on the three common Vs of data – volume, velocity, and variety – can help guide the way.

      Focus on trends that align with your opportunities and challenges

      The path to becoming more competitive in a data-driven economy differs from one company to the next. IT leaders should use the data and analytics trends that align most with their organizational goals and can lead to positive business outcomes.

      1. Prioritize your investments: Conduct market analysis and prioritize the data and analytics investments that will be critical to your business.
      2. Build a robust strategy: Identify a clear path between your data vision and business outcomes to build a strategy that’s a good fit for your organization.
      3. Inspire practical innovation: Follow a pragmatic approach to implementing trends that range from data gravity and democratization to data monetization and augmented analytics.

      Data and Analytics Trends 2023 Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Data and Analytics Trends Report 2023 – A report that explores nine data use cases for emerging technologies that can improve on capabilities needed to compete in the data-driven economy.

      Data technologies are rapidly evolving. Understanding data's art of the possible is critical. However, to adapt to these upcoming data trends, a solid data management foundation is required. This report explores nine data trends based on the proven framework of data V's: Volume, Velocity, Variety, Veracity, Value, Virtue, Visualization, Virality, and Viscosity.

      • Data and Analytics Trends Report 2023
      [infographic]

      Further reading

      Data and Analytics Trends Report 2023

      SOONER OR LATER, YOU WILL BE IN THE DATA BUSINESS!

      Nine Data Trends for 2023

      In this report, we explore nine data use cases for emerging technologies that can improve on capabilities needed to compete in the data-driven economy. Use cases combine emerging data trends and modernization of existing capabilities.

      1. VOLUME
        • Data Gravity
      2. VELOCITY
      • Democratizing Real-Time Data
    • VARIETY
      • Augmented Data Management
    • VERACITY
      • Identity Authenticity
    • VALUE
      • Data Monetization
    • VIRTUE
      • Adaptive Data Governance
    • VISUALIZATION
      • AI-Driven Storytelling & Augmented Analytics
    • VIRALITY
      • Data Marketplace
    • VISCOSITY
      • DevOps – DataOps – XOps

      VOLUME

      Data Gravity

      Trend 01 Demand for storage and bandwidth continues to grow

      When organizations begin to prioritize data, they first consider the sheer volume of data, which will influence data system design. Your data systems must consider the existing and growing volume of data by assessing industry initiatives such as digital transformation, Industry 4.0, IoT, consumer digital footprint, etc.

      The largest data center in the world is a citadel in Reno, Nevada, that stretches over 7.2 million square feet!

      Source: Cloudwards, 2022

      IoT devices will generate 79.4 zettabytes of data
      by 2025.

      Source: IDC, 2019

      There were about 97
      zettabytes of data generated worldwide in 2022.

      Source: “Volume of Data,” Statista, 2022

      VOLUME

      Data Gravity

      Data attracts more data and an ecosystem of applications and services

      SharePoint, OneDrive, Google Drive, and Dropbox offer APIs and integration opportunities for developers to enhance their products.

      Social media platforms thought about this early by allowing for an ecosystem of filters, apps, games, and effects that engage their users with little to no additional effort from internal resources.

      The image contains four logos. SharePoint, OneDrive, Google Drive, and Dropbox.

      VOLUME

      Data Gravity

      Focus on data gravity and avoid cloud repatriation

      Data gravity is the tendency of data to attract applications, services, and other data. A growing number of cloud migration decisions will be made based on the data gravity concept. It will become increasingly important in data strategies, with failure potentially resulting in costly cloud repatriations.

      Emerging technologies and capabilities:

      Data Lakehouse, Data Mesh, Data Fabric, Hybrid Data, Cloud Data, Edge Computing

      47%

      Centralized cloud storage going down in 2 years

      22%
      25%

      Hybrid storage (centralized + edge) going up in 2 years

      47%

      Source: CIO, 2022

      VOLUME

      Data Gravity

      What worked for terabytes is ineffective for petabytes

      When compared to on-premises infrastructure, cloud computing is less expensive and easier to implement. However, poor data replication and data gravity can significantly increase cloud costs to the point of failure. Data gravity will help organizations make better cloud migration decisions.

      It is also critical to recognize changes in the industry landscape. The goal of data processing and analytics is to generate the right data for users to act on. In most cases, the user is a human being, but in the case of autonomous driving (AD), the car takes on the role of the user (DXC Technology).

      To avoid cloud repatriation, it will become prudent for all organizations to consider data gravity and the timing of cloud migration.

      The image contains a diagram on data gravity.

      VELOCITY

      Democratizing Real-Time Data

      Trend 02 Real-time analytics presents an important differentiator

      The velocity element of data can be assessed from two standpoints: the speed at which data is being generated and how fast the organization needs to respond to the incoming information through capture, analysis, and use. Traditionally data was processed in a batch format (all at once or in incremental nightly data loads). There is a growing demand to process data continuously using streaming data-processing techniques.

      Emerging technologies and capabilities:

      Edge Computing

      Google announced it has a quantum computer that is 100 million times faster than any classical computer in its lab.

      Source: Science Alert, 2015

      The number of qubits in quantum computers has been increasing dramatically, from 2 qubits in 1998 to 128 qubits in 2019.

      Source: Statista, 2019

      IBM released a 433-qubit quantum chip named Osprey in 2022 and expects to surpass 1,000 qubits with its next chip, Condor, in 2023.

      Source: Nature, 2023

      VELOCITY

      Democratizing Real-Time Data

      Make data accessible to everyone in real time

      • 90% of an organization’s data is replicated or redundant.
      • Build API and web services that allow for live access to data.
      • Most social media platforms, like Twitter and Facebook, have APIs that offer access to incredible amounts of data and insights.

      VELOCITY

      Democratizing Real-Time Data

      Trend in Data Velocity

      Data democratization means data is widely accessible to all stakeholders without bottlenecks or barriers. Success in data democratization comes with ubiquitous real-time analytics. Google highlights a need to address democratization in two different frames:

      1. Democratizing stream analytics for all businesses to ensure real-time data at the company level.
      2. Democratizing stream analytics for all personas and the ability of all users to generate real-time insights.

      Emerging technologies and capabilities:

      Data Lakehouse, Streaming API Ecosystem, Industry 4.0, Zero-Copy Cloning

      Nearly 70% of all new vehicles globally will be connected to the internet by 2023.

      Source: “Connected light-duty vehicles,” Statista, 2022

      VELOCITY

      Democratizing Real-Time Data

      Enable real-time processing with API

      In the past, data democratization has largely translated into a free data set and open data portals. This has allowed the government to freely share data with the public. Also, the data science community has embraced the availability of large data sets such as weather data, stock data, etc. In the future, more focus will be on the combination of IoT and steaming analytics, which will provide better responsiveness and agility.

      Many researchers, media companies, and organizations now have easy access to the Twitter/Facebook API platform to study various aspects of human behavior and sentiments. Large technology companies have already democratized their data using real-time APIs.

      Thousands of sources for open data are available at your local municipalities alone.

      6G will push Wi-Fi connectivity to 1 terabyte per second! This is expected to become commercially available by 2030.

      VARIETY

      Augmented Data Management

      Trend 03 Need to manage unstructured data

      The variety of data types is increasingly diverse. Structured data often comes from relational databases, while unstructured data comes from several sources such as photos, video, text documents, cell phones, etc. The variety of data is where technology can drive business value. However, unstructured data also poses a risk, especially for external data.

      The number of IoT devices could rise to 30.9 billion by 2025.

      Source: “IoT and Non-IoT Connections Worldwide,” Statista, 2022

      The global edge computing market is expected to reach $250.6 billion by 2024.

      Source: “Edge Computing,” Statista, 2022

      Genomics research is expected to generate between 2 and 40 exabytes of data within the next decade.

      Source: NIH, 2022

      VARIETY

      Augmented Data Management

      Employ AI to automate data management

      New tools will enhance many aspects of data management:

      • Data preparation, integration, cataloging, and quality
      • Metadata management
      • Master data management

      Enabling AI-assisted decision-making tools

      The image contains logos of the AI-assisted decision-making tools. Informatica, collibra, OCTOPAI.

      VARIETY

      Augmented Data Management

      Trend in Data Variety

      Augmented data management will enhance or automate data management capabilities by leveraging AI and related advanced techniques. It is quite possible to leverage existing data management tools and techniques, but most experts have recognized that more work and advanced patterns are needed to solve many complex data problems.

      Emerging technologies and capabilities:

      Data Factory, Data Mesh, Data Fabric, Artificial Intelligence, Machine Learning

      VARIETY

      Augmented Data Management

      Data Fabric vs. Data Mesh: The Data Journey continues at an accelerated pace

      Data Fabric

      Data Mesh

      Data fabric is an architecture that facilitates the end-to-end integration of various data pipelines and cloud environments using intelligent and automated systems. It’s a data integration pattern to unify disparate data systems, embed governance, strengthen security and privacy measures, and provide more data accessibility to workers and particularly to business users.

      The data mesh architecture is an approach that aligns data sources by business domains, or functions, with data owners. With data ownership decentralization, data owners can create data products for their respective domains, meaning data consumers, both data scientists and business users, can use a combination of these data products for data analytics and data science.

      More Unstructured Data

      95% of businesses cite the need to manage unstructured data as a problem for their business.

      VERACITY

      Identity Authenticity

      Trend 04 Veracity of data is a true test of your data capabilities

      Data veracity is defined as the accuracy or truthfulness of a data set. More and more data is created in semi-structured and unstructured formats and originates from largely uncontrolled sources (e.g. social media platforms, external sources). The reliability and quality of the data being integrated should be a top concern. The veracity of data is imperative when looking to use data for predictive purposes. For example, energy companies rely heavily on weather patterns to optimize their service outputs, but weather patterns have an element of unpredictability.

      Data quality affects overall labor productivity by as much as 20%, and 30% of operating expenses are due to insufficient data.

      Source: Pragmatic Works, 2017

      Bad data costs up to
      15% to 25% of revenue.

      Source: MIT Sloan Management Review, 2017

      VERACITY

      Identity Authenticity

      Veracity of data is a true test of your data capabilities

      • Stop creating your own identity architectures and instead integrate a tried-and-true platform.
      • Aim for a single source of truth for digital identity.
      • Establish data governance that can withstand scrutiny.
      • Imagine a day in the future where verified accounts on social media platforms are available.
      • Zero-trust architecture should be used.

      VERACITY

      Identity Authenticity

      Trend in Data Veracity

      Veracity is a concept deeply linked to identity. As the value of the data increases, a greater degree of veracity is required: We must provide more proof to open a bank account than to make friends on Facebook. As a result, there is more trust in bank data than in Facebook data. There is also a growing need to protect marginalized communities.

      Emerging technologies and capabilities:

      Zero Trust, Blockchain, Data Governance, IoT, Cybersecurity

      The image contains a screenshot of Info-Tech's blueprint slide on Zero Trust.

      VERACITY

      Identity Authenticity

      The identity discussion is no longer limited to people or organizations. The development of new technologies, such as the IoT phenomenon, will lead to an explosion of objects, from refrigerators to shipping containers, coming online as well. If all these entities start communicating with each other, standards will be needed to establish who or what they are.

      IDENTITY
      IS

      Age

      Gender

      Address

      Fingerprint

      Face

      Voice

      Irises

      IDENTITY
      KNOWS

      Password

      Passphrase

      PIN

      Sequence

      IDENTITY
      HAS

      Access badge

      Smartcard

      Security token

      Mobile phone

      ID document

      IDENTITY
      DOES

      Motor skills

      Handwriting

      Gestures

      Keystrokes

      Applications use

      The IoT market is expected to grow 18% to 14.4 billion in 2022 and 27 billion by 2025.

      Source: IoT Analytics, 2022

      VALUE

      Data Monetization

      Trend 05 Not Many organization know the true value of their data

      Data can be valuable if used effectively or dangerous if mishandled. The rise of the data economy has created significant opportunities but also has its challenges. It has become urgent to understand the value of data, which may vary for stakeholders based on their business model and strategy. Organizations first need to understand ownership of their data by establishing a data strategy, then they must improve data maturity by developing a deeper understanding of data value.

      94% of enterprises say data is essential to business growth.

      Source: Find stack, 2021

      VALUE

      Data Monetization

      Start developing your data business

      • Blockbuster ran its business well, but Netflix transformed the video rental industry overnight!
      • Big players with data are catching up fast.
      • You don’t have to be a giant to monetize data.
      • Data monetization is probably closer than you think.
      • You simply need to find it, catalog it, and deliver it.

      The image contains logos of companies related to data monetization as described in the text above. The companies are Amazon Prime, Netflix, Disney Plus, Blockbuster, and Apple TV.

      VALUE

      Data Monetization

      Trend in Data Value

      Data monetization is the transformation of data into financial value. However, this does not imply selling data alone. Monetary value is produced by using data to improve and upgrade existing and new products and services. Data monetization demands an organization-wide strategy for value development.

      Emerging technologies and capabilities:

      Data Strategy, Data Monetization Strategy, Data Products

      Netflix uses big data to save $1 billion per year on customer retention.

      Source: Logidots, 2021

      VALUE

      Data Monetization

      Data is a strategic asset

      Data is beyond currency, assets, or commodities and needs to be a category
      of its own.

      • Data always outlives people, processes, and technology. They all come and go while data remains.
      • Oil is a limited resource. Data is not. Unlike oil, data is likely to grow over time.
      • Data is likely to outlast all other current popular financial instruments, including currency, assets, or commodities.
      • Data is used internally and externally and can easily be replicated or combined.

      Data monetization is currently in the speculative territory, which is unacceptable. It should instead be guided by sound data management theory.

      VIRTUE

      Adaptive Data Governance

      Trend 06 Five Core Virtues: Resilience, Humility, Grit, Liberal Education, Empathy (Forbes, 2020)

      We have become more and more dependent on data, analytics, and organizational protection policies. Data virtue is about leveraging data securely and ethically. This topic has become more critical with the advent of GDPR, the right to be forgotten, and related regulations. Data governance, which seeks to establish an oversight framework that manages the creation, acquisition, integrity, security, compliance, and quality of data, is essential for any organization that makes decisions about data.

      Cultural obstacles are the greatest barrier to becoming data-driven, according to 91.9% of executives.

      Source: Harvard Business Review, 2022

      Fifty million Facebook profiles were harvested for Cambridge Analytica in a major data breach.

      Source: The Guardian, 2018

      VIRTUE

      Adaptive Data Governance

      Encourage noninvasive and automated data governance

      • Data governance affects the entire organization, not just data.
      • The old model for data governance was slow and clumsy.
      • Adaptive data governance encourages faster decision making and a more collaborative approach to governance.
      • Agile data governance allows for faster and more flexible decision making.
      • Automated data governance will simplify execution across the organization.
      • It is great for compliance, quality, impact tracking, and cross-referencing and offers independence to data users.

      VIRTUE

      Adaptive Data Governance

      Trend in Data Virtue

      Adaptive data governance encourages a flexible approach that allows an organization to employ multiple data governance strategies depending on changing business situations. The other aspect of adaptive data governance is moving away from manual (and often slow) data governance and toward aggressive automation.

      Emerging technologies and capabilities:

      AI-Powered Data Catalog and Metadata Management,
      Automated Data Policy Enforcement

      “To effectively meet the needs and velocity of digital organizations and modern practices, IT governance must be embedded and automated where possible to drive success and value.”

      Source: Valence Howden, Info-Tech Research Group

      “Research reveals that the combination of AI and big data technologies can automate almost 80% of all physical work, 70% of data processing, and 64% of data collection tasks.”

      Source: Forbes, 2021

      VIRTUE

      Data Governance Automation

      Simple and easy Data Governance

      Tools are not the ultimate answer to implementing data governance. You will still need to secure stakeholders' buy-in and engagement in the data process. Data governance automation should be about simplifying the execution of roles and responsibilities.

      “When you can see where your data governance strategy can be improved, it’s time to put in place automation that help to streamline processes.”

      Source: Nintex, 2021

      VISUALIZATION

      AI-Driven Storytelling & Augmented Analytics

      Trend 07 Automated and augmented data storytelling is not that far away

      Today, data storytelling is led by the user. It’s the manual practice of combining narrative with data to deliver insights in a compelling form to assist decision makers in engaging with data and analytics. A story backed by data is more easily consumed and understood than a dashboard, which can be overwhelming. However, manual data storytelling has some major shortcomings.

      Problem # 1: Telling stories on more than just the insights noticed by people

      Problem # 2: Poor data literacy and the limitations of manual self-service

      Problem # 3: Scaling data storytelling across the business

      VISUALIZATION

      AI-Driven Storytelling & Augmented Analytics

      Use AI to enhance data storytelling

      • Tableau, Power BI, and many other applications already use
        AI-driven analytics.
      • Power BI and SharePoint can use AI to generate visuals for any SharePoint list in a matter of seconds.

      VISUALIZATION

      AI-Driven Storytelling & Augmented Analytics

      Trend in Data Visualization

      AI and natural language processing will drive future visualization and data storytelling. These tools and techniques are improving rapidly and are now designed in a streamlined way to guide people in understanding what their data means and how to act on it instead of expecting them to do self-service analysis with dashboards and charts and know what to do next. Ultimately, being able to understand how to translate emotion, tropes, personal interpretation, and experience and how to tell what’s most relevant to each user is the next frontier for augmented and automated analytics

      Emerging technologies and capabilities:

      AI-Powered Data Catalog and Metadata Management,
      Automated Data Policy Enforcement

      VISUALIZATION

      Data Storytelling

      Augmented data storytelling is not that far away

      Emotions are a cornerstone of human intelligence and decision making. Mastering the art of storytelling is not easy.

      Industry experts predict the combination of data storytelling with augmented and automated techniques; these capabilities are more than capable of generating and automating parts of a data story’s creation for end users.

      The next challenge for AI is translating emotion, tropes, personal interpretation, and experience into what is most essential to end users.

      Source: Yellowfin, 2021

      VIRALITY

      Data Marketplace

      Trend 08 Missing data marketplace

      Data virality measures data spread and popularity. However, for data virality to occur, an ecosystem comparable to that of traditional or modern digital marketplaces is required. Organizations must reevaluate their data strategies to ensure investment in appropriate data domains by understanding data virality. Data virality is the exact opposite of dark data.

      Dark data is “all the information companies collect in their regular business processes, don’t use, have no plans to use, but will never throw out.”

      Source: Forbes, 2019

      VIRALITY

      Data Marketplace

      Make data easily accessible

      • Making data accessible to a broader audience is the key to successful virality.
      • Data marketplaces provide a location for you to make your data public.
      • Why do this? Contributing to public data marketplaces builds credibility, just like contributing to public GitHub projects.
      • Big players like Microsoft, Amazon, and Snowflake already do this!
      • Snowflake introduced zero-copy cloning, which allows users to interact with source data without compromising the integrity of the original source.

      The image contains the logos of Microsoft, Amazon, and Snowflake.

      VIRALITY

      Data Marketplace

      Trend in Data Virality

      The data marketplace can be defined as a dynamic marketplace where users decide what has the most value. Companies can gauge which data is most popular based on usage and decide where to invest. Users can shop for data products within the marketplace and then join these products with other ones they’ve created to launch truly powerful data-driven projects.

      Emerging technologies and capabilities:

      AI-Powered Data Catalog and Metadata Management,
      Automated Data Policy Enforcement

      The image contains a screenshot of Info-Tech's Data-as-a-Service (DaaS) Framework.

      “Data is like garbage. You’d better know what you are going to do with it before you collect it.”

      – Mark Twain

      VIRALITY

      Data Marketplace

      Journey from siloed data platforms to dynamic data marketplaces

      Data remains a complex topic due to many missing foundational components and infrastructure. Interoperability, security, quality, discoverability, speed, and ease are some of those missing foundational components that most organizations face daily.

      Data lacks an ecosystem that is comparable to those of traditional assets or commodities. Data must be available in open or closed data marketplaces to measure its value. These data marketplaces are still in their infancy.

      “Data markets are an important component of the data economy that could unleash the full potential of data generated by the digital economy and human activity in general.”

      Source: ITU Journal, 2018

      VISCOSITY

      DevOps – DataOps – XOps

      Trend 09 Increase efficiency by removing bottlenecks

      Compared to water, a fluid with a high viscosity flows more slowly, like honey. Data viscosity measures the resistance to flow in a volume of data. The data resistance may come from other Vs (variety, velocity, etc.).

      VISCOSITY

      DevOps – DataOps – XOps

      Increase efficiency by removing bottlenecks

      Consider XOps for a second. It makes no difference what X is. What's important is matching operational requirements to enterprise capabilities.

      • For example, Operations must meet the demands of Sales – hence SalesOps
        or S&Op.
      • Development resources must meet the demands of Operations – hence DevOps.
      • Finally, Data must also meet the demand of Operations.

      These Operations guys are demanding!!

      VISCOSITY

      DevOps – DataOps – XOps

      Trend in Data Viscosity

      The merger of development (Dev) and IT Operations (Ops) started in software development with the concept of DevOps. Since then, new Ops terms have formed rapidly (AIOps, MLOps, ModelOps, PlatformOps, SalesOps, SecOps, etc.). All these methodologies come from Lean manufacturing principles, which seek to identify waste by focusing on eliminating errors, cycle time, collaboration, and measurement. Buzzwords are distractions, and the focus must be on the underlying goals and principles. XOps goals should include the elimination of errors and improving efficiencies.

      Emerging technologies and capabilities:

      Collaborative Data Management, Automation Tools

      VISCOSITY

      DataOps → Data Observability

      Data observability, a subcomponent of DataOps, is a set of technical practices, cultural norms, and architecture that enables low error rates. Data observability focuses on error rates instead of only measuring data quality at a single point in time.

      Data Quality Dimensions

      • Uniqueness
      • Timeliness
      • Validity
      • Accuracy
      • Consistency

      ERROR RATES

      Lateness: Missing Your SLA

      System Processing Issues

      Code Change That Broke Something

      Data Quality

      What’s next? Go beyond the buzzwords.

      Avoid following trends solely for the sake of following them. It is critical to comprehend the concept and apply it to your industry. Every industry has its own set of problems and opportunities.

      Highlight the data trends (or lack thereof) that have been most beneficial to you in your organizations. Follow Info-Tech’s approach to building a data practice and platform to develop your data capabilities through the establishment of data goals.

      The image contains a screenshot of Info-Tech's Build Your Data Pracrice and Platform.

      Research Authors

      Rajesh Parab Chris Dyck

      Rajesh Parab

      Director, Research & Advisory

      Data and Analytics

      Chris Dyck

      Research Lead

      Data and Analytics

      “Data technologies are rapidly evolving. Understanding what’s possible is critical. Adapting to these upcoming data trends requires a solid data management foundation.”

      – Rajesh Parab

      Contributing Experts

      Carlos Thomas John Walsh

      Carlos Thomas

      Executive Counselor

      Info-Tech Research Group

      John Walsh

      Executive Counselor

      Info-Tech Research Group

      Bibliography

      Bean, Randy. “Why Becoming a Data-Driven Organization Is So Hard.” Harvard Business Review, 24 Feb. 2022. Accessed Oct. 2022.
      Brown, Annie. “Utilizing AI And Big Data To Reduce Costs And Increase Profits In Departments Across An Organization.” Forbes, 13 April 2021.
      Accessed Oct. 2022.
      Burciaga, Aaron. “Five Core Virtues For Data Science And Artificial Intelligence.” Forbes, 27 Feb. 2020. Accessed Aug. 2022.
      Cadwalladr, Carole, and Emma Graham-Harrison. “Revealed: 50 million Facebook profiles harvested for Cambridge Analytica in major data breach.”
      The Guardian, 17 March 2018. Accessed Aug. 2022.
      Carlier, Mathilde. “Connected light-duty vehicles as a share of total vehicles in 2023.” Statista, 31 Mar. 2021. Accessed Oct. 2022.
      Carter, Rebekah. “The Ultimate List of Big Data Statistics for 2022.” Findstack, 22 May 2021. Accessed Oct. 2022.
      Castelvecchi, Davide. “Underdog technologies gain ground in quantum-computing race.” Nature, 6 Nov. 2023. Accessed Feb. 2023.
      Clark-Jones, Anthony, et al. “Digital Identity:” UBS, 2016. Accessed Aug 2022.
      “The Cost of Bad Data Infographic.” Pragmatic Works, 25 May 2017. Accessed Oct. 2022.
      Demchenko, Yuri, et al. “Data as Economic Goods: Definitions, Properties, Challenges, Enabling Technologies for Future Data Markets.“ ITU Journal: ICT Discoveries, Special Issue, no. 2, vol. 23, Nov. 2018. Accessed Aug 2022.
      Feldman, Sarah. ”20 Years of Quantum Computing Growth.” Statista, 6 May 2019. Accessed Oct. 2022.
      “Genomic Data Science.” NIH, National Human Genome Research Institute, 5 April 2022. Accessed Oct. 2022.

      Bibliography

      Hasbe, Sudhir, and Ryan Lippert. “The democratization of data and insights: making real-time analytics ubiquitous.” Google Cloud, 15 Jan. 2021.
      Accessed Aug. 2022.
      Helmenstine, Anne. “Viscosity Definition and Examples.” Science Notes, 3 Aug. 2021. Accessed Aug. 2022.
      “How data storytelling and augmented analytics are shaping the future of BI together.” Yellowfin, 19 Aug. 2021. Accessed Aug. 2022.
      “How Netflix Saves $1B Annually using AI?” Logidots, 24 Sept. 2021. Accessed Oct. 2022
      Hui, Kenneth. “The AWS Love/Hate Relationship with Data Gravity.” Cloud Architect Musings, 30 Jan. 2017. Accessed Aug 2022.
      ICD. “The Growth in Connected IoT Devices Is Expected to Generate 79.4ZB of Data in 2025, According to a New IDC Forecast.” Business Wire, 18 June 2019. Accessed Oct 2022.
      Internet of Things (IoT) and non-IoT active device connections worldwide from 2010 to 2025” Statista, 27 Nov. 2022. Accessed Nov. 2022.
      Koch, Gunter. “The critical role of data management for autonomous driving development.” DXC Technology, 2021. Accessed Aug. 2022.
      Morris, John. “The Pull of Data Gravity.” CIO, 23 Feb. 2022. Accessed Aug. 2022.
      Nield, David. “Google's Quantum Computer Is 100 Million Times Faster Than Your Laptop.” ScienceAlert, 9 Dec. 2015. Accessed Oct. 2022.
      Redman, Thomas C. “Seizing Opportunity in Data Quality.” MIT Sloan Management Review, 27 Nov. 2017. Accessed Oct. 2022.
      Segovia Domingo, Ana I., and Álvaro Martín Enríquez. “Digital Identity: the current state of affairs.” BBVA Research, 2018. Accessed Aug. 2022.

      Bibliography

      “State of IoT 2022: Number of connected IoT devices growing 18% to 14.4 billion globally.” IOT Analytics, 18 May 2022. Accessed. 14 Nov. 2022.
      Strod, Eran. “Data Observability and Monitoring with DataOps.” DataKitchen, 10 May 2021. Accessed Aug. 2022.
      Sujay Vailshery, Lionel. “Edge computing market value worldwide 2019-2025.” Statista, 25 Feb. 2022. Accessed Oct 2022.
      Sujay Vailshery, Lionel. “IoT and non-IoT connections worldwide 2010-2025.” Statista, 6 Sept. 2022. Accessed Oct. 2022.
      Sumina, Vladimir. “26 Cloud Computing Statistics, Facts & Trends for 2022.” Cloudwards, 7 June 2022. Accessed Oct. 2022.
      Taulli, Tom. “What You Need To Know About Dark Data.” Forbes, 27 Oct. 2019. Accessed Oct. 2022.
      Taylor, Linnet. “What is data justice? The case for connecting digital rights and freedoms globally.“ Big Data & Society, July-Dec 2017. Accessed Aug 2022.
      “Twitter: Data Collection With API Research Paper.” IvyPanda, 28 April 2022. Accessed Aug. 2022.
      “Using governance automation to reduce data risk.” Nintex, 15 Nov. 2021. Accessed Oct. 2022
      “Volume of data/information created, captured, copied, and consumed worldwide from 2010 to 2020, with forecasts from 2021 to 2025.” Statista, 8 Sept. 2022. Accessed Oct 2022.
      Wang, R. “Monday's Musings: Beyond The Three V's of Big Data – Viscosity and Virality.” Forbes, 27 Feb. 2012. Accessed Aug 2022.
      “What is a data fabric?” IBM, n.d. Accessed Aug 2022.
      Yego, Kip. “Augmented data management: Data fabric versus data mesh.” IBM, 27 April 2022. Accessed Aug 2022.

      Define Your Digital Business Strategy

      • Buy Link or Shortcode: {j2store}55|cart{/j2store}
      • member rating overall impact: 9.0/10 Overall Impact
      • member rating average dollars saved: $83,641 Average $ Saved
      • member rating average days saved: 26 Average Days Saved
      • Parent Category Name: Innovation
      • Parent Category Link: /innovation
      • Your organizational digital business strategy sits on the shelf because it fails to guide implementation.
      • Your organization has difficulty adapting new technologies or rethinking their existing business models.
      • Your organization lacks a clear vision for the digital customer journey.
      • Your management team lacks a framework to rethink how your organization delivers value today, which causes annual planning to become an ideation session that lacks focus.

      Our Advice

      Critical Insight

      • Pre-pandemic digital strategies have been primarily focused on automation. However, your post-pandemic digital strategy must focus on driving resilience for growth opportunities.

      Impact and Result

      • Design a strategy that applies innovation to your business model, streamline and transform processes, and make use of technologies to enhance interactions with customers and employees.
      • Use digital for transforming non-routine cognitive activities and for derisking key elements of the value chain.
      • Create a balanced roadmap that improves digital maturity and prepares you for long-term success in a digital economy.

      Define Your Digital Business Strategy Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Digital Business Strategy Deck – A step-by-step document that walks you through how to identify top value chains and a digitally enabled growth opportunity, transform stakeholder journeys, and build a digital transformation roadmap.

      This blueprint guides you through a value-driven approach to digital transformation that allows you to identify what aspects of the business to transform, what technologies to embrace, what processes to automate, and what new business models to create. This approach to digital transformation unifies digital possibilities with your customer experiences.

      • Define Your Digital Business Strategy – Phases 1-4

      2. Digital Business Strategy Workbook – A tool to guide you in planning and prioritizing projects to build an effective digital business strategy.

      This tool guides you in planning and prioritizing projects to build an effective digital business strategy. Key activities include conducting a horizon scan, conducting a journey mapping exercise, prioritizing opportunities from a journey map, expanding opportunities into projects, and lastly, building the digital transformation roadmap using a Gantt chart visual to showcase project execution timelines.

      • Digital Strategy Workbook

      3. Digital Business Strategy Final Report Template – Use this template to capture the synthesized content from outputs of the activities.

      This deck is a visual presentation template for this blueprint. The intent is to capture the contents of the activities in a presentation PowerPoint. It uses sample data from “City of X” to demonstrate the digital business strategy.

      • Digital Business Strategy Final Report Template
      [infographic]

      Workshop: Define Your Digital Business Strategy

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Identify Two Existing Value Chains

      The Purpose

      Understand how your organization creates value today.

      Key Benefits Achieved

      Identify opportunities for digital transformation in how you currently deliver value today.

      Activities

      1.1 Validate business context.

      1.2 Assess business ecosystem.

      1.3 Identify and prioritize value streams.

      1.4 Break down value stream into value chains.

      Outputs

      Business context

      Overview of business ecosystem

      Value streams and value chains

      2 Identify a Digitally Enabled Growth Opportunity

      The Purpose

      Leverage strategic foresight to evaluate how complex trends can evolve over time and identify opportunities to leapfrog competitors.

      Key Benefits Achieved

      Identify a leapfrog idea to sidestep competitors.

      Activities

      2.1 Conduct a horizon scan.

      2.2 Identify leapfrog ideas.

      2.3 Identify impact to existing or new value chains.

      Outputs

      One leapfrog idea

      Corresponding value chain

      3 Transform Stakeholder Journeys

      The Purpose

      Design a journey map to empathize with your customers and identify opportunities to streamline or enhance existing and new experiences.

      Key Benefits Achieved

      Identify a unified view of customer experience.

      Identify opportunities to automate non-routine cognitive tasks.

      Identify gaps in value delivery.

      Improve customer journey.

      Activities

      3.1 Identify stakeholder persona.

      3.2 Identify journey scenario.

      3.3 Conduct one journey mapping exercise.

      3.4 Identify opportunities to improve stakeholder journey.

      3.5 Break down opportunities into projects.

      Outputs

      Stakeholder persona

      Stakeholder scenario

      Journey map

      Journey-based projects

      4 Build a Digital Transformation Roadmap

      The Purpose

      Build a customer-centric digital transformation roadmap.

      Key Benefits Achieved

      Keep your team on the same page with key projects, objectives, and timelines.

      Activities

      4.1 Prioritize and categorize initiatives.

      4.2 Build roadmap.

      Outputs

      Digital goals

      Unified roadmap

      Further reading

      Define Your Digital Business Strategy

      After a major crisis, find your place in the digital economy.

      Info-Tech Research Group

      Info-Tech is a provider of best-practice IT research advisory services that make every IT leader’s job easier.

      35,000 members sharing best practices you can leverage

      Millions spent developing tools and templates annually

      Leverage direct access to over 100 analysts as an extension of your team

      Use our massive database of benchmarks and vendor assessments

      Get up to speed in a fraction of the time

      Analyst Perspective

      Build business resilience and prepare for a digital economy.

      This is a picture of Senior Research Analyst, Dana Daher

      Dana Daher
      Senior Research Analyst

      To survive one of the greatest economic downturns since the Great Depression, organizations had to accelerate their digital transformation by engaging with the Digital Economy. To sustain growth and thrive as the pandemic eases, organizations must focus their attention on building business resilience by transforming how they deliver value today.
      This requires a value-driven approach to digital transformation that is capable of identifying what aspects of the business to transform, what technologies to embrace, what processes to automate, and what new business models to create. And most importantly, it needs to unify digital possibilities with your customer experiences.
      If there was ever a time for an organization to become a digital business, it is today.

      Executive Summary

      Your Challenge

      • Your organization has difficulty adapting new technologies or rethinking the existing business models.
      • Your management lacks a framework to rethink how your organization delivers value today, which causes annual planning to become an ideation session that lacks focus.
      • There is uncertainty on how to meet evolving customer needs and how to compete in a digital economy.

      Common Obstacles

      • Your organization might approach digital transformation as if we were still in 2019, not recognizing that the pandemic resulted in a major shift to an end-to-end digital economy.
      • Your senior-most leadership thinks digital is "IT's problem" because digital is viewed synonymously with technology.
      • On the other hand, your IT team lacks the authority to make decisions without the executives’ involvement in the discussion around digital.

      Info-Tech’s Approach

      • Design a strategy that applies innovation to your business model, streamline and transform processes, and make use of technologies to enhance interactions with customers and employees.
      • Use digital for transforming non-routine cognitive activities and for de-risking key elements of the value chain.
      • Create a balanced roadmap that improves digital maturity and prepares you for long-term success in a digital economy.

      Info-Tech Insight

      After a major crisis, focus on restarting the growth engine and bolstering business resilience.

      Your digital business strategy aims to transform the business

      Digital Business Strategy

      • Looks for ways to transform the business by identifying what technologies to embrace, what processes to automate, and what new business models to create.
      • Unifies digital possibilities with your customer experiences.
      • Accountability lies with the executive leadership.
      • Must involve cross-functional participation from senior management from the different areas of the organization.

      IT Strategy

      • Aims to identify how to change, fix, or improve technology in support of the organization’s business strategy.
      • Accountability lies with the CIO.
      • Must involve IT management and gather strategic input from the business.

      Becoming a digital business

      Automate tasks to free up time for innovation.

      Business activities (tasks, procedures, and processes, etc.) are used to create, sell, buy, and deliver goods and services.

      When we convert information into a readable format used by computers, we call this digitization (e.g. converting paper into digital format). When we convert these activities into a format to be processed by a computer, we have digitalization (e.g. scheduling appointments online).

      These two processes alter how work takes place in an organization and form the foundation of the concept digital transformation.

      We maintain that digital transformation is all about becoming a “digital business” – an organization that performs more than 66% of all work activities via executable code.

      As organizations take a step closer to this optimal state, new avenues are open to identify advances to promote growth, enhance customer experiences, secure sustainability, drive operational efficiencies, and unearth potential future business ventures.

      Key Concepts:

      Digital: The representation of a physical item in a format used by computers

      Digitization: Conversion of information and processes into a digital format

      Digitalization: Conversion of information into a format to be processed by a computer

      Why transform your business?

      COVID-19 has irrefutably changed livelihoods, businesses, and the economy. During the pandemic, digital tools have acted as a lifeline, helping businesses and economies survive, and in the process, have acted as a catalyst for digital transformation.

      As organizations continue to safeguard business continuity and financial recovery, in the long term, recovery won’t be enough.

      Although many pandemic/recession recovery periods have occurred before, this next recovery period will present two first-time challenges no one has faced before. We must find ways to:

      • Recover from the COVID-19 recession.
      • Compete in a digital economy.

      To grow and thrive in this post-pandemic world, organizations must provide meaningful and lasting changes to brace for a future defined by digital technologies. – Dana Daher, Info-Tech Research Group

      We are amid an economic transformation

      What we are facing today is a paradigm shift transforming the ways in which we work, live, and relate to one another.

      In the last 60 years alone, performance and productivity have been vastly improved by IT in virtually all economic activities and sectors. And today, digital technologies continue to advance IT's contribution even further by bringing unprecedented insights into economic activities that have largely been untouched by IT.

      As technological innovation and the digitalization of products and services continue to support economic activities, a fundamental shift is occurring that is redefining how we live, work, shop, and relate to one another.

      These rapid changes are captured in a new 21st century term:

      The Digital Economy.

      90% of CEOs believe the digital economy will impact their industry. But only 25% have a plan in place. – Paul Taylor, Forbes, 2020

      Analyst Perspective

      Become a Digital Business

      this is a picture of Research Fellow, Kenneth McGee

      Kenneth McGee
      Research Fellow

      Today, the world faces two profoundly complex, mega-challenges simultaneously:

      1. Ending the COVID-19 pandemic and recession.
      2. Creating strategies for returning to business growth.

      Within the past year, healthcare professionals have searched for and found solutions that bring real hope to the belief the global pandemic/recession will soon end.

      As progress towards ending COVID-19 continues, business professionals are searching for the most effective near-term and long-term methods of restoring or exceeding the rates of growth they were enjoying prior to 2020.

      We believe developing a digital business strategy can deliver cost savings to help achieve near-term business growth while preparing an enterprise for long-term business growth by effectively competing within the digital economy of the future.

      The Digital Economy

      The digital economy refers to a concept in which all economic activity is facilitated or managed through digital technologies, data, infrastructure, services, and products (OECD, 2020).

      The digital economy captures decades of digital trends including:

      • Declining enterprise computing costs
      • Improvements in computing power and performance; unprecedent analytic capabilities
      • Rapid growth in network speeds, affordability, and geographic reach
      • High adoption rates of PCs, mobile, and other computing devices

      These trends among others have set the stage to permanently alter how buying and selling will take place within and between local, regional, national, and international economies.

      The emerging digital economy concept is so compelling that the world economists, financial experts, and others are currently investigating how they must substantially rewrite the rules governing how taxes, trade, tangible and intangible assets, and countless other financial issues will be assessed and valued in a digital economy.

      Download Info-Tech’s Digital Economy Report

      Signals of Change

      60%
      of People on Earth Use the Internet
      (DataReportal, 2021)
      20%
      of Global Retail Sales Performed via E-commerce
      (eMarketer, 2021)
      6.64T
      Global Business-to-Business
      E-commerce Market
      (Derived from The Business Research Company, 2021)
      9.6%
      of US GDP ($21.4T) accounted for by the digital economy ($2.05T)
      (Bureau of Economic Analysis, 2021)

      The digital economy captures technological developments transforming the way in which we live, work, and socialize

      Technological evolution

      this image contains a timeline of technological advances, from computers and information technology, to the digital economy of the future

      Info-Tech’s approach to digital business strategy

      A path to thrive in a digital economy.

      1. Identify top value chains to be transformed
      2. Identify a digitally enabled growth opportunity
      3. Transform stakeholder journeys
      4. Build a digital transformation roadmap

      Info-Tech Insight

      Pre-pandemic digital strategies have been primarily focused on automation. However, your post-pandemic digital strategy must focus on driving resilience for growth opportunities.

      The Info-Tech difference:

      • Understand how your organization creates value today to identify opportunities for digital transformation.
      • Leverage strategic foresight to evaluate how complex trends can evolve over time and identify opportunities to leapfrog competitors.
      • Design a journey map to empathize with your customers and identify opportunities to streamline or enhance existing and new experiences.
      • Create a balanced roadmap that improves digital maturity and prepares you for long-term success in a digital economy.

      A digital transformation starts by transforming how you deliver value today

      As digital transformation is an effort to transform how you deliver value today, it is important to understand the different value-generating activities that deliver an outcome for and from your customers.

      We do this by looking at value streams –which refer to the specific set of activities an industry player undertakes to create and capture value for and from the end consumer (and so the question to ask is, how do you make money as an organization?).

      Our approach helps you to digitally transform those value streams that generate the most value for your organization.

      Higher Education Value stream

      Recruitment → Admission → Student Enrolment → Instruction & Research → Graduation → Advancement

      Local Government Value Stream

      Sustain Land, Property, and the Environment → Facilitate Civic Engagement → Protect Local Health and Safety → Grow the Economy → Provide Regional Infrastructure

      Manufacturing Value Stream

      Design Product → Produce Product → Sell Product

      Visit Info-Tech’s Industry Coverage Research to identify your industry’s value streams

      Assess your external environment to identify new value generators

      Assessing your external environment allows you to identify trends that will have a high impact on how you deliver value today.

      Traditionally, a PESTLE analysis is used to assess the external environment. While this is a helpful tool, it is often too broad as it identifies macro trends that are not relevant to an organization's addressable market. That is because not every factor that affects the macro environment (for example, the country of operation) affects a specific organization’s industry in the same way.

      And so, instead of simply assessing the macro environment and trying to project its evolution along the PESTLE factors, we recommend to:

      • Conduct a PESTLE first and deduce, from the analysis, what are possible shifts in six characteristics of an organization’s industry, or
      • Proceed immediately with identifying evolutionary trends that impact the organization’s direct market.

      the image depicts the relationship of factors from the Macro Environment, to the Industry/Addressable Market, to the Organization. the macro environmental factors are Political; Economic; Social; Technological; Legal; and Environmental. the Industry/addressable market factors are the Customer; Talent; Regulation; technology and; Supply chain.

      Info-Tech Insight

      While PESTLE is helpful to scan the macro environment, the analysis often lacks relevance to an organization’s industry.

      An analysis of evolutionary shifts in five industry-specific characteristics would be more effective for identifying trends that impact the organization

      A Market Evolution Trend Analysis (META) identifies changes in prevailing market conditions that are directly relevant to an organization’s industry, and thus provides some critical input to the strategy design process, since these trends can bring about strategic risks or opportunities.
      Shifts in these five characteristics directly impact an organization:

      ORGANIZATION

      • Customer Expectations
      • Talent Availability
      • Regulatory System
      • Supply Chain Continuity
      • Technological Landscape

      Capture existing and new value generators through a customer journey map

      As we prioritize value streams, we break them down into value chains – that is the “string” of processes that interrelate that work.

      However, once we identify these value chains and determine what parts we wish to digitally transform, we take on the perspective of the user, as the way they interact with your products and services will be different to the view of those within the organization who implement and provide those services.

      This method allows us to build an empathetic and customer-centric lens, granting the capability to uncover challenges and potential opportunities. Here, we may define new experiences or redesign existing ones.

      This image contains an example of how a school might use a value chain and customer journey map. the value streams listed include: Recruitment; Admission; Student Enrolment; Instruction& Research; Graduation; and Advancement. the Value chain for the Instruction and Research Value stream. The value chain includes: Research; Course Creation, Delivery, and assessment. The Customer journey map for curricula delivery includes: Understanding the needs of students; Construct the course material; Deliver course material; Conduct assessment and; Upload Grades into system

      A digital transformation is not just about customer journeys but also about building business resilience

      Pre-pandemic, a digital transformation was primarily focused around improving customer experiences. Today, we are facing a paradigm shift in the way in which we capture the priorities and strategies for a digital transformation.

      As the world grows increasingly uncertain, organizations need to continue to focus on improving customer experience while simultaneously protecting their enterprise value.

      Ultimately, a digital transformation has two purposes:

      1. The classical model – whereby there is a focus on improving digital experiences.
      2. Value protection or the reduction of enterprise risk by systematically identifying how the organization delivers value and digitally transforming it to protect future cashflows and improve the overall enterprise value.
      Old Paradigm New Paradigm
      Predictable regulatory changes with incremental impact Unpredictable regulatory changes with sweeping impact
      Reluctance to use digital collaboration Wide acceptance of digital collaboration
      Varied landscape of brick-and-mortar channels Last-mile consolidation
      Customers value brand Customers value convenience/speed of fulfilment
      Intensity of talent wars depends on geography Broadened battlefields for the war for talent
      Cloud-first strategies Cloud-only strategies
      Physical assets Aggressive asset decapitalization
      Digitalization of operational processes Robotization of operational processes
      Customer experience design as an ideation mechanism Business resilience for value protection and risk reduction

      Key deliverable:

      Digital Business Strategy Presentation Template

      A highly visual and compelling presentation template that enables easy customization and executive-facing content.

      three images are depicted, which contain slides from the Digital Business Strategy presentation template, which will be available in 2022.

      *Coming in 2022

      Blueprint deliverables

      The Digital Business Strategy Workbook supports each step of this blueprint to help you accomplish your goals:

      Initiative Prioritization

      A screenshot from the Initiative Prioritization blueprint is depicted, no words are legible in the image.

      Use the weighted scorecard approach to evaluate and prioritize your opportunities and initiatives.

      Roadmap Gantt Chart

      A screenshot from the Roadmap Gantt Chart blueprint is depicted, no words are legible in the image.

      Populate your Gantt chart to visually represent your key initiative plan over the next 12 months.

      Journey Mapping Workbook

      A screenshot from the Journey Mapping Workbook blueprint is depicted, no words are legible in the image.

      Populate the journey maps to evaluate a user experience over its end-to-end journey.

      Info-Tech offers various levels of support to best suit your needs

      DIY Toolkit

      “Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful.”

      Guided Implementation

      “Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track.”

      Workshop

      “We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place.”

      Consulting

      “Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project.”

      Diagnostics and consistent frameworks used throughout all four options

      Guided Implementation

      What does a typical GI on this topic look like?

      Phase 0 Phase 1 Phase 2 Phase 3 Phase 4
      Call #1:
      Discuss business context and customize your organization’s capability map.
      Call #2:
      Assess business ecosystem.
      Call #3:
      Perform horizon scanning and trends identification.
      Call #5:
      Identify stakeholder personas and scenarios.
      Call #7:
      Discuss initiative generation and inputs into roadmap.
      Call #3:
      Identify how your organization creates value.
      Call #4:
      Discuss value chain impact.
      Call #6:
      Complete journey mapping exercise.
      Call #8:
      Summarize results and plan next steps.

      A Guided Implementation (GI) is a series of calls with an Info-Tech analyst to help implement our best practices in your organization.
      A typical GI is between 8 to 12 calls over the course of 2 to 4 months.

      Workshop Requirements

      Business Inputs

      Gather business strategy documents and find information on:

      • Business goals
      • Current transformation initiatives
      • Business capabilities to create or enhance
      • Identify top ten revenue and expense generators
      • Identify stakeholders

      Interview the following stakeholders to uncover business context information:

      • CEO
      • CIO

      Download the Business Context Discovery Tool

      Optional Diagnostic

      • Assess your digital maturity (Concierge Service)

      Visit Assess Your Digital Maturity

      Phase 1

      Identify top value chains to be transformed

      • Understand the business
      • Assess your business ecosystem
      • Identify two value chains for transformation

      This phase will walk you through the following activities:

      Understand how your organization delivers value today and identify value chains to be transformed.

      This phase involves the following participants:

      A cross-functional cohort across all levels of the organization.

      Outcomes

      • Business ecosystem
      • Existing value chains to be transformed

      Step 1.1

      Understand the business

      Activities

      • Review business documents.

      Identify top value chains to be transformed

      This step will walk you through the following activities:

      In this section you will gain an understanding of the business context for your strategy.

      This step involves the following participants:

      A cross-functional cohort across levels in the organization.

      Outcomes of this step

      Business Context

      Understand the business context

      Understanding the business context is a must for all strategic initiatives. A pre-requisite to all strategic planning should be to elicit the business context from your business stakeholders.

      Inputs Document(s)/ Method Outputs
      Key stakeholders Strategy Document Stakeholders that are actively involved in, affected by or influence outcome of the organization, e.g. employers, customers, vendors.
      Vision and mission of the organization Website Strategy Document What the organization wants to achieve and how it strives to accomplish those goals.
      Business drivers CEO Interview Inputs and activities that drive the operational and financial results of the organization.
      Key targets CEO Interview Quantitative benchmarks to support strategic goals, e.g. double the enterprise EBITD, improve top-of-mind brand awareness by 15%,
      Strategic investment goals CFO Interview
      Digital Strategy
      Financial investments corresponding with strategic objectives of the organization, e.g. geographic expansion, digital investments.
      Top three value-generating lines of business Financial Document Identification of your top three value-generating products and services or lines of business.
      Goals of the organization over the next 12 months Strategy Document
      Corporate Retreat Notes
      Strategic goals to support the vision, e.g. hire 100 new sales reps, improve product management and marketing.
      Top business initiatives over the next 12 months Strategy Document
      CEO Interview
      Internal campaigns to support strategic goals, e.g. invest in sales team development, expand the product innovation team.
      Business model Strategy Document Products or services that the organization plans to sell, the identified market and customer segments, price points, channels and anticipated expenses.
      Competitive landscape Internal Research Analysis Who your typical or atypical competitors are.

      1.1 Understand the business context

      Objective: Elicit the business context with a careful review of business and strategy documents.

      1. Gather the strategy creation team and review your business context documents. This includes business strategy documents, interview notes from executive stakeholders, and other sources for uncovering the business strategy.
      2. Brainstorm in smaller groups answers to the question you were assigned:
        • What are the strengths and weaknesses of the organization?
        • What are some areas of improvement or opportunity?
        • What does it mean to have a digital business strategy?
      3. Discuss the questions above with participants and document key findings. Share with the group and work through the balanced scorecard questions to complete this exercise.
      4. Document your findings.

      Assess your digital readiness with Info-Tech’s Digital Maturity Assessment

      Input

      • Business Strategy Documents
      • Executive Stakeholder Interviews

      Output

      • Business Context Information

      Materials

      • Collaboration/ Brainstorming Tool (whiteboard, flip chart, digital equivalent)

      Participants

      • Executive Team

      Step 1.2

      Assess your business ecosystem

      Activities

      • Identify disruptors and incumbents.

      Info-Tech Insight

      Your digital business strategy cannot be formulated without a clear vision of the evolution of your industry.

      Identify top value chains to be transformed

      This step will walk you through the following activities:

      In this section, we will assess who the incumbents and disruptors are in your ecosystem and identify who your stakeholders are.

      This step involves the following participants:

      A cross-functional cohort across levels in the organization.

      Outcomes of this step

      Business Ecosystem

      Assess your business ecosystem

      Understand the nature of your competition.

      Learn what your competitors are doing.

      To survive, grow, or transform in today's digital era, organizations must first have a strong pulse on their business ecosystem. Learning what your competitors are doing to grow their bottom line is key to identifying how to grow your own. Start by understanding who the key incumbents and disruptors in your industry are to identify where your industry is heading.

      Incumbents: These are established leaders in the industry that possess the largest market share. Incumbents often focus their attention to their most demanding or profitable customers and neglect the needs of those down market.

      Disruptors: Disruptors are primarily new entrants (typically startups) that possess the ability to displace the existing market, industry, or technology. Disruptors are often focused on smaller markets that the incumbents aren’t focused on. (Clayton Christenson, 1997)

      An image is shown demonstrating the relationship within an industry between incumbents, disruptors, and the organization. The incumbents are represented by two large purple circles. The disruptors are represented by 9 smaller blue circles, which represent smaller individual customer bases, but overall account for a larger portion of the industry.

      ’Disruption’ specifically refers to what happens when the incumbents are so focused on pleasing their most profitable customers that they neglect or misjudge the needs of their other segments.– Ilan Mochari, Inc., 2015

      Example Business Ecosystem Analysis

      Business Target Market & Customer Product/Service & Key Features Key Differentiators Market Positioning
      University XYZ
      • Local Students
      • Continuous Learner
      • Certificate programs
      • Associate degrees
      • Strong engineering department with access to high-quality labs
      • Strong community impact
      Affordable education with low tuition cost and access to bursaries & scholarships.
      University CDE University CDE
      • Local students
      • International students
      • Continuous learning students
      • Continuous learning offerings (weekend classes)
      • Strong engineering program
      • Strong continuous learning programs
      Outcome focused university with strong co-ops/internship programs and career placements for graduates
      University MNG
      • Local students
      • Non degree, freshman and continuous learning adults
      • Associate degrees
      • Certificate programs (IT programs)
      • Dual credit program
      • More locations/campuses
      • Greater physical presence
      • High web presence
      Nurturing university with small student population and classroom sizes. University attractive to adult learners.
      Disruptors Online Learning Company EFG
      • Full-time employees & executives– (online presence important)
      • Shorter courses
      • Full-time employees & executives– (online presence important)
      Competitive pricing with an open acceptance policy
      University JKL Online Credential Program
      • High school
      • University students
      • Adult learners
      • Micro credentials
      • Ability to acquire specific skills
      Borderless and free (or low cost) education

      1.2 Understand your business ecosystem

      Objective: Identify the incumbents and disruptors in your business ecosystem.

      1. Identify the key incumbents and disruptors in your business ecosystem.
        • Incumbents: These are established leaders in the industry that possess the largest market share.
        • Disruptors: Disruptors are primarily new entrants (startups) that possess the ability to displace the existing market, industry, or technology.
      2. Identify target market and key customers. Who are the primary beneficiaries of your products or service offerings? Your key customers are those who keep you in business, increase profits, and are impacted by your operations.
      3. Identify what their core products or services are. Assess what core problem their products solve for key customers and what key features of their solution support this.
      4. Assess what the competitors' key differentiators are. There are many differentiators that an organization can have, examples include product, brand, price, service, or channel.
      5. Identify what the organization’s value proposition is. Why do customers come to them specifically? Leverage insights from the key differentiators to derive this.
      6. Finally, assess how your organization derives value relative to your competitors.

      Input

      • Market Assessment

      Output

      • Key Incumbents and Disruptors

      Materials

      • Collaboration/ Brainstorming Tool (whiteboard, flip chart, digital equivalent)

      Participants

      • Executive Team

      Step 1.3

      Value-chain prioritization

      Activities

      • Identify and prioritize value chains for innovation.

      Identify top value chains to be transformed

      This step will walk you through the following activities:

      Identify and prioritize how your organization currently delivers value today and identify value chains to be transformed.

      This step involves the following participants:

      A cross-functional cohort across levels in the organization.

      Outcomes of this step

      Prioritized Value Chains

      Determine what value the organization creates

      Identify areas for innovation.

      Value streams and value chains connect business goals to the organization’s value realization activities. They enable an organization to create and capture value in the market place by engaging in a set of interconnected activities. Those activities are dependent on the specific industry segment an organization operates within.

      Different types of value your organization creates

      This an example of a value chain which a school would use to analyze how their organization creates value. The value streams listed include: Recruitment; Admission; Student Enrolment; Instruction& Research; Graduation; and Advancement. the Value chain for the Student enrolment stream is displayed. The value chain includes: Matriculation; Enrolment into a Program and; Unit enrolment.

      Value Streams

      A value stream refers to the specific set of activities an industry player undertakes to create and capture value for and from the end consumer.

      Value Chains

      A value chain is a ”string” of processes within a company that interrelate and work together to meet market demand. Examining the value chain of a company will reveal how it achieves competitive advantage.

      Visit Info-Tech’s Industry Coverage Research to identify value streams

      Begin with understanding your industry’s value streams

      Value Streams

      Recruitment

      • The promotion of the institution and the communication with prospective students is accommodated by the recruitment component.
      • Prospective students are categorized as domestic and international, undergraduate and graduate. Each having distinct processes.

      Admission

      • Admission into the university involves processes distinct from recruitment. Student applications are processed and evaluated and the students are informed of the decision.
      • This component is also concerned with transfer students and the approval of transfer credits.

      Student Enrolment

      • Student enrolment is concerned with matriculation when the student first enters the institution, and subsequent enrolment and scheduling of current students.
      • The component is also concerned with financial aid and the ownership of student records.

      Instruction & Research

      • Instruction involves program development, instructional delivery and assessment, and the accreditation of courses of study.
      • The research component begins with establishing policy and degree fundamentals and concerns the research through to publication and impact assessment.

      Graduation

      • Graduation is not only responsible for the ceremony but also the eligibility of the candidate for an award and the subsequent maintenance of transcripts.

      Advancement

      • Alumni relations are the first responsibility of advancement. This involves the continual engagement with former students.
      • Fundraising is the second responsibility. This includes the solicitation and stewardship of gifts from alumni and other benefactors.

      Value stream defined…

      Value streams connect business goals to the organization’s value realization activities in the marketplace. Those activities are dependent on the specific industry segment in which an organization operates.

      There are two types of value streams: core value streams and support value streams.

      • Core value streams are mostly externally facing. They deliver value to either an external or internal customer and they tie to the customer perspective of the strategy map.
      • Support value streams are internally facing and provide the foundational support for an organization to operate.

      An effective method for ensuring all value streams have been considered is to understand that there can be different end-value receivers.

      Leverage your industry’s capability maps to identify value chains

      Business Capability Map Defined

      A business capability defines what a business does to enable value creation, rather than how. Business capabilities:

      • Represent stable business functions.
      • Are unique and independent of each other.
      • Typically, will have a defined business outcome.

      A capability map is a great starting point to identify value chains within an organization as it is a strong indicator of the processes involved to deliver on the value streams.

      this image contains an example of a business capability map using the value streams identified earlier in this blueprint.

      Info-Tech Insight

      Leverage your industry reference architecture to define value streams and value chains.

      Visit Info-Tech’s Industry Coverage Research to identify value streams

      Prioritize value streams to be supported or enhanced

      Use an evaluation criteria that considers both the human and business value generators that these streams provide.

      two identical value streams are depicted. The right most value stream has Student Enrolment and Instruction Research highlighted in green. between the two streams, are two boxes. In these boxes is the following: Business Value: Profit; Enterprise Value; Brand value. Human Value: Faculty satisfaction; Student satisfaction; Community impact.

      Info-Tech Insight

      To produce maximum impact, focus on value streams that provide two-thirds of your enterprise value.

      Business Value

      Assess the value generators to the business, e.g. revenue dollars, enterprise value, cost or differentiation (competitiveness), etc.

      Human Value

      Assess the value generators to people, e.g. student/faculty satisfaction, well-being, and social cohesion.

      Identify value chains for transformation

      Value chains, pioneered by the academic Michael Porter, refer to the ”string” of processes within a company that interrelate and work together to meet market demand. An organization’s value chain is connected to the larger part of the value stream. This perspective of how value is generated encourages leaders to see each activity as a part of a series of steps required deliver value within the value stream and opens avenues to identify new opportunities for value generation.

      this image depicts two sample value chains for the value streams: student enrolment and Instruction & Research. Each value chain has a stakeholder associated with it. This is the primary stakeholder that seeks to gain value from that value chain.

      Prioritize value chains for transformation

      Once we have identified the key value chains within each value stream element, evaluate the individual processes within the value chain to identify opportunities for transformation. Evaluate the value chain processes based on the level of pain experienced by a stakeholder to accomplish that task, and the financial impact that level of the process has on the organization.

      this image depicts the same value chains as the image above, with a legend showing which steps have a financial impact, which steps have a high degree of risk, and which steps are prioritized for transformation. Matriculation and publishing are shown to have a financial impact. Research foundation is shown to have a high degree of risk, and enrollment into a program and conducting research are prioritized for transformation.

      1.3 Value chain analysis

      Objective: Determine how the organization creates value, and prioritize value chains for innovation.

      1. The first step of delivering value is defining how it will happen. Use the organization’s industry segment to start a discussion on how value is created for customers. Working back from the moment value is realized by the customer, consider the sequential steps required to deliver value in your industry segment.
      2. Define and validate the organization’s value stream. Write a short description of the value stream that includes a statement about the value provided and a clear start and end for the value stream.
      3. Prioritize the value streams based on an evaluation criteria that reflects business and human value generators to the organization.
      4. Identify value chains that are associated with each value stream. The value chains refer to a string of processes within the value stream element. Each value chain also captures a particular stakeholder that benefits from the value chain.
      5. Once we have identified the key value chains within each value stream element, evaluate the individual processes within the value chain and identify areas for transformation. Evaluate the value chain processes based on the level of pain or exposure to risk experienced by a stakeholder to accomplish that task and the financial impact that level of the process has on the organization.

      Visit Info-Tech’s Industry Coverage Research to identify value streams and capability maps

      Input

      • Market Assessment

      Output

      • Key Incumbents and Disruptors

      Materials

      • Collaboration/ Brainstorming Tool (whiteboard, flip chart, digital equivalent)

      Participants

      • Executive Team

      Phase 2

      Identify a digitally enabled growth opportunity

      • Conduct horizon scan
      • Identify leapfrog idea
      • Conduct value chain impact analysis

      This phase will walk you through the following activities:

      Assess trends that are impacting your industry and identify strategic growth opportunities.

      This phase involves the following participants:

      A cross-functional cohort across levels in the organization.

      Outcomes

      Identify new growth opportunities and value chains impacted

      Phase 2.1

      Horizon scanning

      Activities

      • Scan the internal and external environment for trends.

      Info-Tech Insight

      Systematically scan your environment to identify avenues or opportunities to skip one or several stages of technological development and stay ahead of disruption.

      Identify a digitally enabled growth opportunity

      This step will walk you through the following activities:

      Scan the environment for external environment for megatrends, trends, and drivers. Prioritize trends and build a trends radar to keep track of trends within your environment.

      This step involves the following participants:

      A cross-functional cohort across levels in the organization.

      Outcomes of this step

      Growth opportunity

      Horizon scanning

      Understand how your industry is evolving.

      Horizon scanning is a systematic analysis of detecting early signs of future changes or threats.

      Horizon scanning involves scanning, analyzing, and communicating changes in an organization’s environment to prepare for potential threats and opportunities. Much of what we know about the future is based around the interactions and trajectory of macro trends, trends, and drivers. These form the foundations for future intelligence.

      Macro Trends

      A macro trend captures a large-scale transformative trend that could impact your addressable market.

      Trends

      A trend captures a business use case of the macro trend. Consider trends in relation to competitors in your industry.

      Drivers

      A driver is an underlying force causing the trend to occur. There can be multiple causal forces, or drivers, that influence a trend, and multiple trends can be influenced by the same causal force.

      Identify signals of change in the present and their potential future impacts.

      Identifying macro trends

      A macro trend captures a large-scale transformative trend that could change the addressable market. Here are some examples of macro trends to consider when horizon scanning for your own organization:

      Talent Availability

      • Decentralized workforce
      • Hybrid workforce
      • Diverse workforce
      • Skills gap
      • Digital workforce
      • Multigenerational workforce

      Customer Expectations

      • Personalization
      • Digital experience
      • Data ownership
      • Transparency
      • Accessibility

      Technological Landscape

      • AI & robotics
      • Virtual world
      • Ubiquitous connectivity,
      • Genomics
      • Materials (smart, nano, bio)

      Regulatory System

      • Market control
      • Economic shifts
      • Digital regulation
      • Consumer protection
      • Global green

      Supply Chain Continuity

      • Resource scarcity
      • Sustainability
      • Supply chain digitization
      • Circular supply chains
      • Agility

      Identifying trends and drivers

      A trend captures a business use case of a macro trend. Assessing trends can reduce some uncertainties about the future and highlight potential opportunities for your organization. A driver captures the internal or external forces that lead the trend to occur. Understanding and capturing drivers is important to understanding why these trends are occurring and the potential impacts to your value chains.

      This image contains a flow chart, demonstrating the relationship between Macro trends, Trends, and Drivers. in this example, the macro trend is Accessibility. The Trends, or patterns of change, are an increase in demands for micro-credentials, and Preference for eLearning. The Drivers, or the why, are addressing skill gaps for increase in demand for micro-credentials, and Accommodating adult/working learners- for Preference for eLearning.

      Leverage industry roundtables and trend reports to understand the art of the possible

      Uncover important business and industry trends that can inform possibilities for technology innovation.

      Explore trends in areas such as:

      • Machine Learning
      • Citizen Dev 2.0
      • Venture Architecture
      • Autonomous Organizations
      • Self-Sovereign Cloud
      • Digital Sustainability

      Market research is critical in identifying factors external to your organization and identifying technology innovation that will provide a competitive edge. It’s important to evaluate the impact each trend or opportunity will have in your organization and market.

      Visit Info-Tech’s Trends & Priorities Research Center

      Visit Info-Tech’s Industry Coverage Research to identify your industry’s value streams

      this image contains three screenshots from Rethinking Higher Education Report and 2021 Tech Trends Report

      Images are from Info-Tech’s Rethinking Higher Education Report and 2021 Tech Trends Report

      Example horizon scanning activity

      Macro Trends Trends Drivers
      Talent Availability Diversity Inclusive campus culture Systemic inequities
      Hybrid workforce Online learning staff COVID-19 and access to physical institutions
      Customer Expectations Digital experience eLearning for working learners Accommodate adult learners
      Accessibility Micro-credentials for non-traditional students Addressing skills gap
      Technological Landscape Artificial intelligence and robotics AI for personalized learning Hyper personalization
      IoT IoT for monitoring equipment Asset tracking
      Augmented reality Immersive education AR and VR Personalized experiences
      Regulatory System Regulatory System Alternative funding for research Changes in federal funding
      Global Green Environmental and sustainability education curricula Regulatory and policy changes
      Supply Chain Continuity Circular supply chains Vendors recycling outdated technology Sustainability
      Cloud-based solutions Cloud-based eLearning software Convenience and accessibility

      Visit Info-Tech’s Industry Coverage Research to identify your industry’s value streams

      Prioritize trends

      Develop a cross-industry holistic view of trends.

      Visualize emerging and prioritize action.

      Moving from horizon scanning to action requires an evaluation process to determine which trends can lead to growth opportunities. First, we need to make a short list of trends to analyze. For your digital strategy, consider trends on the time horizon that are under 24 months. Next, we need to evaluate the shortlisted opportunities by a second set of criteria: relevance to your organization and impact on industry.

      Timing

      The estimated time to disruption this trend will have for your industry. Assess whether the trend will require significant developments to support its entry into the ecosystem.

      Relevance

      The relevance of the trend to your organization. Does the trend fulfil the vision or goals of the organization?

      Impact

      The degree of impact the trend will have on your industry. A trend with high impact will drive new business models, products, or services.

      Prioritize trends to adopt into your organization

      Prioritize trends based on timing, impact, and relevance.

      Trend Timing
      (S/M/L)
      Impact
      (1-5)
      Relevance
      ( 1-5)
      1. Micro-credentialing S 5 5
      2. IoT-connected devices for personalized experience S 1 3
      3. International partnerships with educational institutions M
      4. Use of chatbots throughout enrollment process L
      5. IoT for energy management of campus facilities L
      6. Gamification of digital course content M
      7. Flexible learning curricula S 4 3
      Deprioritize trends
      that have a time frame
      to disruption of more
      than 24 months.
      this image contains a graph demonstrating the relationship between relevance (x axis) and Impact (Y axis).

      2.1 Scanning the horizon

      Objective: Generate trends

      60 minutes

      • Start by selecting macro trends that are occurring in your environment using the five categories. These are the large-scale transformative trends that impact your addressable market. Macro trends have three key characteristics:
        • They span over a long period of time.
        • They impact all geographic regions.
        • They impact governments, individuals, and organizations.
      • Begin to break down these macro trends into trends. Trends should reflect the direction of a macro trend and capture the pattern in events. Consider trends that directly impact your organization.
      • Understand the drivers behind these trends. Why are they occurring? What is driving them? Understanding the drivers helps us understand the value they may generate.
      • Deprioritize trends that are expected to happen beyond 24 months.
      • Prioritize trends that have a high impact and relevance to the organization.
      • If you identify more than one trend, discuss with the group which trend you would like to pursue and limit it to one opportunity.

      Input

      • Macro Trends
      • Trends

      Output

      • Trends Prioritization

      Materials

      • Digital Strategy Workbook

      Participants

      • Executive Team

      Step 2.2

      Leapfrogging ideation

      Activities

      • Identify leapfrog ideas.
      • Identify impact to value chain.

      Info-Tech Insight

      A systematic approach to leapfrog ideation is one of the most critical ways in which an organization can build the capacity for resilient innovation.

      This step will walk you through the following activities:

      Evaluate trend opportunities and determine the strategic opportunities they pose. You will also work towards identifying the impact the trend has on your value chain.

      This step involves the following participants:

      A cross-functional cohort across levels in the organization.

      Outcomes of this step

      • Strategic growth opportunities
      • Value chain impact

      Leapfrog into the future

      Turn trends into growth opportunities.

      To thrive in the digital age, organizations must innovate big, leverage internal creativity, and prepare for flexibility.

      In this digital era, organizations are often playing catch up to a rapidly evolving technological landscape and following a strict linear approach to innovation. However, this linear catch-up approach does not help companies get ahead of competitors. Instead, organizations must identify avenues to skip one or several stages of technological development to leapfrog ahead of their competitors.

      The best way to predict the future is to invent it. – Alan Kay

      Leapfrogging takes place when an organization introduces disruptive innovation into the market and sidesteps competitors who are unable to mobilize to respond to the opportunities.

      Case Study

      Classroom of the Future

      Higher Education: Barco’s Virtual Classroom at UCL

      University College London (UCL), in the United Kingdom, selected Barco weConnect virtual classroom technology for its continuing professional development medical education offering. UCL uses the platform for synchronous teaching, where remote students can interact with a lecturer.

      One of the main advantages of the system is that it enables direct interaction with students through polls, questions, and whiteboarding. The system also allows you to track student engagement in real time.

      The system has also been leveraged for scientific research and publications. In their “Delphi” process, key opinion leaders were able to collaborate in an effective way to reach consensus on a subject matter. The processes that normally takes months were successfully completed in 48 hours (McCann, 2020).

      Results

      The system has been largely successful and has supported remote, real-time teaching, two-way engagement, engagement with international staff, and an overall enriched teaching experience.

      Funnel trends into leapfrog ideas

      Go from trend insights into ideas.

      Brainstorm ways of generating leapfrog ideas from trend insights.

      Dealing with trends is one of the most important tasks for innovation. It provides the basis of developing the future orientation of the organization. However, being aware of a trend is one thing, to develop strategies for response is another.

      To identify the impact the trend has on the organization, consider the four areas of growth strategies for the organization:

      1. New Customers: Leverage the trend to target new customers for existing products or services.
      2. New Business Models: Adjust the business model to capture a change in how the organization delivers value.
      3. New Markets: Enter or create new markets by applying existing products or services to different problems.
      4. New Product or Service Offerings: Introduce new products or services to the existing market.
      A funnel shaped image is depicted. At the top, at the entrance of the funnel, is the word Trend. At the bottom of the image, at the output of the funnel, is the word Opportunity.

      From trend to leapfrog ideas

      Trend New Customer New Market New Business Model New Product or Service
      What trends pose a high-immediate impact to the organization? Target new customers for existing products or services Enter or create new markets by applying existing products or services to different problems Adjust the business model to capture a change in how the organization delivers value Introduce new products or services to the existing market
      Micro-credentials for non-traditional students Target non-traditional learners/students - Online delivery Introduce mini MBA program

      2.2 Identify and prioritize opportunities

      60 minutes

      1. Gather the prioritized trend identified in the horizon scanning exercise (the trend identified to be “adopted” within the organization).
      2. Analyze each trend identified and assess whether the trend provides an opportunity for a new customers, new markets, new business models, or new products and services.

      Input

      • “Adopt” Trends

      Output

      • Trends to pursue
      • Breakdown of strategic opportunities that the trends pose

      Materials

      • Collaboration/ Brainstorming Tool (whiteboard, flip chart, digital equivalent)

      Participants

      • Executive Team

      Step 2.3

      Value chain impact

      Activities

      • Identify impact to value chain.

      This step will walk you through the following activities:

      Evaluate trend opportunities and determine the strategic opportunities they pose. Prioritize the opportunities and identify impact to your value chain.

      This step involves the following participants:

      A cross-functional cohort across levels in the organization.

      Outcomes of this step

      • Strategic growth opportunities

      Value chain analysis

      Identify implications of strategic growth opportunities to the value chains.

      As we identify and prioritize the opportunities available to us, we need to assess their impacts on value chains. Does the opportunity directly impact an existing value chain? Or does it open us to the creation of a new value chain?

      The value chain perspective allows an organization to identify how to best minimize or enhance impacts and generate value.
      As we move from opportunity to impact, it is important to break down opportunities into the relevant pieces so we can see a holistic picture of the sources of differentiation.

      this image depicts the value chain for the value stream, student enrolment.

      2.3 Value chain impact

      Objective: Identify impacts to the value chain from the opportunities identified.
      60 minutes

      1. Once you have identified the opportunity, turn back to the value stream, and with the working group, identify the value stream impacted most by the opportunity. Leverage the human impact/business impact criteria to support the identification of the value stream to be impacted.
      2. Within the value stream, brainstorm what parts of the value chain will be impacted by the new opportunity. Or ask whether this new opportunity provides you with a new value chain to be created.
      3. If this opportunity will require a new value chain, identify what set of new processes or steps will be created to support this new entrant.
      4. Identify any critical value chains that will be impacted by the new opportunity. What areas of the value chain pose the greatest risk? And where can we estimate the financial revenue will be impacted the most?

      Input

      • Opportunity

      Output

      • Value chains impacted

      Materials

      • Collaboration/ Brainstorming Tool (whiteboard, flip chart, digital equivalent)

      Participants

      • Executive Team

      Phase 3

      Transform stakeholder journeys

      • Identify stakeholder personas and scenarios
      • Conduct journey map
      • Identify projects

      This phase will walk you through the following activities:

      Take the prioritized value chains and create a journey map to capture the end-to-end experience of a stakeholder.

      Through a journey mapping exercise, you will identify opportunities to digitize parts of the journey. These opportunities will be broken down into functional initiatives to tackle in your strategy.

      This phase involves the following participants:

      A cross-functional cohort across levels in the organization.

      Outcomes

      1. Stakeholder persona
      2. Stakeholder scenario
      3. Stakeholder journey map
      4. Opportunities

      Step 3.1

      Identify stakeholder persona and journey scenario

      Activities

      • Identify stakeholder persona.
      • Identify stakeholder journey scenario.

      Transform stakeholder journeys

      This step will walk you through the following activities:

      In this step, you with identify stakeholder personas and scenarios relating to the prioritized value chains.

      This step involves the following participants:

      A cross-functional cohort across levels in the organization.

      Outcomes of this step

      • A taxonomy of critical stakeholder journeys.

      Identify stakeholder persona and journey scenario

      From value chain to journey scenario.

      Stakeholder personas and scenarios help us build empathy towards our customers. It helps put us into the shoes of a stakeholder and relate to their experience to solve problems or understand how they experience the steps or processes required to accomplish a goal. A user persona is a valuable basis for stakeholder journey mapping.

      A stakeholder scenario describes the situation the journey map addresses. Scenarios can be real (for existing products and services) or anticipated.

      A stakeholder persona is a fictitious profile to represent a customer or a user segment. Creating this persona helps us understand who your customers really are and why they are using your service or product.

      Learn more about applying design thinking methodologies

      Identify stakeholder scenarios to map

      For your digital strategy, leverage the existing and opportunity value chains identified in phase 1 and 2 for journey mapping.

      Identify two existing value chains to be transformed.
      In section 1, we identified existing value chains to be transformed. For example, your stakeholder persona is a member of the faculty (engineering), and the scenario is the curricula design process.
      this image contains the value chains for instruction (engineering) and enrolment of engineering student. the instruction(engineering) value chain includes curricula research, curricula design, curricula delivery, and Assessment for the faculty-instructor. The enrolment of engineering student value chain includes matriculation, enrolment into a program, and unit enrolment for the student. In the instruction(engineering) value chain, curricula design is highlighted in blue. In the enrolment of engineering student value chain, Enrolment into a program is highlighted.
      Identify one new value chain.
      In section 2, we identified a new value chain. However, for a new opportunity, the scenario is more complex as it may capture many different areas of a value chain. Subsequently, a journey map for a new opportunity may require mapping all parts of the value chain.
      this image contains an example of a value chain for micro-credentialing (mini online MBA)

      Identify stakeholder persona

      Who are you transforming for?

      To define a stakeholder scenario, we need to understand who we are mapping for. In each value chain, we identified a stakeholder who gains value from that value chain. We now need to develop a stakeholder persona: a representation of the end user to gain a strong understanding of who they are, what they need, and their pains and gains.

      One of the best ways to flesh out your stakeholder persona is to engage with the stakeholders directly or to gather the input of those who may engage with them within the organization.

      For example, if we want to define a journey map for a student, we might want to gather the input of students or teaching faculty that have firsthand encounters with different student types and are able to define a common student type.

      Info-Tech Insight

      Run a survey to understand your end users and develop a stronger picture of who they are and what they are seeking to gain from your organization.

      Example Stakeholder Persona

      Name: Anne
      Age: 35
      Occupation: Engineering Faculty
      Location: Toronto, Canada

      Pains

      What are their frustrations, fears, and anxieties?

      • Time restraints
      • Using new digital tools
      • Managing a class while incorporating individual learning
      • Varying levels within the same class
      • Unmotivated students

      What do they need to do?

      What do they want to get done? How will they know they are successful?

      • Design curricula in a hybrid mode without loss of quality of experience of in-classroom learning.

      Gains

      What are their wants, needs, hopes, and dreams?

      • Interactive content for students
      • Curriculum alignment
      • Ability to run a classroom lab (in hybrid format)
      • Self-paced and self-directed learning opportunities for students

      (Adapted from Osterwalder, et al., 2014)

      Define a journey statement for mapping

      Now that we understand who we are mapping for, we need to define a journey statement to capture the stakeholder journey.
      Leverage the following format to define the journey statement.
      As a [stakeholder], I need to [prioritized value chain task], so that I can [desired result or overall goal].

      this image contains the instruction(engineering) value chain shown above. next to it is a stakeholder journey statement, which states: As an engineering faculty member, I want to design my curricula in a hybrid mode of delivery so that I can simulate in-classroom experiences.

      3.1 Identify stakeholder persona and journey scenario

      Objective: Identify stakeholder persona and journey scenario statement for journey mapping exercise.

      1. Start by identifying who your stakeholder is. Give your stakeholder a demographic profile – capture a typical stakeholder for this value chain.
      2. Identify what the gains and pains are during this value chain and what the stakeholder is seeking to accomplish.
      3. Looking at the value chain, create a statement that captures the goals and needs of the stakeholder. Use the following format to create a statement:
        As a [stakeholder], I need to [prioritized value chain task], so that I can [desired result or overall goal].

      Input

      • Prioritized Value Chains (existing and opportunity)

      Output

      • Stakeholder Persona
      • Stakeholder Journey Statement

      Materials

      • Collaboration/ Brainstorming Tool (whiteboard, flip chart, digital equivalent)
      • Stakeholder Persona Canvas

      Participants

      • Executive Team
      • Stakeholders (if possible)
      • Individual who works directly with stakeholders

      Step 3.2

      Map stakeholder journeys

      Activities

      • Map stakeholder journeys.

      Transform stakeholder journeys

      This step will walk you through the following activities:

      Prioritize the journeys by focusing on what matters most to the stakeholders and estimating the organizational effort to improve those experiences.

      This step involves the following participants:

      A cross-functional cohort across levels in the organization.

      Outcomes of this step

      • Candidate journeys identified for redesign or build.

      Leverage customer journey mapping to capture value chains to be transformed

      Conduct a journey mapping exercise to identify opportunities for innovation or automation.

      A journey-based approach helps an organization understand how a stakeholder moves through a process and interacts with the organization in the form of touch points, channels, and supporting characters. By identifying pain points in the journey and the activity types, we can identify opportunities for innovation and automation along the journey.

      Embrace design thinking methodologies to elevate the stakeholder journey and to build a competitive advantage for your organization.

      this image contains an example of the result of a journey mapping exercise. the main headings are Awareness, Consideration, Acquisition, Service and, Loyalty.

      Internal vs. external stakeholder perspective

      In journey mapping, we always start with the stakeholder's perspective, then eventually transition into what the organization does business-wise to deliver value to each stakeholder. It is important to keep in mind both perspectives while conducting a journey mapping exercise as there are often different roles, processes, and technologies associated with each of the journey steps.

      Stakeholder Journey
      (External Perspective)

      • Awareness
      • Consideration
      • Selecting
      • Negotiating
      • Approving

      Business Processes
      (Internal Perspective)

      • Preparation
      • Prospecting
      • Presentation
      • Closing
      • Follow-Up

      Info-Tech Insight

      Take the perspective of an end user, who interacts with your products and services, as it is different from the view of those inside the organization, who implement and provide those services.

      Build a stakeholder journey map

      A stakeholder journey map is a tool used to illustrate the user’s perceptions, emotions, and needs as they move through a process and interact with the organization in the form of touch points, channels, and supporting characters.

      this image depicts an example of a stakeholder journey map, the headings in the map are: Journey Activity; Touch Points; Metrics; Nature of Activity; Key Moments & Pain Points; Opportunities

      Stakeholder Journey Map: Journey Activity

      The journey activity refers to the steps taken to accomplish a goal.

      The journey activity comprises the steps or sequence of tasks the stakeholder takes to accomplish their goal. These steps reflect the high-level process your candidates perform to complete a task or solve a problem.

      Stakeholder Journey Map: Touch Points

      Touch points are the points of interaction between a stakeholder and the organization.

      A touch point refers to any time a stakeholder interacts with your organization or brand. Consider three main points of interaction with the customer in the journey:

      • Before: How did they find out about you? How did they first contact you to start this journey? What channels or mediums were used?
        • Social media
        • Rating & reviews
        • Word of mouth
        • Advertising
      • During: How was the sale or service accomplished?
        • Website
        • Catalog
        • Promotions
        • Point of sale
        • Phone system
      • After: What happened after the sale or service?
        • Billing
        • Transactional emails
        • Marketing emails
        • Follow-ups
        • Thank-you emails

      Stakeholder Journey Map: Nature of Activity

      The nature of activity refers to the type of task the journey activity captures.

      We categorize the activity type to identify opportunities for automation. There are four main types of task types, which in combination (as seen in the table below) capture a task or job to be automated.

      Routine Non-Routine
      Cognitive Routine Cognitive: repeatable tasks that rely on knowledge work, e.g. sales, administration
      Prioritize for automation (2)
      Non-Routine Cognitive: infrequent tasks that rely on knowledge work, e.g. driving, fraud detection
      Prioritize for automation (3)
      Non-Routine Cognitive: infrequent tasks that rely on knowledge work, e.g. driving, fraud detection Prioritize for automation (3) Routine Manual: repeatable tasks that rely on physical work, e.g. manufacturing, production
      Prioritize for automation (1)
      Non-Routine Manual: infrequent tasks that rely on physical work, e.g. food preparation
      Not mature for automation

      Info-Tech Insight

      Where automation makes sense, routine manual activities should be transformed first, followed by routine cognitive activities. Non-routine cognitive activities are the final frontier.

      Stakeholder Journey Map: Metrics

      Metrics are a quantifiable measurement of a process, activity, or initiative.

      Metrics are crucial to justify expenses and to estimate growth for capacity planning and resourcing. There are multiple benefits to identifying and implementing metrics in a journey map:

      • Metrics provide accurate indicators for accurate IT and business decisions.
      • Metrics help you identify stakeholder touch point efficiencies and problems and solve issues before they become more serious.
      • Active metrics tracking makes root cause analysis of issues much easier.

      Example of journey mapping metrics: Cost, effort, turnaround time, throughput, net promoter score (NPS), satisfaction score

      Stakeholder Journey Map: Key Moments & Pain Points

      Key moments and pain points refer to the emotional status of a stakeholder at each stake of the customer journey.

      The key moments are defining pieces or periods in a stakeholder's experience that create a critical turning point or memory.

      The pain points are the critical problems that the stakeholder is facing during the journey or business continuity risks. Prioritize identifying pain points around key moments.

      Info-Tech Insight

      To identify key moments, look for moments that can dramatically influence the quality of the journey or end the journey prematurely. To improve the experience, analyze the hidden needs and how they are or aren’t being met.

      Stakeholder Journey Map: Opportunities

      An opportunity is an investment into people, process, or technology for the purposes of building or improving a business capability and accomplishing a specific organizational objective.

      An opportunity refers to the initiatives or projects that should address a stakeholder pain. Opportunities should also produce a demonstrable financial impact – whether direct (e.g. cost reduction) or indirect (e.g. risk mitigation) – and be evaluated based on how technically difficult it will be to implement.

      Customer

      Create new or different experiences for customers

      Workforce

      Generate new organizational skills or new ways of working

      Operations

      Improve responsiveness and resilience of operations

      Innovation

      Develop different products or services

      Example of stakeholder journey output: Higher Education

      Stakeholder: A faculty member
      Journey: As an engineering faculty member, I want to design my curricula in a hybrid mode of delivery so that I can simulate in-classroom experiences

      Journey activity Understanding the needs of students Construct the course material Deliver course material Conduct assessments Upload grades into system
      Touch Points
      • Research (primary or secondary)
      • Teaching and learning center
      • Training on tools
      • Office suite
      • Video tools
      • PowerPoint live
      • Chat (live)
      • Forum (FAQ
      • Online assessment tool
      • ERP
      • LMS
      Nature of Activity Non-routine cognitive Non-routine cognitive Non-routine cognitive Routine cognitive Routine Manual
      Metrics
      • Time to completion
      • Time to completion
      • Student satisfaction
      • Student satisfaction
      • Student scores
      Ken Moments & Pain Points Lack of centralized repository for research knowledge
      • Too many tools to use
      • Lack of Wi-Fi connectivity for students
      • Loss of social aspects
      • Adjusting to new forms of assessments
      No existing critical pain points; process already automated
      Opportunities
      • Centralized repository for research knowledge
      • Rationalize course creation tool set
      • Connectivity self-assessment/checklist
      • Forums for students
      • Implement an online proctoring tool

      3.2 Stakeholder journey mapping

      Objective: Conduct journey mapping exercise for existing value chains and for opportunities.

      1. Gather the working group and, with the journey mapping workbook, begin to map out the journey scenario statements identified in the value chain analysis. In total, there should be three journey maps:
        • Two for the existing value chains. Map out the specific point in the value chain that is to be transformed.
        • One for the opportunity value chain. Map out all parts of the value chain to be impacted by the new opportunity.
      2. Start with the journey activity and map out the steps involved to accomplish the goal of the stakeholder.
      3. Identify the touch points involved in the value chain.
      4. Categorize the nature of the activity in the journey activity.
      5. Identify metrics for the journey. How can we measure the success of the journey?
      6. Identify pain points and opportunities in parallel with one another.

      Input

      • Value Chain Analysis
      • Stakeholder Personas
      • Journey Mapping Scenario

      Output

      • Journey Map

      Materials

      • Digital Strategy Workbook, Stakeholder Journey tab

      Participants

      • Executives
      • Individuals in the organization that have a direct interaction with the stakeholders

      Info-Tech Insight

      Aim to build out 90% of the stakeholder journey map with the working team; validate the last 10% with the stakeholder themselves.

      Step 3.3

      Prioritize opportunities

      Activities

      • Prioritize opportunities.

      Transform stakeholder journeys

      This step will walk you through the following activities:

      Prioritize the opportunities that arose from the stakeholder journey mapping exercise.

      This step involves the following participants:

      A cross-functional cohort across levels in the organization.

      Outcomes of this step

      Prioritized opportunities

      Prioritization of opportunities

      Leverage design-thinking methods to prioritize opportunities.

      As there may be many opportunities arising from the journey map, we need to prioritize ideas to identify which ones we can tackle first – or at all. Leverage IDEO’s design-thinking “three lenses of innovation” to support prioritization:

      • Feasibility: Do you currently have the capabilities to deliver on this opportunity? Do we have the right partners, resources, or technology?
      • Desirability: Is this a solution the stakeholder needs? Does it solve a known pain point?
      • Viability: Does this initiative have an impact on the financial revenue of the organization? Is it a profitable solution that will support the business model? Will this opportunity require a complex cost structure?
      Opportunities Feasibility
      (L/M/H)
      Desirability
      (L/M/H)
      Viability
      (L/M/H)
      Centralized repository for research knowledge H H H
      Rationalize course creation tool set H H H
      Connectivity self-assessment/ checklist H M H
      Forums for students M H H
      Exam preparation (e.g. education or practice exams) H H H

      3.3 Prioritization of opportunities

      Objective: Prioritize opportunities for creating a roadmap.

      1. Gather the opportunities identified in the journey mapping exercise
      2. Assess the opportunities based on IDEO’s three lenses of innovation:
        • Feasibility: Do you currently have the capabilities to deliver on this opportunity? Do we have the right partners, resources, or technology?
        • Viability: Does this initiative have an impact on the financial revenue of the organization? Is it a profitable solution that will support the business model? Will this opportunity require a complex cost structure?
        • Desirability: Is this a solution the stakeholder needs? Does it solve a known pain point?
      3. Opportunities that score high in all three areas are prioritized for the roadmap.

      Input

      • Opportunities From Journey Map

      Output

      • Prioritized Opportunities

      Materials

      • Digital Strategy Workbook

      Participants

      • Executives

      Step 3.4

      Define digital goals

      Activities

      Transform stakeholder journeys

      This step will walk you through the following activities:

      Define a digital goal as it relates to the prioritized opportunities and the stakeholder journey map.

      This step involves the following participants:

      A cross-functional cohort across levels in the organization.

      Outcomes of this step

      Digital goals

      Define digital goals

      What digital goals can be derived from the stakeholder journey?

      With the prioritized set of opportunities for each stakeholder journey, take a step back and assess what the sum of these opportunities mean for the journey. What is the overall goal or objective of these opportunities? How do these opportunities change or facilitate the journey experience? From here, identify a single goal statement for each stakeholder journey.

      Stakeholder Scenario Prioritized Opportunities Goal
      Faculty (Engineering) As a faculty (Engineering), I want to prepare and teach my course in a hybrid mode of delivery Centralized repository for research knowledge
      Rationalized course creation tool set
      Support hybrid course curricula development through value-driven toolsets and centralized knowledge

      3.4 Define digital goals

      Objective: Identify digital goals derived from the journey statements.

      1. With the prioritized set of opportunities for each stakeholder journey (the two existing journeys and one opportunity journey) take a step back and assess what the sum of these opportunities means for each journey.
        • What is the overall goal or objective of these opportunities?
        • How do these opportunities change or facilitate the journey experience?
      2. From here, identify a single goal for each stakeholder journey.

      Input

      • Opportunities From Journey Map
      • Stakeholder Persona

      Output

      • Digital Goals

      Materials

      • Prioritization Matrix

      Participants

      • Executives

      Step 3.5

      Breakdown opportunities into series of initiatives

      Activities

      • Identify initiatives from the opportunities.

      Transform stakeholder journeys

      This step will walk you through the following activities:

      Identify people, process, and technology initiatives for the opportunities identified.

      This step involves the following participants:

      A cross-functional cohort across levels in the organization.

      Outcomes of this step

      • People, process, and technology initiatives

      Break down opportunities into a series of initiatives

      Brainstorm initiatives for each high-priority opportunity using the framework below. Describe each initiative as a plan or action to take to solve the problem.

      Opportunity → Initiatives:

      People: What initiatives are required to manage people, data, and other organizational factors that are impacted by this opportunity?

      Process: What processes must be created, changed, or removed based on the data?

      Technology: What systems are required to support this opportunity?

      Break down opportunities into a series of initiatives

      Initiatives
      Centralized repository for research knowledge Technology Acquire and implement knowledge management application
      People Train researchers on functionality
      Process Periodically review and validate data entries into repository
      Initiatives
      Rationalize course creation toolset Technology Retire duplicate or under-used tools
      People Provide training on tool types and align to user needs
      Process Catalog software applications and tools across the organization
      Identify under-used or duplicate tools/applications

      Info-Tech Insight

      Ruthlessly evaluate if a initiative should stand alone or if it can be rolled up with another. Fewer initiatives or opportunities increases focus and alignment, allowing for better communication.

      3.5 Break down opportunities into initiatives

      Objective: Break down opportunities into people, process, and technology initiatives.

      1. Split into groups and identify initiatives required to deliver on each opportunity. Document each initiative on sticky notes.
      2. Have each team answer the following questions to identify initiatives for the prioritized opportunities:
        • People: What initiatives are required to manage people, data, and other organizational factors that are impacted by this opportunity?
        • Process: What processes must be created, changed, or removed based on the data?
        • Technology: What systems are required to support this opportunity?
      3. Document findings in the Digital Strategy Workbook.

      Input

      • Opportunities

      Output

      • Opportunity initiatives categorized by people, process and technology

      Materials

      • Digital Strategy Workbook

      Participants

      • Executive team

      Phase 4

      Build a digital transformation roadmap

      • Detail initiatives
      • Build a unified roadmap roadmap

      This phase will walk you through the following activities:

      Build a digital transformation roadmap that captures people, process, and technology initiatives.

      This phase involves the following participants:

      A cross-functional cohort across levels in the organization.

      Outcomes

      • Digital transformation roadmap

      Step 4.1

      Detail initiatives

      Activities

      • Detail initiatives.

      Build a digital transformation roadmap

      This step will walk you through the following activities:

      Detail initiatives for each priority initiative on your horizon.

      This step involves the following participants:

      A cross-functional cohort across levels in the organization.

      Outcomes of this step

      • A roadmap for your digital business strategy.

      Create initiative profiles for each high-priority initiative on your strategy

      this image contains a screenshot of an example initiative profile

      Step 4.2

      Build a roadmap

      Activities

      • Create a roadmap of initiatives.

      Build a digital transformation roadmap

      Info-Tech Insight

      A roadmap that balances growth opportunities with business resilience will transform your organization for long-term success in the digital economy.

      This step will walk you through the following activities:

      Identify timing of initiatives and build a Gantt chart roadmap.

      This step involves the following participants:

      A cross-functional cohort across levels in the organization.

      Outcomes of this step

      • A roadmap for your digital transformation and the journey canvases for each of the prioritized journeys.

      Build a roadmap to visualize your key initiative plan

      Visual representations of data are more compelling than text alone.

      Develop a high-level document that travels with the initiative from inception through executive inquiry, project management, and finally execution.

      A initiative needs to be discrete: able to be conceptualized and discussed as an independent item. Each initiative must have three characteristics:

      • Specific outcome: Describe an explicit change in the people, processes, or technology of the enterprise.
      • Target end date: When the described outcome will be in effect.
      • Owner: Who on the IT team is responsible for executing on the initiative.
      this image contains screenshots of a sample roadmap for supporting hybrid course curricula development through value-driven toolsets and centralized knowledge.

      4.2 Build your roadmap (30 minutes)

      1. For the Gantt chart:
        • Input the Roadmap Start Year date.
        • Change the months and year in the Gantt chart to reflect the same roadmap start year.
        • Populate the planned start and planned end date for the pre-populated list of high-priority initiatives in each category (people, process, and technology).

      Input

      • Initiatives
      • Initiative start & end dates
      • Initiative category

      Output

      • Digital strategy roadmap visual

      Materials

      • Digital Strategy Workbook

      Participants

      • Senior Executive

      Learn more about project portfolio management strategy

      Step 4.3

      Create a refresh strategy

      Activities

      • Refresh your strategy.

      Build a digital transformation roadmap

      Info-Tech Insight

      A digital strategy is a design process, it must be revisited to pressure test and account for changes in the external environment.

      This step will walk you through the following activities:

      Detail a refresh strategy.

      This step involves the following participants:

      A cross-functional cohort across levels in the organization.

      Outcomes of this step

      • Refresh strategy

      Create a refresh strategy

      It is important to dedicate time to your strategy throughout the year. Create a refresh plan to assess for the changing business context and its impact on the digital business strategy. Make sure the regular planning cycle is not the primary trigger for strategy review. Put a process in place to review the strategy and make your organization proactive. Start by examining the changes to the business context and how the effect would trickle downwards. It’s typical for organizations to build a refresh strategy around budget season and hold planning and touch points to accommodate budget approval time.
      Example:

      this image contains an example of a refresh strategy.

      4.3 Create a refresh strategy (30 minutes)

      1. Work with the digital strategy creation team to identify the time frequencies the organization should consider to refresh the digital business strategy. Time frequencies can also be events that trigger a review (i.e. changing business goals). Record the different time frequencies in the Refresh of the Digital Business Strategy slide of the section.
      2. Discuss with the team the different audience members for each time frequency and the scope of the refresh. The scope represents what areas of the digital business strategy need to be re-examined and possibly changed.

      Example:

      Frequency Audience Scope Date
      Annually Executive Leadership Resurvey, review/ validate, update schedule Pre-budget
      Touch Point Executive Leadership Status update, risks/ constraints, priorities Oct 2021
      Every Year (Re-build) Executive Leadership Full planning Jan 2022

      Input

      • Digital Business Strategy

      Output

      • Refresh Strategy

      Materials

      • Digital Business Strategy Presentation Template
      • Collaboration/ Brainstorming Tool (whiteboard, flip chart, digital equivalent)

      Participants

      • Executive Leaders

      Related Info-Tech Research

      Design a Customer-Centric Digital Operating Model

      Design a Customer-Centric Digital Operating Model

      Establish a new way of working to deliver value on your digital transformation initiatives.

      Develop a Project Portfolio Management Strategy

      Develop a Project Portfolio Management Strategy

      Drive project throughput by throttling resource capacity.

      Adopt Design Thinking in Your Organization

      Adopt Design Thinking in Your Organization

      Innovation needs design thinking.

      Digital Maturity Improvement Service

      Digital Maturity Improvement Service

      Prepare your organization for digital transformation – or risk falling behind.

      Research Contributors and Experts

      Kenneth McGee

      this is a picture of Research Fellow, Kenneth McGee

      Research Fellow
      Info-Tech Research Group

      Kenneth McGee is a Research Fellow within the CIO practice at Info-Tech Research Group and is focused on IT business and financial management issues, including IT Strategy, IT Budgets and Cost Management, Mergers & Acquisitions (M&A), and Digital Transformation. He also has extensive experience developing radical IT cost reduction and return-to-growth initiatives during and following financial recessions.

      Ken works with CIOs and IT leaders to help establish twenty-first-century IT organizational charters, structures, and responsibilities. Activities include IT organizational design, IT budget creation, chargeback, IT strategy formulation, and determining the business value derived from IT solutions. Ken’s research has specialized in conducting interviews with CEOs of some of the world’s largest corporations. He has also interviewed a US Cabinet member and IT executives at the White

      House. He has been a frequent keynote speaker at industry conventions, client sales kick-off meetings, and IT offsite planning sessions.

      Ken obtained a BA in Cultural Anthropology from Dowling College, Oakdale, NY, and has pursued graduate studies at Polytechnic Institute (now part of NYU University). He has been an adjunct instructor at State University of New York, Westchester Community College.

      Jack Hakimian

      this is a picture of Vice President of the Info-Tech Research Group, Jack Hakimian

      Vice President
      Info-Tech Research Group

      Jack has more than 25 years of technology and management consulting experience. He has served multi-billion dollar organizations in multiple industries including Financial Services and Telecommunications. Jack also served a number of large public sector institutions.

      Prior to joining the Info-Tech Research Group, he worked for leading consulting players such as Accenture, Deloitte, EY, and IBM.

      Jack led digital business strategy engagements as well as corporate strategy and M&A advisory services for clients across North America, Europe, the Middle East, and Africa. He is a seasoned technology consultant who has developed IT strategies and technology roadmaps, led large business transformations, established data governance programs, and managed the deployment of mission-critical CRM and ERP applications.

      He is a frequent speaker and panelist at technology and innovation conferences and events and holds a Master’s degree in Computer Engineering as well as an MBA from the ESCP-EAP European School of Management.

      Bibliography

      Abrams, Karin von. “Global Ecommerce Forecast 2021.” eMarketer, Insider Intelligence, 7 July 2021. Web.

      Christenson, Clayton. The Innovator's Dilemma: When New Technologies Cause Great Firms to Fail. Harvard Business School, 1997. Book.

      Drucker, Peter F., and Joseph A. Maciariello. Innovation and Entrepreneurship. Routledge, 2015.

      Eagar, Rick, David Boulton, and Camille Demyttenaere. “The Trends in Megatrends.” Arthur D Little, Prism, no. 2, 2014. Web.

      Enright, Sara, and Allison Taylor. “The Future of Stakeholder Engagement.” The Business of a Better World, October 2016. Web.

      Hatem, Louise, Daniel Ker, and John Mitchell. “A roadmap toward a common framework for measuring the digital economy.” Report for the G20 Digital Economy Task Force, OECD, 2020. Web.

      Kemp, Simon. “Digital 2021 April Statshot Report.” DataReportal, Global Digital Insights, 21 Apr. 2021. Web.

      Larson, Chris. “Disruptive Innovation Theory: 4 Key Concepts.” Business Insights, Harvard Business School, HBS Online, 15 Nov. 2016. Web.

      McCann, Leah. “Barco's Virtual Classroom at UCL: A Case Study for the Future of All University Classrooms?” rAVe, 2 July 2020. Web.

      Mochari, Ilan. “The Startup Buzzword Almost Everyone Uses Incorrectly.” Inc., 19 Nov. 2015. Web.

      Osterwalder, Alexander, et al. Value Proposition Design. Wiley, 2014.

      Reed, Laura. “Artificial Intelligence: Is Your Job at Risk?” Science Node, 9 August 2017.

      Rodeck, David. “Alphabet Soup: Understanding the Shape of a Covid-19 Recession.” Forbes, 8 June 2020. Web.

      Tapscott, Don. Wikinomics. Atlantic Books, 2014.

      Taylor, Paul. “Don't Be A Dodo: Adapt to the Digital Economy.” Forbes, 27 Aug. 2015. Web.

      The Business Research Company. "Wholesale Global Market Report 2021: COVID-19 Impact and Recovery to 2030." Research and Markets, January 2021. Press Release.

      “Topic 1: Megatrends and Trends.” BeFore, 11 October 2018.

      “Updated Digital Economy Estimates – June 2021.” Bureau of Economic Analysis, June 2021. Web.

      Williamson, J. N. The Leader Manager. John Wiley & Sons, 1984.

      Mature and Scale Product Ownership

      • Buy Link or Shortcode: {j2store}145|cart{/j2store}
      • member rating overall impact: 9.5/10 Overall Impact
      • member rating average dollars saved: $21,919 Average $ Saved
      • member rating average days saved: 13 Average Days Saved
      • Parent Category Name: Development
      • Parent Category Link: /development
      • Product owners must bridge the gap between the customers, operations, and delivery to ensure products continuously deliver increasing value.
      • Product owners are often assigned to projects or product delivery without proper support, guidance, or alignment.
      • In many organizations, the product owner role is not well-defined, serves as a proxy for stakeholder ownership, and lacks reinforcement of the key skills needed to be successful.

      Our Advice

      Critical Insight

      A product owner is the CEO for their product. Successful product management starts with empowerment and accountability. Product owners own the vision, roadmap, and value realization for their product or family aligned to enterprise goals and priorities.

      • Product and service ownership share the same foundation - underlying capabilities and best practices to own and improve a product or service are identical for both roles. Use the terms that make the most sense for your culture.
      • Product owners represent three primary perspectives: Business (externally facing), Technical (systems and tools), or Operational (manual processes). Although all share the same capabilities, how they approach their responsibilities is influenced by their primary perspective.
      • Product owners are operating under an incomplete understanding of the capabilities needed to succeed. Most product/service owners lack a complete picture of the needed capabilities, skills, and activities to successfully perform their roles.

      Impact and Result

      • Create a culture of product management trust and empowerment with product owners aligned to your operational structure and product needs.
      • Promote and develop true Agile skills among your product owners and family managers.
      • Implement Info-Tech’s product owner capability model to define the role expectations and provide a development path for product owners.

      Mature and Scale Product Ownership Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Mature and Scale Product Ownership Storyboard – Establish a culture of success for product management and mature product owner capabilities.

      Strengthen the product owner role in your organization by focusing on core capabilities and proper alignment.

    • Establish a foundation for empowerment and success.
    • Assign and align product owners with products and stakeholders.
    • Mature product owner capabilities and skills.
      • Mature and Scale Product Ownership Storyboard

      2. Mature and Scale Product Ownership Readiness Assessment – Determine your readiness for a product-centric culture based on Info-Tech’s CLAIM+G model.

      Using Info-Tech’s CLAIM model, quickly determine your organization’s strengths and weaknesses preparing for a product culture. Use the heat map to identify key areas.

      • Mature and Scale Product Ownership Readiness Assessment

      3. Mature and Scale Product Ownership Playbook – Playbook for product owners and product managers.

      Use the blueprint exercises to build your personal product owner playbook. You can also use the workbook to capture exercise outcomes.

      • Mature and Scale Product Ownership Playbook

      4. Mature and Scale Product Ownership Workbook – Workbook for product owners and product managers.

      Use this workbook to capture exercise outcomes and transfer them to your Mature and Scale Product Ownership Playbook (optional).

      • Mature and Scale Product Ownership Workbook

      5. Mature and Scale Product Ownership Proficiency Assessment – Determine your current proficiency and improvement areas.

      Product owners need to improve their core capabilities and real Agile skills. The assessment radar will help identify current proficiency and growth opportunities.

      • Mature and Scale Product Ownership Proficiency Assessment
      [infographic]

      Workshop: Mature and Scale Product Ownership

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Establish the foundation for product ownership

      The Purpose

      Establish the foundation for product ownership.

      Key Benefits Achieved

      Product owner playbook with role clarity and RACI.

      Activities

      1.1 Define enablers and blockers of product management.

      1.2 Define your product management roles and names.

      1.3 Assess your product management readiness.

      1.4 Identify your primary product owner perspective.

      1.5 Define your product owner RACI.

      Outputs

      Enablers and blockers

      Role definitions.

      Product culture readiness

      Product owner perspective mapping

      Product owner RACI

      2 Align product owners to products

      The Purpose

      Align product owners to products.

      Key Benefits Achieved

      Assignment of resources to open products.

      A stakeholder management strategy.

      Activities

      2.1 Assign resources to your products and families.

      2.2 Visualize relationships to identify key influencers.

      2.3 Group stakeholders into categories.

      2.4 Prioritize your stakeholders.

      Outputs

      Product resource assignment

      Stakeholder management strategy

      Stakeholder management strategy

      Stakeholder management strategy

      3 Mature product owner capabilities

      The Purpose

      Mature product owner capabilities.

      Key Benefits Achieved

      Assess your Agile product owner readiness

      Assess and mature product owner capabilities

      Activities

      3.1 Assess your real Agile skill proficiency.

      3.2 Assess your vison capability proficiency.

      3.3 Assess your leadership capability proficiency.

      3.4 Assess your PLM capability proficiency.

      3.5 Assess your value realization capability proficiency.

      3.6 Identify your business value drivers and sources of value.

      Outputs

      Real Agile skill proficiency assessment

      Info-Tech’s product owner capability model proficiency assessment

      Info-Tech’s product owner capability model proficiency assessment

      Info-Tech’s product owner capability model proficiency assessment

      Info-Tech’s product owner capability model proficiency assessment

      Business value drivers and sources of value

      Further reading

      Mature and Scale Product Ownership

      Strengthen the product owner’s role in your organization by focusing on core capabilities and proper alignment.

      Executive Brief

      Analyst Perspective

      Empower product owners throughout your organization.

      Hans Eckman

      Whether you manage a product or service, the fundamentals of good product ownership are the same. Organizations need to focus on three key elements of product ownership in order to be successful.

      • Create an environment of empowerment and service leadership to reinforce product owners and product family managers as the true owners of the vision, improvement, and realized the value of their products.
      • Align product and product family owner roles based on operational alignment and the groups defined when scaling product management.
      • Develop your product owners to improve the quality of roadmaps, alignment to enterprise goals, and profit and loss (P&L) for each product or service.

      By focusing the attention of the teammates serving in product owner or service owner roles, your organization will deliver value sooner and respond to change more effectively.

      Hans Eckman

      Principal Research Director – Application Delivery and Management
      Info-Tech Research Group

      Executive Summary

      Your Challenge

      Product owners must bridge the gap between the customers, operations, and delivery to ensure products continuously deliver increasing value.

      Product owners are often assigned to projects or product delivery without proper support, guidance, or alignment.

      In many organizations the product owner role is not well-defined, serves as a proxy for stakeholder ownership, and lacks reinforcement of the key skills needed to be successful.

      Common Obstacles

      Organizations have poor alignment or missing product owners between lines of business, IT, and operations.

      Product owners are aligned to projects and demand management rather than long-term strategic product ownership.

      Product families are not properly defined, scaled, and supported within organizations.

      Individuals in product owner roles have an incomplete understanding of needed capabilities and lack a development path.

      Info-Tech's Approach

      Create a culture of product management trust and empowerment with product owners aligned to your operational structure and product needs.

      Promote and develop true Agile skills among your product owners and family managers.

      Implement Info-Tech’s product owner capability model to define the role expectations and provide a development path for product owners.

      Extend product management success using Deliver on Your Digital Product Vision and Deliver Digital Products at Scale.

      Info-Tech Insight

      There is no single correct approach to product ownership. Product ownership must be tuned and structured to meet the delivery needs of your organization and the teams it serves.

      Info-Tech’s Approach

      Product owners make the final decision

      • Establish a foundation for empowerment and success
      • Assign product owners and align with products and stakeholders
      • Mature product owner capabilities and skills
      Product Owner capabilities: Vision, Product Lifecycle Management, Leadership, Value Realization

      The Info-Tech difference

      1. Assign product owners where product decisions are needed, not to match org charts or delivery teams. The product owner has the final word on product decisions.
      2. Organize product owners into related teams to ensure product capabilities delivered are aligned to enterprise strategy and goals.
      3. Shared products and services must support the needs of many product owners with conflicting priorities. Shared service product owners must map and prioritize demand to align to enterprise priorities and goals.
      4. All product owners share the same capability model.

      Insight summary

      There is no single correct approach to product ownership

      Successful product management starts with empowerment and accountability. Product owners own the vision, roadmap, and value realization for their product or family aligned to enterprise goals and priorities.

      Phase 1 insight

      Product owners represent three primary perspectives: business (external-facing), technical (systems and tools), or operational (manual processes). Although all share the same capabilities, how they approach their responsibilities is influenced by their primary perspective.

      Phase 2 insight

      Start with your operational grouping of products and families, identifying where an owner is needed. Then, assign people to the products and families. The owner does not define the product or family.

      Phase 3 insight

      Product owners are operating under an incomplete understanding of the capabilities needed to succeed. Most product/service owners lack a complete picture of the needed capabilities, skills, and activities to successfully perform their roles.

      Product and service ownership share the same foundation

      The underlying capabilities and best practices to own and improve a product or service are identical for both roles. Use the terms that make the most sense for your culture.

      Map product owner roles to your existing job titles

      Identify where product management is needed and align expectations with existing roles. Successful product management does not require a dedicated job family.

      Projects can be a mechanism for funding product changes and improvements

      Projects can be a mechanism for funding product changes and improvements. Shows difference of value for project life-cycles, hybrid life-cycles, and product life-cycles.

      Projects within products

      Regardless of whether you recognize yourself as a product-based or project-based shop, the same basic principles should apply.

      You go through a period or periods of project-like development to build a version of an application or product.

      You also have parallel services along with your project development, which encompass the more product-based view. These may range from basic support and maintenance to full-fledged strategy teams or services like sales and marketing.

      Product and services owners share the same foundation and capabilities

      For the purpose of this blueprint, product/service and product owner/service owner are used interchangeably. The term “product” is used for consistency but would apply to services, as well.

      Product = Service

      Common foundations: Focus on continuous improvement, ROI, and value realization. Clear vision, goals, roadmap, and backlog.

      “Product” and “service” are terms that each organization needs to define to fit its culture and customers (internal and external). The most important aspect is consistent use and understanding of:

      • External products
      • Internal products
      • External services
      • Internal services
      • Products as a service (PaaS)
      • Productizing services (SaaS)

      Recognize the product owner perspectives

      The 3 product owner perspectives. 1. Business: Customer-facing, value-generating. 2. Technical: IT systems and tools. 3. Operations: Keep-the-lights-on processes.

      Product owners represent one of three primary perspectives. Although all share the same capabilities, how they approach their responsibilities is influenced by their primary perspective.

      Info-Tech Insight

      Product owners must translate needs and constraints from their perspective into the language of their audience. Kathy Borneman, Digital Product Owner at SunTrust Bank, noted the challenges of finding a common language between lines of business and IT (e.g. what is a unit?).

      Match your product management role definitions to your product family levels

      Product ownership exists at the different operational tiers or levels in your product hierarchy. This does not imply a management relationship.

      Product portfolio

      Groups of product families within an overall value stream or capability grouping.

      Project portfolio manager

      Product family

      A collection of related products. Products can be grouped along architectural, functional, operational, or experiential patterns.

      Product family manager

      Product

      Single product composed of one or more applications and services.

      Product owner

      Info-Tech Insight

      Define the current roles that will perform the product management function or define consistent role names to product owners and managers.

      Align enterprise value through product families

      Product families are operational groups based on capabilities or business functions. Product family managers translate goals, priorities, and constraints so they are actionable at the next level. Product owners prioritize changes to enhance the capabilities that allow you to realize your product family. Enabling capabilities realize value and help reach your goals.

      Understand special circumstances

      In Deliver Digital Products at Scale, products were grouped into families using Info-Tech’s five scaling patterns. Assigning owners to Enterprise Applications and Shared Services requires special consideration.

      Value stream alignment

      • Business architecture
        • Value stream
        • Capability
        • Function
      • Market/customer segment
      • Line of business (LoB)
      • Example: Customer group > value stream > products

      Enterprise applications

      • Enabling capabilities
      • Enterprise platforms
      • Supporting apps
      • Example: HR > Workday/Peoplesoft > Modules Supporting: Job board, healthcare administrator

      Shared Services

      • Organization of related services into service family
      • Direct hierarchy does not necessarily exist within the family
      • Examples: End-user support and ticketing, workflow and collaboration tools

      Technical

      • Domain grouping of IT infrastructure, platforms, apps, skills, or languages
      • Often used in combination with Shared Services grouping or LoB-specific apps
      • Examples: Java, .NET, low-code, database, network

      Organizational alignment

      • Used at higher levels of the organization where products are aligned under divisions
      • Separation of product managers from organizational structure is no longer needed because the management team owns the product management role

      Map sources of demand and influencers

      Use the stakeholder analysis to define the key stakeholders and sources of demand for enterprise applications and shared services. Extend your mapping to include their stakeholders and influencers to uncover additional sources of demand and prioritization.

      Map of key stakeholders for enterprise applications and shared services.

      Info-Tech Insight

      Your product owner map defines the influence landscape your product operates. It is every bit as important as the teams who enhance, support and operate your product directly.

      Combine your product owner map with your stakeholder map to create a comprehensive view of influencers.

      The primary value of the product owner is to fill the backlog with the highest ROI opportunities aligned with enterprise goals.

      Info-Tech Insight

      The product owner owns the direction of the product.

      • Roadmap - Where are we going?
      • Backlog - What changes are needed to get there?
      • Product review - Did we get close enough?

      Product delivery realizes value for your product family

      While planning and analysis are done at the family level, work and delivery are done at the individual product level.

      Product strategy includes: Vision, Goals, Roadmap, backlog and Release plan.

      Product family owners are more strategic

      When assigning resources, recognize that product family owners will need to be more strategic with their planning and alignment of child families and products.

      Product family owners are more strategic. They require a roadmap that is strategic, goal-based, high-level, and flexible.

      Info-Tech Insight

      Roadmaps for your product family are, by design, less detailed. This does not mean they aren’t actionable! Your product family roadmap should be able to communicate clear intentions around the future delivery of value in both the near and long term.

      Connecting your product family roadmaps to product roadmaps

      Your product and product family roadmaps should be connected at an artifact level that is common between both. Typically, this is done with capabilities, but it can be done at a more granular level if an understanding of capabilities isn’t available.

      Product family roadmap versus Product Roadmaps.

      Develop a product owner stakeholder strategy

      Stakeholder management, Product lifecycle, Project delivery, Operational support.

      Stakeholders are a critical cornerstone to product ownership. They provide the context, alignment, and constraints that influence or control what a product owner can accomplish.

      Product owners operate within a network of stakeholders who represent different perspectives within the organization.

      First, product owners must identify members of their stakeholder network. Next, they should devise a strategy for managing stakeholders.

      Without a stakeholder strategy, product owners will encounter obstacles, resistance, or unexpected changes.

      Create a stakeholder network map to product roadmaps and prioritization

      Follow the trail of breadcrumbs from your direct stakeholders to their influencers, to uncover hidden stakeholders.

      Stakeholder network map defines the influence landscape your product operates. Connectors determine who may be influencing your direct stakeholders.

      Info-Tech Insight

      Your stakeholder map defines the influence landscape your product operates. It is every bit as important as the teams who enhance, support and operate your product directly.

      Use “connectors” to determine who may be influencing your direct stakeholders. They may not have any formal authority within the organization, but they may have informal yet substantive relationships with your stakeholders.

      Being successful at Agile is more than about just doing Agile

      The following represents the hard skills needed to “Do Agile”:

      Being successful at Agile needs 4 hard skills: 1. Engineering skills, 2. Technician Skills, 3. Framework/Process skills, 4. Tools skills.
      • Engineering skills. These are the skills and competencies required for building brand-new valuable software.
      • Technician skills. These are the skills and competencies required for maintaining and operating the software delivered to stakeholders.
      • Framework/Process skills. These are the specific knowledge skills required to support engineering or technician skills.
      • Tools skills. This represents the software that helps you deliver other software.

      While these are important, they are not the whole story. To effectively deliver software, we believe in the importance of being Agile over simply doing Agile.

      Adapted from: “Doing Agile” Is Only Part of the Software Delivery Pie

      Why focus on core skills?

      They are the foundation to achieve business outcomes

      Skills, actions, output and outcomes

      The right skills development is only possible with proper assessment and alignment against outcomes.

      Focus on these real Agile skills

      Agile skills

      • Accountability
      • Collaboration
      • Comfort with ambiguity
      • Communication
      • Empathy
      • Facilitation
      • Functional decomposition
      • Initiative
      • Process discipline
      • Resilience

      Product capabilities deliver value

      As a product owner, you are responsible for managing these facets through your capabilities and activities.

      The core product and value stream consists of: Funding - Product management and governance, Business functionality - Stakeholder and relationship management, and Technology - Product delivery.

      Info-Tech Best Practice

      It is easy to lose sight of what matters when we look at a product from a single point of view. Despite what "The Agile Manifesto" says, working software is not valuable without the knowledge and support that people need in order to adopt, use, and maintain it. If you build it, they will not come. Product owners must consider the needs of all stakeholders when designing and building products.

      Recognize product owner knowledge gaps

      Pulse survey of product owners

      Pulse survey of product owners. Graph shows large percentage of respondents have alignment to common agile definition of product owners. Yet a significant perception gap in P&L, delivery, and analytics.

      Info-Tech Insight

      1. Less than 15% of respondents identified analytics or financial management as a key component of product ownership.
      2. Assess your product owner’s capabilities and understanding to develop a maturity plan.

      Source: Pulse Survey (N=18)

      Implement the Info-Tech product owner capability model

      Unfortunately, most product owners operate with incomplete knowledge of the skills and capabilities needed to perform the role. Common gaps include focusing only on product backlogs, acting as a proxy for product decisions, and ignoring the need for key performance indicators (KPIs) and analytics in both planning and value realization.

      Product Owner capabilities: Vision, Product Lifecycle Management, Leadership, Value Realization

      Vision

      • Market Analysis
      • Business Alignment
      • Product Roadmap

      Leadership

      • Soft Skills
      • Collaboration
      • Decision Making

      Product Lifecycle Management

      • Plan
      • Build
      • Run

      Value Realization

      • KPIs
      • Financial Management
      • Business Model

      Product owner capabilities provide support

      Vision predicts impact of Value realization. Value realization provides input to vision

      Your vision informs and aligns what goals and capabilities are needed to fulfill your product or product family vision and align with enterprise goals and priorities. Each item on your roadmap should have corresponding KPIs or OKRs to know how far you moved the value needle. Value realization measures how well you met your target, as well as the impacts on your business value canvas and cost model.

      Product lifecycle management builds trust with Leadership. Leadership improves quality of Product lifecycle management.

      Your leadership skills improve collaborations and decisions when working with your stakeholders and product delivery teams. This builds trust and improves continued improvements to the entire product lifecycle. A product owner’s focus should always be on finding ways to improve value delivery.

      Product owner capabilities provide support

      Leadership enhances Vision. Vision Guides Product Lifecycle Management. Product Lifecycle Management delivers Value Realization. Leadership enhances Value Realization

      Develop product owner capabilities

      Each capability: Vision, Product lifecycle management, Value realization and Leadership has 3 components needed for successful product ownership.

      Avoid common capability gaps

      Vision

      • Focusing solely on backlog grooming (tactical only)
      • Ignoring or failing to align product roadmap to enterprise goals
      • Operational support and execution
      • Basing decisions on opinion rather than market data
      • Ignoring or missing internal and external threats to your product

      Leadership

      • Failing to include feedback from all teams who interact with your product
      • Using a command-and-control approach
      • Viewing product owner as only a delivery role
      • Acting as a proxy for stakeholder decisions
      • Avoiding tough strategic decisions in favor of easier tactical choices

      Product lifecycle management

      • Focusing on delivery and not the full product lifecycle
      • Ignoring support, operations, and technical debt
      • Failing to build knowledge management into the lifecycle
      • Underestimating delivery capacity, capabilities, or commitment
      • Assuming delivery stops at implementation

      Value realization

      • Focusing exclusively on “on time/on budget” metrics
      • Failing to measure a 360-degree end-user view of the product
      • Skipping business plans and financial models
      • Limiting financial management to project/change budgets
      • Ignoring market analysis for growth, penetration, and threats

      Your product vision is your North Star

      It's ok to dream a little!

      Who is the target customer, what is the key benefit, what do they need, what is the differentiator

      Adapted from: Crossing the Chasm

      Info-Tech Best Practice

      A product vision shouldn’t be so far out that it doesn’t feel real or so short-term that it gets bogged down in minutiae and implementation details. Finding the right balance will take some trial and error and will be different for each organization.

      Leverage the product canvas to state and inform your product vision

      Leverage the product Canvas to state and inform your product vision. Includes: Product name, Tracking info, Vision, List of business objectives or goals, Metrics used to measure value realization, List of groups who consume the product/service, and List of key resources or stakeholders.

      Define product value by aligning backlog delivery with roadmap goals

      In each product plan, the backlogs show what you will deliver. Roadmaps identify when and in what order you will deliver value, capabilities, and goals.

      In each product plan, the backlogs show what you will deliver. Roadmaps identify when and in what order you will deliver value, capabilities, and goals.

      Use a balanced value to establish a common definition of goals and value

      Value drivers are strategic priorities aligned to our enterprise strategy and translated through our product families. Each product and change has an impact on the value driver helping us reach our enterprise goals.

      Importance of the value driver multiplied by the Impact of value score is equal to the Value score.

      Info-Tech Insight

      Your value drivers and impact helps estimate the expected value of roadmap items, prioritize roadmap and backlog items, and identify KPIs and OKRs to measure value realization and actual impact.

      Use CLAIM to guide your journey

      Culture, Learning, Automation, Integrated teams, Metrics and governance.

      Value is best created by self-managing teams who deliver in frequent, short increments supported by leaders who coach them through challenges.

      Product-centric delivery and Agile are a radical change in how people work and think. Structured, facilitated learning is required throughout the transformation to help leaders and practitioners make the shift.

      Product management, Agile, and DevOps have inspired SDLC tools that have become a key part of delivery practices and work management.

      Self-organizing teams that cross business, delivery, and operations are essential to gain the full benefits of product-centric delivery.

      Successful implementations require the disciplined use of metrics that support developing better teams

      Communicate reasons for changes and how they will be implemented

      Five elements of communicating change: What is the change? Why are we doing it? How are we going to go about it? How long will it take us to do it? What will the role be for each department individual?

      Leaders of successful change spend considerable time developing a powerful change message; that is, a compelling narrative that articulates the desired end state, and that makes the change concrete and meaningful to staff.

      The organizational change message should:

      • Explain why the change is needed.
      • Summarize what will stay the same.
      • Highlight what will be left behind.
      • Emphasize what is being changed.
      • Explain how the change will be implemented.
      • Address how change will affect various roles in the organization.
      • Discuss the staff’s role in making the change successful.

      Info-Tech’s methodology for mature and scale product ownership

      Phase steps

      1. Establish the foundation for product ownership

      Step 1.1 Establish an environment for product owner success

      Step 1.2 Establish your product ownership model

      2. Align product owners to products

      Step 2.1 Assign product owners to products

      Step 2.2 Manage stakeholder influence

      3. Mature product owner capabilities

      Step 3.1 Assess your Agile product owner readiness

      Step 3.2 Mature product owner capabilities

      Phase outcomes

      1.1.1 Define enablers and blockers of product management

      1.1.2 Define your product management roles and names

      1.2.1 Identify your primary product owner perspective

      1.2.2 Define your product owner RACI

      2.1.1 Assign resources to your products and families

      2.2.1 Visualize relationships to identify key influencers

      2.2.2 Group stakeholders into categories

      2.2.3 Prioritize your stakeholders

      3.1.1 Assess your real Agile skill proficiency

      3.2 Mature product owner capabilities

      3.2.1 Assess your vision capability proficiency

      3.2.2 Assess your leadership capability proficiency

      3.2.3 Assess your PLM capability proficiency

      3.2.4 Identify your business value drivers and sources of value

      3.2.5 Assess your value realization capability proficiency

      Blueprint deliverables

      Each step of this blueprint is accompanied by supporting deliverables to help you accomplish your goals.

      Key deliverable

      Mature and Scale Product Ownership Playbook

      Capture and organize the outcomes of the activities in the workbook.

      Mature and Scale Product Ownership Workbook

      The workbook helps organize and communicate the outcomes of each activity.

      Mature and Scale Product Ownership Readiness Assessment

      Determine your level of mastery of real Agile skills and product owner capabilities.


      Blueprint benefits

      IT benefits

      • Competent product owner who can support teams operating in any delivery methodology.
      • Representative viewpoint and input from the technical and operational product owner perspectives.
      • Products aligned to business needs and committed work are achievable.
      • Single point of contact with a business representative.
      • Acceptance of product owner role outside the Scrum teams.

      Business benefits

      • Better alignment to enterprise goals, vision, and outcomes.
      • Improved coordination with stakeholders.
      • Quantifiable value realization tied to vision.
      • Product decisions made at the right time and with the right input.
      • Product owner who has the appropriate business, operations, and technical knowledge.

      Measure the value of this blueprint

      Align product owner metrics to product delivery and value realization.

      Member outcome

      Suggested Metric

      Estimated impact

      Increase business application satisfaction Satisfaction of business applications (CIO BV Diagnostic) 20% increase within one year after implementation
      Increase effectiveness of application portfolio management Effectiveness of application portfolio management (M&G Diagnostic) 20% increase within one year after implementation
      Increase importance and effectiveness of application portfolio Importance and effectiveness to business (APA Diagnostic) 20% increase within one year after implementation
      Increase satisfaction of support of business operations Support to business (CIO BV Diagnostic) 20% increase within one year after implementation
      Successfully deliver committed work (productivity) Number of successful deliveries; burndown Reduction in project implementation overrun by 20%

      Info-Tech offers various levels of support to best suit your needs

      DIY Toolkit

      "Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful."

      Guided Implementation

      "Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track."

      Workshop

      "We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place."

      Consulting

      "Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project"

      Diagnostics and consistent frameworks are used throughout all four options.

      Guided Implementation

      What does a typical GI on this topic look like?

      Phase 1 Establish the Foundation for Product Ownership

      Phase 2 Align Product Owners to Products

      Phase 3 Mature Product Owner Capabilities

      • Call #1:
        Scope objectives and your specific challenges
      • Call #2:
        Step 1.1 Establish an environment for product owner success
        Step 1.2 Establish your product ownership model
      • Call #3:
        Step 2.1 Assign product owners to products
      • Call #4:
        Step 2.2 Manage stakeholder influence
      • Call #5:
        Step 3.1 Assess your Agile product owner readiness
      • Call #6:
        Step 3.2 Mature product owner capabilities

      A Guided Implementation (GI) is a series of calls with an Info-Tech analyst to help implement our best practices in your organization.

      A typical GI is between 8 and 12 calls over the course of 4 to 6 months.

      Workshop Overview

      Contact your account representative for more information.
      workshops@infotech.com 1-888-670-8889

      Phase 1

      Phase 2

      Phase 3

      Activities

      Establish the Foundation for Product Ownership

      Step 1.1 Establish an environment for product owner success

      1.1.1 Define enablers and blockers of product management

      1.1.2 Define your product management roles and names

      1.1.3 Assess your product management readiness

      Step 1.2 Establish your product ownership model

      1.2.1 Identify your primary product owner perspective

      1.2.2 Define your product owner RACI

      Align Product Owners to Products

      Step 2.1 Assign product owners to products

      2.1.1 Assign resources to your products and families

      Step 2.2 Manage stakeholder influence

      2.2.1 Visualize relationships to identify key influencers

      2.2.2 Group stakeholders into categories

      2.2.3 Prioritize your stakeholders

      Mature Product Owner Capabilities

      Step 3.1 Assess your Agile product owner readiness

      3.1.1 Assess your real Agile skill proficiency

      Step 3.2 Mature product owner capabilities=

      3.2.1 Assess your Vision capability proficiency

      3.2.2 Assess your Leadership capability proficiency

      3.2.3 Assess your PLM capability proficiency

      3.2.4 Identify your business value drivers and sources of value

      3.2.5 Assess your Value Realization capability proficiency

      Deliverables

      1. Enablers and blockers
      2. Role definitions
      3. Product culture readiness
      4. Product owner perspective mapping
      5. Product owner RACI
      1. Product resource assignment
      2. Stakeholder management strategy
      1. Real Agile skill proficiency assessment
      2. Info-Tech’s product owner capability model proficiency assessment
      3. Business value drivers and sources of value

      Related Info-Tech Research

      Product delivery

      Deliver on Your Digital Product Vision

      Build a product vision your organization can take from strategy through execution.

      Deliver Digital Products at Scale

      Deliver value at the scale of your organization through defining enterprise product families.

      Build Your Agile Acceleration Roadmap

      Quickly assess the state of your Agile readiness and plan your path forward to higher value realization.

      Develop Your Agile Approach for a Successful Transformation

      Understand Agile fundamentals, principles, and practices so you can apply them effectively in your organization.

      Implement DevOps Practices That Work

      Streamline business value delivery through the strategic adoption of DevOps practices.

      Extend Agile Practices Beyond IT

      Further the benefits of Agile by extending a scaled Agile framework to the business.

      Build Your BizDevOps Playbook

      Embrace a team sport culture built around continuous business-IT collaboration to deliver great products.

      Embed Security Into the DevOps Pipeline

      Shift security left to get into DevSecOps.

      Spread Best Practices With an Agile Center of Excellence

      Facilitate ongoing alignment between Agile teams and the business with a set of targeted service offerings.

      Enable Organization-Wide Collaboration by Scaling Agile

      Execute a disciplined approach to rolling out Agile methods in the organization.

      Related Info-Tech Research

      Application portfolio management

      APM Research Center

      See an overview of the APM journey and how we can support the pieces in this journey.

      Application Portfolio Management Foundations

      Ensure your application portfolio delivers the best possible return on investment.

      Streamline Application Maintenance

      Effective maintenance ensures the long-term value of your applications.

      Streamline Application Management

      Move beyond maintenance to ensuring exceptional value from your apps.

      Build an Application Department Strategy

      Delivering value starts with embracing what your department can do.

      Embrace Business-Managed Applications

      Empower the business to implement its own applications with a trusted business-IT relationship.

      Optimize Applications Release Management

      Facilitate ongoing alignment between Agile teams and the business with a set of targeted service offerings.

      Related Info-Tech Research

      Value, delivery metrics, estimation

      Build a Value Measurement Framework

      Focus product delivery on business value-driven outcomes.

      Select and Use SDLC Metrics Effectively

      Be careful what you ask for, because you will probably get it.

      Application Portfolio Assessment: End User Feedback

      Develop data-driven insights to help you decide which applications to retire, upgrade, re-train on, or maintain to meet the demands of the business.

      Create a Holistic IT Dashboard

      Mature your IT department by measuring what matters.

      Refine Your Estimation Practices With Top-Down Allocations

      Don’t let bad estimates ruin good work.

      Estimate Software Delivery With Confidence

      Commit to achievable software releases by grounding realistic expectations.

      Reduce Time to Consensus With an Accelerated Business Case

      Expand on the financial model to give your initiative momentum.

      Optimize Project Intake, Approval, and Prioritization

      Deliver more projects by giving yourself the voice to say “no” or “not yet” to new projects.

      Enhance PPM Dashboards and Reports

      Facilitate ongoing alignment between Agile teams and the business with a set of targeted service offerings.

      Related Info-Tech Research

      Organizational design and performance

      Redesign Your IT Organizational Structure

      Focus product delivery on business value-driven outcomes.

      Build a Strategic Workforce Plan

      Have the right people in the right place, at the right time.

      Implement a New Organizational Structure

      Reorganizations are inherently disruptive. Implement your new structure with minimal pain for staff while maintaining IT performance throughout the change.

      Build an IT Employee Engagement Program

      Don’t just measure engagement, act on it.

      Set Meaningful Employee Performance Measures

      Set holistic measures to inspire employee performance.

      Phase 1

      Establish the Foundation for Product Ownership

      Phase 1: Establish an environment for product owner success, Establish your product ownership model

      Mature and Scale Product Ownership

      This phase will walk you through the following activities:

      1.1.1 Define enablers and blockers of product management

      1.1.2 Define your product management roles and names

      1.1.3 Assess your product management readiness

      1.2.1 Identify your primary product owner perspective

      1.2.2 Define your product owner RACI

      This phase involves the following participants:

      • Product owners
      • Product managers
      • Development team leads
      • Portfolio managers
      • Delivery managers
      • Business analysts

      Step 1.1

      Establish an environment for product owner success

      Activities

      1.1.1 Define enablers and blockers of product management

      1.1.2 Define your product management roles and names

      1.1.3 Assess your product management readiness

      Establish the foundation for product ownership

      This step involves the following participants:

      • Product owners
      • Product managers
      • Development team leads
      • Portfolio managers
      • Delivery managers
      • Business analysts

      Outcomes of this step

      • Enablers and blockers
      • Role definitions

      Empower product owners as the true owners of their product

      Product ownership requires decision-making authority and accountability for the value realization from those decisions. POs are more than a proxy for stakeholders, aggregators for changes, and the communication of someone else’s priorities.

      “A Product Owner in its most beneficial form acts like an Entrepreneur, like a 'mini-CEO'. The Product Owner is someone who really 'owns' the product.”

      – Robbin Schuurman,
      “Tips for Starting Technical Product Managers”

      Info-Tech Best Practice

      Implement Info-Tech’s Product Owner Capability Model to help empower and hold product owners accountable for the maturity and success of their product. The product owner must understand how their product fits into the organization’s mission and strategy in order to align to enterprise value.

      Product and service owners share the same foundation and capabilities

      For the purpose of this blueprint, product/service and product owner/service owner are used interchangeably. The term “product” is used for consistency but applies to services, as well.

      Product = Service

      Common foundations: Focus on continuous improvement, ROI, and value realization. Clear vision, goals, roadmap, and backlog.

      “Product” and “service” are terms that each organization needs to define to fit its culture and customers (internal and external). The most important aspect is consistent use and understanding of:

      • External products
      • Internal products
      • External services
      • Internal services
      • Products as a service (PaaS)
      • Productizing services (SaaS)

      Define product ownership to match your culture and customers

      Characteristics of a discrete product:

      • Has end users or consumers
      • Delivers quantifiable value
      • Evolves or changes over time
      • Has predictable delivery
      • Has definable boundaries
      • Has a cost to produce and operate
      • Has a discrete backlog and roadmap of improvements

      What does not need a product owner?

      • Individual features
      • Transactions
      • Unstructured data
      • One-time solutions
      • Non-repeatable processes
      • Solutions that have no users or consumers
      • People or teams

      Info-Tech Insight

      • Products are long-term endeavors that don’t end after the project finishes.
      • Products mature and improve their ability to deliver value.
      • Products have a discrete backlog of changes to improve the product itself, separate from operational requests fulfilled by the product or service.

      Need help defining your products or services? Download our blueprint Deliver Digital Products at Scale.

      Connect roadmaps to value realization with KPIs

      Every roadmap item should have an expected realized value once it is implemented. The associate KPIs or OKRs determine if our goal was met. Any gap in value feedback back into the roadmap and backlog refinement.</p data-verified=

      " loading="lazy">

      Info-Tech Insight

      Every roadmap item should have an expected realized value once it is implemented. The associate KPIs or OKRs determine if our goal was met. Any gap in value feedback back into the roadmap and backlog refinement.

      Identify the differences between a project-centric and a product-centric organization

      Differences between Project centric and Product centric organizations in regards to: Funding, Prioritization, Accountability, Product management, Work allocation, and Capacity management.

      Info-Tech Insight

      Product delivery requires significant shifts in the way you complete development work and deliver value to your users. Make the changes that support improving end-user value and enterprise alignment.

      Projects can be a mechanism for funding product changes and improvements

      Projects lifecycle, hybrid lifecycle and product lifecycle. Period or periods of project development have parallel services that encompass a more product-based view.

      Projects withing products

      Regardless of whether you recognize yourself as a product-based or project-based shop, the same basic principles should apply.

      You go through a period or periods of project-like development to build a version of an application or product.

      You also have parallel services along with your project development, which encompasses a more product-based view. These may range from basic support and maintenance to full-fledged strategy teams or services like sales and marketing.

      Recognize common barriers to product management

      The transition to product ownership is a series of behavioral and cultural changes supported by processes and governance. It takes time and consistency to be successful.

      • Command and control structures
      • Lack of ownership and accountability
      • High instability in the market, demand, or organization
      • Lack of dedicated teams align to delivery, service, or product areas
      • Culture of one-off projects
      • Lack of identified and engaged stakeholders
      • Lack of customer exposure and knowledge

      Agile’s four core values

      “…while there is value in the items on the right, we value the items on the left more.”

      Source: “The Agile Manifesto”

      We value...

      We value being agile: Individuals and interactions, Working Software, Customer collaboration, Responding to change. Versus being prescriptive: Processes and tools, Comprehensive documentation, Contract negotiation, following a plan.

      Exercise 1.1.1 Define enablers and blockers of product management

      1 hour
      1. Identify and mitigate blockers of product management in your organization.
      2. What enablers will support strong product owners?
      3. What blockers will make the transition to product management harder?
      4. For each blocker, also define at least one mitigating step.
      Define enablers e.g. team culture. Define blockers and at least one mitigating step

      Output

      • Enablers and blockers

      Participants

      • Product owners
      • Product managers
      • Development team leads
      • Portfolio managers
      • Business analysts

      Capture in the Mature and Scale Product Ownership Playbook.

      Align enterprise value through product families

      Product families are operational groups based on capabilities or business functions. Product family managers translate goals, priorities, and constraints so they are actionable at the next level. Product owners prioritize changes to enhance the capabilities that allow you to realize your product family. Enabling capabilities realize value and help reach your goals.

      Effective product delivery requires thinking about more than just a single product

      Good application and product management begins with strengthening good practices for a single or small set of applications, products, and services.

      Product portfolio

      Groups of product families within an overall value stream or capability grouping.

      Project portfolio manager

      Product family

      A collection of related products. Products can be grouped along architectural, functional, operational, or experiential patterns.

      Product family manager

      Product

      Single product composed of one or more applications and services.

      Product owner

      Info-Tech Insight

      Define the current roles that will perform the product management function or define consistent role names to product owners and managers.

      Exercise 1.1.2 Define your product management roles and names

      1-2 hour
      1. Identify the roles in which product management activities will be owned.
      2. Define a common set of role names and describe the role.
      3. Map the level of accountability for each role: Product or Product Family
      4. Product owner perspectives will be defined in the next step.

      Define roles, description and level of product accountability.

      Output

      • Role definitions

      Participants

      • Product owners
      • Product managers
      • Development team leads
      • Portfolio managers
      • Business analysts

      Capture in the Mature and Scale Product Ownership Playbook.

      Use CLAIM to guide your journey

      Culture, Learning, Automation, Integrated teams, Metrics and governance.

      Value is best created by self-managing teams who deliver in frequent, short increments supported by leaders who coach them through challenges.

      Product-centric delivery and Agile are a radical change in how people work and think. Structured, facilitated learning is required throughout the transformation to help leaders and practitioners make the shift.

      Product management, Agile, and DevOps have inspired SDLC tools that have become a key part of delivery practices and work management.

      Self-organizing teams that cross business, delivery, and operations are essential to gain the full benefits of product-centric delivery.

      Successful implementations require the disciplined use of metrics that support developing better teams

      Exercise 1.1.3 Assess your product management readiness

      1 hour
      1. Open and complete the Mature and Scale Product Ownership Readiness Assessment in your Playbook or the provided Excel tool.
      2. Discuss high and low scores for each area to reach a consensus.
      3. Record your results in your Playbook.

      Assess your culture, learning, automation, Integrated teams, metrics and governance.

      Output

      • Assessment of product management readiness based on Info-Tech’s CLAIM+G model.

      Participants

      • Product owners
      • Product managers
      • Development team leads
      • Portfolio managers
      • Business analysts

      Capture in the Mature and Scale Product Ownership Readiness Assessment.

      Communicate reasons for changes and how they will be implemented

      Five elements of communicating change: What is the change? Why are we doing it? How are we going to go about it? How long will it take us to do it? What will the role be for each department individual?

      Leaders of successful change spend considerable time developing a powerful change message; that is, a compelling narrative that articulates the desired end state, and that makes the change concrete and meaningful to staff.

      The organizational change message should:

      Step 1.2

      Establish your product ownership model

      Activities

      1.2.1 Identify your primary product owner perspective

      1.2.2 Define your product owner RACI

      Establish the foundation for product ownership

      This step involves the following participants:

      • Product owners
      • Product managers
      • Development team leads
      • Portfolio managers
      • Delivery managers
      • Business analysts

      Outcomes of this step

      • Product owner perspective mapping
      • Product owner RACI

      Recognize the product owner perspectives

      The 3 product owner perspectives. 1. Business: Customer-facing, value-generating. 2. Technical: IT systems and tools. 3. Operations: Keep-the-lights-on processes.

      Product owners represent one of three primary perspectives. Although all share the same capabilities, how they approach their responsibilities is influenced by their primary perspective.

      Info-Tech Best Practice

      Product owners must translate needs and constraints from their perspective into the language of their audience. Kathy Borneman, Digital Product Owner at SunTrust Bank, noted the challenges of finding a common language between lines of business and IT (e.g. what is a unit?).

      Identify and align to product owner perspectives to ensure product success

      Product owner perspectives

      The 3 product owner perspectives. 1. Business: Customer-facing, value-generating. 2. Technical: IT systems and tools. 3. Operations: Keep-the-lights-on processes.
      1. Each product owner perspective provides important feedback, demand, and support for the product.
      2. Where a perspective is represented by a distinct role, the perspective is managed with that product owner.
      3. If separate roles don’t exist, the product owner must evaluate their work using two or three perspectives.
      4. The ultimate success of a product, and therefore product owner, is meeting the end-user value of the business product owner, tool support of the technical product owner, and manual processing support of the operations product owner.

      Line of business (LOB) product owners

      LOB product owners focus on the products and services consumed by the organization’s external consumers and users. The role centers on the market needs, competitive landscape, and operational support to deliver products and services.

      Business perspective

      • Alignment to enterprise strategy and priorities
      • Growth: market penetration and/or revenue
      • Perception of product value
      • Quality, stability, and predictability
      • Improvement and innovation
      • P&L
      • Market threats and opportunities
      • Speed to market
      • Service alignment
      • Meet or exceed individual goals

      Relationship to Operations

      • Customer satisfaction
      • Speed of delivery and manual processing
      • Continuity

      Relationship to Technical

      • Enabler
      • Analysis and insight
      • Lower operating and support costs

      Technical product owners

      Technical product owners are responsible for the IT systems, tools, platforms, and services that support business operations. Often they are identified as application or platform managers.

      Technical perspective

      • Application, application suite, or group of applications
      • Core platforms and tools
      • Infrastructure and networking
      • Third-party technology services
      • Enable business operations
      • Direct-to-customer product or service
      • Highly interconnected
      • Need for continuous improvement
      • End-of-life management
      • Internal value proposition and users

      Relationship to Business

      • Direct consumers
      • End users
      • Source of funding

      Relationship to Operations

      • End users
      • Process enablement or automation
      • Support, continuity, and manual intervention

      Operations (service) product owners

      Operational product owners focus on the people, processes, and tools needed for manual processing and decisions when automation is not cost-effective. Operational product owners are typically called service owners due to the nature of their work.

      Operational perspective

      • Business enablement
      • Continuity
      • Problem, incident, issue resolution
      • Process efficiency
      • Throughput
      • Error/defect avoidance
      • Decision enablement
      • Waste reduction
      • Limit time in process
      • Disaster recovery

      Relationship to Business

      • Revenue enablement
      • Manual intervention and processing
      • End-user satisfaction

      Relationship to Technical

      • Process enabler
      • Performance enhancement
      • Threat of automation

      Exercise 1.2.1 Identify your primary product owner perspective

      1 hour
      1. Identify which product owner perspective represents your primary focus.
      2. Determine where the other perspectives need to be part of your product roadmap or if they are managed by other product owners.

      Identify product/service name, identify product owner perspective, determine if other perspectives need to be part of roadmap.

      Output

      • Identification of primary product owner perspective.

      Participants

      • Product owners
      • Product managers
      • Development team leads
      • Portfolio managers
      • Business analysts

      Capture in the Mature and Scale Product Ownership Playbook.

      Realign differences between project managers and product owners

      Differences between Project Manager and Product Owners in regards to: Funding, Prioritization, Accountability, Product management, Work allocation, and Capacity management.

      Manage and communicate key milestones

      Successful product owners understand and define the key milestones in their product delivery lifecycles. These need to be managed along with the product backlog and roadmap.

      Define key milestones and their product delivery life-cycles.

      Info-Tech Best Practice

      Product ownership isn’t just about managing the product backlog and development cycles. Teams need to manage key milestones such as learning milestones, test releases, product releases, phase gates, and other organizational checkpoints.

      Define who manages each key milestone

      Key milestones must be proactively managed. If a project manager is not available, those responsibilities need to be managed by the product owner or Scrum Master. Start with responsibility mapping to decide which role will be responsible.

      Example milestones and Project Manager, Product Owner and Team Facilitator.

      *Scrum Master, Delivery Manager, Team Lead

      Exercise 1.2.2 Define your product owner RACI

      60 minutes
      1. Review your product and project delivery methodologies to identify key milestones (including approvals, gates, reviews, compliance checks, etc.). List each milestone on a flip chart or whiteboard.
      2. For each milestone, define who is accountable for the completion.
      3. For each milestone, define who is responsible for executing the milestone activity. (Who does the work that allows the milestone to be completed?)
      4. Review any responsibility and accountability gaps and identify opportunities to better support and execute your operating model.
      5. If you previously completed Deliver Digital Products at Scale , review and update your RACI in the Mature and Scale Product Ownership Workbook .

      Define: Milestones, Project Manager, Product/service owner, Team Facilitator, and Other roles.

      Output

      • Product owner RACI

      Participants

      • Product owners
      • Product managers
      • Development team leads
      • Portfolio managers
      • Business analysts

      Capture in the Mature and Scale Product Ownership Playbook.

      Phase 2

      Align Product Owners to Products

      Phase 2: Assign product owners to products, Manage stakeholder influence

      Mature and Scale Product Ownership

      This phase will walk you through the following activities:

      2.1.1 Assign resources to your products and families

      2.2.1 Visualize relationships to identify key influencers

      2.2.2 Group stakeholders into categories

      2.2.3 Prioritize your stakeholders

      This phase involves the following participants:

      • Product owners
      • Product managers
      • Development team leads
      • Portfolio managers
      • Delivery managers
      • Business analysts

      Step 2.1

      Assign product owners to products

      Activities

      2.1.1 Assign resources to your products and families

      Align product owners to products

      This step involves the following participants:

      • Product owners
      • Product managers
      • Development team leads
      • Portfolio managers
      • Delivery managers
      • Business analysts

      Outcomes of this step

      • Product resource assignment

      Match your product management role definitions to your product family levels

      Using the role definitions, you created in Exercise 1.1.2, determine which roles correspond to which levels of your product families.

      Product portfolio

      Groups of product families within an overall value stream or capability grouping.

      Project portfolio manager

      Product family

      A collection of related products. Products can be grouped along architectural, functional, operational, or experiential patterns.

      Product family manager

      Product

      Single product composed of one or more applications and services.

      Product owner

      Info-Tech Insight

      Define the current roles that will perform the product management function or define consistent role names to product owners and managers.

      Assign resources throughout your product families

      Project families are owned by a product manager. Product owners own each product that has a distinct backlog.

      Info-Tech Insight

      • Start by assigning resources to each product or product family box.
      • A product owner can be responsible for more than one product.
      • Ownership of more than one product does not mean they share the same backlog.
      • For help organizing your product families, please download Deliver Digital Products at Scale.

      Understand special circumstances

      In Deliver Digital Products at Scale , products were grouped into families using Info-Tech’s five scaling patterns. Assigning owners to Enterprise Applications and Shared Services requires special consideration.

      Value stream alignment

      • Business architecture
        • Value stream
        • Capability
        • Function
      • Market/customer segment
      • Line of business (LoB)
      • Example: Customer group > value stream > products

      Enterprise applications

      • Enabling capabilities
      • Enterprise platforms
      • Supporting apps
      • Example: HR > Workday/Peoplesoft > Modules Supporting: Job board, healthcare administrator

      Shared Services

      • Organization of related services into service family
      • Direct hierarchy does not necessarily exist within the family
      • Examples: End-user support and ticketing, workflow and collaboration tools

      Technical

      • Domain grouping of IT infrastructure, platforms, apps, skills, or languages
      • Often used in combination with Shared Services grouping or LoB-specific apps
      • Examples: Java, .NET, low-code, database, network

      Organizational alignment

      • Used at higher levels of the organization where products are aligned under divisions
      • Separation of product managers from organizational structure is no longer needed because the management team owns the product management role

      Map the source of demand to each product

      With enterprise applications and shared services, your demand comes from other product and service owners rather than end customers in a value stream.

      Enterprise applications

      • Primary demand comes from the operational teams and service groups using the platform.
      • Each group typically has processes and tools aligned to a module or portion of the overall platform.
      • Product owners determine end-user needs to assist with process improvement and automation.
      • Product family managers help align roadmap goals and capabilities across the modules and tools to ensure consistency and the alignment of changes.

      Shared services

      • Primary demand for shared services comes from other product owners and service managers whose solution or application is dependent on the shared service platform.
      • Families are grouped by related themes (e.g. workflow tools) to increase reusability, standard enterprise solutions, reduced redundancy, and consistent processes across multiple teams.
      • Product owners manage the individual applications or services within a family.

      Pattern: Enterprise applications

      A division or group delivers enabling capabilities and the team’s operational alignment maps directly to the modules/components of an enterprise application and other applications that support the specific business function.

      Workforce Management, Strategic HR, Talent Management, Core HR

      Example:

      • Human resources is one corporate function. Within HR, however, there are subfunctions that operate independently.
      • Each operational team is supported by one or more applications or modules within a primary HR system.
      • Even though the teams work independently, the information they manage is shared with, or ties into processes used by other teams. Coordination of efforts helps provide a higher level of service and consistency.

      For additional information about HRMS, please download Get the Most Out of Your HRMS.

      Assigning owners to enterprise applications

      Align your enterprise application owners to your operating teams that use the enterprise applications. Effectively, your service managers will align with your platform module owners to provide integrated awareness and planning.

      Family manager (top-level), Family managers (second-level) and Product owners.

      Pattern: Shared services

      Grouping by service type, knowledge area, or technology allows for specialization while families align service delivery to shared business capabilities.

      Grouping by service type, knowledge area, or technology allows for specialization while families align service delivery to shared business capabilities.

      Example:

      • Recommended for governance, risk, and compliance; infrastructure; security; end-user support; and shared platforms (workflow, collaboration, imaging/record retention). Direct hierarchies do not necessarily exist within the shared service family.
      • Service groupings are common for service owners (also known as support managers, operations managers, etc.).
      • End-user ticketing comes through a common request system, is routed to the team responsible for triage, and then is routed to a team for resolution.
      • Collaboration tools and workflow tools are enablers of other applications, and product families might support multiple apps or platforms delivering that shared capability.

      Assigning owners to shared services

      Assign owners by service type, knowledge area, or technology to provide alignment of shared business capabilities and common solutions.

      Family manager (top-level), Family managers (second-level) and Product owners.

      Map sources of demand and influencers

      Use the stakeholder analysis to define the key stakeholders and sources of demand for enterprise applications and shared services. Extend your mapping to include their stakeholders and influencers to uncover additional sources of demand and prioritization.

      Map of key stakeholders for enterprise applications and shared services.

      Info-Tech Insight

      Your product owner map defines the influence landscape your product operates. It is every bit as important as the teams who enhance, support, and operate your product directly.

      Combine your product owner map with your stakeholder map to create a comprehensive view of influencers.

      Exercise 2.1.1 Assign resources to your products and families

      1-4 hours
      1. Use the product families you completed in Deliver Digital Products at Scale to determine which products and product families need a resource assigned. Where the same resource fills more than one role, they are the product owner or manager for each independently.
      2. Product families that are being managed as products (one backlog for multiple products) should have one owner until the family is split into separate products later.
      3. For each product and family, define the following:
        • Who is the owner (role or person)?
        • Is ownership clearly defined?
        • Are there other stakeholders who make decisions for the product?
      4. Record the results in the Mature and Scale Product Ownership Workbook on the Product Owner Mapping worksheet.

      Output

      • Product owner and manager resource alignment.

      Participants

      • Product owners
      • Product managers
      • Development team leads
      • Portfolio managers
      • Business analysts

      Capture in the Mature and Scale Product Ownership Playbook.

      Step 2.2

      Manage stakeholder influence

      Activities

      2.2.1 Visualize relationships to identify key influencers

      2.2.2 Group stakeholders into categories

      2.2.3 Prioritize your stakeholders

      Align product owners to products

      This step involves the following participants:

      • Product owners
      • Product managers
      • Development team leads
      • Portfolio managers
      • Delivery managers
      • Business analysts

      Outcomes of this step

      • Stakeholder management strategy

      Develop a product owner stakeholder strategy

      Stakeholder management, Product lifecycle, Project delivery, Operational support.

      Stakeholders are a critical cornerstone to product ownership. They provide the context, alignment, and constraints that influence or control what a product owner can accomplish.

      Product owners operate within a network of stakeholders who represent different perspectives within the organization.

      First, product owners must identify members of their stakeholder network. Next, they should devise a strategy for managing stakeholders.

      Without a stakeholder strategy, product owners will encounter obstacles, resistance, or unexpected changes.

      Create a stakeholder network map to product roadmaps and prioritization

      Follow the trail of breadcrumbs from your direct stakeholders to their influencers to uncover hidden stakeholders.

      Create a stakeholder network map to product roadmaps and prioritization. Use connectors to determine who may be influencing your direct stakeholders.

      Info-Tech Insight

      Your stakeholder map defines the influence landscape your product operates. It is every bit as important as the teams who enhance, support, and operate your product directly.

      Use connectors to determine who may be influencing your direct stakeholders. They may not have any formal authority within the organization, but they may have informal yet substantive relationships with your stakeholders.

      Exercise 2.2.1 Visualize relationships to identify key influencers

      1 hour
      1. List direct stakeholders for your product.
      2. Determine the stakeholders of your stakeholders and consider adding each of them to the stakeholder list.
      3. Assess who has either formal or informal influence over your stakeholders; add these influencers to your stakeholder list.
      4. Construct a diagram linking stakeholders and their influencers together.
        • Use black arrows to indicate the direction of professional influence.
        • Use dashed green arrows to indicate informal bidirectional influence relationships.
      5. Record the results in the Mature and Scale Product Ownership Workbook .

      Output

      • Relationships among stakeholders and influencers

      Participants

      • Product owners
      • Product managers
      • Development team leads
      • Portfolio managers
      • Business analysts

      Capture in the Mature and Scale Product Ownership Playbook.

      Categorize your stakeholders with a prioritization map

      A stakeholder prioritization map helps product owners categorize their stakeholders by their level of influence and ownership in the product and/or teams.

      Influence versus Ownership/Interest

      There are four areas on the map, and the stakeholders within each area should be treated differently.

      • Players have a high interest in the initiative and the influence to effect change over the initiative. Their support is critical, and a lack of support can cause significant impediments to the objectives.
      • Mediators have a low interest but significant influence over the initiative. They can help to provide balance and objective opinions to issues that arise.
      • Noisemakers have low influence but high interest. They tend to be very vocal and engaged, either positively or negatively but have little ability to enact their wishes.
      • Spectators are generally apathetic and have little influence over or interest in the initiative.

      Exercise 2.2.2 Group stakeholders into categories

      1 hour
      1. Identify your stakeholders’ interest in and influence on your Agile implementation as high, medium, or low by rating the attributes below.
      2. Map your results to the model below to determine each stakeholder’s category.
      3. Record the results in the Mature and Scale Product Ownership Workbook .

      Influence versus Ownership/Interest with CMO, CIO and Product Manager in assigned areas.

      Output

      • Categorization of stakeholders and influencers

      Participants

      • Product owners
      • Product managers
      • Development team leads
      • Portfolio managers
      • Business analysts

      Capture in the Mature and Scale Product Ownership Playbook.

      Prioritize your stakeholders

      There may be too many stakeholders to be able to manage them all. Focus your attention on the stakeholders that matter most.

      Stakeholder category versus level of support.

      Consider the three dimensions of stakeholder prioritization: influence, interest, and support. Support can be determined by rating the following question: How likely is it that your stakeholder would recommend your product? These parameters are used to prioritize which stakeholders are most important and should receive your focused attention. The table to the right indicates how stakeholders are ranked.

      Exercise 2.2.3 Prioritize your stakeholders

      1 hour
      1. Identify the level of support of each stakeholder by answering the following question: How likely is it that your stakeholder would endorse your product?
      2. Prioritize your stakeholders using the prioritization scheme on the previous slide.
      3. Record the results in the Mature and Scale Product Ownership Workbook .

      Stakeholder, Category, level of support, prioritization.

      Output

      • Stakeholder and influencer prioritization

      Participants

      • Product owners
      • Product managers
      • Development team leads
      • Portfolio managers
      • Business analysts

      Capture in the Mature and Scale Product Ownership Playbook.

      Define strategies for engaging stakeholders by type

      Authority Vs. Ownership/Interest.

      Type

      Quadrant

      Actions

      Players

      High influence, high interest – actively engage Keep them updated on the progress of the project. Continuously involve players in the process and maintain their engagement and interest by demonstrating their value to its success.

      Mediators

      High influence, low interest – keep satisfied They can be the game changers in groups of stakeholders. Turn them into supporters by gaining their confidence and trust and including them in important decision-making steps. In turn, they can help you influence other stakeholders.

      Noisemakers

      Low influence, high interest – keep informed Try to increase their influence (or decrease it if they are detractors) by providing them with key information, supporting them in meetings, and using mediators to help them.

      Spectators

      Low influence, low interest – monitor They are followers. Keep them in the loop by providing clarity on objectives and status updates.

      Info-Tech Insight

      Each group of stakeholders draws attention and resources away from critical tasks. By properly identifying your stakeholder groups, the product owner can develop corresponding actions to manage stakeholders in each group. This can dramatically reduce wasted effort trying to satisfy spectators and noisemakers while ensuring the needs of mediators and players are met.

      Phase 3

      Mature Product Owner Capabilities

      Phase 3: Assess your Agile product owner readiness, Mature product owner capabilities.

      Mature and Scale Product Ownership

      This phase will walk you through the following activities:

      3.1.1 Assess your real Agile skill proficiency

      3.2.1 Assess your vision capability proficiency

      3.2.2 Assess your leadership capability proficiency

      3.2.3 Assess your PLM capability proficiency

      3.2.4 Identify your business value drivers and sources of value

      3.2.5 Assess your value realization capability proficiency

      This phase involves the following participants:

      • Product owners
      • Product managers

      Step 3.1

      Assess your Agile product owner readiness

      Activities

      3.1.1 Assess your real Agile skill proficiency

      Mature product owner capabilities

      This step involves the following participants:

      • Product owners
      • Product managers

      Outcomes of this step

      • Real Agile skill proficiency assessment

      Why focus on core skills?

      They are the foundation to achieve business outcomes

      Skills, actions, output and outcomes

      The right skills development is only possible with proper assessment and alignment against outcomes.

      Being successful at Agile is more than about just doing Agile

      The following represents the hard skills needed to “Do Agile”:

      Being successful at Agile needs 4 hard skills: 1. Engineering skills, 2. Technician Skills, 3. Framework/Process skills, 4. Tools skills.

      • Engineering skills. These are the skills and competencies required for building brand-new valuable software.
      • Technician skills. These are the skills and competencies required for maintaining and operating the software delivered to stakeholders.
      • Framework/Process skills. These are the specific knowledge skills required to support engineering or technician skills.
      • Tools skills. This represents the software that helps you deliver other software.

      While these are important, they are not the whole story. To effectively deliver software, we believe in the importance of being Agile over simply doing Agile.

      Adapted from: “Doing Agile” Is Only Part of the Software Delivery Pie

      Focus on these real Agile skills

      Agile skills

      • Accountability
      • Collaboration
      • Comfort with ambiguity
      • Communication
      • Empathy
      • Facilitation
      • Functional decomposition
      • Initiative
      • Process discipline
      • Resilience

      Info-Tech research shows these are the real Agile skills to get started with

      Skill Name

      Description

      Accountability

      Refers to the state of being accountable. In an Agile context, it implies transparency, dedication, acting responsibly, and doing what is necessary to get the job done.

      Collaboration

      Values diverse perspectives and working with others to achieve the best output possible. Effective at working toward individual, team, department, and organizational goals.

      Comfort with ambiguity

      Allows you to confidently take the next steps when presented with a problem without having all the necessary information present.

      Communication

      Uses different techniques to share information, concerns, or emotions when a situation arises, and it allows you to vary your approach depending on the current phase of development.

      Empathy

      Is the ability to understand and share the feelings of another to better serve your team and your stakeholders.

      Facilitation

      Refers to guiding and directing people through a set of conversations and events to learn and achieve a shared understanding.

      Functional decomposition

      Is being able to break down requirements into constituent epics and stories.

      Initiative

      Is being able to anticipate challenges and then act on opportunities that lead to better business outcomes.

      Process discipline

      Refers to the focus of following the right steps for a given activity at the right time to achieve the right outcomes.

      Resilience

      Refers to the behaviors, thoughts, and actions that allow a person to recover from stress and adversity.

      Accountability

      An accountable person:

      • Takes ownership of their own decisions and actions and is responsible for the quality of results.
      • Recognizes personal accountabilities to others, including customers.
      • Works well autonomously.
      • Ensures that the mutual expectations between themselves and others are clearly defined.
      • Takes the appropriate actions to ensure that obligations are met in a timely manner.
      • As a leader, takes responsibility for those being led.

      Accountability drives high performance in teams and organizations

      • The performance level of teams depends heavily on accountability and who demonstrates it:
        • In weak teams, there is no accountability.
        • In mediocre teams, supervisors demonstrate accountability.
        • In high-performance teams, peers manage most performance problems through joint accountability. (Grenny, 2014)
      • According to Bain & Company, accountability is the third most important attribute of high-performing companies. Some of the other key attributes include honest, performance-focused, collaborative, and innovative. (Mankins, 2013)

      All components of the employee empowerment driver have a strong, positive correlation with engagement.

      Employee empowerment and Correlation with engagement.

      Source: McLean & Company Engagement Database, 2018; N=71,794

      Accountability

      Your Score: ____

      1 - Foundational: Transitioning and Growing

      2 - Capable/Competent: Core Contributor

      3 - Influential: Gifted Improver

      4 - Transformational: Towering Strength

      • Alerts others to possible problems in a timely manner.
      • Seeks appropriate support to solve problems.
      • Actively contributes to the creation and evaluation of possible solutions.
      • Acts on solutions selected and decisions made as directed.
      • Makes effective decisions about how to complete work tasks.
      • Demonstrates the capability of breaking down concrete issues into parts and synthesizing information succinctly.
      • Collects and analyzes information from a variety of sources.
      • Seeks information and input to fully understand the cause of problems.
      • Takes action to address obstacles and problems before they impact performance and results.
      • Initiates the evaluation of possible solutions to problems.
      • Makes effective decisions about work task prioritization.
      • Appropriately assesses risks before deciding.
      • Effectively navigates through ambiguity, using multiple data points to analyze issues and identify trends.
      • Does not jump to conclusions.
      • Draws logical conclusions and provides opinions and recommendations with confidence.
      • Takes ownership over decisions and their consequences.
      • Demonstrates broad knowledge of information sources that can be used to assess problems and make decisions.
      • Invests time in planning, discovery, and reflection to drive better decisions.
      • Effectively leverages hard data as inputs to making decisions.
      • Garners insight from abstract data and makes appropriate decisions.
      • Coaches others in effective decision-making practices.
      • Has the authority to solve problems and make decisions.
      • Thinks several steps ahead in deciding the best course of action, anticipating likely outcomes, risks, or implications.
      • Establishes metrics to aid in decision-making, for self and teams
      • Prioritizes objective and ambiguous information and analyzes this when making decisions.
      • Solicits a diverse range of opinions and perspectives as inputs to decision making.
      • Applies frameworks to decision making, particularly in situations that have little base in prior experience.
      • Makes effective decisions about organizational priorities.
      • Holds others accountable for their decisions and consequences.
      • Creates a culture of empowerment and trust to facilitate effective problem solving and decision making.
      • Makes sound decisions that have organization-wide consequences and that influence future direction.

      Collaboration as a skill

      The principles and values of Agile revolve around collaboration.

      • Works well with others on specialized and cross-functional teams.
      • Can self-organize while part of a team.
      • Respects the commitments that others make.
      • Identifies and articulates dependencies.
      • Values diverse perspectives and works with others to achieve the best output possible.
      • Effective at working toward individual, team, department, and organizational goals.
      The principles and values of Agile revolve around collaboration. Doing what was done before (being prescriptive), going though the motions (doing Agile), living the principles (being Agile)

      Collaboration

      The Agile Manifesto has three principles that focus on collaboration:

      1. The business and developers must work together daily throughout the project.
      2. Build projects around motivated individuals. Give them the environment and support they need and trust them to get the job done.
      3. The most efficient and effective method of conveying information to and within a development team is face-to-face conversation.

      Effective collaboration supports Agile behaviors, including embracing change and the ability to work iteratively.

      Collaboration

      Your Score: ____

      1 - Foundational: Transitioning and Growing

      2 - Capable/Competent: Core Contributor

      3 - Influential: Gifted Improver

      4 - Transformational: Towering Strength

      • Understands role on the team and the associated responsibilities and accountabilities.
      • Treats team members with respect.
      • Contributes to team decisions and to the achievement of team goals and objectives.
      • Demonstrates a positive attitude.
      • Works cross-functionally to achieve common goals and to support the achievement of other team/department goals.
      • Values working in a diverse team and understands the importance of differing perspectives to develop unique solutions or ideas.
      • Fosters team camaraderie, collaboration, and cohesion.
      • Understands the impact of one's actions on the ability of team members to do their jobs.
      • Respects the differences other team members bring to the table by openly seeking others' opinions.
      • Helps the team accomplish goals and objectives by breaking down shared goals into smaller tasks.
      • Approaches challenging team situations with optimism and an open mind, focusing on coming to a respectful conclusion.
      • Makes suggestions to improve team engagement and effectiveness.
      • Supports implementation of team decisions.
      • Professionally gives and seeks feedback to achieve common goals.
      • Values working in a diverse team and understands the importance of differing perspectives to develop unique solutions or ideas.
      • Motivates the team toward achieving goals and exceeding expectations.
      • Reaches out to other teams and departments to build collaborative, cross-functional relationships.
      • Creates a culture of collaboration that leverages team members' strengths, even when the team is remote or virtual.
      • Participates and encourages others to participate in initiatives that improve team engagement and effectiveness.
      • Builds consensus to make and implement team decisions, often navigating through challenging task or interpersonal obstacles.
      • Values leading a diverse team and understands the importance of differing perspectives to develop unique solutions or ideas.
      • Creates a culture of collaboration among teams, departments, external business partners, and all employee levels.
      • Breaks down silos to achieve inter-departmental collaboration.
      • Demonstrates ownership and accountability for team/department/ organizational outcomes.
      • Uses an inclusive and consultative approach in setting team goals and objectives and making team decisions.
      • Coaches others on how to identify and proactively mitigate potential points of team conflict.
      • Recognizes and rewards teamwork throughout the organization.
      • Provides the tools and resources necessary for teams to succeed.
      • Values diverse teams and understands the importance of differing perspectives to develop unique solutions or ideas.

      Comfort with ambiguity

      Ability to handle ambiguity is a key factor in Agile success.

      • Implies the ability to maintain a level of effectiveness when all information is not present.
      • Able to confidently act when presented with a problem without all information present.
      • Risk and uncertainty can comfortably be handled.
      • As a result, can easily adapt and embrace change.
      • People comfortable with ambiguity demonstrate effective problem-solving skills.

      Relative importance of traits found in Agile teams

      1. Handles ambiguity
      2. Agreeable
      3. Conscientious

      Comfort with ambiguity

      Your Score: ____

      1 - Foundational: Transitioning and Growing

      2 - Capable/Competent: Core Contributor

      3 - Influential: Gifted Improver

      4 - Transformational: Towering Strength

      • Requires most information to be present before carrying out required activities.
      • Can operate with some information missing.
      • Comfortable asking people within their known circles for help.
      • Significant time is taken to reveal small pieces of information.
      • More adept at operating with information missing.
      • Willing to reach out to people outside of their regular circles for assistance and clarification.
      • Able to apply primary and secondary research methods to fill in the missing pieces.
      • Can operate essentially with a statement and a blank page.
      • Able to build a plan, drive others and themselves to obtain the right information to solve the problem.
      • Able to optimize only pulling what is necessary to answer the desired question and achieve the desired outcome.

      Communication

      Even though many organizations recognize its importance, communication is one of the root causes of project failure.

      Project success vs Communication effectiveness. Effective communications is associated with a 17% increase in finishing projects within budget.

      56%

      56% of the resources spent on a project are at risk due to ineffective communications.

      PMI, 2013.

      29%

      In 29% of projects started in the past 12 months, poor communication was identified as being one of the primary causes of failure.

      PMI, 2013.

      Why are communication skills important to the Agile team?

      It’s not about the volume, it’s about the method.

      • Effectively and appropriately interacts with others to build relationships and share ideas and information.
      • Uses tact and diplomacy to navigate difficult situations.
      • Relays key messages by creating a compelling story, targeted toward specific audiences.

      Communication effectiveness, Activity and Effort required.

      Adapted From: Agile Modeling

      Communication

      Your Score:____

      1 - Foundational: Transitioning and Growing

      2 - Capable/Competent: Core Contributor

      3 - Influential: Gifted Improver

      4 - Transformational: Towering Strength

      • Actively listens, learns through observation, and uses clear and precise language.
      • Possesses an open and approachable demeanor, with a positive and constructive tone.
      • Demonstrates interest in the thoughts and feelings of others.
      • Considers potential responses of others before speaking or acting.
      • Checks own understanding of others’ communication by repeating or paraphrasing.
      • Demonstrates self-control in stressful situations.
      • Provides clear, concise information to others via verbal or written communication.
      • Seeks to understand others' points of view, looking at verbal and non-verbal cues to encourage open and honest discussions.
      • Invites and encourages others to participate in discussions.
      • Projects a sincere and genuine tone.
      • Remains calm when dealing with others who are upset or angry.
      • Provides and seeks support to improve communication.
      • Does not jump to conclusions or act on assumptions.
      • Tailors messages to meet the different needs of different audiences.
      • Accurately interprets responses of others to their words and actions.
      • Provides feedback effectively and with empathy.
      • Is a role model for others on how to effectively communicate.
      • Ensures effective communication takes place at the departmental level.
      • Engages stakeholders using appropriate communication methods to achieve desired outcomes.
      • Creates opportunities and forums for discussion and idea sharing.
      • Demonstrates understanding of the feelings, motivations, and perspectives of others, while adapting communications to anticipated reactions.
      • Shares insights about their own strengths, weaknesses, successes, ad failures to show empathy and help others relate.
      • Discusses contentious issues without getting defensive and maintains a professional tone.
      • Coaches others on how to communicate effectively and craft targeted messages.
      • Sets and exemplifies standards for respectful and effective communications in the organization.
      • Comfortably delivers strategic messages supporting their function and the organization at the enterprise level.
      • Communicates with senior-level executives on complex organizational issues.
      • Promotes inter-departmental communication and transparency.
      • Achieves buy-in and consensus from people who share widely different views.
      • Shares complex messages in clear, understandable language.
      • Accurately interprets how they are perceived by others.
      • Rallies employees to communicate ideas and build upon differing perspectives to drive innovation.

      Empathy

      Empathy is the ability to understand and share the feelings of another in order to better serve your team and your stakeholders. There are three kinds:

      Cognitive

      Thought, understanding, intellect

      • Knowing how someone else feels and what they might be thinking.
      • Contributes to more effective communication.

      Emotional

      Feelings, physical sensation

      • You physically feel the emotions of the other person.
      • Helps build emotional connections with others.

      Compassionate

      Intellect, emotion with action

      • Along with understanding, you take action to help.

      How is empathy an Agile skill?

      Empathy enables you to serve your team, your customers, and your organization

      Serving the team

      • Primary types: Emotional and compassionate empathy.
      • The team is accountable for delivery.
      • By being able to empathize with the person you are talking to, complex issues can be addressed.
      • A lack of empathy leads to a lack of collaboration and being able to go forward on a common path.

      Serving your customers and stakeholders

      • Primary type: Cognitive empathy.
      • Agile enables the delivery of the right value at the right time to your stakeholders
      • Translating your stakeholders' needs requires an understanding of who they are as people. This is done through observations, interviews and conversations.
      • Leveraging empathy maps and user-story writing is an effective tool.

      Empathy

      Your Score: ____

      1 - Foundational: Transitioning and Growing

      2 - Capable/Competent: Core Contributor

      3 - Influential: Gifted Improver

      4 - Transformational: Towering Strength

      • Knowing how someone else feels and what they might be thinking.
      • Ability to build emotional connections with others.
      • Able to harness emotional connections to achieve tangible and experiential outcomes.
      • Demonstrates an awareness of different feelings and ways of thinking by both internal and external stakeholders.
      • Limited ability to make social connections with others outside of the immediate team.
      • Able to connect with similarly minded people to improve customer/stakeholder satisfaction. (Insights into action)
      • Able to interact and understand others with vastly different views.
      • Lack of agreement does not stop individual. from asking questions, understanding, and pushing the conversation forward

      Facilitation

      It’s not just your manager’s problem.

      “Facilitation is the skill of moderating discussions within a group in order to enable all participants to effectively articulate their views on a topic under discussion, and to ensure that participants in the discussion are able to recognize and appreciate the differing points of view that are articulated.” (IIBA, 2015)

      • Drives action through influence, often without authority.
      • Leads and impacts others' thinking, decisions, or behavior through inclusive practices and relationship building.
      • Encourages others to self-organize and hold themselves accountable.
      • Identifies blockers and constructively removes barriers to progress.

      Facilitation

      Your Score: ____

      1 - Foundational: Transitioning and Growing

      2 - Capable/Competent: Core Contributor

      3 - Influential: Gifted Improver

      4 - Transformational: Towering Strength

      • Drives action through influence, often without authority.
      • Leads and impacts others' thinking, decisions, or behavior through inclusive practices and relationship building.
      • Encourages others to self-organize and hold themselves accountable.
      • Identifies blockers and constructively removes barriers to progress.
      • Maps and executes processes effectively.
      • Uses facts and concrete examples to demonstrate a point and gain support from others.
      • Openly listens to the perspectives of others.
      • Builds relationships through honest and consistent behavior.
      • Understands the impact of their own actions and how others will perceive it.
      • Identifies impediments to progress.
      • Anticipates the effect of one's approach on the emotions and sensitivities of others.
      • Practices active listening while demonstrating positivity and openness.
      • Customizes discussion and presentations to include "what’s in it for me" for the audience.
      • Presents compelling information to emphasize the value of an idea.
      • Involves others in refining ideas or making decisions in order to drive buy-in and action.
      • Knows how to appropriately use influence to achieve outcomes without formal authority.
      • Seeks ways and the help of others to address barriers or blockers to progress.
      • Leverages a planned approach to influencing others by identifying stakeholder interests, common goals, and potential barriers.
      • Builds upon successes to gain acceptance for new ideas.
      • Facilitates connections between members of their network for the benefit of the organization or others.
      • Demonstrates the ability to draw on trusting relationships to garner support for ideas and action.
      • Encourages a culture that allows space for influence to drive action.
      • Adept at appropriately leveraging influence to achieve business unit outcomes.
      • Actively manages the removal of barriers and blockers for teams.

      Functional decomposition

      It’s not just a process, it’s a skill.

      “Functional decomposition helps manage complexity and reduce uncertainty by breaking down processes, systems, functional areas, or deliverables into their simpler constituent parts and allowing each part to be analyzed independently."

      (IIBA, 2015)

      Being able to break down requirements into constituent consumable items (example: epics and user stories).

      Start: Strategic Initiatives. 1: Epics. 2: Capabilities. 3: Features. End: Stories.

      Use artifact mapping to improve functional decomposition

      In our research, we refer to these items as epics, capabilities, features, and user stories. How you develop your guiding principles and structure your backlog should be based on the terminology and artifact types commonly used in your organization.

      Agile, Waterfall, Relationship, Decomposition skill most in demand, definition.

      Functional Decomposition

      Your Score: ____

      1 - Foundational: Transitioning and Growing

      2 - Capable/Competent: Core Contributor

      3 - Influential: Gifted Improver

      4 - Transformational: Towering Strength

      • Able to decompose items with assistance from other team members.
      • Able to decompose items independently, ensuring alignment with business value.
      • Able to decompose items independently and actively seeks out collaboration opportunities with relevant SME's during and after the refinement process to ensure completion.
      • Able to decompose items at a variety of granularity levels.
      • Able to teach and lead others in their decomposition efforts.
      • Able to quickly operate at different levels of the requirements stack.

      Initiative and self-organization

      A team that takes initiative can self-organize to solve critical problems.

      • "The best architectures, requirements, and designs emerge from self-organizing teams." (Agile Manifesto)
      • In a nutshell, the initiative represents the ability to anticipate challenges and act on opportunities that lead to better business outcomes.
      • Anticipates challenges and acts on opportunities that lead to better business outcomes.
      • Thinks critically and is motivated to use both specialist expertise and general knowledge.
      • Driven by the delivery of business value and better business outcomes.
      • Empowers others to act and is empowered and self-motivated.

      Initiative and self-organization

      Your Score: ____

      1 - Foundational: Transitioning and Growing

      2 - Capable/Competent: Core Contributor

      3 - Influential: Gifted Improver

      4 - Transformational: Towering Strength

      • Demonstrates awareness of an opportunity or issue which is presently occurring or is within the immediate work area.
      • Reports an opportunity or issue to the appropriate person.
      • Acts instead of waiting to be asked.
      • Willingly takes on challenges, even if they fall outside their area of expertise.
      • Is proactive in identifying issues and making recommendations to resolve them.
      • Within the scope of the work environment, takes action to improve processes or results, or to resolve problems.
      • Not deterred by obstacles.
      • Tackles challenges that require risk taking.
      • Procures the necessary resources, team and technical support to enable success.
      • Assists others to get the job done.
      • Demonstrates awareness of an opportunities or issues which are in the future or outside the immediate work area.
      • Typically exceeds the expectations of the job.
      • Learns new technology or skills outside their specialization so that they can be a more effective team member.
      • Recommends solutions to enhance results or prevent potential issues.
      • Drives implementation of new processes within the team to improve results.
      • Able to provide recommendations on plans and decisions that are strategic and future-oriented for the organization.
      • Identifies areas of high risk or of organizational level impact.
      • Able to empower significant recourses from the organization to enable success.
      • Leads long-term engagements that result in improved organizational capabilities and processes.

      Process discipline

      A common misconception is that Agile means no process and no discipline. Effective Agile teams require more adherence to the right processes to create a culture of self-improvement.

      • Refers to the focus of following the right steps for a given activity at the right time to achieve the right outcomes.
      • Focus on following the right steps for a given activity at the right time to achieve desired outcomes.
      Example: Scrum Ceremonies during a sprint (1 - 4 weeks/sprint). 1: Sprint planning, 2: Daily scrum, 3: Sprint review, 4: Sprint retrospective.

      Process discipline

      Your Score: ____

      1 - Foundational: Transitioning and Growing

      2 - Capable/Competent: Core Contributor

      3 - Influential: Gifted Improver

      4 - Transformational: Towering Strength

      • Demonstrates awareness of the key processes and steps that are needed in a given situation.
      • Limited consistency in following processes and limited understanding of the 'why' behind the processes.
      • Aware and follows through with key agile processes in a consistent manner.
      • Demonstrates not only the knowledge of processes but understands the 'why' behind their existence.
      • Aware and follows through with key agile processes in a consistent manner.
      • Demonstrates understanding of not only why specific processes exist but can suggest changes to improve efficiency, consistency, and outcomes.

      N/A -- Maximum level is '3

      Resilience

      If your team hits the wall, don’t let the wall hit them back.

      • Resilience is critical for an effective Agile transformation. A team that demonstrates resilience always exhibits:
      • Evolution over transformation – There is a recognition that changes happen over time.
      • Intensity and productivity – A race is not won by the ones who are the fastest, but by the ones who are the most consistent. Regardless of what comes up, the team can push through.
      • That organizational resistance is futile – Given that it is working on the right objectives, the team needs to demonstrate a consistency of approach and intensity regardless of what may stand in its way.
      • Refers to the behaviors, thoughts, and actions that allow a person to recover from stress and adversity.

      How resilience aligns with Agile

      A team is not “living the principles” without resilience.

      1. Purpose

        Aligns with: “Our highest priority is to satisfy the customer through early and continuous delivery of valuable software.” The vision or goals may not be clear in certain circumstances and can be difficult to relate to a single work item. Being able to intrinsically source and harness a sense of purpose becomes more important, especially as a self-organizing team.
      2. Perseverance

        Aligns with: “Agile processes harness change for the customer's competitive advantage.” Perseverance enables teams to continuously deliver at a steady pace, addressing impediments or setbacks and continuing to move forward.
      3. Composure

        Aligns with: “Agile processes promote sustainable development,” and “At regular intervals, the team reflects ... and adjusts its behavior accordingly.”
        When difficult situations arise, composure allows us to understand perspectives, empathize with customers, accept late changes, and sustain a steady pace.
      4. Self-Reliance

        Aligns with: “The best architectures, requirements, and designs emerge from self-organizing teams.” Knowing oneself, recognizing strengths, and drawing on past successes, can be a powerful aid in creating high-performing Agile teams
      5. Authenticity

        Aligns with: “At regular intervals, the team reflects … and adjusts its behavior accordingly,” and “Build projects around motivated individuals.”
        When difficult situations arise, authenticity is crucial. “For example, being able to openly disclose areas outside of your strengths in sprint planning or being able to contribute constructively toward self-organization.”

      Adapted from: Why Innovation, 2019.

      Resilience

      Your Score: ____

      1 - Foundational: Transitioning and Growing

      2 - Capable/Competent: Core Contributor

      3 - Influential: Gifted Improver

      4 - Transformational: Towering Strength

      • Easily distracted and stopped by moderately stressful and challenging situations.
      • Requires significant help from others to get back on track.
      • Not frequently able (or knows) how to ask for help
      • Handles typical stresses and challenges for the given role.
      • Able to get back on track with limited assistance.
      • Able to ask for help when they need it.
      • Quality of work unaffected by an increase in pressures and challenges.
      • Handles stresses and challenges what is deemed above and beyond their given role.
      • Able to provide advice to others on how to handle difficult and challenging situations.
      • Quality of work and outcomes is maintained and sometimes exceeded as pressure increases.
      • Team looks to this individual as being the gold standard on how to approach any given problem or situation.
      • Directly mentors others on approaches in situations regardless of the level of challenge.

      Exercise 1.2.1 Identify your primary product owner perspective

      1 hour
      1. Review each real Agile skill and determine your current proficiency.
      2. Complete your assessment in the Mature and Scale Product Owner Proficiency Assessment tool.
      3. Record the results in the Mature and Scale Product Ownership Playbook.
      4. Review the skills map to identify strengths and areas of growth.

      Accountability, Collaboration, Comfort in Ambiguity, Communication, Empathy, Facilitation, Functional Decomposition, Initiative, Process Discipline, Resilience.

      Output

      • Agile skills assessment results.

      Participants

      • Product owners
      • Product managers

      Capture in the Mature and Scale Product Owner Proficiency Assessment.

      Determine your Agile skills proficiency: Edit chart data to plot your scores or add your data points and connect the lines.

      Step 3.2

      Mature product owner capabilities

      Activities

      3.2.1 Assess your vision capability proficiency

      3.2.2 Assess your leadership capability proficiency

      3.2.3 Assess your PLM capability proficiency

      3.2.4 Identify your business value drivers and sources of value

      3.2.5 Assess your value realization capability proficiency

      Mature product owner capabilities

      This step involves the following participants:

      • Product owners
      • Product managers

      Outcomes of this step

      • Info-Tech product owner capability model proficiency assessment

      Product capabilities deliver value

      As a product owner, you are responsible for managing these facets through your capabilities and activities.

      The core product and value stream consists of: Funding - Product management and governance, Business functionality - Stakeholder and relationship management, and Technology - Product delivery.

      Info-Tech Best Practice

      It is easy to lose sight of what matters when we look at a product from a single point of view . Despite what "The Agile Manifesto" says, working software is not valuable without the knowledge and support that people need in order to adopt, use, and maintain it. If you build it, they will not come. Product owners must consider the needs of all stakeholders when designing and building products.

      Recognize product owner knowledge gaps

      Pulse survey of product owners

      Pulse survey of product owners. Graph shows large percentage of respondents have alignment to common agile definition of product owners. Yet a significant perception gap in P&L, delivery, and analytics.

      Info-Tech Insight

      1. Less than 15% of respondents identified analytics or financial management as a key component of product ownership.
      2. Assess your product owner’s capabilities and understanding to develop a maturity plan.

      Source: Pulse Survey (N=18)

      Implement the Info-Tech product owner capability model

      Unfortunately, most product owners operate with incomplete knowledge of the skills and capabilities needed to perform the role. Common gaps include focusing only on product backlogs, acting as a proxy for product decisions, and ignoring the need for key performance indicators (KPIs) and analytics in both planning and value realization.

      Product Owner capabilities: Vision, Product Lifecycle Management, Leadership, Value Realization

      Vision

      • Market Analysis
      • Business Alignment
      • Product Roadmap

      Leadership

      • Soft Skills
      • Collaboration
      • Decision Making

      Product Lifecycle Management

      • Plan
      • Build
      • Run

      Value Realization

      • KPIs
      • Financial Management
      • Business Model

      Product owner capabilities provide support

      Vision predicts impact of Value realization. Value realization provides input to vision

      Your vision informs and aligns what goals and capabilities are needed to fulfill your product or product family vision and align with enterprise goals and priorities. Each item on your roadmap should have corresponding KPIs or OKRs to know how far you moved the value needle. Value realization measures how well you met your target, as well as the impacts on your business value canvas and cost model.

      Product lifecycle management builds trust with Leadership. Leadership improves quality of Product lifecycle management.

      Your leadership skills improve collaborations and decisions when working with your stakeholders and product delivery teams. This builds trust and improves continued improvements to the entire product lifecycle. A product owner’s focus should always be on finding ways to improve value delivery.

      Product owner capabilities provide support

      Leadership enhances Vision. Vision Guides Product Lifecycle Management. Product Lifecycle Management delivers Value Realization. Leadership enhances Value Realization

      Develop product owner capabilities

      Each capability: Vision, Product lifecycle management, Value realization and Leadership has 3 components needed for successful product ownership.

      Avoid common capability gaps

      Vision

      • Focusing solely on backlog grooming (tactical only)
      • Ignoring or failing to align product roadmap to enterprise goals
      • Operational support and execution
      • Basing decisions on opinion rather than market data
      • Ignoring or missing internal and external threats to your product

      Leadership

      • Failing to include feedback from all teams who interact with your product
      • Using a command-and-control approach
      • Viewing product owner as only a delivery role
      • Acting as a proxy for stakeholder decisions
      • Avoiding tough strategic decisions in favor of easier tactical choices

      Product lifecycle management

      • Focusing on delivery and not the full product lifecycle
      • Ignoring support, operations, and technical debt
      • Failing to build knowledge management into the lifecycle
      • Underestimating delivery capacity, capabilities, or commitment
      • Assuming delivery stops at implementation

      Value realization

      • Focusing exclusively on “on time/on budget” metrics
      • Failing to measure a 360-degree end-user view of the product
      • Skipping business plans and financial models
      • Limiting financial management to project/change budgets
      • Ignoring market analysis for growth, penetration, and threats

      Capabilities: Vision

      Market Analysis

      • Customer Empathy: Identify the target users and unique value your product provides that is not currently being met. Define the size of your user base, segmentation, and potential growth.
      • Customer Journey: Define the future path and capabilities your users will respond to.
      • Competitive analysis: Complete a SWOT analysis for your end-to-end product lifecycle. Use Info-Tech’s Business SWOT Analysis Template.

      Business Alignment

      • Enterprise alignment: Align to enterprise and product family goals, strategies, and constraints.
      • Delivery and release strategy: Develop a delivery strategy to achieve value quickly and adapt to internal and external changes. Value delivery is constrained by your delivery pipeline.
      • OCM and go-to-market strategy: Create organizational change management, communications, and a user implementation approach to improve adoption and satisfaction from changes.

      Product Roadmap

      • Roadmap strategy: Determine the duration, detail, and structure of your roadmap to accurately communicate your vision.
      • Value prioritization: Define criteria used to evaluate and sequence demand items.
      • Release and capacity planning: Build your roadmap with realistic goals and milestones based on your delivery pipeline and dependencies.

      “Customers are best heard through many ears.”

      – Thomas K. Connellan, Inside the Magic Kingdom

      Vision: Market Analysis, Business Alignment, and Product Roadmap.

      Info-Tech Insight

      Data comes from many places and may still not tell the complete story.

      Build your product strategy playbook

      Complete Deliver on Your Digital Product Vision to define your Vision, Goals, Roadmap approach, and Backlog quality filters.

      Digital Product Strategy Supporting Workbook

      Supporting workbook that captures the interim results from a number of exercises that will contribute to your overall digital product vision.

      Product Backlog Item Prioritization Tool

      An optional tool to help you capture your product backlog and prioritize based on your given criteria

      Product Roadmap Tool

      An optional tool to help you build out and visualize your first roadmap.

      Your Digital Product Vision Details Strategy

      Record the results from the exercises to help you define, detail, and make real your digital product vision.

      Your product vision is your North Star

      It's ok to dream a little!

      Who is the target customer, what is the key benefit, what do they need, what is the differentiator

      Adapted from: Geoffrey Moore, 2014.

      Info-Tech Best Practice

      A product vision shouldn’t be so far out that it doesn’t feel real or so short-term that it gets bogged down in minutiae and implementation details. Finding the right balance will take some trial and error and will be different for each organization.

      Use product roadmaps to guide delivery

      In Deliver on Your Digital Product Vision, we showed how the product roadmap is key to value realization. As a product owner, the product roadmap is your communicated path to align teams and changes to your defined goals, while aligning your product to enterprise goals and strategy.

      As a product owner, the product roadmap is your communicated path to align teams and changes to your defined goals, while aligning your product to enterprise goals and strategy

      Info-Tech Best Practice

      Info-Tech Best Practice Product delivery requires a comprehensive set of business and technical competencies to effectively roadmap, plan, deliver, support, and validate your product portfolio. Product delivery is a “multi-faceted, complex discipline that can be difficult to grasp and hard to master.” It will take time to learn and adopt methods and become a competent product manager or owner (“What Is Product Management?”, Pichler Consulting Limited).

      Match your roadmap and backlog to the needs of the product

      Ultimately, you want products to be able to respond faster to changes and deliver value sooner. The level of detail in the roadmap and backlog is a tool to help the product owner plan for change. The duration of your product roadmap is all directly related to the tier of product owner in the product family.

      The level of detail in the roadmap and backlog is a tool to help the product owner plan for change. The duration of your product roadmap is all directly related to the tier of product owner in the product family.

      Product delivery realizes value for your product family

      While planning and analysis are done at the family level, work and delivery are done at the individual product level.

      Product strategy includes: Vision, Goals, Roadmap, backlog and Release plan.

      Use artifact mapping to improve functional decomposition

      In our research, we refer to these items as epics, capabilities, features, and user stories. How you develop your guiding principles and structure your backlog should be based on the terminology and artifact types commonly used in your organization.

      Agile, Waterfall, Relationship, Decomposition skill most in demand, definition.

      Manage and communicate key milestones

      Successful product owners understand and define the key milestones in their product delivery lifecycles. These need to be managed along with the product backlog and roadmap.

      Define key milestones and their release dates.

      Info-Tech Best Practice

      Product ownership isn’t just about managing the product backlog and development cycles! Teams need to manage key milestones such as learning milestones, test releases, product releases, phase gates, and other organizational checkpoints!

      Milestones

      • Points in the timeline when the established set of artifacts is complete (feature-based), or checking status at a particular point in time (time-based).
      • Typically assigned a date and used to show the progress of development.
      • Plays an important role when sequencing different types of artifacts.

      Release dates

      • Releases mark the actual delivery of a set of artifacts packaged together in a new version of the product.
      • Release dates, firm or not, allow stakeholders to anticipate when this is coming.

      Leverage the product canvas to state and inform your product vision

      Leverage the product Canvas to state and inform your product vision. Includes: Product name, Tracking info, Vision, List of business objectives or goals, Metrics used to measure value realization, List of groups who consume the product/service, and List of key resources or stakeholders.

      Capability: Vision

      Your Score: ____

      1 - Foundational: Transitioning and Growing

      2 - Capable/Competent: Core Contributor

      3 - Influential: Gifted Improver

      4 - Transformational: Towering Strength

      • Product backlog.
      • Basic roadmap with milestones and releases.
      • Unprioritized stakeholder list.
      • Understanding of product’s purpose and value.
      • Customers and end-users defined with core needs identified.
      • Roadmap with goals and capabilities defined by themes and set to appropriate time horizons.
      • Documented stakeholder management plan with communication and collaboration aligned to the stakeholder strategy.
      • Value drivers traced to product families and enterprise goals.
      • Customer personas defined with pain relievers and value creators defined.
      • Fully-developed roadmap traced to family (and child) roadmaps.
      • Expected ROI for all current and next roadmap items.
      • KPIs/OKRs used to improve roadmap prioritization and sequencing.
      • Proactive stakeholder engagement and reviews.
      • Cross-functional engagement to align opportunities and drive enterprise value.
      • Formal metrics to assess customer needs and value realization.
      • Roadmaps managed in an enterprise system for full traceability, value realization reporting, and views for defined audiences.
      • Proactive stakeholder engagement with regular planning and review ceremonies tied to their roadmaps and goals.
      • Cross-functional innovation to find disruptive opportunities to drive enterprise value.
      • Omni-channel metrics and customer feedback mechanisms to proactively evaluate goals, capabilities, and value realization.

      Exercise 3.2.1 Assess your Vision capability proficiency

      1 hour
      1. Review the expectations for this capability and determine your current proficiency for each skill.
      2. Complete your assessment in the Mature and Scale Product Owner Proficiency Assessment tool.
      3. Record the results in the Mature and Scale Product Ownership Playbook.
      4. Review the skills map to identify strengths and areas of growth.

      Output

      • Product owner capability assessment

      Participants

      • Product owners
      • Product managers

      Capture in the Mature and Scale Product Owner Proficiency Assessment.

      Capabilities: Leadership

      Soft Skills

      • Communication: Maintain consistent, concise, and appropriate communication using SMART guidelines (specific, measurable, attainable, relevant, and timely).
      • Integrity: Stick to your values, principles, and decision criteria for the product to build and maintain trust with your users and teams.
      • Influence: Manage stakeholders using influence and collaboration over contract negotiation.

      Collaboration

      • Stakeholder management: Build a communications strategy for each stakeholder group, tailored to individual stakeholders.
      • Relationship management: Use every interaction point to strengthen relationships, build trust, and empower teams.
      • Team development: Promote development through stretch goals and controlled risks to build team capabilities and performance.

      Decision Making

      • Prioritized criteria: Remove personal bias by basing decisions off data analysis and criteria.
      • Continuous improvement: Balance new features with the need to ensure quality and create an environment of continuous improvement.
      • Team empowerment/negotiation: Push decisions to teams closest to the problem and solution, using Delegation Poker to guide you.

      “Everything walks the walk. Everything talks the talk.”

      – Thomas K. Connellan, Inside the Magic Kingdom

      Leadership: Soft skills, collaboration, decision making.

      Info-Tech Insight

      Product owners cannot be just a proxy for stakeholder decisions. The product owner owns product decisions and management of all stakeholders.

      Capability: Leadership

      Your Score: ____

      1 - Foundational: Transitioning and Growing

      2 - Capable/Competent: Core Contributor

      3 - Influential: Gifted Improver

      4 - Transformational: Towering Strength

      • Activities are prioritized with minimal direction and/or assistance.
      • Progress self-monitoring against objectives with leadership apprised of deviations against plan.
      • Facilitated decisions from stakeholders or teams.
      • Informal feedback on performance and collaboration with teams.
      • Independently prioritized activities and provide direction or assistance to others as needed.
      • Managed issue resolution and provided guidance on goals, priorities, and constraints.
      • Product decision ownership with input from stakeholders, SMEs, and delivery teams.
      • Formal product management retrospectives with tracked and measured changes to improve performance.
      • Consulted in the most challenging situations to provide subject matter expertise on leading practices and industry standards.
      • Provide mentoring and coaching to your peers and/or teammates.
      • Use team empowerment, pushing decisions to the lowest appropriate level based on risk and complexity.
      • Mature and flexible communication.
      • Provide strategies and programs ensuring all individuals in the delivery organization obtain the level of coaching and supervision required for success in their position.
      • Provide leadership to the organization’s coaches ensuring delivery excellence across the organization.
      • Help develop strategic initiatives driving common approaches and utilizing information assets and processes across the enterprise.

      Exercise 3.2.2 Assess your Leadership capability proficiency

      1 hour
      1. Review the expectations for this capability and determine your current proficiency for each skill.
      2. Complete your assessment in the Mature and Scale Product Owner Proficiency Assessment tool.
      3. Record the results in the Mature and Scale Product Ownership Playbook.
      4. Review the skills map to identify strengths and areas of growth.

      Output

      • Product owner capability assessment

      Participants

      • Product owners
      • Product managers

      Capture in the Mature and Scale Product Owner Proficiency Assessment.

      Capability: Product lifecycle management

      Plan

      • Product backlog: Follow a schedule for backlog intake, grooming, updates, and prioritization.
      • Journey map: Create an end-user journey map to guide adoption and loyalty.
      • Fit for purpose: Define expected value and intended use to ensure product meets your end user’s needs.

      Build

      • Capacity management: Work with operations and delivery teams to ensure consistent and stable outcomes.
      • Release strategy: Build learning, release, and critical milestones into a repeatable release plan.
      • Compliance: Build policy compliance into delivery practices to ensure alignment and reduce avoidable risk (privacy, security).

      Run

      • Adoption: Focus attention on end-user adoption and proficiency to accelerate value and maximize retention.
      • Support: Build operational support and business continuity into every team.
      • Measure: Measure KPIs and validate expected value to ensure product alignment to goals and consistent product quality.

      “Pay fantastic attention to detail. Reward, recognize, celebrate.”

      – Thomas K. Connellan, Inside the Magic Kingdom

      Product Lifecycle Management: Plan, Build, Run

      Info-Tech Insight

      Product owners must actively manage the full lifecycle of the product.

      Define product value by aligning backlog delivery with roadmap goals

      In each product plan, the backlogs show what you will deliver. Roadmaps identify when and in what order you will deliver value, capabilities, and goals.

      In each product plan, the backlogs show what you will deliver. Roadmaps identify when and in what order you will deliver value, capabilities, and goals.

      A backlog stores and organizes PBIs at various stages of readiness

      A backlog stores and organizes PBIs at different levels of readiness. Stage 3 - Ideas are composed of raw, vague ideas that have yet to go through any formal valuation. Stage 2 - Qualified are researched and qualified PBIs awaiting refinement. Stage 1 - Ready are Discrete, refined RBIs that are read to be placed in your development team's sprint plans.

      A well-formed backlog can be thought of as a DEEP backlog:

      Detailed Appropriately: PBIs are broken down and refined, as necessary.

      Emergent: The backlog grows and evolves over time as PBIs are added and removed.

      Estimated: The effort a PBI requires is estimated at each tier.

      Prioritized: The PBI’s value and priority are determined at each tier.

      (Perforce, 2018)

      Distinguish your specific goals for refining in the product backlog vs. planning for a sprint itself

      Often backlog refinement is used interchangeably or considered a part of sprint planning. The reality is they are very similar, as the required participants and objectives are the same; however, there are some key differences.

      Backlog refinement versus Sprint planning. Differences in Objectives, Cadence and Participants

      Use quality filters to promote high value items into the delivery pipeline

      Product backlog has quality filters such as: Backlogged, Qualified and Ready. Sprint backlog has a backlog of accepted PBI's

      Basic scrum process

      The scrum process coordinates multiple stakeholders to deliver on business priorities.

      Prioritized Backlog, Sprint Backlog, Manage Delivery, Sprint Review, Product Release

      Capability: Product lifecycle management

      Your Score: ____

      1 - Foundational: Transitioning and Growing

      2 - Capable/Competent: Core Contributor

      3 - Influential: Gifted Improver

      4 - Transformational: Towering Strength

      • Informal or undocumented intake process.
      • Informal or undocumented delivery lifecycle.
      • Unstable or unpredictable throughput or quality.
      • Informal or undocumented testing and release processes.
      • Informal or undocumented organizational change management planning for each release.
      • Informal or undocumented compliance validation with every release.
      • Documented intake process with stakeholder prioritization of requests.
      • Consistent delivery lifecycle with stable and predictable throughput with an expected range of delivery variance.
      • Formal and documented testing and release processes.
      • Organizational change management planning for each major release.
      • Compliance validation with every major release.
      • Intake process using value drivers and prioritization criteria to sequence all items.
      • Consistent delivery lifecycle with stable and predictable throughput with little variance.
      • Risk-based and partially automated testing and release processes.
      • Organizational change management planning for all releases.
      • Automated compliance validation with every major release.
      • Intake process using enterprise value drivers and prioritization criteria to sequence all items.
      • Stable Agile DevOps with low variability and automation.
      • Risk-based automated and manual testing.
      • Multiple release channels based on risk. Automated build, validation, and rollback capabilities.
      • Cross-channel, integrated organizational change management for all releases.
      • Automated compliance validation with every change or release.

      Exercise 3.2.3 Assess your PLM capability proficiency

      1 hour
      1. Review the expectations for this capability and determine your current proficiency for each skill.
      2. Complete your assessment in the Mature and Scale Product Owner Proficiency Assessment tool.
      3. Record the results in the Mature and Scale Product Ownership Playbook.
      4. Review the skills map to identify strengths and areas of growth.

      Output

      • Product owner capability assessment

      Participants

      • Product owners
      • Product managers

      Capture in the Mature and Scale Product Owner Proficiency Assessment.

      Capabilities: Value realization

      Key performance indicators (KPIs)

      • Usability and user satisfaction: Assess satisfaction through usage monitoring and end-user feedback.
      • Value validation: Directly measure performance against defined value proposition, goals, and predicted ROI.
      • Fit for purpose: Verify the product addresses the intended purpose better than other options.

      Financial management

      • P&L: Manage each product as if it were its own business with profit and loss statements.
      • Acquisition cost/market growth: Define the cost of acquiring a new consumer, onboarding internal users, and increasing product usage.
      • User retention/market share: Verify product usage continues after adoption and solution reaches new user groups to increase value.

      Business model

      • Defines value proposition: Dedicate your primary focus to understanding and defining the value your product will deliver.
      • Market strategy and goals: Define your acquisition, adoption, and retention plan for users.
      • Financial model: Build an end-to-end financial model and plan for the product and all related operational support.

      “The competition is anyone the customer compares you with.”

      – Thomas K. Connellan, Inside the Magic Kingdom

      Value Realization: KPIs, Financial management, Business model

      Info-Tech Insight

      Most organizations stop with on-time and on-budget. True financial alignment needs to define and manage the full lifecycle P&L.

      Use a balanced value to establish a common definition of goals and value

      Value drivers are strategic priorities aligned to our enterprise strategy and translated through our product families. Each product and change has an impact on the value driver helping us reach our enterprise goals.

      Importance of the value driver multiplied by the Impact of value score is equal to the Value score.

      Info-Tech Insight

      Your value drivers and impact helps estimate the expected value of roadmap items, prioritize roadmap and backlog items, and identify KPIs and OKRs to measure value realization and actual impact.

      Include balanced value as one criteria to guide better decisions

      Your balanced value is just one of many criteria needed to align your product goals and sequence roadmap items. Feasibility, delivery pipeline capacity, shared services, and other factors may impact the prioritization of backlog items.

      Build your balanced business value score by using four key value drivers.

      Determine your value drivers

      Competent organizations know that value cannot always be represented by revenue or reduced expenses. However, it is not always apparent how to envision the full spectrum of sources of value. Dissecting value by benefit type and the value source’s orientation allows you to see the many ways in which a product or service brings value to the organization.

      Business value matrix

      Graph with 4 quadrants representing Outward versus Inward, and Financial benefit versus Human benefit. The quadrants are Reach customers, Increase revenue/demonstrate value, Enhance services, Reduce costs.

      Financial benefits vs. improved capabilities

      Financial benefits refer to the degree to which the value source can be measured through monetary metrics and is often quite tangible.

      Human benefits refer to how a product or service can deliver value through a user’s experience.

      Inward vs. outward orientation

      Inward refers to value sources that have an internal impact and improve your organization’s effectiveness and efficiency in performing its operations.

      Outward refers to value sources that come from your interaction with external factors, such as the market or your customers.

      Exercise 3.2.4 Identify your business value drivers and sources of value

      1 hour
      1. Brainstorm the different types of business value that you produce on the sticky notes (one item per page). Draw from examples of products in your portfolio.
      2. Identify the most important value items for your organization (two to three per quadrant).
      3. Record the results in the Mature and Scale Product Ownership Workbook.

      Output

      • Product owner capability assessment

      Participants

      • Product owners
      • Product managers

      Capture in the Mature and Scale Product Ownership Workbook.

      My business value sources

      Graph with 4 quadrants representing Outward versus Inward, and Financial benefit versus Human benefit. The quadrants are Reach customers, Increase revenue/demonstrate value, Enhance services, Reduce costs.

      Capability: Value realization

      Your Score: ____

      1 - Foundational: Transitioning and Growing

      2 - Capable/Competent: Core Contributor

      3 - Influential: Gifted Improver

      4 - Transformational: Towering Strength

      • Product canvas or basic product positioning overview.
      • Simple budget or funding mechanism for changes.
      • Product demos and informal user feedback mechanisms.
      • Business value canvas or basic business model tied to roadmap funding.
      • Product funding tied to roadmap milestones and prioritization.
      • Defined KPIs /OKRs for roadmap delivery throughput and value realization measurement.
      • Business model with operating cost structures, revenue/value traceability, and market/user segments.
      • Scenario-based roadmap funding alignment.
      • Roadmap aligned KPIs /OKRs for delivery throughput and value realization measurement as a key factor in roadmap prioritization.
      • Business model tied to enterprise operating costs and value realization KPIs/OKRs.
      • P&L roadmap and cost accounting tied to value metrics.
      • Roadmap aligned enterprise and scenario-based KPIs /OKRs for delivery throughput and value realization measurement as a key factor in roadmap prioritization.

      Exercise 3.2.5 Assess your value realization capability proficiency

      1 hour
      1. Review the expectations for this capability and determine your current proficiency for each skill.
      2. Complete your assessment in the Mature and Scale Product Owner Proficiency Assessment tool.
      3. Record the results in the Mature and Scale Product Ownership Playbook.
      4. Review the skills map to identify strengths and areas of growth.

      Output

      • Product owner capability assessment

      Participants

      • Product owners
      • Product managers

      Capture in the Mature and Scale Product Owner Proficiency Assessment.

      Determine your product owner capability proficiency in regards to: Vision, Leadership, Product Lifecycle, and Value Realization

      Summary of Accomplishment

      Problem solved.

      Product ownership can be one of the most difficult challenges facing delivery and operations teams. By focusing on operational grouping and alignment of goals, organizations can improve their value realization at all levels in the organization.

      The foundation for delivering and enhancing products and services is rooted in the same capability model. Traditionally, product owners have focused on only a subset of skills and capabilities needed to properly manage and grow their products. The product owner capability model is a useful tool to ensure optimal performance from product owners and assess the right level of detail for each product within the product families.

      Congratulations. You’ve completed a significant step toward higher-value products and services.

      If you would like additional support, have our analysts guide you through other phases as apart of an Info-Tech workshop

      Contact your account representative for more information

      workshops@infotech.com
      1-888-670-8889

      Additional Support

      If you would like additional support, have our analysts guide you through other phases as apart of an Info-Tech workshop

      Contact your account representative for more information
      workshops@infotech.com 1-888-670-8889

      The following are sample activities that will be conducted by Info-Tech analysts with your team:

      3.1.1 Assess your real Agile skill proficiency

      Assess your skills and capabilities against the real Agile skills inventory

      2.2.3 Prioritize your stakeholders

      Build a stakeholder management strategy.

      Research Contributors and Experts

      Emily Archer

      Lead Business Analyst,
      Enterprise Consulting, authentic digital agency

      Emily Archer is a consultant currently working with Fortune 500 clients to ensure the delivery of successful projects, products, and processes. She helps increase the business value returned for organizations’ investments in designing and implementing enterprise content hubs and content operations, custom web applications, digital marketing, and e-commerce platforms.

      David Berg

      Founder & CTO
      Strainprint Technologies Inc.

      David Berg is a product commercialization expert who has spent the last 20 years delivering product management and business development services across a broad range of industries. Early in his career, David worked with product management and engineering teams to build core network infrastructure products that secure and power the internet we benefit from today. David’s experience also includes working with clean technologies in the area of clean power generation, agritech, and Internet of Things infrastructure. Over the last five years, David has been focused on his latest venture, Strainprint Technologies, a data and analytics company focused on the medical cannabis industry. Strainprint has built the largest longitudinal medical cannabis dataset in the world, with a goal to develop an understanding of treatment behavior, interactions, and chemical drivers to guide future product development.

      Research Contributors and Experts

      Kathy Borneman

      Digital Product Owner, SunTrust Bank

      Kathy Borneman is a senior product owner who helps people enjoy their jobs again by engaging others in end-to-end decision making to deliver software and operational solutions that enhance the client experience and allow people to think and act strategically.

      Charlie Campbell

      Product Owner, Merchant e-Solutions

      Charlie Campbell is an experienced problem solver with the ability to quickly dissect situations and recommend immediate actions to achieve resolution, liaise between technical and functional personnel to bridge the technology and communication gap, and work with diverse teams and resources to reach a common goal.

      Research Contributors and Experts

      Yarrow Diamond

      Sr. Director, Business Architecture
      Financial Services

      Yarrow Diamond is an experienced professional with expertise in enterprise strategy development, project portfolio management, and business process reengineering across financial services, healthcare and insurance, hospitality, and real estate environments. She has a master’s in Enterprise Architecture from Penn State University, LSSMBB, PMP, CSM, ITILv3.

      Cari J. Faanes-Blakey, CBAP, PMI-PBA

      Enterprise Business Systems Analyst,
      Vertex, Inc.

      Cari J. Faanes-Blakey has a history in software development and implementation as a Business Analyst and Project Manager for financial and taxation software vendors. Active in the International Institute of Business Analysis (IIBA), Cari participated on the writing team for the BA Body of Knowledge 3.0 and the certification exam.

      Research Contributors and Experts

      Kieran Gobey

      Senior Consultant Professional Services
      Blueprint Software Systems

      Kieran Gobey is an IT professional with 24 years of experience, focused on business, technology, and systems analysis. He has split his career between external and internal customer-facing roles, and this has resulted in a true understanding of what is required to be a Professional Services Consultant. His problem-solving skills and ability to mentor others have resulted in successful software implementations.

      Kieran’s specialties include deep system troubleshooting and analysis skills, facilitating communications to bring together participants effectively, mentoring, leadership, and organizational skills.

      Rupert Kainzbauer

      VP Product, Digital Wallets
      Paysafe Group

      Rupert Kainzbauer is an experienced senior leader with a passion for defining and delivering products that deliver real customer and commercial benefit. With a team of highly experienced and motivated product managers, he has successfully led highly complex, multi-stakeholder payments initiatives, from proposition development and solution design through to market delivery. Their domain experience is in building online payment products in high-risk and emerging markets, remittance, prepaid cards, and mobile applications.

      Research Contributors and Experts

      Saeed Khan

      Founder,
      Transformation Labs

      Saeed Khan has been working in high tech for 30 years in Canada and the US and has held several leadership roles in Product Management in that time. He speaks regularly at conferences and has been writing publicly about technology product management since 2005.

      Through Transformation Labs, Saeed helps companies accelerate product success by working with product teams to improve their skills, practices, and processes. He is a cofounder of ProductCamp Toronto and currently runs a Meetup group and global Slack community called Product Leaders; the only global community of senior level product executives.

      Hoi Kun Lo

      Product Owner
      Nielsen

      Hoi Kun Lo is an experienced change agent who can be found actively participating within the IIBA and WITI groups in Tampa, FL and a champion for Agile, architecture, diversity, and inclusion programs at Nielsen. She is currently a Product Owner in the Digital Strategy team within Nielsen Global Watch Technology.

      Research Contributors and Experts

      Abhishek Mathur

      Sr Director, Product Management
      Kasisto, Inc.

      Abhishek Mathur is a product management leader, an artificial intelligence practitioner, and an educator. He has led product management and engineering teams at Clarifai, IBM, and Kasisto to build a variety of artificial intelligence applications within the space of computer vision, natural language processing, and recommendation systems. Abhishek enjoys having deep conversations about the future of technology and helping aspiring product managers enter and accelerate their careers.

      Jeff Meister

      Technology Advisor and Product Leader

      Jeff Meister is a technology advisor and product leader. He has more than 20 years of experience building and operating software products and the teams that build them. He has built products across a wide range of industries and has built and led large engineering, design, and product organizations.

      Jeff most recently served as Senior Director of Product Management at Avanade, where he built and led the product management practice. This involved hiring and leading product managers, defining product management processes, solution shaping and engagement execution, and evangelizing the discipline through pitches, presentations, and speaking engagements.

      Jeff holds a Bachelor of Applied Science (Electrical Engineering) and a Bachelor of Arts from the University of Waterloo, an MBA from INSEAD (Strategy), and certifications in product management, project management, and design thinking.

      Research Contributors and Experts

      Vincent Mirabelli

      Principal,
      Global Project Synergy Group

      With over 10 years of experience in both the private and public sectors, Vincent Mirabelli possesses an impressive track record of improving, informing, and transforming business strategy and operations through process improvement, design and re-engineering, and the application of quality to business analysis, project management, and process improvement standards.

      Oz Nazili

      VP, Product & Growth
      TWG

      Oz Nazili is a product leader with a decade of experience in both building products and product teams. Having spent time at funded startups and large enterprises, he thinks often about the most effective way to deliver value to users. His core areas of interest include Lean MVP development and data-driven product growth.

      Research Contributors and Experts

      Mike Starkey

      Director of Engineering
      W.W. Grainger

      Mike Starkey is a Director of Engineering at W.W. Grainger, currently focusing on operating model development, digital architecture, and building enterprise software. Prior to joining W.W. Grainger, Mike held a variety of technology consulting roles throughout the system delivery lifecycle spanning multiple industries such as healthcare, retail, manufacturing, and utilities with Fortune 500 companies.

      Anant Tailor

      Cofounder and Head of Product
      Dream Payments Corp.

      Anant Tailor is a cofounder at Dream Payments where he currently serves as the COO and Head of Product, having responsibility for Product Strategy & Development, Client Delivery, Compliance, and Operations. He has 20+ years of experience building and operating organizations that deliver software products and solutions for consumers and businesses of varying sizes.

      Prior to founding Dream Payments, Anant was the COO and Director of Client Services at DonRiver Inc, a technology strategy and software consultancy that he helped to build and scale into a global company with 100+ employees operating in seven countries.

      Anant is a Professional Engineer with a Bachelor degree in Electrical Engineering from McMaster University and a certificate in Product Strategy & Management from the Kellogg School of Management at Northwestern University.

      Research Contributors and Experts

      Angela Weller

      Scrum Master, Businessolver

      Angela Weller is an experienced Agile business analyst who collaborates with key stakeholders to attain their goals and contributes to the achievement of the company’s strategic objectives to ensure a competitive advantage. She excels when mediating or facilitating teams.

      Related Info-Tech Research

      Product Delivery

      Deliver on Your Digital Product Vision

      Build a product vision your organization can take from strategy through execution.

      Deliver Digital Products at Scale

      Deliver value at the scale of your organization through defining enterprise product families.

      Build Your Agile Acceleration Roadmap

      Quickly assess the state of your Agile readiness and plan your path forward to higher value realization.

      Implement Agile Practices That Work

      Improve collaboration and transparency with the business to minimize project failure.

      Implement DevOps Practices That Work

      Streamline business value delivery through the strategic adoption of DevOps practices.

      Extend Agile Practices Beyond IT

      Further the benefits of Agile by extending a scaled Agile framework to the business.

      Build Your BizDevOps Playbook

      Embrace a team sport culture built around continuous business-IT collaboration to deliver great products.

      Embed Security Into the DevOps Pipeline

      Shift security left to get into DevSecOps.

      Spread Best Practices With an Agile Center of Excellence

      Facilitate ongoing alignment between Agile teams and the business with a set of targeted service offerings.

      Enable Organization-Wide Collaboration by Scaling Agile

      Execute a disciplined approach to rolling out Agile methods in the organization.

      Related Info-Tech Research

      Application Portfolio Management

      APM Research Center

      See an overview of the APM journey and how we can support the pieces in this journey.

      Application Portfolio Management Foundations

      Ensure your application portfolio delivers the best possible return on investment.

      Streamline Application Maintenance

      Effective maintenance ensures the long-term value of your applications.

      Streamline Application Management

      Move beyond maintenance to ensuring exceptional value from your apps.

      Build an Application Department Strategy

      Delivering value starts with embracing what your department can do.

      Embrace Business-Managed Applications

      Empower the business to implement their own applications with a trusted business-IT relationship

      Optimize Applications Release Management

      Facilitate ongoing alignment between Agile teams and the business with a set of targeted service offerings.

      Related Info-Tech Research

      Value, Delivery Metrics, Estimation

      Build a Value Measurement Framework

      Focus product delivery on business value–driven outcomes.

      Select and Use SDLC Metrics Effectively

      Be careful what you ask for, because you will probably get it.

      Application Portfolio Assessment: End User Feedback

      Develop data-driven insights to help you decide which applications to retire, upgrade, re-train on, or maintain to meet the demands of the business.

      Create a Holistic IT Dashboard

      Mature your IT department by measuring what matters.

      Refine Your Estimation Practices With Top-Down Allocations

      Don’t let bad estimates ruin good work.

      Estimate Software Delivery With Confidence

      Commit to achievable software releases by grounding realistic expectations.

      Reduce Time to Consensus With an Accelerated Business Case

      Expand on the financial model to give your initiative momentum.

      Optimize Project Intake, Approval, and Prioritization

      Deliver more projects by giving yourself the voice to say “no” or “not yet” to new projects.

      Enhance PPM Dashboards and Reports

      Facilitate ongoing alignment between Agile teams and the business with a set of targeted service offerings.

      Related Info-Tech Research

      Organizational Design and Performance

      Redesign Your IT Organizational Structure

      Focus product delivery on business value-driven outcomes.

      Build a Strategic IT Workforce Plan

      Have the right people, in the right place, at the right time.

      Implement a New Organizational Structure

      Reorganizations are inherently disruptive. Implement your new structure with minimal pain for staff while maintaining IT performance throughout the change.

      Build an IT Employee Engagement Program

      Don’t just measure engagement, act on it

      Set Meaningful Employee Performance Measures

      Set holistic measures to inspire employee performance.

      Bibliography (Product Management)

      “12th Annual State of Agile Report.” VersionOne, 9 April 2018. Web.

      A, Karen. “20 Mental Models for Product Managers.” Product Management Insider, Medium, 2 Aug. 2018. Web.

      Adams, Paul. “Product Teams: How to Build & Structure Product Teams for Growth.” Inside Intercom, 30 Oct. 2019. Web.

      Aghina, Handscomb, Ludolph, West, and Abby Yip, “How to select and develop individuals for successful agile teams: A practical guide” McKinsey & Company 20 Dec. 2018. Web.

      Agile Alliance. “Product Owner.” Agile Alliance. n.d. Web.

      Ambler, Scott W. "Communication on Agile Software Teams“, Agile Modeling. 2001-2022. Web.

      Ambysoft. “2018 IT Project Success Rates Survey Results.” Ambysoft. 2018. Web.

      Banfield, Richard, et al. “On-Demand Webinar: Strategies for Scaling Your (Growing) Enterprise Product Team.” Pluralsight, 31 Jan. 2018. Web.

      Beck, Beedle, van Bennekum, Cockburn, Cunningham, Fowler, Grenning, Highsmith, Hunt, Jeffries, Kern, Marick, Martin, Mellor, Schwaber, Sutherland, Thomas, "Manifesto for Agile Software Development." agilemanifesto.org. 2001

      Berez, Steve, et al. “How to Plan and budget for Agile at Scale.” Bain & Company, 08 Oct 2019. Web

      Blueprint. “10 Ways Requirements Can Sabotage Your Projects Right From the Start.” Blueprint. 2012. Web.

      Breddels, Dajo, and Paul Kuijten. “Product Owner Value Game.” Agile2015 Conference, Agile Alliance 2015. Web.

      Cagan, Martin. “Behind Every Great Product.” Silicon Valley Product Group. 2005. Web.

      Cohn, Mike. “What Is a Product?” Mountain Goat Software. 6 Sept. 2016. Web.

      Connellan, Thomas K. Inside the Magic Kingdom, Bard Press, 1997.

      Curphey, Mark. “Product Definition.” SlideShare, 25 Feb. 2007. Web.

      “Delegation Poker Product Image.” Management 3.0, n.d. Web.

      Distel, Dominic, et al. “Finding the sweet spot in product-portfolio management.’ McKinsey, 4 Dec. 2020. Web

      Eringa, Ron. “Evolution of the Product Owner.” RonEringa.com, 12 June 2016. Web.

      Fernandes, Thaisa. “Spotify Squad Framework - Part I.” PM101, Medium, 6 Mar. 2017. Web.

      Galen, Robert. “Measuring Product Ownership – What Does ‘Good’ Look Like?” RGalen Consulting, 5 Aug. 2015. Web.

      Grenny, Joseph. “The Best Teams Hold Themselves Accountable.” Harvard Business Review, 30 May 2014. Web.

      Halisky, Merland, and Luke Lackrone. “The Product Owner’s Universe.” Agile2016 Conference, Agile Alliance, 2016. Web.

      Bibliography (Product Management)

      IIBA "A Guide to the Business Analysis Body of Knowledge® (BABOK® Guide) v3" IIBA. 15 APR 2015

      Kamer, Jurriaan. “How to Build Your Own ‘Spotify Model’.” The Ready, Medium, 9 Feb. 2018. Web.

      Kendis Team. “Exploring Key Elements of Spotify’s Agile Scaling Model.” Scaled Agile Framework, Medium, 23 Jul. 2018. Web.

      Lindstrom, Lowell. “7 Skills You Need to Be a Great Product Owner.” Scrum Alliance, n.d. Web.

      Lukassen, Chris. “The Five Belts Of The Product Owner.” Xebia.com, 20 Sept. 2016. Web.

      Mankins, Michael. “The Defining Elements of a Winning Culture.” Bain, 19 Dec. 2013. Web.

      McCloskey, Heather. “Scaling Product Management: Secrets to Defeating Common Challenges.” ProductPlan, 12 July 2019. Web.

      McCloskey, Heather. “When and How to Scale Your Product Team.” UserVoice, 21 Feb. 2017. Web. Mironov, Rich. “Scaling Up Product Manager/Owner Teams.” Rich Mironov's Product Bytes, Mironov Consulting, 12 Apr. 2014. Web.

      Moore, Geoffrey A. “Crossing the Chasm, 3rd Edition.” Collins Business Essentials, 28 Jan 2014

      Oh, Paul. “How Mastering Resilience Can Help Drive Agile Transformations.” Why Innovation!, 10 Oct. 2019.

      Overeem, Barry. “A Product Owner Self-Assessment.” Barry Overeem, 6 Mar. 2017. Web.

      Overeem, Barry. “Retrospective: Using the Team Radar.” Barry Overeem, 27 Feb. 2017. Web.

      Pichler, Roman. “How to Scale the Scrum Product Owner.” Roman Pichler, 28 June 2016 . Web.

      Pichler, Roman. “Product Management Framework.” Pichler Consulting Limited, 2014. Web.

      Pichler, Roman. “Sprint Planning Tips for Product Owners.” LinkedIn, 4 Sept. 2018. Web.

      Pichler, Roman. “What Is Product Management?” Pichler Consulting Limited, 26 Nov. 2014. Web.

      PMI "The high cost of low performance: the essential role of communications“. PMI Pulse of Profession, May 2013.

      Radigan,Dan. “Putting the ‘Flow' Back in Workflow With WIP Limits.” Atlassian, n.d. Web.

      Bibliography (Product Management)

      Rouse, Margaret. “Definition: product.” TechTarget, Sept. 2005. Web.

      Schuurman, Robbin. “10 Tips for Product Owners on (Business) Value.” Scrum.org, 30 Nov. 2017. Web.

      Schuurman, Robbin. “10 Tips for Product Owners on Agile Product Management.” Scrum.org, 28 Nov. 2017. Web.

      Schuurman, Robbin. “10 Tips for Product Owners on Product Backlog Management.” Scrum.org, 5 Dec. 2017. Web.

      Schuurman, Robbin. “10 Tips for Product Owners on the Product Vision.” Scrum.org, 29 Nov. 2017. Web.

      Schuurman, Robbin. “Tips for Starting Product Owners.” Scrum.org, 27 Nov. 2017. Web.

      Sharma, Rohit. “Scaling Product Teams the Structured Way.” Monetary Musings, 28 Nov. 2016. Web.

      Shirazi, Reza. “Betsy Stockdale of Seilevel: Product Managers Are Not Afraid To Be Wrong.” Austin Voice of Product, 2 Oct. 2018. Web.

      Spitz, Enid R. “The Three Kinds of Empathy: Emotional, Cognitive, Compassionate.” The Three Kinds of Empathy: Emotional, Cognitive, Compassionate. Heartmanity. Web.

      Steiner, Anne. “Start to Scale Your Product Management: Multiple Teams Working on Single Product.” Cprime, 6 Aug. 2019. Web.

      “The Qualities of Leadership: Leading Change.” Cornelius & Associates, 2016. Web.

      “The Standish Group 2015 Chaos Report.” The Standish Group. 2015. Web.

      Theus, Andre. “When Should You Scale the Product Management Team?” ProductPlan, 7 May 2019. Web.

      Tolonen, Arto. “Scaling Product Management in a Single Product Company.” Smartly.io, 26 Apr. 2018. Web.

      Ulrich, Catherine. “The 6 Types of Product Managers. Which One Do You Need?” Medium, 19 Dec. 2017. Web.

      Verwijs, Christiaan. “Retrospective: Do The Team Radar.” The Liberators, Medium, 10 Feb. 2017. Web.

      Vlaanderen, Kevin. “Towards Agile Product and Portfolio Management”. Academia.edu. 2010. Web.

      Backlog

      2009 Business Analysis Benchmark Study.” IAG Consulting, 2009. Web.

      Armel, Kate. “Data-driven Estimation, Management Lead to High Quality.” Quantitative Software Management Inc, 2015. Web.

      Bradley, Marty. “Agile Estimation Guidance.” Leading Agile, 30 Aug. 2016. Web. Feb. 2019.

      CollabNet and VersionOne. “12th Annual State of Agile Report.” VersionOne, 9 April 2018. Web.

      Craveiro, João. “Marty meets Martin: connecting the two triads of Product Management.” Product Coalition, 18 Nov. 2017. Accessed Feb. 2019.

      “Enablers.” Scaled Agile, n.d. Web.

      “Epic.” Scaled Agile, n.d. Web.

      Fischer, Christian. “Scrum Compact.” Itemis, n.d. Web. Feb. 2019.

      Hackshall, Robin. “Product Backlog Refinement.” Scrum Alliance, 9 Oct. 2014. Accessed Feb. 2019.

      Hartman, Bob. “New to agile? INVEST in good user stories.” Agile For All, 14 May 2009. Web.

      Huether, Derek. “Cheat Sheet for Product Backlog Refinement (Grooming).” Leading Agile, 2 Nov. 2013. Accessed Feb. 2019.

      Karlsson, Johan. “Backlog Grooming: Must-Know Tips for High-Value Products.” Perforce, 18 May 2018. Accessed Feb. 2019.

      Khan, Saeed. “Good Bye ‘Product Owner’, Hello ‘Backlog Manager.’” On Product Management, 27 June 2011. Accessed Feb. 2019.

      Khan, Saeed. “Let’s End the Confusion: A Product Owner is NOT a Product Manager.” On Product Management, 14 July 2017. Accessed Feb. 2019.

      Lawrence, Richard. “New Story Splitting Resource.” Agile For All. 27 Jan. 2012. Web. Feb. 2019.

      Leffingwell, Dean. “SAFe 4.0.” Scaled Agile Inc, 2017. Accessed Feb. 2019.

      Lucero, Mario. “Product Backlog – Deep Model.” Agilelucero, 8 Oct. 2014. Web.

      “PI Planning.” Scaled Agile, n.d. Web.

      Pichler, Roman. “The Product Roadmap and the Product Backlog.” Roman Pichler, 9 Sept. 2014. Accessed Feb. 2019.

      Rubin, Kenneth S. Essential Scrum: A Practical Guide to the Most Popular Agile Process. Pearson Education, 2012.

      Schuurman, Robbin. “10 Tips for Product Owners on Product Backlog Management.” Burozeven, 20 Nov. 2017. Accessed Feb. 2019.

      Srinivasan, Vibhu. “Product Backlog Management: Tips from a Seasoned Product Owner.” Agile Alliance, n.d. Accessed Feb. 2019.

      Todaro, Dave. “Splitting Epics and User Stories.” Ascendle, n.d. Accessed Feb. 2019.

      “What Characteristics Make Good Agile Acceptance Criteria?” Segue Technologies, 3 Sept. 2015. Web. Feb. 2019.

      Bibliography (Roadmap)

      Bastow, Janna. “Creating Agile Product roadmaps Everyone Understands.” ProdPad, 22 Mar. 2017. Accessed Sept. 2018.

      Bastow, Janna. “The Product Tree Game: Our Favorite Way To Prioritize Features.” ProdPad, 21 Feb. 2016. Accessed Sept. 2018.

      Chernak, Yuri. “Requirements Reuse: The State of the Practice.” 2012 IEEE International Conference, 12 June 2012, Herzliya, Israel. Web.

      Fowler, Martin. “Application Boundary.” MartinFowler.com, 11 Sept. 2003. Accessed 20 Nov. 2017.

      Harrin, Elizabeth. “Learn What a Project Milestone Is.” The Balance Careers, 10 May 2018. Accessed Sept. 2018.

      “How to create a product roadmap.” Roadmunk, n.d. Accessed Sept. 2018.

      Johnson, Steve. “How to Master the 3 Horizons of Product Strategy.” Aha!, 24 Sept. 2015. Accessed Sept. 2018.

      Johnson, Steve. “The Product Roadmap vs. the Technology Roadmap.” Aha!, 23 June 2016. Accessed Sept. 2018

      Juncal, Shaun. “How Should You Set Your Product Roadmap Timeframes?” ProductPlan, Web. Sept. 2018.

      Leffingwell, Dean. “SAFe 4.0.” Scaled Agile, 2017. Web.

      Maurya, Ash. “What is a Minimum Viable Product (MVP).” Leanstack, 12 June 2017. Accessed Sept. 2018.

      Pichler, Roman. “10 Tips for Creating an Agile Product Roadmap.” Roman Pichler, 20 July 2016. Accessed Sept. 2018.

      Pichler, Roman. Strategize: Product Strategy and Product Roadmap Practices for the Digital Age. Pichler Consulting, 2016.

      “Product Roadmap Contents: What Should You Include?” ProductPlan, n.d. Accessed 20 Nov. 2017.

      Saez, Andrea. “Why Your Roadmap Is Not a Release Plan.” ProdPad, 23 October 2015. Accessed Sept. 2018.

      Schuurman, Robbin. “Tips for Agile product roadmaps & product roadmap examples.” Scrum.org, 7 Dec. 2017. Accessed Sept. 2018.

      Bibliography (Vision and Canvas)

      Adams, Paul. “The Future Product Canvas.” Inside Intercom, 10 Jan. 2014. Web.

      “Aligning IT Funding Models to the Pace of Technology Change.” EDUCAUSE, 14 Dec. 2015. Web.

      Altman, Igor. “Metrics: Gone Bad.” OpenView, 10 Nov. 2009. Web.

      Barry, Richard. “The Product Vision Canvas – a Strategic Tool in Developing a Successful Business.” Polymorph, 2019. Web.

      “Business Canvas – Business Models & Value Propositions.” Strategyzer, 2019. Web.

      “Business Model Canvas.” Wikipedia: The Free Encyclopedia, 4 Aug. 2019. Web.

      Charak, Dinker. “Idea to Product: The Working Model.” ThoughtWorks, 13 July 2017. Web.

      Charak, Dinker. “Product Management Canvas - Product in a Snapshot.” Dinker Charak, 29 May 2017. Web.

      Chudley, James. “Practical Steps in Determining Your Product Vision (Product Tank Bristol, Oct. 2018).” LinkedIn SlideShare. Uploaded by cxpartners, 2 Nov. 2018. Web.

      Cowan, Alex. “The 20 Minute Business Plan: Business Model Canvas Made Easy.” COWAN+, 2019. Web.

      Craig, Desiree. “So You've Decided To Become A Product Manager.” Start it up, Medium, 2 June 2019. Web.

      “Create an Aha! Business Model Canvas Strategic Model.” Aha! Support, 2019. Web.

      Eick, Stephen. “Does Code Decay? Assessing the Evidence from Change Management Data.” IEEE Transactions on Software Engineering, vol. 27, no. 1, Jan. 2001, pp. 1-12. Web.

      Eriksson, Martin. “The next Product Canvas.” Mind the Product, 22 Nov. 2013. Web.

      “Experience Canvas: a Lean Approach: Atlassian Team Playbook.” Atlassian, 2019. Web.

      Freeman, James. “How to Make a Product Canvas – Visualize Your Product Plan.” Edraw, 23 Dec. 2019. Web.

      Fuchs, Danny. “Measure What Matters: 5 Best Practices from Performance Management Leaders.” OpenGov, 8 Aug. 2018. Web.

      Gorisse, Willem. “A Practical Guide to the Product Canvas.” Mendix, 28 Mar. 2017. Web.

      Gothelf, Jeff. “The Lean UX Canvas.” Jeff Gothelf, 15 Dec. 2016. Web.

      Gottesdiener, Ellen. “Using the Product Canvas to Define Your Product: Getting Started.” EBG Consulting, 15 Jan. 2019. Web.

      Gottesdiener, Ellen. “Using the Product Canvas to Define Your Product's Core Requirements.” EBG Consulting, 4 Feb. 2019. Web.

      Gray, Mark Krishan. “Should I Use the Business Model Canvas or the Lean Canvas?” Blog, Medium.com, 2019. Web.

      Bibliography (Vision and Canvas)

      Hanby, Jeff. "Software Maintenance: Understanding and Estimating Costs." LookFar, 21 Oct. 2016. Web.

      “How do you define a product?” Scrum.org, 4 Apr 2017, Web

      Juncal, Shaun. “How to Build a Product Roadmap Based on a Business Model Canvas.” ProductPlan, 19 June 2019. Web.

      “Lean Canvas Intro - Uber Example.” YouTube, uploaded by Railsware Product Academy, 12 Oct. 2018. Web.

      “Lesson 6: Product Canvas.” ProdPad Help Center, 2019. Web.

      Lucero, Mario. “The Product Canvas.” Agilelucero.com, 22 June 2015. Web.

      Maurya, Ash. “Create a New Lean Canvas.” Canvanizer, 2019. Web.

      Maurya, Ash. “Don't Write a Business Plan. Create a Lean Canvas Instead.” LEANSTACK, 2019. Web.

      Maurya, Ash. “Why Lean Canvas vs Business Model Canvas?” Medium, 27 Feb. 2012. Web.

      Mirabelli, Vincent. “The Project Value Canvas.” Vincent Mirabelli, 2019. Web.

      Mishra, LN. “Business Analysis Canvas – The Ultimate Enterprise Architecture.” BA Times, 19 June 2019. Web.

      Muller. Jerry Z. “Why performance metrics isn’t always the best way to judge performance.” Fast Company, 3 April 2019. Web.

      Perri, Melissa. “What Is Good Product Strategy?” Melissa Perri, 14 July 2016. Web.

      Pichler, Roman. “A Product Canvas for Agile Product Management, Lean UX, Lean Startup.” Roman Pichler, 16 July 2012. Web.

      Pichler, Roman. “Introducing the Product Canvas.” JAXenter, 15 Jan. 2013. Web.

      Pichler, Roman. “Roman's Product Canvas: Introduction.” YouTube, uploaded by Roman Pichler, 3 Mar. 2017. Web.

      Pichler, Roman. “The Agile Vision Board: Vision and Product Strategy.” Roman Pichler, 10 May 2011. Web.

      Pichler, Roman. “The Product Canvas – Template.” Roman Pichler, 11 Oct. 2016. Web.

      Pichler, Roman. “The Product Canvas Tutorial V1.0.” LinkedIn SlideShare. Uploaded by Roman Pichler, 14 Feb. 2013. Web.

      Pichler, Roman. “The Product Vision Board: Introduction.” YouTube uploaded by Roman Pichler, 3 Mar. 2017. Web.

      “Product Canvas PowerPoint Template.” SlideModel, 2019. Web.

      Bibliography (Vision and Canvas)

      “Product Canvas.” SketchBubble, 2019, Web.

      “Product Canvas.” YouTube, uploaded by Wojciech Szramowski, 18 May 2016. Web.

      “Product Roadmap Software to Help You Plan, Visualize, and Share Your Product Roadmap.” Productboard, 2019. Web.

      Roggero, Giulio. “Product Canvas Step-by-Step.” LinkedIn SlideShare, uploaded by Giulio Roggero, 18 May 2013. Web.

      Royce, Dr. Winston W. “Managing the Development of Large Software Systems.” Scf.usc.edu, 1970. Web.

      Ryan, Dustin. “The Product Canvas.” Qdivision, Medium, 20 June 2017. Web.

      Snow, Darryl. “Product Vision Board.” Medium, 6 May 2017. Web.

      Stanislav, Shymansky. “Lean Canvas – a Tool Your Startup Needs Instead of a Business Plan.” Railsware, 12 Oct. 2018. Web.

      Stanislav, Shymansky. “Lean Canvas Examples of Multi-Billion Startups.” Railsware, 20 Feb. 2019. Web.

      “The Product Vision Canvas.” YouTube, Uploaded by Tom Miskin, 20 May 2019. Web.

      Tranter, Leon. “Agile Metrics: the Ultimate Guide.” Extreme Uncertainty, n.d. Web.

      “Using Business Model Canvas to Launch a Technology Startup or Improve Established Operating Model.” AltexSoft, 27 July 2018. Web.

      Veyrat, Pierre. “Lean Business Model Canvas: Examples + 3 Pillars + MVP + Agile.” HEFLO BPM, 10 Mar. 2017. Web.

      “What Are Software Metrics and How Can You Track Them?” Stackify, 16 Sept. 2017. Web

      “What Is a Product Vision?” Aha!, 2019. Web.

      Supporting Research

      Transformation topics and supporting Info-Tech research to make the journey easier, with less rework.

      Supporting research and services

      Improving IT alignment

      Build a Business-Aligned IT Strategy

      Success depends on IT initiatives clearly aligned to business goals, IT excellence, and driving technology innovation.

      Includes a "Strategy on a page" template

      Make Your IT Governance Adaptable

      Governance isn't optional, so keep it simple and make it flexible.

      Create an IT View of the Service Catalog

      Unlock the full value of your service catalog with technical components.

      Application Portfolio Management Foundations

      Ensure your application portfolio delivers the best possible return on investment.

      Supporting research and services

      Shifting toward Agile DevOps

      Agile/DevOps Resource Center

      Tools and advice you need to be successful with Agile.

      Develop Your Agile Approach for a Successful Transformation

      Understand Agile fundamentals, principles, and practices so you can apply them effectively in your organization.

      Implement DevOps Practices That Work

      Streamline business value delivery through the strategic adoption of DevOps practices.

      Perform an Agile Skills Assessment

      Being Agile isn't about processes, it's about people.

      Define the Role of Project Management in Agile and Product-Centric Delivery

      Projects and products are not mutually exclusive.

      Supporting research and services

      Shifting toward product management

      Make the Case for Product Delivery

      Align your organization on the practices to deliver what matters most.

      Deliver on Your Digital Product Vision

      Build a product vision your organization can take from strategy through execution.

      Deliver Digital Products at Scale

      Deliver value at the scale of your organization through defining enterprise product families.

      Build a Better Product Owner

      Strengthen the product owner's role in your organization by focusing on core capabilities and proper alignment.

      Supporting research and services

      Improving value and delivery metrics

      Build a Value Measurement Framework

      Focus product delivery on business value-driven outcomes.

      Create a Holistic IT Dashboard

      Mature your IT department by measuring what matters.

      Select and Use SDLC Metrics Effectively

      Be careful what you ask for because you will probably get it.

      Reduce Time to Consensus With an Accelerated Business Case

      Expand on the financial model to give your initiative momentum.

      Supporting research and services

      Improving governance, prioritization, and value

      Make Your IT Governance Adaptable

      Governance isn't optional, so keep it simple and make it flexible.

      Maximize Business Value from IT Through Benefits Realization

      Embed benefits realization into your governance process to prioritize IT spending and confirm the value of IT.

      Drive Digital Transformation With Platform Strategies

      Innovate and transform your business models with digital platforms.

      Succeed With Digital Strategy Execution

      Building a digital strategy is only half the battle: create a systematic roadmap of technology initiatives to execute the strategy and drive digital transformation.

      Build a Value Measurement Framework

      Focus product delivery on business value-driven outcomes.

      Create a Holistic IT Dashboard

      Mature your IT department by measuring what matters.

      Supporting research and services

      Improving requirements management and quality assurance

      Requirements Gathering for Small Enterprises

      Right-size the guidelines of your requirements gathering process.

      Improve Requirements Gathering

      Back to basics: great products are built on great requirements.

      Build a Software Quality Assurance Program

      Build quality into every step of your SDLC.

      Automate Testing to Get More Done

      Drive software delivery throughput and quality confidence by extending your automation test coverage.

      Manage Your Technical Debt

      Make the case to manage technical debt in terms of business impact.

      Create a Business Process Management Strategy

      Avoid project failure by keeping the "B" in BPM.

      Build a Winning Business Process Automation Playbook

      Optimize and automate your business processes with a user-centric approach.

      Create a Winning BPI Playbook

      Don't waste your time focusing on the "as is." Focus on the improvements and the "to be."

      Supporting research and services

      Improving release management

      Optimize Applications Release Management

      Build trust by right-sizing your process using appropriate governance.

      Streamline Application Maintenance

      Effective maintenance ensures the long-term value of your applications.

      Streamline Application Management

      Move beyond maintenance to ensure exceptional value from your apps.

      Optimize Change Management

      Right-size your change management process.

      Manage Your Technical Debt

      Make the case to manage technical debt in terms of business impact.

      Improve Application Development Throughput

      Drive down your delivery time by eliminating development inefficiencies and bottlenecks while maintaining high quality.

      Supporting research and services

      Business relationship management

      Embed Business Relationship Management

      Leverage knowledge of the business to become a strategic IT partner.

      Improving security

      Build an Information Security Strategy

      Create value by aligning your strategy to business goals and business risks.

      Develop and Deploy Security Policies

      Enhance your overall security posture with a defensible and prescriptive policy suite.

      Simplify Identity and Access Management

      Leverage risk- and role-based access control to quantify and simplify the IAM process.

      Supporting research and services

      Improving and supporting business-managed applications

      Embrace Business-Managed Applications

      Empower the business to implement their own applications with a trusted business-IT relationship.

      Enhance Your Solution Architecture Practices

      Ensure your software systems solution is architected to reflect stakeholders’ short-and long-term needs.

      Satisfy Digital End Users With Low- and No-Code

      Extend IT, automation, and digital capabilities to the business with the right tools, good governance, and trusted organizational relationships.

      Build Your First RPA Bot

      Support RPA delivery with strong collaboration and management foundations.

      Automate Work Faster and More Easily With Robotic Process Automation

      Embrace the symbiotic relationship between the human and digital workforce.

      Supporting research and services

      Improving business intelligence, analytics, and reporting

      Modernize Data Architecture for Measurable Business Results

      Enable the business to achieve operational excellence, client intimacy, and product leadership with an innovative, Agile, and fit-for-purpose data architecture practice.

      Build a Reporting and Analytics Strategy

      Deliver actionable business insights by creating a business-aligned reporting and analytics strategy.

      Build Your Data Quality Program

      Quality data drives quality business decisions.

      Design Data-as-a-Service

      Journey to the data marketplace ecosystems.

      Build a Robust and Comprehensive Data Strategy

      Key to building and fostering a data-driven culture.

      Build an Application Integration Strategy

      Level the table before assembling the application integration puzzle or risk losing pieces.

      Appendix

      Pulse survey results

      Pulse survey (N=18): What are the key components of product/service ownership?

      Pulse survey results: What are the key components of product/service ownership? Table shows answer options and responses in percentage.

      Pulse Survey (N=18): What are the key individual skills for a product/service owner?

      What are the key individual skills for a product/service owner? Table shows answer options and responses in percentage

      Other choices entered by respondents:

      • Anticipating client needs, being able to support delivery in all phases of the product lifecycle, adaptability, and ensuring a healthy backlog (at least two sprints’ worth of work).
      • Requirements elicitation and prioritization.
      • The key skill is being product-focused to ensure it provides value for competitive advantage.

      Pulse Survey (N=18): What are three things an outstanding product/service owner does that an average one doesn’t?

      What are three things an outstanding product/service owner does that an average one doesn't? Table shows results.

      Build a Data Pipeline for Reporting and Analytics

      • Buy Link or Shortcode: {j2store}126|cart{/j2store}
      • member rating overall impact: 9.3/10 Overall Impact
      • member rating average dollars saved: $61,999 Average $ Saved
      • member rating average days saved: 20 Average Days Saved
      • Parent Category Name: Data Management
      • Parent Category Link: /data-management
      • Continuous and disruptive database design updates while trying to have one design pattern to fit all use cases.
      • Sub-par performance while loading, retrieving, and querying data.
      • You want to shorten time-to-market of the projects aimed at data delivery and consumption.
      • Unnecessarily complicated database design limits usability of the data and requires knowledge of specific data structures for their effective use.

      Our Advice

      Critical Insight

      • Evolve your data architecture. Data pipeline is an evolutionary break away from the enterprise data warehouse methodology.
      • Avoid endless data projects. Building centralized all-in-one enterprise data warehouses takes forever to deliver a positive ROI.
      • Facilitate data self-service. Use-case optimized data delivery repositories facilitate data self-service.

      Impact and Result

      • Understand your high-level business capabilities and interactions across them – your data repositories and flows should be just a digital reflection thereof.
      • Divide your data world in logical verticals overlaid with various speed data progression lanes, i.e. build your data pipeline – and conquer it one segment at a time.
      • Use the most appropriate database design pattern for a given phase/component in your data pipeline progression.

      Build a Data Pipeline for Reporting and Analytics Research & Tools

      Start here – read the Executive Brief

      Build your data pipeline using the most appropriate data design patterns.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Understand data progression

      Identify major business capabilities, business processes running inside and across them, and datasets produced or used by these business processes and activities performed thereupon.

      • Build a Data Pipeline for Reporting and Analytics – Phase 1: Understand Data Progression

      2. Identify data pipeline components

      Identify data pipeline vertical zones: data creation, accumulation, augmentation, and consumption, as well as horizontal lanes: fast, medium, and slow speed.

      • Build a Data Pipeline for Reporting and Analytics – Phase 2: Identify Data Pipeline Components

      3. Select data design patterns

      Select the right data design patterns for the data pipeline components, as well as an applicable data model industry standard (if available).

      • Build a Data Pipeline for Reporting and Analytics – Phase 3: Select Data Design Patterns
      [infographic]

      Workshop: Build a Data Pipeline for Reporting and Analytics

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Understand Data Progression

      The Purpose

      Identify major business capabilities, business processes running inside and across them, and datasets produced or used by these business processes and activities performed thereupon.

      Key Benefits Achieved

      Indicates the ownership of datasets and the high-level data flows across the organization.

      Activities

      1.1 Review & discuss typical pitfalls (and their causes) of major data management initiatives.

      1.2 Discuss the main business capabilities of the organization and how they interact.

      1.3 Discuss the business processes running inside and across business capabilities and the datasets involved.

      1.4 Create the Enterprise Business Process Model (EBPM).

      Outputs

      Understanding typical pitfalls (and their causes) of major data management initiatives.

      Business capabilities map

      Business processes map

      Enterprise Business Process Model (EBPM)

      2 Identify Data Pipeline Components

      The Purpose

      Identify data pipeline vertical zones: data creation, accumulation, augmentation, and consumption, as well as horizontal lanes: fast, medium, and slow speed.

      Key Benefits Achieved

      Design the high-level data progression pipeline.

      Activities

      2.1 Review and discuss the concept of a data pipeline in general, as well as the vertical zones: data creation, accumulation, augmentation, and consumption.

      2.2 Identify these zones in the enterprise business model.

      2.3 Review and discuss multi-lane data progression.

      2.4 Identify different speed lanes in the enterprise business model.

      Outputs

      Understanding of a data pipeline design, including its zones.

      EBPM mapping to Data Pipeline Zones

      Understanding of multi-lane data progression

      EBPM mapping to Multi-Speed Data Progression Lanes

      3 Develop the Roadmap

      The Purpose

      Select the right data design patterns for the data pipeline components, as well as an applicable data model industry standard (if available).

      Key Benefits Achieved

      Use of appropriate data design pattern for each zone with calibration on the data progression speed.

      Activities

      3.1 Review and discuss various data design patterns.

      3.2 Discuss and select the data design pattern selection for data pipeline components.

      3.3 Discuss applicability of data model industry standards (if available).

      Outputs

      Understanding of various data design patterns.

      Data Design Patterns mapping to the data pipeline.

      Selection of an applicable data model from available industry standards.

      Cost and Budget Management

      • Buy Link or Shortcode: {j2store}8|cart{/j2store}
      • Related Products: {j2store}8|crosssells{/j2store}
      • Up-Sell: {j2store}8|upsells{/j2store}
      • member rating overall impact: 9.5/10
      • member rating average dollars saved: $2,000
      • member rating average days saved: 5
      • Parent Category Name: Financial Management
      • Parent Category Link: /financial-management

      The challenge

      • IT is seen as a cost center in most organizations. Your IT spend is fuelled by negative sentiment instead of contributing to business value.

      • Budgetary approval is difficult, and in many cases, the starting point is lowering the cost-income ratio without looking at the benefits.
      • Provide the right amount of detail in your budgets to tell your investment and spending story. Align it with the business story. Too much detail only increases confusion, too little suspicion.

      Our advice

      Insight

      An effective IT budget complements the business story with how you will achieve the expected business targets.

      • Partner with the business to understand the strategic direction of the company and its future needs.
      • Know your costs and the value you will deliver.
      • Present your numbers and story clearly and credibly. Excellent delivery is part of good communication.
      • Guide your company by clearly explaining the implications of different choices they can make.

      Impact and results 

      • Get a head-start on your IT forecasting exercise by knowing the business strategy and what initiatives they will launch.
      • The coffee corner works! Pre-sell your ideas in quick chats.
      • Do not make innovation budgets bigger than they need to be. It undermines your credibility.
      • You must know your history to accurately forecast your IT operations cost and how it will evolve based on expected business changes.
      • Anticipate questions. IT discretionary proposals are often challenged. Think ahead of time about what areas your business partners will focus on and be ready with researched and credible responses.
      • When you have an optimized budget, tie further cost reductions to consequences in service delivery or deferred projects, or a changed operating model.

      The roadmap

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      Get started

      Our concise executive brief shows you why you should develop a budget based on value delivery. We'll show you our methodology and the ways we can help you in completing this.

      Plan for budget success

      • Build an IT Budget That Demonstrates Value Delivery – Phase 1: Plan (ppt)
      • IT Budget Interview Guide (doc)

      Build your budget.

      • Build an IT Budget That Demonstrates Value Delivery – Phase 2: Build (ppt)
      • IT Cost Forecasting Tool (xls)

      Sell your budget

      • Build an IT Budget That Demonstrates Value Delivery – Phase 3: Sell (ppt)
      • IT Budget Presentation (ppt)

       

      The MVP Major Incident Manager

      The time has come to hire a new major incident manager. How do you go about that? How do you choose the right candidate? Major incident managers must have several typically conflicting traits, so how do you pick the right person? Let's dive into that.

      Register to read more …

      Scale Business Process Automation

      • Buy Link or Shortcode: {j2store}241|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Optimization
      • Parent Category Link: /optimization
      • Business process automation (BPA) adoption gained significant momentum as your business leaders saw the positive outcomes in your pilots, such as improvements in customer experience, operational efficiencies, and cost optimizations.
      • Your stakeholders are ready to increase their investments in more process automation solutions. They want to scale initial successes to other business and IT functions.
      • However, it is unclear how BPA can be successfully scaled and what benefits can be achieved from it.

      Our Advice

      Critical Insight

      The shift from isolated, task-based automations in your pilot to value-oriented, scaled automations brings new challenges and barriers to your organization such as:

      • Little motivation or tolerance to change existing business operations to see the full value of BPA.
      • Overinvesting in current BPA technologies to maximize the return despite available alternatives that can do the same tasks better.
      • BPA teams are ill-equipped to meet the demands and complexities of scaled BPA implementations.

      Impact and Result

      • Ground your scaling expectations. Set realistic and achievable goals centered on driving business value to the entire organization by optimizing and automating end-to-end business processes.
      • Define your scaling journey. Tailor your scaling approach according to your ability to ease BPA implementation, to broaden BPA adoption, and to loosen BPA constraints.
      • Prepare to scale BPA. Cement your BPA management and governance foundations to support BPA scaling using the lessons learned from your pilot implementation.

      Scale Business Process Automation Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Scale Business Process Automation Deck – A guide to learn the opportunities and values of scaling business process automation.

      This research walks you through the level setting of your scaled business process automation (BPA) expectations, factors to consider in defining your scaled BPA journey, and assessing your readiness to scale BPA.

      • Scale Business Process Automation Storyboard

      2. Scale Business Process Automation Readiness Assessment – A tool to help you evaluate your readiness to scale business process automation.

      Use this tool to identify key gaps in the people, processes, and technologies you need to support the scaling of business process automation (BPA). It also contains a canvas to facilitate your discussions around business process automation with your stakeholders and BPA teams.

      • Scale Business Process Automation Readiness Assessment
      [infographic]

      Further reading

      Scale Business Process Automation

      Take a value-first approach to automate the processes that matter

      Analyst Perspective

      Scaling business process automation (BPA) is an organization-wide commitment

      Business and IT must work together to ensure the right automations are implemented and BPA is grown and matured in a sustainable way. However, many organizations are not ready to make this commitment. Managing the automation demand backlog, coordinating cross-functional effort and organizational change, and measuring BPA value are some of the leading factors challenging scaling BPA.

      Pilot BPA with the intent to scale it. Pilots are safe starting points to establish your foundational governance and management practices and build the necessary relationships and collaborations for you to be successful. These factors will then allow you to explore more sophisticated, complicated, and innovative opportunities to drive new value to your team, department, and organization.

      A picture of Andrew Kum-Seun

      Andrew Kum-Seun
      Research Director,
      Application Delivery and Management
      Info-Tech Research Group

      Executive Summary

      Your Challenge

      • Business process automation (BPA) adoption gained significant momentum as your business leaders see the positive outcomes in your pilots, such as improvements in customer experience, operational efficiencies, and cost optimizations.
      • Your stakeholders are ready to increase their investments in more process automation solutions. They want to scale initial successes to other business and IT functions.
      • However, it is unclear how BPA can be successfully scaled and what benefits can be achieved from it.

      Common Obstacles

      The shift from isolated, task-based automations in your pilot to value-oriented and scaled automations brings new challenges and barriers to your organization:

      • Little motivation or tolerance to change existing business operations to see the full value of BPA.
      • Overinvesting in current BPA technologies to maximize return despite available alternatives that can do the same tasks better.
      • BPA teams are ill-equipped to meet the demands and complexities of scaled BPA implementations.

      Info-Tech's Approach

      • Ground your scaling expectations. Set realistic and achievable goals centered on driving business value to the entire organization by optimizing and automating end-to-end business processes.
      • Define your scaling journey. Tailor your scaling approach according to your ability to ease BPA implementation, to broaden BPA adoption, and to loosen BPA constraints.
      • Prepare to scale BPA. Cement your BPA management and governance foundations to support BPA scaling using the lessons learned from your pilot implementation.

      Info-Tech Insight

      Take a value-first approach in your scaling business process automation (BPA) journey. Low-risk, task-oriented automations are good starting points to introduce BPA but constrain the broader returns your organization wants. Business value can only scale when everything and everyone in your processes are working together to streamline the entire value stream rather than the small gains from optimizing small, isolated automations.

      Scale Business Process Automation

      Take a value-first approach to automate the processes that matter

      Pilot Your BPA Capabilities

      • Learn the foundation practices to design, deliver, and support BPA.
      • Understand the fit and value of BPA.
      • Gauge the tolerance for business operational change and system risk.

      See Info-Tech's Build a Winning Business Process Automation Playbook blueprint for more information.

      Build Your Scaling BPA Vision

      Apply Lessons Learned to Scale

      1. Ground Your Scaling Expectations
        Set realistic and achievable goals centered on driving business value to the entire organization by optimizing and automating end-to-end business processes.
      2. Define Your Scaling Journey
        Tailor your scaling approach according to your ability to ease BPA implementation, to broaden BPA adoption, and to loosen BPA constraints.
      3. Prepare to Scale BPA
        Cement your BPA management and governance foundations to support BPA scaling using the lessons learned from your pilot implementation.

      Research deliverable

      Design and communicate your approach to scale business process automation with Info-Tech's Scale Business Process Automation Readiness Assessment:

      • Level set your scaled BPA goals and objectives.
      • Discuss and design your scaled BPA journey.
      • Identify the gaps and improvements needed to scale your BPA practices and implementation.

      A screenshot from Info-Tech's Scale Business Process Automation Readiness Assessment

      Step 1.1

      Ground Your Scaling Expectations

      Activities

      1.1.1 Define Your Scaling Objectives

      This step involves the following participants:

      • Business Process Owners
      • Product Owners
      • Application Directors
      • Business Architects
      • BPA Delivery & Support Teams

      Outcomes of this step

      Scaling BPA objectives

      Organizations want to scale their initial BPA success

      Notable Initial Benefits

      1. Time Saved: "In the first day of live operations, the robots were saving 51 hours each day or the equivalent of six people working an eight-hour shift." – Brendan MacDonald, Director of Customer Compliance Operations, Ladbrokes (UiPath)
      2. Documentation & Knowledge Sharing: "If certain people left, knowledge of some processes would be lost and we realized that we needed a reliable process management system in place." – Peta Kinnane, Acting Audit and Risk Coordinator, Liverpool City Council (Nintex)
      3. Improved Service Delivery: "Thanks to this automation, our percentage of triaged and assigned tickets is now 100%. Nothing falls through the cracks. It has also improved the time to assignment. We assign tickets 2x faster than before." – Sebastian Goodwin, Head of Cybersecurity, Nutanix (Workato)

      Can We Gain More From Automation?

      The Solution

      As industries evolve and adopt more tools and technology, their products, services, and business operating models become more complex. Task- and desktop-based automations are often not enough. More sophisticated and scaled automations are needed to simplify and streamline the process from end-to-end of complex operations and align them with organizational goals.

      Stakeholders see automation as an opportunity to scale the business

      The value of scaling BPA is dependent on the organization's ability to scale with it. In other words, stakeholders should see an increase in business value without a substantial increase in resources and operational costs (e.g., there should be little difference if sending out 10 emails versus 1000).

      Examples of how business can be scaled with automation

      • Processes triggered by incoming documents or email: in these processes, an incoming document or email (that has semi-structured or unstructured data) is collected by a script or an RPA bot. This document is then processed with a machine learning model that validates it either by rules or ML models. The validated and enriched machine-readable data is then passed on to the next system of record.
      • The accounts payable process: this process includes receiving, processing, and paying out invoices from suppliers that provided goods or services to the company. While manual processing can be expensive, take too much time, and lead to errors, businesses can automate this process with machine learning and document extraction technologies like optical characters recognition (OCR), which converts texts containing images into characters that can be readable by computers to edit, compute, and analyze.
      • Order management: these processes include retrieving email and relevant attachments, extracting information that tells the business what its customers want, updating internal systems with newly placed orders or modifications, or taking necessary actions related to customer queries.
      • Enhance customer experience: [BPA tools] can help teams develop and distribute customer loyalty offers faster while also optimizing these offers with customer insights. Now, enterprises can more easily guarantee they are delivering the relevant solutions their clients are demanding.

      Source: Stefanini Group

      Scaling BPA has its challenges

      Perceived Lack of Opportunities

      Pilot BPA implementations often involve the processes that are straightforward to automate or are already shortlisted to optimize. However, these low-hanging fruits will run out. Discovering new BPA opportunities can be challenged for a variety of reasons, such as:

      • Lack of documentation and knowledge
      • Low user participation or drive to change
      • BPA technology limitations and constraints

      Perceived Lack of Opportunities

      BPA is not a cheap investment. A single RPA bot, for example, can cost between $5,000 to $15,000. This cost does not include the added cost for training, renewal fees, infrastructure set up and other variable and reoccurring costs that often come with RPA delivery and support (Blueprint). This reality can motivate BPA owners to favor existing technologies over other cheaper and more effective alternatives in an attempt boost their return on investment.

      Ill-Equipped Support Teams

      Good technical skills and tools, and the right mindset are critical to ensure BPA capabilities are deployed effectively. Low-code no-code (LCNC) can help but success isn't guaranteed. Lack of experience with low-code platforms is the biggest obstacle in low-code adoption according to 60% of respondents (Creatio). The learning curve has led some organizations to hire contractors to onboard BPA teams, hire new employees, or dedicate significant funding and resources to upskill internal resources.

      Shift your objectives from task-based efficiencies to value-driven capabilities

      How can I improve myself?

      How can we improve my team?

      How can we improve my organization?

      Objectives

      • Improve worker productivity
      • Improve the repeatability and predictability of the process
      • Deliver outputs of consistent quality and cadence
      • Increase process, tool, and technology confidence
      • Increase the team's throughput, commitment, and load
      • Apply more focus on cognitive and complex tasks
      • Reduce the time to complete error-prone, manual, and routine collaborations
      • Deliver insightful, personalized, and valuable outputs
      • Drive more value in existing pipelines and introduce new value streams
      • Deliver consistent digital experiences involving different technologies
      • Automatically tailor a customer's experience to individual preferences
      • Forecast and rapidly respond to customer issues and market trends

      Goals

      • Learn the fit of BPA & set the foundations
      • Improve the practices & tools and optimize the performance
      • Scale BPA capabilities throughout the organization

      Gauge the success of your scaled BPA

      BPA Practice Effectiveness

      Key Question: Are stakeholders satisfied with how the BPA practice is meeting their automation needs?

      Examples of Metrics:

      • User satisfaction
      • Automation request turnaround time
      • Throughput of BPA team

      Automation Solution Quality

      Key Question: How do your automation solutions perform and meet your quality standards?

      Examples of Metrics:

      • Licensing and operational costs
      • Service level agreement and uptime/downtime
      • Number of defects

      Business Value Delivery

      Key Question: How has automation improved the value your employees, teams, and the organization delivers?

      Examples of Metrics:
      Increase in revenue generation
      Reduction in operational costs
      Expansion of business capabilities with minimal increases in costs and risks

      1.1.1 Define your scaling objectives

      5 minutes

      1. Complete the following fields to build your scaled business process automation canvas:
        1. Problem that scaling BPA is intending to solve
        2. Your vision for scaling BPA
        3. Stakeholders
        4. Scaled BPA business and IT objectives and metrics
        5. Business capabilities, processes, and application systems involved
        6. Notable constraints, roadblocks, and challenges to your scaled BPA success
      2. Document your findings and discussions in Info-Tech's Scale Business Process Automation Readiness Assessment.

      Output

      Scaled BPA value canvas

      Participants

      • Business Process Owners
      • Product Owners
      • Application Directors
      • Business Architects
      • BPA Delivery & Support Teams

      Record the results in the 2. Value Canvas Tab in the Scale Business Process Automation Readiness Assessment.

      1.1.1 cont'd

      Scaled BPA Value Canvas Template:

      A screenshot of Scaled BPA Value Canvas Template

      Align your objectives to your application portfolio strategy

      Why is an application portfolio strategy important for BPA?

      • All business process optimizations are designed, delivered, and managed to support a consistent interpretation of the business and IT vision and goals.
      • Clear understanding of the sprawl, criticality, and risks of automation solutions and applications to business capabilities.
      • BPA initiatives are planned, prioritized, and coordinated alongside modernization, upgrades, and other changes to the application portfolio.
      • Resources, skills, and capacities are strategically allocated to meet BPA demand considering other commitments in the backlog and roadmap.
      • BPA expectations and practices uphold the persona, values, and principles of the application team.

      What is an application portfolio strategy?

      An application portfolio strategy details the direction, activities, and tactics to deliver on the promise of your application portfolio. It often includes:

      • Portfolio vision and goals
      • Application, automation, and process portfolio
      • Values and principles
      • Portfolio health
      • Risks and constraints
      • Strategic roadmap

      See our Application Portfolio Management Foundations blueprint for more information.

      Leverage your BPA champions to drive change and support scaling initiatives

      An arrow showing the steps to Leverage your BPA champions to drive change and support scaling initiatives

      Expected Outcome From Your Pilot: Your pilot would have recognized the roles that know how to effectively apply good BPA practices (e.g., process analysis and optimization) and are familiar with the BPA toolset. These individuals are prime candidates who can standardize your Build a Winning Business Process Automation Playbook, upskill interested teams, and build relationships among those involved in the delivery and use of BPA.

      Step 1.2

      Define Your Scaling Journey

      Activities

      1.2.1 Discuss Your BPA Opportunities
      1.2.2 Lay Out Your Scaling BPA Journey

      Scale Business Process Automation

      This step involves the following participants:

      • Business Process Owners
      • Product Owners
      • Application Directors
      • Business Architects
      • BPA Delivery & Support Teams

      Outcomes of this step

      • List of scaling BPA opportunities
      • Tailored scaling journey

      Maintain a healthy demand pipeline

      A successful scaled BPA practice requires a continuous demand for BPA capabilities and the delivery of minimum viable automations (MVA) held together by a broader strategic roadmap.

      An image of a healthy demand pipeline.  it flows from opportunities to trends, with inputs from internal and external sources.

      An MVA focuses on a single and small process use case, involves minimal possible effort to improve, and is designed to satisfy a specific user group. Its purpose is to maximize learning and value and inform the further scaling of the BPA technology, approach, or practice.

      See our Build a Winning Business Process Automation Playbook blueprint for more information.

      Investigate how BPA trends can drive more value for the organization

      • Event-Driven Automation
        Process is triggered by a schedule, system output, scenario, or user (e.g., voice-activated, time-sensitive, system condition)
      • Low- & No-Code Automation build and management are completed through an easy-to-learn scripting language and/or a GUI.
      • Intelligent Document Processing
        Transform documents for better analysis, processing and handling (e.g., optical character recognition) by a tool or system.
      • End-to-End Process Automation & Transparency
        Linking cross-functional processes to enable automation of the entire value stream with seamless handoffs or triggers.
      • Orchestration of Different BPA Technologies
        Integrating and sequencing the execution of multiple automation solutions through a single console.
      • Cognitive Automation
        AI and other intelligent technologies automate information-intensive processes, including semi and unstructured data and human thinking simulation.
      • Intelligent Internet-of-Things
        Connecting process automation technologies to physical environments with sensors and other interaction devices (e.g., computer vision).
      • Ethical Design
        Optimizing processes that align to the moral value, principles, and beliefs of the organization (e.g., respects data privacy, resists manipulative patterns).
      • User Profiling & Tailored Experiences
        Customizing process outputs and user experience with user-defined configurations or system and user activity monitoring.
      • Process Mining & Discovery
        Gleaning optimization opportunities by analyzing system activities (mining) or monitoring user interactions with applications (discovery).

      1.2.1 Discuss your BPA opportunities

      5 minutes

      1. Review the goals and objectives of your initiative and the expectations you want to gain from scaling BPA.
      2. Discuss how BPA trends can be leveraged in your organization.
      3. List high priority scaling BPA opportunities.

      Output

      • Scaled BPA opportunities

      Participants

      • Business Process Owners
      • Product Owners
      • Application Directors
      • Business Architects
      • BPA Delivery & Support Teams

      Create your recipe for success

      Your scaling BPA recipe (approach) can involve multiple different flavors of various quantities to fit the needs and constraints of your organization and workers.

      What and how many ingredients you need is dependent on three key questions:

      1. How can we ease BPA implementation?
      2. How can we broaden the BPA scope?
      3. How can we loosen constraints?

      Personalize Scaling BPA To Your Taste

      • Extend BPA Across Business Units (Horizontal)
      • Integrate BPA Across Your Application Architecture (Vertical)
      • Embed AI/ML Into Your Automation Technologies
      • Empower Users With Business-Managed Automations
      • Combine Multiple Technologies for End-to-End Automation
      • Increase the Volume and Velocity of Automation
      • Automate Cognitive Processes and Making Variable Decisions

      Answer these questions in the definition of your scaling BPA journey

      Seeing the full value of your scaling approach is dependent on your ability to support BPA adoption across the organization

      How can we ease BPA implementation?

      • Good governance practices (e.g., role definitions, delivery and management processes, technology standards).
      • Support for innovation and experimentation.
      • Interoperable and plug-and-play architecture.
      • Dedicated technology management and support, including resources, documents, templates and shells.
      • Accessible and easy-to-understand knowledge and document repository.

      How can we broaden BPA scope?

      • Provide a unified experience across processes, fragmented technologies, and siloed business functions.
      • Improve intellectually intensive activities, challenging decision making and complex processes with more valuable insights and information using BPA.
      • Proactively react to business and technology environments and operational changes and interact with customers with unattended automation.
      • Infuse BPA technologies into your product and service to expand their functions, output quality, and reliability.

      How can we loosen constraints?

      • Processes are automated without the need for structured data and optimized processes, and there is no need to work around or avoid legacy applications.
      • Workers are empowered to develop and maintain their own automations.
      • Coaching, mentoring, training, and onboarding capabilities.
      • Accessibility and adoption of underutilized applications are improved with BPA.
      • BPA is used to overcome the limitations or the inefficiencies of other BPA technologies.

      1.2.2 Lay out your scaling BPA journey

      5 minutes

      1. Review the goals and objectives of your initiative, the expectations you want to gain from scaling BPA, and the various scaling BPA opportunities.
      2. Discuss the different scaling BPA flavors (patterns) and how each flavor is applicable to your situation. Ask yourself these key questions:
        1. How can we ease BPA implementation?
        2. How can we broaden the BPA scope?
        3. How can we loosen constraints?
      3. Design the broad steps of your scaling BPA journey. See the following slide for an example.
      4. Document your findings and discussions in Info-Tech's Scale Business Process Automation Readiness Assessment.

      Record the results in the 3. Scaled BPA Journey Tab in the Scale Business Process Automation Readiness Assessment.

      Output

      • Scaled BPA journey

      Participants

      • Business Process Owners
      • Product Owners
      • Application Directors
      • Business Architects
      • BPA Delivery & Support Teams

      1.2.2 cont'd

      An image of the marker used to identify Continuous business process optimization and automation Continuous business process optimization and automation
      An image of the marker used to identify Scope of Info-Tech's Build Your Business Process Automation Playbook blueprintScope of Info-Tech's Build Your Business Process Automation Playbook blueprint

      Example:

      An example of the BPA journey.  Below are the links included in the journey.

      Continuously review and realign expectations

      Optimizing your scaled BPA practices and applying continuous improvements starts with monitoring the process after implementation.

      Purpose of Monitoring

      1. Diligent monitoring confirms your scaled BPA implementation is performing as desired and meeting initial expectations.
      2. Holding reviews of your BPA practice and implementations helps assess the impact of marketplace and business operations changes and allows the organization to stay on top of trends and risks.

      Metrics

      Metrics are an important aspect of monitoring and sustaining the scaled practice. The metrics will help determine success and find areas where adjustments may be needed.

      Hold retrospectives to identify any practice issues to be resolved or opportunities to undertake

      The retrospective gives your organization the opportunity to review themselves and brainstorm solutions and a plan for improvements to be actioned. This session is reoccurring, typically, after key milestones. While it is important to allow all participants the opportunity to voice their opinions, feelings, and experiences, retrospectives must be positive, productive, and time boxed.

      Step 1.3

      Prepare to Scale BPA

      Activities

      1.3.1 Assess Your Readiness to Scale BPA

      This step involves the following participants:

      • Business Process Owners
      • Product Owners
      • Application Directors
      • Business Architects
      • BPA Delivery & Support Teams

      Outcomes of this step

      • Scale BPA readiness assessment

      Prepare to scale by learning from your pilot implementations

      "While most organizations are advised to start with automating the 'low hanging fruit' first, the truth is that it can create traps that will impede your ability to achieve RPA at scale. In fact, scaling RPA into the organizational structure is fundamentally different from implementing a conventional software product or other process automation."
      – Blueprint

      What should be the takeaways from your pilot?

      Degree of Required BPA Support

      • Practices needed to address the organization's tolerance to business process changes and automation adoption.
      • Resources, budget and skills needed to configure and orchestrate automation technologies to existing business applications and systems.

      Technology Integration & Compatibility

      • The BPA technology and application system's flexibility to be enhanced, modified, and removed.
      • Adherence to data and system quality standards (e.g., security, availability) across all tools and technologies.

      Good Practices Toolkit

      • A list of tactics, techniques, templates, and examples to assist teams assessing and optimizing business processes and applying BPA solutions in your organization's context.
      • Strategies to navigate common blockers, challenges, and risks.

      Controls & Measures

      • Defined guardrails aligned to your organization's policies and risk tolerance
      • Key metrics are gathered to gauge the value and performance of your processes and automations for enhancements and further scaling.

      Decide how to architect and govern your BPA solutions

      Centralized

      A single body and platform to coordinate, execute, and manage all automation solutions.

      An image of the Centralized approach to governing BPA solutions.

      Distributed

      Automation solutions are locally delivered and managed whether that is per business unit, type of technology, or vendor. Some collaboration and integration can occur among solutions but might be done without a holistic strategy or approach.

      An image of the Distributed approach to governing BPA solutions.

      Hybrid

      Automation solutions are locally delivered and managed and executed for isolated use cases. Broader and complex automations are centrally orchestrated and administered.

      An image of the Hybrid approach to governing BPA solutions.

      Be prepared to address the risks with scaling BPA

      "Companies tend to underestimate the complexity of their business processes – and bots will frequently malfunction without an RPA design team that knows how to anticipate and prepare for most process exceptions. Unresolved process exceptions rank among the biggest RPA challenges, prompting frustrated users to revert to manual work."
      – Eduardo Diquez, Auxis, 2020

      Scenarios

      • Handling Failures of Dependent Systems
      • Handling Data Corruption & Quality Issues
      • Alignment to Regulatory & Industry Standards
      • Addressing Changes & Regressions to Business Processes
      • "Run Away" & Hijacked Automations
      • Unauthorized Access to Sensitive Information

      Recognize the costs to support your scaled BPA environment

      Cost Factors

      Automation Operations
      How will chaining multiple BPA technologies together impact your operating budget? Is there a limit on the number of active automations you can have at a single time?

      User Licenses
      How many users require access to the designer, orchestrator, and other functions of the BPA solution? Do they also require access to dependent applications, services, and databases?

      System Enhancements
      Are application and system upgrades and modernizations needed to support BPA? Is your infrastructure, data, and security controls capable of handling BPA demand?

      Supporting Resources
      Are dedicated resources needed to support, govern, and manage BPA across business and IT functions? Are internal resources or third-party providers preferred?

      Training & Onboarding
      Are end users and supporting resources trained to deliver, support, and/or use BPA? How will training and onboarding be facilitated: internally or via third party providers?

      Create a cross-functional and supportive body to lead the scaling of BPA

      Your supportive body is a cross-functional group of individuals promoting collaboration and good BPA practices. It enables an organization to extract the full benefits from critical systems, guides the growth and evolution of strategic BPA implementations, and provides critical expertise to those that need it. A supportive body distinctly caters to optimizing and strengthening BPA governance, management, and operational practices for a single technology or business function or broadly across the entire organization encompassing all BPA capabilities.

      What a support body is not:

      • A Temporary Measure
      • Exclusive to Large Organizations
      • A Project Management Office
      • A Physical Office
      • A Quick Fix

      See our Maximize the Benefits from Enterprise Applications With a Center of Excellence blueprint for more information.

      What are my options?

      Center of Excellence (CoE)
      AND
      Community of Practice (CoP)

      CoEs and CoPs provide critical functions

      An image of the critical functions provided by CoE and CoP.

      Shift your principles as you scale BPA

      As BPA scales, users and teams must not only think of how a BPA solution operates at a personal and technical level or what goals it is trying to achieve, but why it is worth doing and how the outcomes of the automated process will impact the organization's reputation, morality, and public perception.

      An image of the journey from Siloed BPA to Scaled BPA.

      "I think you're going to see a lot of corporations thinking about the corporate responsibility of [organizational change from automation], because studies show that consumers want and will only do business with socially responsible companies."

      – Todd Lohr

      Source: Appian, 2018.

      Assess your readiness to scale BPA

      Vision & Objectives
      Clear direction and goals of the business process automation practice.

      Governance
      Defined BPA roles and responsibilities, processes, and technology controls.

      Skills & Competencies
      The capabilities users and support roles must have to be successful with BPA.

      Business Process Management & Optimization
      The tactics to document, analyze, optimize, and monitor business processes.

      Business Process Automation Delivery
      The tactics to review the fit of automation solutions and deliver and support according to end user needs and preferences.

      Business Process Automation Platform
      The capabilities to manage BPA platforms and ensure it supports the growing needs of the business.

      1.3.1 Assess your readiness to scale BPA

      5 minutes

      1. Review your scaling BPA journey and selected patterns.
      2. Conduct a readiness assessment using the 4. Readiness Assessment tab in Info-Tech's Scale Business Process Automation Readiness Assessment.
      3. Brainstorm solutions to improve the capability or address the gaps found in this assessment.

      Output

      • Scaled BPA readiness assessment

      Participants

      • Business Process Owners
      • Product Owners
      • Application Directors
      • Business Architects
      • BPA Delivery & Support Teams

      Record the results in the 4. Readiness Assessment tab in Info-Tech's Scale Business Process Automation Readiness Assessment.

      Info-Tech offers various levels of support to best suit your needs

      DIY Toolkit

      “Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful.”

      Guided Implementation

      “Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track.”

      Workshop

      “We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place.”

      Consulting

      “Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project.”

      Diagnostics and consistent frameworks used throughout all four options

      Related Info-Tech Research

      Bibliography

      Alston, Roland. "With the Rise of Intelligent Automation, Ethics Matter Now More than Ever." Appian, 4 Sept. 2018. Web.
      "Challenges of Achieving RPA at Scale." Blueprint, N.d. Web.
      Dilmegani, Cem. "RPA Benefits: 20 Ways Bots Improve Businesses in 2023," AI Multiple, 9 Jan 2023. Web.
      Diquez, Eduardo. "Struggling To Scale RPA? Discover The Secret to Success." Auxis, 30 Sept. 2020. Web.
      "How much does Robotic Process Automation (RPA) Really Cost?" Blueprint, 14 Sept. 2021. Web.
      "Liverpool City Council improves document process with Nintex." Nintex, n.d. Web.
      "The State of Low-Code/No-Code." Creatio, 2021. Web.
      "Using automation to enhance security and increase IT NPS to 90+ at Nutanix." Workato, n.d. Web.
      "What Is Hyperautomation? A Complete Guide To One Of Gartner's Top Tech Trends." Stefanini Group, 26 Mar. 2021. Web.